WO2002048982A1 - Intruder detection through trajectory analysis in monitoring and surveillance systems - Google Patents
Intruder detection through trajectory analysis in monitoring and surveillance systems Download PDFInfo
- Publication number
- WO2002048982A1 WO2002048982A1 PCT/EP2001/013822 EP0113822W WO0248982A1 WO 2002048982 A1 WO2002048982 A1 WO 2002048982A1 EP 0113822 W EP0113822 W EP 0113822W WO 0248982 A1 WO0248982 A1 WO 0248982A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- individual
- trajectory
- match
- alarm signal
- monitoring
- Prior art date
Links
Classifications
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B13/00—Burglar, theft or intruder alarms
- G08B13/18—Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength
- G08B13/189—Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems
- G08B13/194—Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems
- G08B13/196—Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
- G08B13/19602—Image analysis to detect motion of the intruder, e.g. by frame subtraction
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B13/00—Burglar, theft or intruder alarms
- G08B13/18—Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength
- G08B13/189—Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems
- G08B13/194—Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems
- G08B13/196—Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
- G08B13/19602—Image analysis to detect motion of the intruder, e.g. by frame subtraction
- G08B13/19613—Recognition of a predetermined image pattern or behaviour pattern indicating theft or intrusion
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B13/00—Burglar, theft or intruder alarms
- G08B13/18—Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength
- G08B13/189—Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems
- G08B13/194—Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems
- G08B13/196—Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
- G08B13/19639—Details of the system layout
- G08B13/19645—Multiple cameras, each having view on one of a plurality of scenes, e.g. multiple cameras for multi-room surveillance or for tracking an object by view hand-over
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B13/00—Burglar, theft or intruder alarms
- G08B13/18—Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength
- G08B13/189—Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems
- G08B13/194—Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems
- G08B13/196—Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
- G08B13/19639—Details of the system layout
- G08B13/19652—Systems using zones in a single scene defined for different treatment, e.g. outer zone gives pre-alarm, inner zone gives alarm
Definitions
- the present invention relates generally to security monitoring systems and, more particularly, to a security monitoring system that uses trajectories in a way to establish abnormal behavior and triggers an appropriate alarm in response thereto.
- Security monitoring systems of the prior art utilize a box that monitors contact sensors for doors and windows and one or more infra-red sensors for area monitoring.
- a contact is triggered or an infra-red sensor triggers
- an alarm is sounded and a signal is sent via a data link such as a phone line to a central monitoring site.
- the central monitoring site typically initiates a set of phone calls, to the homeowner, to work, and/or to a designated neighbor to determine if the alarm signal was due to an unauthorized intruder or just to an accidental triggering by a family member or other authorized occupant of the structure.
- the alarm signal cannot be resolved by the phone calls, it is passed to the local police department. 95% of the calls passed to the police department turn out to be "false alarms" in the sense that they were not due to an unauthorized intruder.
- the security monitoring system comprises: at least one camera for monitoring a path of an individual inside and/or outside a structure; a recorder for recording the monitoring of the individual; trajectory analysis means for computing a trajectory of the path of the individual from the recorded monitoring; comparison means for comparing the trajectory against known trajectories; and an alarm system for transmitting an alarm signal based on the comparison.
- the at least one camera comprises a camera for each of an entrance, exit, and one or more rooms of the structure and the at least one camera is a video camera where the recorder records video segments of the path of the individual inside and/or outside the structure.
- the alarm system transmits the alarm signal if the trajectory does not match one of the known trajectories and does not transmit the alarm signal if the trajectory does match one of the known trajectories.
- the system further comprises: a database for storing image data for each authorized individual of the structure; and a recognition system for comparing images of the individual from the at least one camera with the stored image data in the database and for determining if the individual is one of the authorized individuals.
- the stored image data in the database are preferably face images in which case the recognition system is a face recognition system.
- the alarm system transmits the alarm signal if the trajectory does not match one of the known trajectories and the individual is determined not to be one of the authorized individuals and does not transmit the alarm signal if the trajectory does match one of the known trajectories or the individual is determined to be one of the authorized individuals.
- the method comprises the steps of: monitoring a path of an individual inside and/or outside the structure; recording the monitoring of the individual; computing a trajectory of the path of the individual from the monitoring; comparing the trajectory against known trajectories; and determining whether to transmit an alarm signal based on the comparison.
- the computing step preferably comprises computing the trajectory of the individual based on spatial and/or timing information derived from the monitoring. More preferably, the determining step comprises transmitting the alarm signal if the trajectory does not match one of the known trajectories and not transmitting the alarm signal if the trajectory does match one of the known trajectories.
- the methods further comprises the steps of: storing image data for each authorized individual of the structure; and comparing images of the individual from the at least one camera with the stored image data in the database and for determining if the individual is one of the authorized individuals.
- the determining step comprises transmitting the alarm signal if the trajectory does not match one of the known trajectories and the individual is determined not to be one of the authorized individuals and not transmitting the alarm signal if the trajectory does match one of the known trajectories or the individual is determined to be one of the authorized individuals.
- the method further comprises the step of adding the trajectory to the known trajectories.
- Figure 1 illustrates a schematical view of a structure having the security monitoring system of the present invention.
- Figure 2 illustrates a flow chart of a preferred implementation of a method for monitoring the structure of Figure 1.
- the present invention is a security monitoring system and methods for using the same that uses trajectories in a way to establish abnormal behavior and triggers an appropriate alarm by monitoring the entrance, exit, and/or other rooms of a structure; recording key video segments; tracking the individual in the structure thereby producing trajectories; and performing a trajectory analysis. If an abnormal trajectory is found, the system can trigger an alarm signal, or alternatively, check whether the individual is authorized to be in the structure before triggering the alarm signal.
- Trajectory as used in the present invention describes the path of an individual within one or multiple rooms of a structure, and/or possibly outside of the structure. It can include not only spatial information (where the person went) but also timing information (speed of motion, whether the individual stopped at a certain spot and for how long, etc.).
- the system of the present invention is based on the notion that each individual exhibits certain characteristics as they perform activities in a structure. This is particularly true for members of a residential household. For instance, when an individual enters a house, he or she might first go to check the mail, open the refrigerator, switch on the television, etc. These are activities that an unauthorized intruder is unlikely to perform.
- a trajectory is said to be "abnormal" if it does not match a known trajectory in a database of acceptable trajectories for each authorized individual in the structure. It is assumed that such a database has been built prior to the use of the system. However, as will be discussed below, the system of the present invention can also build the database of known trajectories as it is used with the utilization of a recognition system, such as face recognition.
- the security monitoring system 100 comprises at least one camera for monitoring a path of an individual inside and/or outside a structure 102.
- the security monitoring system 100 comprises several cameras including an exit and entrance camera 104, 106 and a room camera 108.
- Figure 1 illustrates only a single room camera 108, it is illustrated as such to generally describe the system and methods of the present invention.
- a room camera 108 is provided in each of several rooms and more preferably, in each room of the structure 102.
- the exit, entrance, and room cameras are preferably color video cameras.
- the exit, entrance, and/or room cameras 104, 106, 108 can be static or pan-tilt-zoom (PTZ) type.
- the exit and entrance cameras 104, 106 are shown mounted near the door 106 and facing towards the exit and entrance 102a, 104a, respectively. However, this configuration is illustrated for its simplicity.
- the exit and entrance cameras 102, 104 are mounted in a door 105 as is described in co-pending U.S. Patent Application No. 09/734780 (Docket No. 701662, 13935) which is incorporated herein by its reference.
- the system 100 of the present invention also comprises an image recording system 110 (alternatively referred to as a recorder) for recording the monitoring of the individual.
- the recorder 110 records the monitored path.
- the entire video sequence is recorded as long as the individual is in the camera's field of view.
- the image recording system 110 is preferably a computer or other processor having a storage device such as a hard drive and an image capture card.
- the image recording system 110 can be of any type known in the art without departing from the scope and spirit of the present invention.
- a trajectory analysis means such as a computer vision system 112 computes a trajectory of the path of the individual from the recorded monitoring. The computed trajectory is then compared against known trajectories in a database 114. The known trajectories in the database 114 are preferably associated with each authorized individual of the structure. If there is no match between the computed trajectory and a known trajectory in the database 114, an alarm system 116 triggers an alarm signal and preferably transmits the same to a central monitoring site 118 via a data link 119, such as a telephone line (POTS).
- POTS telephone line
- the alarm system 116 can be a typical alarm system known in the art having magnetic door contact sensors 120 and/or infrared detectors (not shown) which is additionally capable of receiving and processing information from the computer vision system 112.
- the security monitoring system also includes an alarm system 110.
- the security monitoring system 100 further comprises a database for storing image data for each authorized individual of the structure, such as face image data. In the case of a residential home, the faces of the people living in the home are recorded, preferably by the exit and/or entry cameras 104, 106 and stored in the database 114.
- Figure 1 illustrates a single database 114 for both.
- the security monitoring system 100 can alternatively utilize the recognition system 122 which compares the images of the individual from one of the cameras 104, 106, 120 with the stored image data (e.g., faces) in the database 114 to determine if the individual is one of the authorized individuals. If there is no match between the stored images with the stored image data in the database 114 then the system 100 proceeds as described above by triggering an alarm signal to the central monitoring site 118.
- Face recognition algorithms and systems are well known in the art, such as the one described by S. Gutta et al., Face Recognition, Sixth International Conference on Computer Vision, pgs. 646- 651, IEEE, January 4-7 1998, Mumbai, India.
- the alarm signal is not triggered.
- the computed trajectory does not match one of the known trajectories in the database 114 but the face of the individual matches one of the faces of an authorized individual, the computed trajectory is added to the known trajectories for that individual.
- image data generally in the form of color video image data is captured by interior and/or exterior cameras 104, 106, 108 to monitor a path of an individual inside and/or outside the structure 102.
- the monitored path of the individual is recorded in the image recording system 110.
- the computer vision system 112 analyzes the recorded image data and computes a trajectory of the path of the individual.
- the computed trajectory is compared against the known trajectories in the database 114.
- step 210 it is determined whether or not the computed trajectory matches one of the known trajectories. If there is a match between the computed trajectory and one of the known trajectories, the method proceeds along path 210a to step 212 where the alarm system 16 does not trigger an alarm. In other words, the detection of the individual does not trigger an alarm because his trajectory matches one of the known trajectories making him likely to have authorization to be in the structure. If the computed trajectory does not match one of the known trajectories, then the method can proceed along path 210b (shown as a dotted line) to step 214 where the alarm system 116 triggers an alarm and preferably transmits that alarm signal to a central monitoring site 118 along a data link 119.
- path 210b shown as a dotted line
- the method preferably proceeds along path 210c to step 216.
- a comparison is made between images of the individual from one of the cameras and stored image data in the database 114 (preferably face data of the individuals authorized to be in the structure).
- the method proceeds along path 218b to step 212 where it is determined not to trigger an alarm signal.
- the method preferably also adds the computed trajectory to the known trajectories for the recognized individual at step 220.
- the system can build an acceptable database of known trajectories while it is being used and can also account for changes in habit or circumstance by any of the authorized individuals. For instance, - ⁇ rniture can be moved making for a different path to the refrigerator, or an authorized individual may become permanently or temporarily disabled and his or her path may become more efficient.
Landscapes
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Engineering & Computer Science (AREA)
- Computer Vision & Pattern Recognition (AREA)
- Alarm Systems (AREA)
- Closed-Circuit Television Systems (AREA)
- Testing Electric Properties And Detecting Electric Faults (AREA)
- Keying Circuit Devices (AREA)
- Burglar Alarm Systems (AREA)
- Image Processing (AREA)
- Image Analysis (AREA)
Abstract
Description
Claims
Priority Applications (4)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
AT01270868T ATE300071T1 (en) | 2000-12-12 | 2001-11-26 | BURGLARY DETECTION THROUGH TRAJECTORY ANALYSIS IN SUPERVISION AND MONITORING SYSTEMS |
DE60112123T DE60112123T2 (en) | 2000-12-12 | 2001-11-26 | BREAKER RECOGNITION BY TRAJECTORIAL ANALYSIS IN SUPERVISION AND MONITORING SYSTEMS |
JP2002550616A JP3974038B2 (en) | 2000-12-12 | 2001-11-26 | Intruder detection using trajectory analysis in surveillance and reconnaissance systems |
EP01270868A EP1350234B1 (en) | 2000-12-12 | 2001-11-26 | Intruder detection through trajectory analysis in monitoring and surveillance systems |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US09/734,821 | 2000-12-12 | ||
US09/734,821 US6441734B1 (en) | 2000-12-12 | 2000-12-12 | Intruder detection through trajectory analysis in monitoring and surveillance systems |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2002048982A1 true WO2002048982A1 (en) | 2002-06-20 |
Family
ID=24953199
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/EP2001/013822 WO2002048982A1 (en) | 2000-12-12 | 2001-11-26 | Intruder detection through trajectory analysis in monitoring and surveillance systems |
Country Status (7)
Country | Link |
---|---|
US (2) | US6441734B1 (en) |
EP (1) | EP1350234B1 (en) |
JP (1) | JP3974038B2 (en) |
CN (1) | CN1276395C (en) |
AT (1) | ATE300071T1 (en) |
DE (1) | DE60112123T2 (en) |
WO (1) | WO2002048982A1 (en) |
Families Citing this family (96)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7124427B1 (en) * | 1999-04-30 | 2006-10-17 | Touch Technologies, Inc. | Method and apparatus for surveillance using an image server |
US7319479B1 (en) * | 2000-09-22 | 2008-01-15 | Brickstream Corporation | System and method for multi-camera linking and analysis |
US9892606B2 (en) | 2001-11-15 | 2018-02-13 | Avigilon Fortress Corporation | Video surveillance system employing video primitives |
US8564661B2 (en) | 2000-10-24 | 2013-10-22 | Objectvideo, Inc. | Video analytic rule detection system and method |
US8711217B2 (en) | 2000-10-24 | 2014-04-29 | Objectvideo, Inc. | Video surveillance system employing video primitives |
US6441734B1 (en) * | 2000-12-12 | 2002-08-27 | Koninklijke Philips Electronics N.V. | Intruder detection through trajectory analysis in monitoring and surveillance systems |
US6507309B2 (en) | 2001-03-16 | 2003-01-14 | Battelle Memorial Institute | Interrogation of an object for dimensional and topographical information |
US7365672B2 (en) * | 2001-03-16 | 2008-04-29 | Battelle Memorial Institute | Detection of a concealed object |
US7405692B2 (en) * | 2001-03-16 | 2008-07-29 | Battelle Memorial Institute | Detecting concealed objects at a checkpoint |
US20020171734A1 (en) * | 2001-05-16 | 2002-11-21 | Hiroshi Arakawa | Remote monitoring system |
US7079992B2 (en) * | 2001-06-05 | 2006-07-18 | Siemens Corporate Research, Inc. | Systematic design analysis for a vision system |
US6793128B2 (en) * | 2001-06-18 | 2004-09-21 | Hewlett-Packard Development Company, L.P. | Face photo storage system |
US7953219B2 (en) | 2001-07-19 | 2011-05-31 | Nice Systems, Ltd. | Method apparatus and system for capturing and analyzing interaction based content |
US7728870B2 (en) | 2001-09-06 | 2010-06-01 | Nice Systems Ltd | Advanced quality management and recording solutions for walk-in environments |
AU2002334356A1 (en) * | 2001-09-06 | 2003-03-18 | Nice Systems Ltd. | Recording of interactions between a customer and a sales person at a point of sales |
JP2003087771A (en) * | 2001-09-07 | 2003-03-20 | Oki Electric Ind Co Ltd | Monitoring system and monitoring method |
WO2003028358A2 (en) * | 2001-09-24 | 2003-04-03 | Nice Systems Ltd. | System and method for the automatic control of video frame rate |
WO2003044743A2 (en) * | 2001-11-20 | 2003-05-30 | Hutchins Nicholas D | Facilities management system |
US7688349B2 (en) * | 2001-12-07 | 2010-03-30 | International Business Machines Corporation | Method of detecting and tracking groups of people |
US7436887B2 (en) | 2002-02-06 | 2008-10-14 | Playtex Products, Inc. | Method and apparatus for video frame sequence-based object tracking |
US20050128304A1 (en) * | 2002-02-06 | 2005-06-16 | Manasseh Frederick M. | System and method for traveler interactions management |
WO2003067360A2 (en) * | 2002-02-06 | 2003-08-14 | Nice Systems Ltd. | System and method for video content analysis-based detection, surveillance and alarm management |
AU2003209654A1 (en) | 2002-03-07 | 2003-09-16 | Nice Systems Ltd. | Method and apparatus for internal and external monitoring of a transportation vehicle |
AU2003212630A1 (en) * | 2002-03-07 | 2003-09-16 | Nice Systems Ltd. | A system and method for traveler interactions management |
JP2003296855A (en) * | 2002-03-29 | 2003-10-17 | Toshiba Corp | Monitoring device |
US9712665B2 (en) | 2003-04-09 | 2017-07-18 | Nice Ltd. | Apparatus, system and method for dispute resolution, regulation compliance and quality management in financial institutions |
WO2005018097A2 (en) * | 2003-08-18 | 2005-02-24 | Nice Systems Ltd. | Apparatus and method for audio content analysis, marking and summing |
AU2003276661A1 (en) * | 2003-11-05 | 2005-05-26 | Nice Systems Ltd. | Apparatus and method for event-driven content analysis |
US7171024B2 (en) * | 2003-12-01 | 2007-01-30 | Brickstream Corporation | Systems and methods for determining if objects are in a queue |
TW200525449A (en) * | 2004-01-29 | 2005-08-01 | Lai Jin Ding | Human body image recognition system |
WO2005086046A1 (en) * | 2004-03-10 | 2005-09-15 | Nice Systems Ltd. | Apparatus and method for generating a content-based follow up |
CN100394454C (en) * | 2004-03-25 | 2008-06-11 | 浙江工业大学 | Intelligent security device |
US7086139B2 (en) * | 2004-04-30 | 2006-08-08 | Hitachi Global Storage Technologies Netherlands B.V. | Methods of making magnetic write heads using electron beam lithography |
TWI244624B (en) * | 2004-06-04 | 2005-12-01 | Jin-Ding Lai | Device and method for defining an area whose image is monitored |
US7868914B2 (en) | 2004-06-07 | 2011-01-11 | Sportsmedia Technology Corporation | Video event statistic tracking system |
US8204884B2 (en) * | 2004-07-14 | 2012-06-19 | Nice Systems Ltd. | Method, apparatus and system for capturing and analyzing interaction based content |
WO2006021943A1 (en) | 2004-08-09 | 2006-03-02 | Nice Systems Ltd. | Apparatus and method for multimedia content based |
US8724891B2 (en) | 2004-08-31 | 2014-05-13 | Ramot At Tel-Aviv University Ltd. | Apparatus and methods for the detection of abnormal motion in a video stream |
US7253766B2 (en) * | 2004-09-24 | 2007-08-07 | Battelle Memorial Institute | Three-dimensional surface/contour processing based on electromagnetic radiation interrogation |
US8078463B2 (en) * | 2004-11-23 | 2011-12-13 | Nice Systems, Ltd. | Method and apparatus for speaker spotting |
US8005675B2 (en) * | 2005-03-17 | 2011-08-23 | Nice Systems, Ltd. | Apparatus and method for audio analysis |
EP1867167A4 (en) * | 2005-04-03 | 2009-05-06 | Nice Systems Ltd | Apparatus and methods for the semi-automatic tracking and examining of an object or an event in a monitored site |
US7342493B2 (en) * | 2005-04-22 | 2008-03-11 | Ultravision Security Systems, Inc. | Motion detector |
US7386105B2 (en) * | 2005-05-27 | 2008-06-10 | Nice Systems Ltd | Method and apparatus for fraud detection |
JP4947936B2 (en) | 2005-08-11 | 2012-06-06 | ソニー株式会社 | Monitoring system and management device |
US7555146B2 (en) * | 2005-12-28 | 2009-06-30 | Tsongjy Huang | Identification recognition system for area security |
KR101268432B1 (en) * | 2006-01-09 | 2013-05-28 | 삼성전자주식회사 | Smart door open and close certification System using Smart Communicator and Method thereof |
WO2007086042A2 (en) * | 2006-01-25 | 2007-08-02 | Nice Systems Ltd. | Method and apparatus for segmentation of audio interactions |
US7844081B2 (en) * | 2006-05-15 | 2010-11-30 | Battelle Memorial Institute | Imaging systems and methods for obtaining and using biometric information |
US8248473B2 (en) * | 2006-10-05 | 2012-08-21 | Graber Curtis E | Robotic sentry with low dispersion acoustic projector |
US8760519B2 (en) * | 2007-02-16 | 2014-06-24 | Panasonic Corporation | Threat-detection in a distributed multi-camera surveillance system |
US7667596B2 (en) * | 2007-02-16 | 2010-02-23 | Panasonic Corporation | Method and system for scoring surveillance system footage |
US20080249858A1 (en) * | 2007-04-03 | 2008-10-09 | Robert Lee Angell | Automatically generating an optimal marketing model for marketing products to customers |
US9031858B2 (en) * | 2007-04-03 | 2015-05-12 | International Business Machines Corporation | Using biometric data for a customer to improve upsale ad cross-sale of items |
US9092808B2 (en) * | 2007-04-03 | 2015-07-28 | International Business Machines Corporation | Preferred customer marketing delivery based on dynamic data for a customer |
US8812355B2 (en) * | 2007-04-03 | 2014-08-19 | International Business Machines Corporation | Generating customized marketing messages for a customer using dynamic customer behavior data |
US8775238B2 (en) * | 2007-04-03 | 2014-07-08 | International Business Machines Corporation | Generating customized disincentive marketing content for a customer based on customer risk assessment |
US9846883B2 (en) * | 2007-04-03 | 2017-12-19 | International Business Machines Corporation | Generating customized marketing messages using automatically generated customer identification data |
US9031857B2 (en) * | 2007-04-03 | 2015-05-12 | International Business Machines Corporation | Generating customized marketing messages at the customer level based on biometric data |
US20080249866A1 (en) * | 2007-04-03 | 2008-10-09 | Robert Lee Angell | Generating customized marketing content for upsale of items |
US9685048B2 (en) * | 2007-04-03 | 2017-06-20 | International Business Machines Corporation | Automatically generating an optimal marketing strategy for improving cross sales and upsales of items |
US8639563B2 (en) * | 2007-04-03 | 2014-01-28 | International Business Machines Corporation | Generating customized marketing messages at a customer level using current events data |
US20080249865A1 (en) * | 2007-04-03 | 2008-10-09 | Robert Lee Angell | Recipe and project based marketing and guided selling in a retail store environment |
US8831972B2 (en) * | 2007-04-03 | 2014-09-09 | International Business Machines Corporation | Generating a customer risk assessment using dynamic customer data |
US20080249835A1 (en) * | 2007-04-03 | 2008-10-09 | Robert Lee Angell | Identifying significant groupings of customers for use in customizing digital media marketing content provided directly to a customer |
US9361623B2 (en) * | 2007-04-03 | 2016-06-07 | International Business Machines Corporation | Preferred customer marketing delivery based on biometric data for a customer |
US20080249864A1 (en) * | 2007-04-03 | 2008-10-09 | Robert Lee Angell | Generating customized marketing content to improve cross sale of related items |
US20080249870A1 (en) * | 2007-04-03 | 2008-10-09 | Robert Lee Angell | Method and apparatus for decision tree based marketing and selling for a retail store |
US9626684B2 (en) * | 2007-04-03 | 2017-04-18 | International Business Machines Corporation | Providing customized digital media marketing content directly to a customer |
US7696869B2 (en) * | 2007-04-05 | 2010-04-13 | Health Hero Network, Inc. | Interactive programmable container security and compliance system |
US7957565B1 (en) * | 2007-04-05 | 2011-06-07 | Videomining Corporation | Method and system for recognizing employees in a physical space based on automatic behavior analysis |
US7908237B2 (en) * | 2007-06-29 | 2011-03-15 | International Business Machines Corporation | Method and apparatus for identifying unexpected behavior of a customer in a retail environment using detected location data, temperature, humidity, lighting conditions, music, and odors |
US20090006125A1 (en) * | 2007-06-29 | 2009-01-01 | Robert Lee Angell | Method and apparatus for implementing digital video modeling to generate an optimal healthcare delivery model |
US7908233B2 (en) * | 2007-06-29 | 2011-03-15 | International Business Machines Corporation | Method and apparatus for implementing digital video modeling to generate an expected behavior model |
US20090005650A1 (en) * | 2007-06-29 | 2009-01-01 | Robert Lee Angell | Method and apparatus for implementing digital video modeling to generate a patient risk assessment model |
US20090083121A1 (en) * | 2007-09-26 | 2009-03-26 | Robert Lee Angell | Method and apparatus for determining profitability of customer groups identified from a continuous video stream |
US8195499B2 (en) * | 2007-09-26 | 2012-06-05 | International Business Machines Corporation | Identifying customer behavioral types from a continuous video stream for use in optimizing loss leader merchandizing |
US20090089107A1 (en) * | 2007-09-27 | 2009-04-02 | Robert Lee Angell | Method and apparatus for ranking a customer using dynamically generated external data |
US20090150321A1 (en) * | 2007-12-07 | 2009-06-11 | Nokia Corporation | Method, Apparatus and Computer Program Product for Developing and Utilizing User Pattern Profiles |
US8169481B2 (en) * | 2008-05-05 | 2012-05-01 | Panasonic Corporation | System architecture and process for assessing multi-perspective multi-context abnormal behavior |
KR20100062575A (en) * | 2008-12-02 | 2010-06-10 | 삼성테크윈 주식회사 | Method to control monitoring camera and control apparatus using the same |
CN101989371A (en) * | 2009-08-07 | 2011-03-23 | 樊晓青 | Anti-theft method |
US9449233B2 (en) * | 2010-12-01 | 2016-09-20 | The Trustees Of The University Of Pennsylvania | Distributed target tracking using self localizing smart camera networks |
US20130121529A1 (en) * | 2011-11-15 | 2013-05-16 | L-3 Communications Security And Detection Systems, Inc. | Millimeter-wave subject surveillance with body characterization for object detection |
US11470285B2 (en) | 2012-02-07 | 2022-10-11 | Johnson Controls Tyco IP Holdings LLP | Method and system for monitoring portal to detect entry and exit |
US9519853B2 (en) | 2013-11-01 | 2016-12-13 | James P Tolle | Wearable, non-visible identification device for friendly force identification and intruder detection |
JP6451133B2 (en) * | 2014-08-01 | 2019-01-16 | 株式会社リコー | Anomaly detection device, anomaly detection method, anomaly detection system, and program |
US20160378268A1 (en) * | 2015-06-23 | 2016-12-29 | Honeywell International Inc. | System and method of smart incident analysis in control system using floor maps |
US10755542B2 (en) * | 2016-12-06 | 2020-08-25 | At&T Intellectual Property I, L.P. | Method and apparatus for surveillance via guided wave communication |
WO2018119257A1 (en) | 2016-12-22 | 2018-06-28 | Active8 Software, LLC | Systems and methods for electronic ticketing, monitoring, and indicating permissive use of facilities |
EP3557549B1 (en) | 2018-04-19 | 2024-02-21 | PKE Holding AG | Method for evaluating a motion event |
CN109767527A (en) * | 2018-12-20 | 2019-05-17 | 深圳云天励飞技术有限公司 | Personal identification method and Related product |
GB2593209A (en) | 2020-03-20 | 2021-09-22 | Tj Morris Ltd | Security System |
TWI753427B (en) * | 2020-05-11 | 2022-01-21 | 台達電子工業股份有限公司 | A surveillance method with predictive track and trace and parking duration monitoring |
CN112257660B (en) * | 2020-11-11 | 2023-11-17 | 汇纳科技股份有限公司 | Method, system, equipment and computer readable storage medium for removing invalid passenger flow |
RU2755775C1 (en) * | 2021-01-14 | 2021-09-21 | Виктор Михайлович Крылов | Method for automatically generating digital model of protected object, analyzing the security systems of protected object and assessing vulnerability of a protected object, taking into account aforementioned analysis |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5764283A (en) * | 1995-12-29 | 1998-06-09 | Lucent Technologies Inc. | Method and apparatus for tracking moving objects in real time using contours of the objects and feature paths |
US5966074A (en) * | 1996-12-17 | 1999-10-12 | Baxter; Keith M. | Intruder alarm with trajectory display |
US5991429A (en) * | 1996-12-06 | 1999-11-23 | Coffin; Jeffrey S. | Facial recognition system for security access and identification |
EP0962894A2 (en) * | 1998-05-30 | 1999-12-08 | Neil James Stevenson | A vehicle entry/exit control system |
Family Cites Families (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CA1116286A (en) * | 1979-02-20 | 1982-01-12 | Control Data Canada, Ltd. | Perimeter surveillance system |
FR2593311B1 (en) * | 1986-01-22 | 1990-09-14 | Berruyer Yves | SYSTEM FOR PROTECTING A SET OF SITES IN A NETWORK BY ANTICIPATING A DISTURBANCE |
GB2223614A (en) | 1988-08-30 | 1990-04-11 | Gerald Victor Waring | Identity verification |
US5657076A (en) | 1993-01-12 | 1997-08-12 | Tapp; Hollis M. | Security and surveillance system |
US5982418A (en) | 1996-04-22 | 1999-11-09 | Sensormatic Electronics Corporation | Distributed video data storage in video surveillance system |
US5831669A (en) | 1996-07-09 | 1998-11-03 | Ericsson Inc | Facility monitoring system with image memory and correlation |
US6069655A (en) | 1997-08-01 | 2000-05-30 | Wells Fargo Alarm Services, Inc. | Advanced video security system |
GB2329542B (en) | 1997-09-17 | 2002-03-27 | Sony Uk Ltd | Security control system and method of operation |
JPH11328405A (en) | 1998-05-11 | 1999-11-30 | Mitsubishi Electric Corp | Facial shape discriminating device |
US6054928A (en) * | 1998-06-04 | 2000-04-25 | Lemelson Jerome H. | Prisoner tracking and warning system and corresponding methods |
GB2343945B (en) | 1998-11-18 | 2001-02-28 | Sintec Company Ltd | Method and apparatus for photographing/recognizing a face |
US6188318B1 (en) * | 1999-06-29 | 2001-02-13 | Pittway Corp. | Dual-technology intrusion detector with pet immunity |
US6441734B1 (en) * | 2000-12-12 | 2002-08-27 | Koninklijke Philips Electronics N.V. | Intruder detection through trajectory analysis in monitoring and surveillance systems |
-
2000
- 2000-12-12 US US09/734,821 patent/US6441734B1/en not_active Expired - Lifetime
-
2001
- 2001-11-26 CN CNB018048722A patent/CN1276395C/en not_active Expired - Lifetime
- 2001-11-26 JP JP2002550616A patent/JP3974038B2/en not_active Expired - Lifetime
- 2001-11-26 AT AT01270868T patent/ATE300071T1/en not_active IP Right Cessation
- 2001-11-26 WO PCT/EP2001/013822 patent/WO2002048982A1/en active IP Right Grant
- 2001-11-26 DE DE60112123T patent/DE60112123T2/en not_active Expired - Lifetime
- 2001-11-26 EP EP01270868A patent/EP1350234B1/en not_active Expired - Lifetime
-
2002
- 2002-07-11 US US10/194,128 patent/US6593852B2/en not_active Expired - Lifetime
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5764283A (en) * | 1995-12-29 | 1998-06-09 | Lucent Technologies Inc. | Method and apparatus for tracking moving objects in real time using contours of the objects and feature paths |
US5991429A (en) * | 1996-12-06 | 1999-11-23 | Coffin; Jeffrey S. | Facial recognition system for security access and identification |
US5966074A (en) * | 1996-12-17 | 1999-10-12 | Baxter; Keith M. | Intruder alarm with trajectory display |
EP0962894A2 (en) * | 1998-05-30 | 1999-12-08 | Neil James Stevenson | A vehicle entry/exit control system |
Also Published As
Publication number | Publication date |
---|---|
EP1350234B1 (en) | 2005-07-20 |
CN1401112A (en) | 2003-03-05 |
JP3974038B2 (en) | 2007-09-12 |
US20020171736A1 (en) | 2002-11-21 |
DE60112123D1 (en) | 2005-08-25 |
US6441734B1 (en) | 2002-08-27 |
US6593852B2 (en) | 2003-07-15 |
US20020070859A1 (en) | 2002-06-13 |
CN1276395C (en) | 2006-09-20 |
ATE300071T1 (en) | 2005-08-15 |
EP1350234A1 (en) | 2003-10-08 |
JP2004516560A (en) | 2004-06-03 |
DE60112123T2 (en) | 2006-05-24 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
EP1350234B1 (en) | Intruder detection through trajectory analysis in monitoring and surveillance systems | |
US6744462B2 (en) | Apparatus and methods for resolution of entry/exit conflicts for security monitoring systems | |
EP1346577B1 (en) | Method and apparatus to select the best video frame to transmit to a remote station for cctv based residential security monitoring | |
US7504942B2 (en) | Local verification systems and methods for security monitoring | |
US6690414B2 (en) | Method and apparatus to reduce false alarms in exit/entrance situations for residential security monitoring | |
US20070268145A1 (en) | Automated tailgating detection via fusion of video and access control | |
US20020070858A1 (en) | Placement of camera in door for face recognition-based security systems | |
US20070182543A1 (en) | Intelligent Home Security System | |
US20040223629A1 (en) | Facial surveillance system and method | |
CN111212274A (en) | Intelligent building security system | |
CN116457851B (en) | System and method for real estate monitoring | |
US20140240128A1 (en) | Barrier pressure detection system | |
US20110133930A1 (en) | Filtering video events in a secured area using loose coupling within a security system | |
CN210129251U (en) | Access control with edge recognition | |
KR20200023944A (en) | Inner door system with visitor monitoring function | |
CN211457260U (en) | Intelligent building security system | |
JPH11120455A (en) | Room enterance managing system | |
KR19990016367A (en) | Operation Method of Personal Surveillance / Security System Using Computer Screensaver and Image Processing / Compression Storage Technique |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AK | Designated states |
Kind code of ref document: A1 Designated state(s): CN JP |
|
AL | Designated countries for regional patents |
Kind code of ref document: A1 Designated state(s): AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE TR |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2001270868 Country of ref document: EP |
|
ENP | Entry into the national phase |
Ref country code: JP Ref document number: 2002 550616 Kind code of ref document: A Format of ref document f/p: F |
|
WWE | Wipo information: entry into national phase |
Ref document number: 018048722 Country of ref document: CN |
|
121 | Ep: the epo has been informed by wipo that ep was designated in this application | ||
WWP | Wipo information: published in national office |
Ref document number: 2001270868 Country of ref document: EP |
|
WWG | Wipo information: grant in national office |
Ref document number: 2001270868 Country of ref document: EP |