WO2015191844A2 - Improved alarm system - Google Patents

Improved alarm system Download PDF

Info

Publication number
WO2015191844A2
WO2015191844A2 PCT/US2015/035314 US2015035314W WO2015191844A2 WO 2015191844 A2 WO2015191844 A2 WO 2015191844A2 US 2015035314 W US2015035314 W US 2015035314W WO 2015191844 A2 WO2015191844 A2 WO 2015191844A2
Authority
WO
WIPO (PCT)
Prior art keywords
devices
processor
alerted
person
registered
Prior art date
Application number
PCT/US2015/035314
Other languages
French (fr)
Other versions
WO2015191844A3 (en
Inventor
Andrew Estrada
Mitchell HALL
Mark Benson
Peter Preuss
Original Assignee
Defensory, Inc.
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Defensory, Inc. filed Critical Defensory, Inc.
Publication of WO2015191844A2 publication Critical patent/WO2015191844A2/en
Publication of WO2015191844A3 publication Critical patent/WO2015191844A3/en

Links

Classifications

    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms
    • G08B13/18Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength
    • G08B13/189Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems
    • G08B13/194Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems
    • G08B13/196Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
    • G08B13/19602Image analysis to detect motion of the intruder, e.g. by frame subtraction
    • G08B13/19613Recognition of a predetermined image pattern or behaviour pattern indicating theft or intrusion
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B25/00Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems
    • G08B25/005Alarm destination chosen according to a hierarchy of available destinations, e.g. if hospital does not answer send to police station
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B29/00Checking or monitoring of signalling or alarm systems; Prevention or correction of operating errors, e.g. preventing unauthorised operation
    • G08B29/18Prevention or correction of operating errors
    • G08B29/185Signal analysis techniques for reducing or preventing false alarms or for enhancing the reliability of the system
    • G08B29/188Data fusion; cooperative systems, e.g. voting among different detectors

Definitions

  • the invention relates generally to home security systems and more specifically to various embodiments that facilitate security employing human motion detection, person identification technology, and a distributed alert/response network.
  • the alarm may be triggered by an intruder, or it may be triggered by members of the household, a family pet, or even curtains moving due to an open window or ventilation system. Even if a camera is employed, the homeowner must investigate to see what caused the alarm. If the homeowner is away or unavailable, then the monitoring service has to investigate or contact authorities. For these reasons, these types of systems are prone to false alarms. Finally, the use of a monitoring service is costly and increases response time. Since the monitoring service must first confirm the tripped alarm with the homeowner before calling police, valuable minutes are lost if an actual burglary is in progress. [0004] A need therefore exists for an improved home security system which overcomes these shortcomings.
  • the present invention improves on existing technology by providing a home security system that is always armed, senses human motion, distinguishes between known and unknown persons, and enables monitoring by a network of trusted individuals.
  • the invention provides a method.
  • the method includes detecting, by a motion detector connected to a security system, the presence of a person and transmitting information about the person along with a first unique identifier of the security system to a server; obtaining, by a registered device a second unique identifier of the security system, and transmitting the second unique identifier to the server along with a unique identifier of the registered device; comparing the first and second unique identifiers of the security system and the unique identifier of the registered device to a device list comprising a plurality of registered device identifiers, a plurality of security system identifiers, and any associations between the plurality of registered device identifiers and plurality of security system identifiers; determining, that the detected person is known if the first and second unique identifiers are identical and the second unique identifier is associated with the unique identifier of the registered device in the device list; and sending to a network of alerted devices information consisting of at least the time
  • the invention provides a method.
  • the method includes detecting, by a motion detector connected to a security system, the presence of a person; obtaining, by the security system, a unique identifier of a registered device that is in close proximity to the detected person; comparing the unique identifier of the registered device to a device list comprising a plurality of registered device identifiers; determining, that the detected person is known if the unique identifier is identical to one of the plurality of unique identifiers in the device list; and sending to a network of alerted devices information consisting of at least the time and date that the detection occurred and registered information of the registered device and the determination of known or unknown detected person.
  • the invention provides a system.
  • the system includes a data storage medium having computer executable instructions and a list of registered devices; a processor communicatively coupled to the data storage medium; a motion detector communicatively coupled to the processor; and a wireless transceiver
  • the processor being operable to execute the computer executable instructions to at least: detect the presence of a person using the motion detector; obtain a unique identifier of a registered device if present; compare the unique identifier against the list of registered devices; determine that the detected person is known if the unique identifier appears on the list of registered devices and unknown otherwise; and send to a network of alerted devices, information consisting of at least the time and date that the detection occurred and registered information of the registered device if any and the determination of the person being known or unknown.
  • the invention provides a method.
  • the method includes detecting, by a processor, a contiguous group of pixels in a video signal; comparing, by the processor, pixel locations within the group to corresponding pixels in one or more previous or subsequent frames of the video signal; estimating, by the processor, a motion velocity vector for each detected group of pixels based on direction and distance of movement of objects represented by each pixel from frame to frame of the video signal; assigning, by the processor, multiple detected groups of pixels into regions of uniform motion within which multiple detected groups of pixels 1) exhibit motion velocity vectors with the same direction and same non-zero speed of movement and 2) are located next to each other in the image; determining, by the processor, if the dimensions of any of the regions of uniform motion exceed a predetermined threshold, indicating a high likelihood of human motion; and communicating, by a wireless or wired transceiver, the presence of human motion to a security system.
  • the invention provides a system.
  • the system includes a data storage medium having computer executable instructions and a video stream; and a processor communicatively coupled to the data storage medium, the processor being operable to execute the computer executable instructions to at least: detect a contiguous group of pixels in the video stream; compare the detected group of pixels to one or more previous or subsequent frames in the video stream; estimate a motion velocity vector for each detected group of pixels based on direction and distance of movement of objects represented by each pixel from frame to frame of the video signal; assign multiple detected groups of pixels into regions of uniform motion within which multiple detected groups of pixels 1) exhibit motion velocity vectors with the same direction and same non-zero speed of movement and 2) are located next to each other in the image; determine if the number of pixels in any of the regions of uniform motion exceed a predetermined threshold, wherein exceeding the predetermined threshold is indicative of a high likelihood of human motion; and communicate the presence of human motion to a security system.
  • Figure 1 shows an exemplary system that facilitates security employing motion detection, tag identification, and notifications to one or more connected devices.
  • Figure 2 shows an exemplary remote device.
  • Figure 3 shows an exemplary server.
  • Figure 4 shows an exemplary trusted network.
  • Figure 5 shows an exemplary human motion detector.
  • the present invention is based on various embodiments that facilitate security employing human motion detection, person identification technology, and a distributed alert/response network.
  • compositions or methods comprising recited elements or steps contemplates particular embodiments in which the composition or method consists essentially of or consists of those elements or steps.
  • Wi-Fi Wireless Fidelity
  • Zigbee Zigbee
  • Bluetooth Long Term Evolution
  • LTE Long Term Evolution
  • 3 GPP Third Generation Partnership Project
  • wireless technologies enable a remote device to exchange security related information with a user and for the user to exchange control, configuration, and communication with the remote device.
  • the user may even communicate by real time voice and/or video with another person located near the remote device.
  • the aforementioned connected device may be a smart phone, a smart watch, a tablet computer, a laptop PC, or other such device to exchange the information.
  • the information itself may be carried by the wireless technology directly between the connected device and the remote device. Or the information may pass through a combination of networks and services such as the internet, server-based software, cloud software and services, wireless networks, and even other wired or optical technologies such as Ethernet or OCC (Optical camera communications).
  • networks and services such as the internet, server-based software, cloud software and services, wireless networks, and even other wired or optical technologies such as Ethernet or OCC (Optical camera communications).
  • the aforementioned remote device detects the presence of persons using a combination of sensor devices, location technologies, and motion detection technologies.
  • the remote device uses Bluetooth technology to sense a mobile phone on the person to be detected. By detecting that the mobile phone and the human motion are in the same location, the system determines that a person is present and further determines whether that person is known or unknown.
  • the remote device employs an identification means to identify the detected person as known or unknown.
  • a known person is one that has been previously registered with the remote device or the connected device. Such registration may take place through manual entry by the user, or by some automatic means such as facial recognition followed by confirmation by the user.
  • a list of known persons is maintained by the remote device, the connected device, or by a separate server accessible to both devices.
  • Various embodiments disclosed herein facilitate security through the use of sensors and methods to detect the presence of unknown persons and notify interested parties in a timely manner.
  • FIG. 1 illustrates an example system that facilitates security employing one or more remote devices.
  • System 100 can include one or more remote devices 102, an access point 104, a server 106, one or more registered devices 112, one or more alerted devices 108, one or more control devices 116 and/or a core network 114.
  • one or more of the remote devices 102, access point 104, server 106, one or more registered devices 112, one or more alerted devices 108, one or more control devices 116 and/or core network can be electrically or communicatively connected to one another to perform one or more functions of system 100.
  • the remote devices 102 and the access point 104 can be located in a secured area 110 (e.g., a residential property, a commercial property or the like).
  • a secured area 110 e.g., a residential property, a commercial property or the like.
  • the core network 114 can be or can include a wireless or wired network to which the remote device(s) 102, the access point 104, the server 106, the alerted device(s) 108, the control device(s) 116 and/or the registered device(s) 112 are communicatively coupled in some embodiments.
  • the core network 114 can include a broadband landline and/or one or more public cell sites to which the remote device(s) 102, the access point 104, the server 106, the alerted devices 108, and/or the registered device(s) 112 are
  • each remote device 102 can be assigned a universally unique identifier (UUID) by the manufacturer.
  • UUID universally unique identifier
  • a human operator can assign a unique description of each remote device 102. The human operator can enter the unique description at one of the control devices 116 which then sends the unique description to the corresponding remote device 102 and to the server 106.
  • each unique description can unambiguously identify the corresponding remote device in a way that is recognizable to the human operator of the control device 116.
  • a human operator can register each of the one or more registered devices 112 by sending an invitation from a control device 116.
  • Such an invitation can be a text message, an email, or some other notification and can contain a unique URL from which the person in possession of the registered device 112 can download and install an application software program.
  • the application software program Once the application software program is installed and starts executing, it can send a message through the core network 114 to the server 106.
  • Such message can contain information including but not limited to an identifier (e.g., phone number, user name, and the like) uniquely identifying the registered device 112, and the name of the person in possession of the registered device 112.
  • an identifier e.g., phone number, user name, and the like
  • the message can also contain a photograph of the person in possession of the registered device 112.
  • the remote device(s) 102 can monitor and detect one or more persons that enter the secured area 110.
  • any remote device 102 that detects a person in the secured area 110 can transmit a message through the core network 114 to the server 106 in response to the detection.
  • the remote device(s) 102 can transmit the message through the access point 104 and the core network 114 to the server 106 via a wired and/or wireline connection in various embodiments.
  • the transmitted message can contain the time and date of the detection, along with a unique description and/or the UUID of the detecting remote device 102.
  • the remote device can obtain from the registered device 112 an identifier that uniquely identifies the registered device 112. The aforementioned transmitted message can then contain the identifier that uniquely identifies the registered device 112 in addition to the UUID of the detecting remote device 102 and other items of information.
  • the detected person can carry on their person a registered device 112.
  • the registered device 112 can detect a beacon signal from each remote device 102 which uniquely identifies the remote device.
  • such beacon signal can contain the UUID of the remote device 102.
  • the beacon signal can be a Bluetooth advertisement.
  • the registered device 112 can transmit a message through the core network 114 to the server 106 in response to detecting the beacon signal from a remote device 102.
  • Such a transmitted message can contain information including but not limited to an identifier that uniquely identifies the registered device 112, the date and time of the detection, and the UUID of the remote device 102.
  • the transmitted message can also contain the location in geographic coordinates of the registered device 112 at the time of the detection.
  • the registered device 112 can wirelessly communicate with the remote device 102 in order to transfer an identifier that uniquely identifies the registered device 112 to the remote device 102.
  • Such wireless communication can employ Bluetooth, Wi-Fi, cellular telecommunications, or other wireless technology in various embodiments.
  • the registered device(s) 112, the control device(s) 116, and/or the alerted device(s) 108 can be smart phones, tablets, or smart watches with downloaded application software.
  • the same device can be a control device 116, a registered device 112 and an alerted device 108.
  • the same device can be a registered device 112 and an alerted device 108, without also being a control device 116.
  • a device can be a registered device 112 without also being a control device 116 or an alerted device 108.
  • the operator can assign one or more roles of registered device 112, control device 116, and/or control device to any device.
  • Fig. 2 illustrates an example remote device (e.g., remote device 102, 102').
  • the remote device 102' can include one or more of the structure and/or functionality of the remote device 102 with reference to Fig. 1.
  • the remote device 102' can include a processor component 200, a beacon transceiver component 202, a wireless transceiver component 204, a speaker component 206, one or more microphone components 208, a motion sensor component 210, a camera component 212 and/or one or more LED processor components 214.
  • one or more of the processor component 200, a beacon transceiver component 202, a wireless transceiver component 204, a speaker component 206, one or more microphone components 208, a motion sensor component 210, a camera component 212 and/or one or more LED processor components 214 can be electrically and/or communicatively coupled to one another to perform one or more of the functions of the remote device 102'.
  • the processor component 200 can execute computer executable instructions to implement the functions of the remote device 102' and can receive audio signals from the one or more microphone components 208, send audio signals to the speaker component 206, send on/off signals to the one or more LED components 214, receive video and still photo data from and configuring sensitivity and focus and other parameters to the camera module 212, receive motion indication signals from and configure sensitivity and other parameters to the motion sensor component 210, receive data from and configure UUID and other parameters to the beacon transceiver component 202, and/or exchange data with the access point 104 through the wireless transceiver component 204.
  • the wireless transceiver component 204 can be configured to exchange data with the access point 104.
  • the wireless transceiver component 204 can send a message to the server 106 through the access point 104 and the core network 114 in response to determination of human motion by the processor component 200 employing signals from the motion sensor component 210 and/or the one or more microphone components 208 and/or the camera module 212.
  • the wireless transceiver component 204 can employ Wi-Fi technology, wireline Ethernet technology, or the like to exchange data with the core network 114.
  • the beacon transceiver component 202 can send periodic signals to enable detection of the remote device 102' by one or more registered devices 112.
  • the beacon transceiver component 202 can utilize a plurality of antennas in order to enable the registered devices 112 to estimate the angle of arrival (AoA) of the incoming signal and thereby estimate the location of the registered devices 112 relative to the remote device 102'.
  • the beacon transceiver component 202 can utilize Bluetooth technology, Wi-Fi technology, audio or ultrasonic technology, or some other means of sending a signal that can be received and identified by a registered device 112 in the near vicinity of the remote device 102'.
  • the motion sensor component 210 can sense when objects are moving relative to the remote device 102 within a certain field of view using an active or passive technology that measure frequency shift or a change in range or some other technique.
  • the motion sensor component 210 can use infrared signals, or ultrasound signals, or some other means of sensing motion.
  • the one or more LED components 214 can be configured to turn on and off to indicate the status of the remote device 102'.
  • the one or more LED components 214 can be employed to indicate motion detection, person detection, registered device 112 detection, low battery status, connection status with the access point 104 and the core network 114, and other items of interest to system operation.
  • Each of the one or more LED components 214 can radiate light of a certain color using light emitting diode (LED) technology, or some other means of producing visible light of a distinct color.
  • LED light emitting diode
  • the speaker component 206 and the one or more microphone components 208 can be employed to implement an intercom feature.
  • the processor component 200 can exchange audio in real time with a control device 116 or an alerted device 108 over the access point 104 and the core network 114 thus enabling the operator of the control device 116 or the alerted device 108 to conduct a conversation with a person within audio range of the remote device 102'.
  • the remote device 102' can be installed at an entry point to a building such as a residence or business.
  • the conversation feature can be used by an operator of a control device 116 or an alerted device 108 to speak with someone arriving at the entry point to facilitate security of the residence or business.
  • the operator of the control device 116 or the alerted device 108 can view still photos or live video of the person at the entry point of the building.
  • the camera module 212 can be configured to send video signals or still photos to the processor component 200.
  • the processor component 200 can utilize these signals to facilitate various functions of the remote device 102'.
  • the processor component 200 can utilize the video signals to detect human motion within the field of view of the camera module 212.
  • the processor component 200 can share video and still photos with control device(s) 116 and/or alerted device(s) 108.
  • the processor 200 can share video and still photos with alerted device(s) 108 in response to a detected person in order to alert operators of alerted device(s) 108 to the presence of said detected person. Said operators can then respond by initiating a remote conversation with the detected person, and/or contacting police if the detected person presents a security threat.
  • Fig. 3 illustrates an example server (e.g., server 106, 106').
  • the server 106' can include one or more of the structure and/or functionality of the server 106 with reference to Fig. 1.
  • the server 106' can include a data storage 304, which further can contain a device list 302, a processor 300, and/or a network transceiver 306.
  • a data storage 304 which further can contain a device list 302, processor 300, and/or a network transceiver 306 can be electrically and/or communicatively coupled to one another to perform one or more of the functions of the server 106'.
  • the data storage 304 can be a computer readable storage medium containing instructions for execution by the processor 300.
  • the data storage 304 can contain a device list 302.
  • the device list 302 can further contain identifiers each of which uniquely identifies a single registered device 112.
  • the device list 302 can also contain identifiers uniquely identifying each of the control devices 116, the alerted devices 116 and/or the remote devices 102.
  • the uniquely identifying information can enable the processor to send information to each of the registered device(s) 112, the control device(s) 116, and/or the alerted device(s) 108 and receive information from each of the remote device(s) 102.
  • the network transceiver 306 can be configured to transmit and/or receive signals to and/or from the core network 114.
  • the processor 300 can execute instructions stored in the data storage 304 to facilitate the various functions of the server 106'. For example, in some embodiments, the processor 300 can receive registration requests from control devices 116 and/or registered devices 112. In some embodiments, the processor 300 can combine information from remote devices 102 indicating the detection of detected person(s) with information from registered devices 112 indicating the detection of remote device(s) 102. By combining such information, the processor 300 can determine if 1) a person is in close proximity to one or more specific remote devices 102 (that is within range of the motion sensor component
  • a registered device 112 is in close proximity to one or more specific remote devices 102 (that is within range of the beacon transceiver component 202).
  • the processor 300 can ascertain if a registered or non-registered person is near a remote device 112 and transmit alerts to the alerted devices 108 accordingly.
  • the processor 300 can further receive video and/or still photos of the detected person and pass these along to the alerted devices 108 to further facilitate the security utility of the system.
  • the operators of the alerted devices 108 then can determine if the detected persons are a security threat or not and respond accordingly.
  • the server 106' sends alerts only if a person is detected with no registered device 112.
  • the server 106' sends stronger alerts if a person is detected with no registered device 112 and softer alerts if a person is detected with a registered device 112.
  • the remote device 102 detects both the presence of a person and the unique identifier of a registered device 112. In that case, the remote device 102 can ascertain the presence of a registered or non-registered person and send alerts either by employing the server 106' and process 300 or by employing the processor component 200 without involvement from the server 106' and processor 300.
  • Fig. 4 illustrates an example of a trusted network 400 of alerted devices 108.
  • one or more alerted devices 108 can be configured as primary devices 404.
  • Other alerted devices 108 can be configured as layer 1 secondary devices 406.
  • Still other alerted devices 108 can be configured as layer 2 secondary devices 408.
  • Still other alerted devices 108 can be configured as layer 3, 4, and so until the final layer N secondary devices 410.
  • the server 106 can respond to a person detection by first sending alerts to the primary devices 404.
  • the operators of such primary devices 404 can have the option of clearing the alert either because they judge the alert to be non-threatening or because they contact authorities to investigate the situation.
  • the server 106 can stop sending alerts in response to the original person detection and the other alerted devices never receive the alert. But if the operators of the primary devices 404 miss the alert or choose not to clear it, then the server 106 can send subsequent alerts to the layer 1 secondary devices 406. The operators of layer 1 secondary devices 406 can similarly clear or not clear the alert. If cleared, the server 106 can stop sending alerts and if not cleared, the server 106 can send subsequent alerts to layer 2 secondary devices 408. The server 106 can continue sending alerts to each layer in turn until the final layer N secondary devices 410 is reached. The operators of alerted devices 108 at any layer can clear or not clear the alerts. The number N can be configured by the operator of one of the controller devices 116. If alerts are not cleared after reaching layer N secondary devices 410, then the server 106 can send alerts to primary devices 404 and start the process all over again. The process can continue until the alert is cleared.
  • Fig. 5 illustrates an example of a human motion detector 500.
  • the detector can include a processor 200 executing computer executable instructions, a pixel motion detector 502, a group classifier 504, and a group threshold detector 506.
  • the pixel motion detector 502 is configured to analyze video frames captured by the camera module 212 and assign to each pixel within each video frame, a motion vector estimate based on comparisons to the previous and/or next one or more video frames.
  • the motion vector estimate may include the direction and speed of motion for each pixel.
  • the pixel motion detector 502 can work with small neighborhoods (e.g., grouping) of pixels, determining within each neighborhood the most likely trajectory of the center pixel from frame to frame based on similar color and intensity. From the trajectory distance and direction, along with the time interval from frame to frame, the motion vector can be calculated.
  • the group classifier 504 may then estimate from the set of motion vectors along with the position of each pixel in the camera field of view a grouping or subset of pixels which exhibit the following qualities: 1) they are positioned close to each other in the video image and 2) have motion vectors of similar direction and velocity and 3) have motion vectors that are significantly different from stationary pixels in the video image. Further, the group classifier 504 can then estimate the dimensions of this grouping of pixels in height, width, and area (e.g., number of pixels). The group threshold detector 506 can then compare the dimensions of the grouping of pixels from the group classifier 504 to threshold dimensions that are similar to a human being moving through the field of view of the camera module 212 and thus assign a determination as to the presence of human motion or not.
  • This determination can be a binary yes or no decision or a soft decision proportional to the likelihood of the presence of human motion.
  • the remote device 102 and camera module 212 can be positioned on the exterior of a building above entry points such as doors and windows and pointed down toward the ground. In this way, several objectives can be achieved to maximize the accuracy of the human motion detector 500 such as 1) a person approaching the entry point will move across the field of view to maximize detection by the pixel motion detector 502, and 2) the size of a person approaching the entry point when viewed from such a vantage point will be more consistent across the human population and thus maximize detection by the group threshold detector 506.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Vision & Pattern Recognition (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Alarm Systems (AREA)
  • Emergency Alarm Devices (AREA)

Abstract

The present invention provides a system and method for detecting the presence of a known or unknown person based on the presence or absence of a unique identifier of a registered device, and sending information about the presence of the known or unknown person to a network of alerted devices. Also provided is a system and method for detecting the presence of human motion within a video stream based on a comparison of a group of detected contiguous pixels within the video stream.

Description

IMPROVED ALARM SYSTEM
CROSS REFERENCE TO RELATED APPLICATION(S)
[0001] This application claims the benefit of priority under 35 U.S.C. § 119(e) of U.S. Application No. 62/010,646, filed June 1 1, 2014, the entire content of which is incorporated herein by reference.
BACKGROUND OF THE INVENTION
FIELD OF THE INVENTION
[0002] The invention relates generally to home security systems and more specifically to various embodiments that facilitate security employing human motion detection, person identification technology, and a distributed alert/response network.
BACKGROUND INFORMATION
[0003] Existing home security systems rely on various types of sensor devices to detect unwanted intrusion. These devices are typically electrically or wirelessly connected to a control unit. The control unit sounds an alarm when intrusion is detected and also may contact a monitoring service. The monitoring service responds to such contact by alerting the homeowner, contacting police, and in some cases dispatching security personnel to the residence. Such systems suffer from several shortcomings. For example, the control unit must be manually armed and disarmed by the homeowner. This task requires diligence and effort by the homeowner and/or other home dwellers. It also weakens security since the home is only protected when the system is armed. In addition, when the system does detect intrusion, it offers little information to the homeowner about the nature of the threat. The alarm may be triggered by an intruder, or it may be triggered by members of the household, a family pet, or even curtains moving due to an open window or ventilation system. Even if a camera is employed, the homeowner must investigate to see what caused the alarm. If the homeowner is away or unavailable, then the monitoring service has to investigate or contact authorities. For these reasons, these types of systems are prone to false alarms. Finally, the use of a monitoring service is costly and increases response time. Since the monitoring service must first confirm the tripped alarm with the homeowner before calling police, valuable minutes are lost if an actual burglary is in progress. [0004] A need therefore exists for an improved home security system which overcomes these shortcomings.
SUMMARY OF THE INVENTION
[0005] The present invention improves on existing technology by providing a home security system that is always armed, senses human motion, distinguishes between known and unknown persons, and enables monitoring by a network of trusted individuals.
[0006] In one embodiment, the invention provides a method. The method includes detecting, by a motion detector connected to a security system, the presence of a person and transmitting information about the person along with a first unique identifier of the security system to a server; obtaining, by a registered device a second unique identifier of the security system, and transmitting the second unique identifier to the server along with a unique identifier of the registered device; comparing the first and second unique identifiers of the security system and the unique identifier of the registered device to a device list comprising a plurality of registered device identifiers, a plurality of security system identifiers, and any associations between the plurality of registered device identifiers and plurality of security system identifiers; determining, that the detected person is known if the first and second unique identifiers are identical and the second unique identifier is associated with the unique identifier of the registered device in the device list; and sending to a network of alerted devices information consisting of at least the time and date that the detection occurred and registered information of the registered device and the determination of known or unknown detected person.
[0007] In another embodiment, the invention provides a method. The method includes detecting, by a motion detector connected to a security system, the presence of a person; obtaining, by the security system, a unique identifier of a registered device that is in close proximity to the detected person; comparing the unique identifier of the registered device to a device list comprising a plurality of registered device identifiers; determining, that the detected person is known if the unique identifier is identical to one of the plurality of unique identifiers in the device list; and sending to a network of alerted devices information consisting of at least the time and date that the detection occurred and registered information of the registered device and the determination of known or unknown detected person.
[0008] In another embodiment, the invention provides a system. The system includes a data storage medium having computer executable instructions and a list of registered devices; a processor communicatively coupled to the data storage medium; a motion detector communicatively coupled to the processor; and a wireless transceiver
communicatively coupled to the processor, the processor being operable to execute the computer executable instructions to at least: detect the presence of a person using the motion detector; obtain a unique identifier of a registered device if present; compare the unique identifier against the list of registered devices; determine that the detected person is known if the unique identifier appears on the list of registered devices and unknown otherwise; and send to a network of alerted devices, information consisting of at least the time and date that the detection occurred and registered information of the registered device if any and the determination of the person being known or unknown.
[0009] In another embodiment, the invention provides a method. The method includes detecting, by a processor, a contiguous group of pixels in a video signal; comparing, by the processor, pixel locations within the group to corresponding pixels in one or more previous or subsequent frames of the video signal; estimating, by the processor, a motion velocity vector for each detected group of pixels based on direction and distance of movement of objects represented by each pixel from frame to frame of the video signal; assigning, by the processor, multiple detected groups of pixels into regions of uniform motion within which multiple detected groups of pixels 1) exhibit motion velocity vectors with the same direction and same non-zero speed of movement and 2) are located next to each other in the image; determining, by the processor, if the dimensions of any of the regions of uniform motion exceed a predetermined threshold, indicating a high likelihood of human motion; and communicating, by a wireless or wired transceiver, the presence of human motion to a security system.
[0010] In another embodiment, the invention provides a system. The system includes a data storage medium having computer executable instructions and a video stream; and a processor communicatively coupled to the data storage medium, the processor being operable to execute the computer executable instructions to at least: detect a contiguous group of pixels in the video stream; compare the detected group of pixels to one or more previous or subsequent frames in the video stream; estimate a motion velocity vector for each detected group of pixels based on direction and distance of movement of objects represented by each pixel from frame to frame of the video signal; assign multiple detected groups of pixels into regions of uniform motion within which multiple detected groups of pixels 1) exhibit motion velocity vectors with the same direction and same non-zero speed of movement and 2) are located next to each other in the image; determine if the number of pixels in any of the regions of uniform motion exceed a predetermined threshold, wherein exceeding the predetermined threshold is indicative of a high likelihood of human motion; and communicate the presence of human motion to a security system.
BRIEF DESCRIPTION OF THE DRAWINGS
[0011] Figure 1 shows an exemplary system that facilitates security employing motion detection, tag identification, and notifications to one or more connected devices.
[0012] Figure 2 shows an exemplary remote device.
[0013] Figure 3 shows an exemplary server.
[0014] Figure 4 shows an exemplary trusted network.
[0015] Figure 5 shows an exemplary human motion detector.
DETAILED DESCRIPTION OF THE INVENTION
[0016] The present invention is based on various embodiments that facilitate security employing human motion detection, person identification technology, and a distributed alert/response network.
[0017] Before the present compositions and methods are described, it is to be understood that this invention is not limited to particular compositions, methods, and experimental conditions described, as such compositions, methods, and conditions may vary. It is also to be understood that the terminology used herein is for purposes of describing particular embodiments only, and is not intended to be limiting, since the scope of the present invention will be limited only in the appended claims.
[0018] As used in this specification and the appended claims, the singular forms "a", "an", and "the" include plural references unless the context clearly dictates otherwise. Thus, for example, references to "the method" includes one or more methods, and/or steps of the type described herein which will become apparent to those persons skilled in the art upon reading this disclosure and so forth.
[0019] The term "comprising," which is used interchangeably with "including," "containing," or "characterized by," is inclusive or open-ended language and does not exclude additional, unrecited elements or method steps. The phrase "consisting of excludes any element, step, or ingredient not specified in the claim. The phrase "consisting essentially of limits the scope of a claim to the specified materials or steps and those that do not materially affect the basic and novel characteristics of the claimed invention. The present disclosure contemplates embodiments of the invention compositions and methods corresponding to the scope of each of these phrases. Thus, a composition or method comprising recited elements or steps contemplates particular embodiments in which the composition or method consists essentially of or consists of those elements or steps.
[0020] Unless defined otherwise, all technical and scientific terms used herein have the same meaning as commonly understood by one of ordinary skill in the art to which this invention belongs. Although any methods and materials similar or equivalent to those described herein can be used in the practice or testing of the invention, the preferred methods and materials are now described.
[0021] With the advancement of technology, the use of wireless networking and telecommunication technologies such as Wireless Fidelity (Wi-Fi), Zigbee, Bluetooth, Long
Term Evolution (LTE), Third Generation Partnership Project (3 GPP), Third Generation
Partnership Project 2 (3GPP2), 802.xx wireless technologies and the like are widely deployed in commercial and residential areas. Such wireless technologies enable a remote device to exchange security related information with a user and for the user to exchange control, configuration, and communication with the remote device. The user may even communicate by real time voice and/or video with another person located near the remote device.
[0022] The aforementioned connected device may be a smart phone, a smart watch, a tablet computer, a laptop PC, or other such device to exchange the information. The information itself may be carried by the wireless technology directly between the connected device and the remote device. Or the information may pass through a combination of networks and services such as the internet, server-based software, cloud software and services, wireless networks, and even other wired or optical technologies such as Ethernet or OCC (Optical camera communications).
[0023] The aforementioned remote device detects the presence of persons using a combination of sensor devices, location technologies, and motion detection technologies. In one embodiment, the remote device uses Bluetooth technology to sense a mobile phone on the person to be detected. By detecting that the mobile phone and the human motion are in the same location, the system determines that a person is present and further determines whether that person is known or unknown.
[0024] Moreover, the remote device employs an identification means to identify the detected person as known or unknown. A known person is one that has been previously registered with the remote device or the connected device. Such registration may take place through manual entry by the user, or by some automatic means such as facial recognition followed by confirmation by the user. A list of known persons is maintained by the remote device, the connected device, or by a separate server accessible to both devices.
[0025] Various embodiments disclosed herein facilitate security through the use of sensors and methods to detect the presence of unknown persons and notify interested parties in a timely manner.
[0026] The following examples are intended to illustrate but not limit the invention.
EXAMPLE 1 [0027] Fig. 1 illustrates an example system that facilitates security employing one or more remote devices. System 100 can include one or more remote devices 102, an access point 104, a server 106, one or more registered devices 112, one or more alerted devices 108, one or more control devices 116 and/or a core network 114. In some embodiments, one or more of the remote devices 102, access point 104, server 106, one or more registered devices 112, one or more alerted devices 108, one or more control devices 116 and/or core network can be electrically or communicatively connected to one another to perform one or more functions of system 100.
[0028] The remote devices 102 and the access point 104 can be located in a secured area 110 (e.g., a residential property, a commercial property or the like).
[0029] The core network 114 can be or can include a wireless or wired network to which the remote device(s) 102, the access point 104, the server 106, the alerted device(s) 108, the control device(s) 116 and/or the registered device(s) 112 are communicatively coupled in some embodiments. For example, the core network 114 can include a broadband landline and/or one or more public cell sites to which the remote device(s) 102, the access point 104, the server 106, the alerted devices 108, and/or the registered device(s) 112 are
communicatively coupled.
[0030] In some embodiments, each remote device 102 can be assigned a universally unique identifier (UUID) by the manufacturer. In addition, a human operator can assign a unique description of each remote device 102. The human operator can enter the unique description at one of the control devices 116 which then sends the unique description to the corresponding remote device 102 and to the server 106. In some embodiments, each unique description can unambiguously identify the corresponding remote device in a way that is recognizable to the human operator of the control device 116.
[0031] In some embodiments, a human operator can register each of the one or more registered devices 112 by sending an invitation from a control device 116. Such an invitation can be a text message, an email, or some other notification and can contain a unique URL from which the person in possession of the registered device 112 can download and install an application software program. Once the application software program is installed and starts executing, it can send a message through the core network 114 to the server 106. Such message can contain information including but not limited to an identifier (e.g., phone number, user name, and the like) uniquely identifying the registered device 112, and the name of the person in possession of the registered device 112. In some
embodiments the message can also contain a photograph of the person in possession of the registered device 112.
[0032] The remote device(s) 102 can monitor and detect one or more persons that enter the secured area 110. In some embodiments, any remote device 102 that detects a person in the secured area 110 can transmit a message through the core network 114 to the server 106 in response to the detection. The remote device(s) 102 can transmit the message through the access point 104 and the core network 114 to the server 106 via a wired and/or wireline connection in various embodiments. The transmitted message can contain the time and date of the detection, along with a unique description and/or the UUID of the detecting remote device 102. In another embodiment, the remote device can obtain from the registered device 112 an identifier that uniquely identifies the registered device 112. The aforementioned transmitted message can then contain the identifier that uniquely identifies the registered device 112 in addition to the UUID of the detecting remote device 102 and other items of information.
[0033] The detected person can carry on their person a registered device 112. In one embodiment, the registered device 112 can detect a beacon signal from each remote device 102 which uniquely identifies the remote device. For example, such beacon signal can contain the UUID of the remote device 102. In one embodiment, the beacon signal can be a Bluetooth advertisement. The registered device 112 can transmit a message through the core network 114 to the server 106 in response to detecting the beacon signal from a remote device 102. Such a transmitted message can contain information including but not limited to an identifier that uniquely identifies the registered device 112, the date and time of the detection, and the UUID of the remote device 102. The transmitted message can also contain the location in geographic coordinates of the registered device 112 at the time of the detection. In another embodiment, the registered device 112 can wirelessly communicate with the remote device 102 in order to transfer an identifier that uniquely identifies the registered device 112 to the remote device 102. Such wireless communication can employ Bluetooth, Wi-Fi, cellular telecommunications, or other wireless technology in various embodiments.
[0034] The registered device(s) 112, the control device(s) 116, and/or the alerted device(s) 108 can be smart phones, tablets, or smart watches with downloaded application software. In one embodiment, the same device can be a control device 116, a registered device 112 and an alerted device 108. In another embodiment, the same device can be a registered device 112 and an alerted device 108, without also being a control device 116. In another embodiment, a device can be a registered device 112 without also being a control device 116 or an alerted device 108. In other embodiments, the operator can assign one or more roles of registered device 112, control device 116, and/or control device to any device.
[0035] The structure and/or functionality of the remote device 102 will now be described in more detail with reference to additional figures. Fig. 2 illustrates an example remote device (e.g., remote device 102, 102'). The remote device 102' can include one or more of the structure and/or functionality of the remote device 102 with reference to Fig. 1.
[0036] The remote device 102' can include a processor component 200, a beacon transceiver component 202, a wireless transceiver component 204, a speaker component 206, one or more microphone components 208, a motion sensor component 210, a camera component 212 and/or one or more LED processor components 214. In some embodiments, one or more of the processor component 200, a beacon transceiver component 202, a wireless transceiver component 204, a speaker component 206, one or more microphone components 208, a motion sensor component 210, a camera component 212 and/or one or more LED processor components 214 can be electrically and/or communicatively coupled to one another to perform one or more of the functions of the remote device 102'.
[0037] The processor component 200 can execute computer executable instructions to implement the functions of the remote device 102' and can receive audio signals from the one or more microphone components 208, send audio signals to the speaker component 206, send on/off signals to the one or more LED components 214, receive video and still photo data from and configuring sensitivity and focus and other parameters to the camera module 212, receive motion indication signals from and configure sensitivity and other parameters to the motion sensor component 210, receive data from and configure UUID and other parameters to the beacon transceiver component 202, and/or exchange data with the access point 104 through the wireless transceiver component 204.
[0038] The wireless transceiver component 204 can be configured to exchange data with the access point 104. For example, in some embodiments, the wireless transceiver component 204 can send a message to the server 106 through the access point 104 and the core network 114 in response to determination of human motion by the processor component 200 employing signals from the motion sensor component 210 and/or the one or more microphone components 208 and/or the camera module 212. In some embodiments, the wireless transceiver component 204 can employ Wi-Fi technology, wireline Ethernet technology, or the like to exchange data with the core network 114.
[0039] The beacon transceiver component 202 can send periodic signals to enable detection of the remote device 102' by one or more registered devices 112. In some embodiments, the beacon transceiver component 202 can utilize a plurality of antennas in order to enable the registered devices 112 to estimate the angle of arrival (AoA) of the incoming signal and thereby estimate the location of the registered devices 112 relative to the remote device 102'. In some embodiments, the beacon transceiver component 202 can utilize Bluetooth technology, Wi-Fi technology, audio or ultrasonic technology, or some other means of sending a signal that can be received and identified by a registered device 112 in the near vicinity of the remote device 102'.
[0040] The motion sensor component 210 can sense when objects are moving relative to the remote device 102 within a certain field of view using an active or passive technology that measure frequency shift or a change in range or some other technique. For example, in some embodiments, the motion sensor component 210 can use infrared signals, or ultrasound signals, or some other means of sensing motion.
[0041] The one or more LED components 214 can be configured to turn on and off to indicate the status of the remote device 102'. For example, in some embodiments, the one or more LED components 214 can be employed to indicate motion detection, person detection, registered device 112 detection, low battery status, connection status with the access point 104 and the core network 114, and other items of interest to system operation. Each of the one or more LED components 214 can radiate light of a certain color using light emitting diode (LED) technology, or some other means of producing visible light of a distinct color.
[0042] The speaker component 206 and the one or more microphone components 208 can be employed to implement an intercom feature. In some embodiments, the processor component 200 can exchange audio in real time with a control device 116 or an alerted device 108 over the access point 104 and the core network 114 thus enabling the operator of the control device 116 or the alerted device 108 to conduct a conversation with a person within audio range of the remote device 102'. For example, in some embodiments, the remote device 102' can be installed at an entry point to a building such as a residence or business. The conversation feature can be used by an operator of a control device 116 or an alerted device 108 to speak with someone arriving at the entry point to facilitate security of the residence or business. In addition, by also employing the camera module 212, the operator of the control device 116 or the alerted device 108 can view still photos or live video of the person at the entry point of the building.
[0043] The camera module 212 can be configured to send video signals or still photos to the processor component 200. The processor component 200 can utilize these signals to facilitate various functions of the remote device 102'. In some embodiments, the processor component 200 can utilize the video signals to detect human motion within the field of view of the camera module 212. In other embodiments, the processor component 200 can share video and still photos with control device(s) 116 and/or alerted device(s) 108. In other embodiments, the processor 200 can share video and still photos with alerted device(s) 108 in response to a detected person in order to alert operators of alerted device(s) 108 to the presence of said detected person. Said operators can then respond by initiating a remote conversation with the detected person, and/or contacting police if the detected person presents a security threat.
[0044] The structure and/or functionality of the server 106 will now be described in more detail with reference to additional figures. Fig. 3 illustrates an example server (e.g., server 106, 106'). The server 106' can include one or more of the structure and/or functionality of the server 106 with reference to Fig. 1.
[0045] The server 106' can include a data storage 304, which further can contain a device list 302, a processor 300, and/or a network transceiver 306. In some embodiments, one or more of the data storage 304, which further can contain a device list 302, processor 300, and/or a network transceiver 306 can be electrically and/or communicatively coupled to one another to perform one or more of the functions of the server 106'.
[0046] The data storage 304 can be a computer readable storage medium containing instructions for execution by the processor 300. In addition, the data storage 304 can contain a device list 302. The device list 302 can further contain identifiers each of which uniquely identifies a single registered device 112. The device list 302 can also contain identifiers uniquely identifying each of the control devices 116, the alerted devices 116 and/or the remote devices 102. The uniquely identifying information can enable the processor to send information to each of the registered device(s) 112, the control device(s) 116, and/or the alerted device(s) 108 and receive information from each of the remote device(s) 102.
[0047] The network transceiver 306 can be configured to transmit and/or receive signals to and/or from the core network 114.
[0048] The processor 300 can execute instructions stored in the data storage 304 to facilitate the various functions of the server 106'. For example, in some embodiments, the processor 300 can receive registration requests from control devices 116 and/or registered devices 112. In some embodiments, the processor 300 can combine information from remote devices 102 indicating the detection of detected person(s) with information from registered devices 112 indicating the detection of remote device(s) 102. By combining such information, the processor 300 can determine if 1) a person is in close proximity to one or more specific remote devices 102 (that is within range of the motion sensor component
210), and 2) a registered device 112 is in close proximity to one or more specific remote devices 102 (that is within range of the beacon transceiver component 202). Using both determinations, the processor 300 can ascertain if a registered or non-registered person is near a remote device 112 and transmit alerts to the alerted devices 108 accordingly. The processor 300 can further receive video and/or still photos of the detected person and pass these along to the alerted devices 108 to further facilitate the security utility of the system. Using this information, the operators of the alerted devices 108 then can determine if the detected persons are a security threat or not and respond accordingly. In one embodiment the server 106' sends alerts only if a person is detected with no registered device 112. In another embodiment, the server 106' sends stronger alerts if a person is detected with no registered device 112 and softer alerts if a person is detected with a registered device 112. In another embodiment, the remote device 102 detects both the presence of a person and the unique identifier of a registered device 112. In that case, the remote device 102 can ascertain the presence of a registered or non-registered person and send alerts either by employing the server 106' and process 300 or by employing the processor component 200 without involvement from the server 106' and processor 300.
[0049] Fig. 4 illustrates an example of a trusted network 400 of alerted devices 108. In one embodiment one or more alerted devices 108 can be configured as primary devices 404. Other alerted devices 108 can be configured as layer 1 secondary devices 406. Still other alerted devices 108 can be configured as layer 2 secondary devices 408. Still other alerted devices 108 can be configured as layer 3, 4, and so until the final layer N secondary devices 410. Thus arranged, the server 106 can respond to a person detection by first sending alerts to the primary devices 404. The operators of such primary devices 404 can have the option of clearing the alert either because they judge the alert to be non-threatening or because they contact authorities to investigate the situation. If the alert is so cleared, then the server 106 can stop sending alerts in response to the original person detection and the other alerted devices never receive the alert. But if the operators of the primary devices 404 miss the alert or choose not to clear it, then the server 106 can send subsequent alerts to the layer 1 secondary devices 406. The operators of layer 1 secondary devices 406 can similarly clear or not clear the alert. If cleared, the server 106 can stop sending alerts and if not cleared, the server 106 can send subsequent alerts to layer 2 secondary devices 408. The server 106 can continue sending alerts to each layer in turn until the final layer N secondary devices 410 is reached. The operators of alerted devices 108 at any layer can clear or not clear the alerts. The number N can be configured by the operator of one of the controller devices 116. If alerts are not cleared after reaching layer N secondary devices 410, then the server 106 can send alerts to primary devices 404 and start the process all over again. The process can continue until the alert is cleared.
[0050] Fig. 5 illustrates an example of a human motion detector 500. In one
embodiment, the detector can include a processor 200 executing computer executable instructions, a pixel motion detector 502, a group classifier 504, and a group threshold detector 506. The pixel motion detector 502 is configured to analyze video frames captured by the camera module 212 and assign to each pixel within each video frame, a motion vector estimate based on comparisons to the previous and/or next one or more video frames. The motion vector estimate may include the direction and speed of motion for each pixel. For example, in one embodiment, the pixel motion detector 502 can work with small neighborhoods (e.g., grouping) of pixels, determining within each neighborhood the most likely trajectory of the center pixel from frame to frame based on similar color and intensity. From the trajectory distance and direction, along with the time interval from frame to frame, the motion vector can be calculated. The group classifier 504 may then estimate from the set of motion vectors along with the position of each pixel in the camera field of view a grouping or subset of pixels which exhibit the following qualities: 1) they are positioned close to each other in the video image and 2) have motion vectors of similar direction and velocity and 3) have motion vectors that are significantly different from stationary pixels in the video image. Further, the group classifier 504 can then estimate the dimensions of this grouping of pixels in height, width, and area (e.g., number of pixels). The group threshold detector 506 can then compare the dimensions of the grouping of pixels from the group classifier 504 to threshold dimensions that are similar to a human being moving through the field of view of the camera module 212 and thus assign a determination as to the presence of human motion or not. This determination can be a binary yes or no decision or a soft decision proportional to the likelihood of the presence of human motion. For example, in one embodiment, the remote device 102 and camera module 212 can be positioned on the exterior of a building above entry points such as doors and windows and pointed down toward the ground. In this way, several objectives can be achieved to maximize the accuracy of the human motion detector 500 such as 1) a person approaching the entry point will move across the field of view to maximize detection by the pixel motion detector 502, and 2) the size of a person approaching the entry point when viewed from such a vantage point will be more consistent across the human population and thus maximize detection by the group threshold detector 506.
[0051] Although the invention has been described with reference to the above example, it will be understood that modifications and variations are encompassed within the spirit and scope of the invention. Accordingly, the invention is limited only by the following claims.

Claims

What is claimed is:
1. A method, comprising:
detecting, by a motion detector connected to a security system, the presence of a person and transmitting information about the person along with a first unique identifier of the security system to a server;
obtaining, by a registered device a second unique identifier of the security system, and transmitting the second unique identifier to the security system along with a third unique identifier of the registered device;
comparing the first, second, and third unique identifiers to a device list comprising a
plurality of registered device identifiers, a plurality of security system identifiers, and any associations between the plurality of registered device identifiers and plurality of security system identifiers;
determining, that the detected person is known if the first and second unique identifiers are identical and the second unique identifier is associated with the third unique identifier in the device list; and
sending to a network of alerted devices information consisting of at least the time and date that the detection occurred and registered information of the registered device and the determination that the detected person is known or unknown.
2. The method of claim 1, wherein the obtaining occurs via a wireless transmitter and associated processor of the security system, and a wireless receiver and associated processor of the registered device.
3. The method of claim 2, wherein the obtaining occurs via Bluetooth or Wi-Fi
technology.
4. The method of claim 1, wherein the sending occurs via a Wi-Fi or cellular network connected to the internet.
5. The method of claim 1, wherein the one or more alerted devices are selected from the group consisting of a mobile smart phone, a smart watch, a tablet computer, a laptop computer, and a personal computer.
6. The method of claim 5, wherein the one or more alerted devices includes an application software program configured to display the result of determining received from the security system.
7. The method of claim 6, wherein the application software program is further
configured to display photos and/or video of the detected person.
8. The method of claim 5, wherein any one or more of the alerted devices is a control device configured to add and remove devices from the device list , query the security system, and disable and enable the security system.
9. The method of claim 1, wherein detection of a person and determining that the person is unknown is indicative of a security threat, and wherein information about the security threat is sent to the alerted devices.
10. The method of claim 1, further comprising capturing an image of the detected
person and sending the captured image to the alerted devices.
11. The method of claim 1, further comprising capturing video footage of the detected person and sending the video footage to the alerted devices.
12. A method, comprising:
detecting, by a motion detector connected to a security system, the presence of a person; obtaining, by the security system, a unique identifier of a registered device that is in close proximity to the detected person;
comparing the unique identifier of the registered device to a device list comprising a
plurality of registered device identifiers;
determining, that the detected person is known if the unique identifier is identical to one of the plurality of unique identifiers in the device list; and
sending to a network of alerted devices information consisting of at least the time and date that the detection occurred and registered information of the registered device, and the determination that the detected person is known or unknown.
13. The method of claim 12, wherein the obtaining occurs via a wireless receiver and associated processor of the security system, and a wireless transmitter and associated processor of the registered device.
14. The method of claim 13, wherein the obtaining occurs via Bluetooth or Wi-Fi technology.
15. The method of claim 12, wherein the sending occurs via a Wi-Fi or cellular network connected to the internet.
16. The method of claim 12, wherein the one or more alerted devices are selected from the group consisting of a mobile smart phone, a smart watch, a tablet computer, a laptop computer, and a personal computer.
17. The method of claim 16, wherein the one or more alerted devices includes an
application software program configured to display the result of determining received from the system.
18. The method of claim 17, wherein the application software program is further
configured to display photos and/or video of the detected person.
19. The method of claim 16, wherein any one or more of the alerted devices is a control device configured to add and remove devices from the device list, query the security system, and disable and enable the security system.
20. The method of claim 12, wherein when the obtained unique identifier is not identical to one of the plurality of unique identifiers in the device list is indicative of a security threat, and wherein information about the security threat is sent to the alerted devices.
21. The method of claim 12, further comprising capturing an image of the detected person and sending the captured image to the alerted devices.
22. The method of claim 12, further comprising capturing video footage of the detected person and sending the video footage to the alerted devices.
23. A system, comprising:
a data storage medium having computer executable instructions and a list of registered devices;
a processor communicatively coupled to the data storage medium;
a motion detector communicatively coupled to the processor; and a wireless transceiver communicatively coupled to the processor,
the processor being operable to execute the computer executable instructions to at least:
detect the presence of a person via the motion detector;
obtain a unique identifier of a registered device, if present;
compare the unique identifier to the list of registered devices;
determine that the detected person is known if the unique identifier appears on the list of registered devices, and unknown otherwise; and
send to a network of alerted devices information comprising at least the time and date that the detection occurred, information about the registered device if any, and the determination of the person being known or unknown.
24. The system of claim 23, wherein detection of an unknown person is indicative of a security threat, and wherein the processor sends information about the security threat to the alerted devices.
25. The system of claim 23, wherein the list of registered devices is located on a server communicatively coupled to the processor.
26. The system of claim 25, wherein the information about the detected person is sent through the server.
27. The system of claim 24, wherein the information about the security threat is sent through the server.
28. The system of claim 23, further comprising a camera communicatively coupled to the processor, wherein the computer executable instructions further cause the processor to capture an image of the detected person and the send the captured image to the alerted devices.
29. The system of claim 28, wherein the capture image comprises video footage.
30. A method comprising:
detecting, by a processor, a contiguous group of pixels in a video signal;
comparing, by the processor, pixel locations within the detected group to corresponding pixels in one or more previous or subsequent frames of the video signal; estimating, by the processor, a motion velocity vector for each detected group of pixels based on direction and distance of movement of objects represented by each pixel from frame to frame of the video signal;
assigning, by the processor, multiple detected groups of pixels into regions of uniform motion within which multiple detected groups of pixels exhibit motion velocity vectors with the same direction and same non-zero speed of movement, and are located next to each other in the image;
determining, by the processor, if the dimensions of any of the regions of uniform motion exceed a predetermined threshold, indicating a high likelihood of human motion; and
communicating, by a wireless or wired transceiver, the presence of human motion to a security system.
31. A system comprising:
a data storage medium having computer executable instructions and a video stream; and a processor communicatively coupled to the data storage medium, the processor being operable to execute the computer executable instructions to at least:
detect a contiguous group of pixels in the video stream;
compare the detected group of pixels to one or more previous or subsequent frames in the video stream;
estimate a motion velocity vector for each detected group of pixels based on
direction and distance of movement of objects represented by each pixel from frame to frame of the video signal;
assign multiple detected groups of pixels into regions of uniform motion within which multiple detected groups of pixels exhibit motion velocity vectors with the same direction and same non-zero speed of movement, and are located next to each other in the image;
determine if the number of pixels in any of the regions of uniform motion exceed a predetermined threshold, wherein exceeding the predetermined threshold is indicative of a high likelihood of human motion; and
communicate the presence of human motion to a security system.
PCT/US2015/035314 2014-06-11 2015-06-11 Improved alarm system WO2015191844A2 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US201462010646P 2014-06-11 2014-06-11
US62/010,646 2014-06-11

Publications (2)

Publication Number Publication Date
WO2015191844A2 true WO2015191844A2 (en) 2015-12-17
WO2015191844A3 WO2015191844A3 (en) 2016-03-17

Family

ID=54834561

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/US2015/035314 WO2015191844A2 (en) 2014-06-11 2015-06-11 Improved alarm system

Country Status (1)

Country Link
WO (1) WO2015191844A2 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107454593A (en) * 2017-08-01 2017-12-08 中国联合网络通信集团有限公司 Family's monitoring method, household monitoring system and network communicating system

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20020175995A1 (en) * 2001-05-26 2002-11-28 Marc Sleeckx Video surveillance system
JP3946243B2 (en) * 2005-03-23 2007-07-18 株式会社Ihc Authentication system
DE602007002978D1 (en) * 2007-02-27 2009-12-10 Lucent Technologies Inc Wireless communication method for controlling a security device access
US8629755B2 (en) * 2008-08-15 2014-01-14 Mohammed Hashim-Waris Visitor management systems and methods

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107454593A (en) * 2017-08-01 2017-12-08 中国联合网络通信集团有限公司 Family's monitoring method, household monitoring system and network communicating system

Also Published As

Publication number Publication date
WO2015191844A3 (en) 2016-03-17

Similar Documents

Publication Publication Date Title
US10446000B2 (en) Detecting an intruder's wireless device during a break in to a premises
US10257469B2 (en) Neighborhood camera linking system
US9934675B2 (en) System and method for reporting the existence of sensors belonging to multiple organizations
US10986717B1 (en) Reduced false alarms for outdoor IP security cameras
US9728077B1 (en) eReceptionist and eNeighborhood watch system for crime prevention and/or verification
US9053621B2 (en) Image surveillance system and image surveillance method
US10477343B2 (en) Device, method, and system for maintaining geofences associated with criminal organizations
US10559177B2 (en) Area and property monitoring system and method
US10455353B2 (en) Device, method, and system for electronically detecting an out-of-boundary condition for a criminal origanization
US20160217683A1 (en) Method and Surveillance System for Detecting Unwanted Intrusion based on Interactions between Wireless Communication and Monitoring Devices
WO2013184180A2 (en) Escort security surveillance system
CA2983316C (en) Monitoring system having personal information protection function and method thereof
KR20190024254A (en) Doorbell
KR101654181B1 (en) A security closed circuit television emergency call bell system using smart phone apps and smart tags
KR20180004846A (en) Indoor and outdoor monitoring device using movie motion detection of wallpad and its method
WO2007105295A1 (en) Mobile terminal monitoring device and mobile terminal monitoring method
KR102084687B1 (en) Security operation service method and system for detecting illegal photography
US20190096153A1 (en) Smart digital door lock and method for controlling the same
EP4179513A2 (en) False alarm reduction system, method and apparatus
US20180018863A1 (en) Portable phone activated video camera with phone location tracking
WO2015191844A2 (en) Improved alarm system
US11523485B1 (en) Reduced false alarms for outdoor IP security cameras
KR20090103169A (en) System for notifying of emergency
US12033478B2 (en) Multisensor security system with aircraft monitoring
US20220392322A1 (en) Multisensor Security System with Aircraft Monitoring

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 15805757

Country of ref document: EP

Kind code of ref document: A2

NENP Non-entry into the national phase in:

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 15805757

Country of ref document: EP

Kind code of ref document: A2