WO2017090004A2 - Security and alarm system - Google Patents

Security and alarm system Download PDF

Info

Publication number
WO2017090004A2
WO2017090004A2 PCT/IB2016/057138 IB2016057138W WO2017090004A2 WO 2017090004 A2 WO2017090004 A2 WO 2017090004A2 IB 2016057138 W IB2016057138 W IB 2016057138W WO 2017090004 A2 WO2017090004 A2 WO 2017090004A2
Authority
WO
WIPO (PCT)
Prior art keywords
alarm
centralized computer
image acquisition
detectors
metadata
Prior art date
Application number
PCT/IB2016/057138
Other languages
French (fr)
Other versions
WO2017090004A3 (en
Inventor
Giovanni GOVI
Original Assignee
Tessitura Govi S.R.L.
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tessitura Govi S.R.L. filed Critical Tessitura Govi S.R.L.
Priority to EP16816389.7A priority Critical patent/EP3381022A2/en
Publication of WO2017090004A2 publication Critical patent/WO2017090004A2/en
Publication of WO2017090004A3 publication Critical patent/WO2017090004A3/en

Links

Classifications

    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms
    • G08B13/18Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength
    • G08B13/189Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems
    • G08B13/194Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems
    • G08B13/196Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
    • G08B13/19639Details of the system layout
    • G08B13/19645Multiple cameras, each having view on one of a plurality of scenes, e.g. multiple cameras for multi-room surveillance or for tracking an object by view hand-over
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms
    • G08B13/18Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength
    • G08B13/189Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems
    • G08B13/194Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems
    • G08B13/196Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
    • G08B13/19665Details related to the storage of video surveillance data
    • G08B13/19671Addition of non-video data, i.e. metadata, to video stream
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B25/00Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems
    • G08B25/01Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems characterised by the transmission medium
    • G08B25/08Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems characterised by the transmission medium using communication transmission lines
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B25/00Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems
    • G08B25/14Central alarm receiver or annunciator arrangements
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N7/00Television systems
    • H04N7/18Closed-circuit television [CCTV] systems, i.e. systems in which the video signal is not broadcast
    • H04N7/181Closed-circuit television [CCTV] systems, i.e. systems in which the video signal is not broadcast for receiving images from a plurality of remote sources
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B27/00Alarm systems in which the alarm condition is signalled from a central station to a plurality of substations
    • G08B27/003Signalling to neighbouring houses

Definitions

  • the present invention relates to a security and alarm system.
  • the control systems (generally) comprise a control unit to which are linked numerous sensors (including of different type) and which is suitable for triggering an alarm device.
  • the alarm device can consist of a telephone dialer (for sending calls or alarm messages), of a siren, of a light indicator and the like, or of a combination of these.
  • the sensors can be used to highlight a burglary (e.g., the power circuits which close through the doors and windows and which undergo an interruption of power continuity in case of the doors/windows or the micro-switches, etc., being opened) or can be used to detect environmental information (real cameras, presence detectors, heat detectors and the like).
  • a burglary e.g., the power circuits which close through the doors and windows and which undergo an interruption of power continuity in case of the doors/windows or the micro-switches, etc., being opened
  • environmental information real cameras, presence detectors, heat detectors and the like.
  • the systems of known type only permit signaling the anomaly to the emergency services (police force, firemen, etc.). Solely on the basis of the signaling from an alarm system (or the signaling of a person warned solely by the alarm system), furthermore, the emergency service personnel will be unable to verify the seriousness of the problem (thereby consequently establishing the best operating strategy).
  • a further problem of alarm systems of known type involves their scarce capacity to provoke the direct intervention of neighbors and/or persons who are in the area: the type of emitted signal (generally the sound of a siren) is not normally enough to arouse interest, inasmuch as too generic and makes the corresponding source hard to identify.
  • the main aim of the present invention is to pinpoint and identify, following an alarm signal, the persons involved in an extraordinary event in an automated way, filtering the identification data acquired in a univocal and rapid way.
  • Another object of the present invention is to solve the aforementioned problems, by devising a security and alarm system which is difficult to tamper with.
  • Another object of the invention is to devise a security and alarm system that ensures to the emergency service personnel to establish the most correct operational strategy based on detailed information.
  • Yet another object of the invention is to devise a security and alarm system that leads neighbors and/or people who are in the area to intervene directly.
  • a further object of the invention is to devise a security and alarm system that enables people who are in the area a certain and rapid identification of the place where the reported problem has occurred.
  • a security and alarm system of the type comprising at least one control and management unit, at least one sensor and at least one alarm indicator, characterized in that said at least one control and management unit comprises a module for remote connection to a centralized computer exclusively accessible to the emergency service personnel to reference the data received from said at least one unit, said at least one sensor comprising image acquisition apparatuses, said centralized computer, upon an alarm signal received from a specific unit, sending a signal for the activation of the respective image acquisition sensors to the units of the contiguous systems for monitoring.
  • the process for the management of security and alarm systems consists in:
  • the security and alarm system comprises at least one sensor, at least one control and management unit, and at least one alarm indicator.
  • the sensor comprises image acquisition apparatuses placeable in an area to be monitored and the number of which is variable according to the extension of the latter.
  • the image acquisition apparatuses are placed at the access and/or exit points of the area to be monitored.
  • the image acquisition apparatuses are high-definition cameras, or alternatively radio-frequency sensors for detecting identification data from mobile devices (smartphones or the like).
  • control and management unit comprises a remote connection module to a centralized computer exclusively accessible to first aid operators, to reference the data received from one or more control and management units.
  • the control and management unit is of the type of an electronic control unit operatively connected to the centralized computer and to the image acquisition apparatuses.
  • control and management unit is connected to a plurality of image acquisition apparatuses; in other words, a single system can comprise a plurality of control and management units operatively connected the one to the other, and respectively connected to a plurality of image acquisition apparatuses and wherein each control and management unit represents the connection node between the alarm indicators, the image acquisition apparatuses and the centralized computer.
  • the centralized computer has tracing and identification means of at least one person detected by the image acquisition apparatuses based on an alarm signal received from one or more alarm indicators.
  • the alarm indicator is of the type of an alarm system associated with single dwelling and/or industrial units present in the area to be monitored.
  • the alarm indicator is a sensor, e.g. adapted to detect the emission of gas, smoke, or in general event occurrences of an environmental or fraudulent origin.
  • the latter acquires the identification data of the person by means of the image acquisition apparatuses.
  • the image acquisition apparatuses comprise metadata processing means; in detail, such metadata comprise a series of descriptive data of the person.
  • the metadata identify the person according to the structure, the color, the weight and the speed of movement of same.
  • the metadata are acquired and filed by the centralized computer.
  • the centralized computer comprises at least one metadata storage unit.
  • the image acquisition apparatuses comprise sending means of the metadata themselves to the centralized computer.
  • the identification of the person i.e., the association of the metadatum corresponding to an identification image of the person itself, occurs by means of the interrogation of the centralized computer.
  • the centralized computer comprises interrogation means of the image acquisition means operatively connected to the control and management unit and adapted to receive at least one image of the person.
  • the identification of the person i.e., the association of the metadatum with the corresponding image occurs by means of analysis means.
  • the tracing and identification means comprise analysis means for analyzing the metadata stored in the storage unit for the identification of the person.
  • the identification of the person occurs by means of the filing of images and the extrapolation of the meta datum corresponding to the person and the interrogation of the centralized computer by means of the meta datum; this means that the processing of the meta datum is done a posteriori with respect to the acquisition of the images, and the latter acts as a filtering element for the screening and tracing of the images showing the person.
  • the image acquisition apparatuses continuously acquire the metadata corresponding to images of the area to be monitored which are stored inside the storage unit of the centralized computer.
  • the alarm indicator sends the alarm signal to the control and management unit.
  • the control and management unit by means of the remote connection module, sends the alarm signal to the centralized computer.
  • the analysis means identify and trace, by means of the metadata, the route covered by the person.
  • the interrogation means of the image acquisition means associate each metadatum corresponding to the person with the corresponding images showing him/her. In other words, the interrogation means interrogate the image acquisition means in order to trace and identify the person through the images showing him/her and which have been acquired by the image acquisition means themselves involved in his/her route within the area to be monitored.
  • the security and alarm system comprises at least one control and management unit, at least one sensor and at least one alarm indicator, in conformity with most existing traditional systems.
  • At least one control and management unit of each system comprises, in turn, a remote connection module to a centralized computer accessible only to emergency service personnel to reference the data received from such at least one unit.
  • the information sent by the at least one control and management unit of a single system is sent and stored by means of the centralized computer: it is therefore a server suitable for collecting the data.
  • This server will only be accessible to emergency service personnel, including in such definition the police forces, first aid operators, firemen and anyone else appointed to carry out an investigation of a judicial nature.
  • the sensors in the system according to the invention comprise image acquisition apparatuses: the acquired images will then be available to the emergency service personnel (which may refer to the centralized computer in real time).
  • the centralized computer be constantly under the control of specific supervision personnel (e.g., the police force operating unit): depending on the type of alarm signal received, the appointed personnel can decide which service is to intervene (e.g., police forces, or first aid or firemen, or inter-force unit, etc.) and provide these with information suitable for defining the most correct intervention strategy.
  • specific supervision personnel e.g., the police force operating unit
  • the appointed personnel can decide which service is to intervene (e.g., police forces, or first aid or firemen, or inter-force unit, etc.) and provide these with information suitable for defining the most correct intervention strategy.
  • the centralized computer upon an alarm signal received from a specific unit, will send a signal to the units of the contiguous systems for the activation of the respective sensors, for the acquisition of the images required to monitor the area.
  • the activation of the sensors of the units of nearby systems may enable the police forces to get the images which are detected by all the sensors present in the area.
  • Such images might help identify criminals, their means of transport, facilitating investigations.
  • Another example instead relates to the possibility of the sensors of a system detecting a fire.
  • the activation of nearby sensors could enable firemen to obtain further information on the size and extension of the fire itself, making it possible to plan the number of operating means required for correct intervention.
  • a further example relates to the detection of a gas leak by a first system according to the invention.
  • the activation of the sensors of nearby systems could permit measuring the amount of the leak (the rate of gas dilution in an open environment being known, the appointed personnel could estimate the amount of gas flowing out according to the maximum distance at which the sensors detect the presence thereof).
  • the remote connection module can preferably be made up of an Internet access device.
  • the module can be a router, or an assembly constituted by a wireless transceiver and a wireless router, or an Internet key and the like. It cannot be ruled out on the other hand that the module consists of a transceiver of other nature (e.g., a radio-frequency transceiver) through which to send the information to the centralized computer and receive from this any sensor activation commands.
  • a transceiver of other nature e.g., a radio-frequency transceiver
  • the centralized computer advantageously comprises a memory apparatus for storing all the data received from the units associated therewith.
  • the information collected in the memory apparatus of the centralized computer will in fact allow a deeper level of investigation than that currently possible (without using the systems according to the invention).
  • the image acquisition apparatuses that can be used may be numerous and diversified; in particular, the possibility is indicated of using video cameras, still cameras, infrared scanners and the like.
  • the system also generally comprises other types of sensors, such as, e.g. sound recorders, smoke detectors, gas detectors, electrical mains connection detectors, detectors of the closure of doors and windows and shutters in general, presence detectors and the like.
  • sensors such as, e.g. sound recorders, smoke detectors, gas detectors, electrical mains connection detectors, detectors of the closure of doors and windows and shutters in general, presence detectors and the like.
  • the smoke detectors can on the other hand be very useful for detecting a fire and estimating its extension (directly or through an interpolation of the values also read by the detectors of the contiguous systems).
  • Gas detectors permit detecting the presence of a leak (gas leak) and, as has already been said, the possibility of cross checking the data of the system that has sent the alarm with those of the contiguous systems also permits assessing the amount of the leak itself.
  • the electrical mains connection detectors the detectors of the closure of doors and windows and shutters in general and the presence detectors are the instruments by means of which to identify any break- in attempts: in fact, ill- intentioned persons could try and tamper with the electrical mains connection to disable any anti-theft devices and could try and enter the protected premises by forcing or breaking a frame (window, door and the like).
  • the Internet connection router (if this is an external component of the system and therefore, more specifically, the system uses an Internet connection already present in the environment) is energized by means of an uninterruptible power supply unit (or other similar device) in order to ensure the correct transmission of the data collected by the sensors to the centralized computer.
  • the centralized computer by means of the units of the contiguous systems connected thereto, will be suitable for the selective activation (i.e., single or according to specific predefined assemblies) of the corresponding image acquisition sensors, of the corresponding sound recorders, of the corresponding thermal detectors, of the corresponding smoke detectors, of the corresponding gas detectors, of the corresponding electrical mains connection detectors, for a monitoring of the region that is adjacent to the region of the unit that initially sent the alarm signal.
  • the centralized computer by means of the units of the contiguous systems connected thereto, is also suitable for the selective activation of at least one alarm indicator for broadcasting the alarm signal in the whole region adjacent to the region of the unit that initially sent the alarm signal.
  • the alarm indicators may be visual (flashing, perimeter lighting, spots focused on strategic areas) or sound emitting.
  • the alarm indicator can validly comprise an alarm and can validly comprise an audio playback device for the emission of predefined messages, related to the type of alarm and the exact location of emission thereof.
  • the playback device by means of its loudspeaker, can broadcast a high-volume audio message which identifies the type of extraordinary event, the address where it occurred and the time, possibly specifying that the corresponding emergency service has already been called in.
  • possible messages which can be repeated cyclically by the playback device could be: "Attempted theft in apartment A in X street at time HH.MM, signal sent to the police”; "Fire in apartment A in X street at time HH.MM, signal sent to the Fire Department".
  • the present invention also identifies a new operating mode of using the alarm systems, therefore a new management process of the security and alarm systems, only feasible with systems according to the invention.
  • the new process consists, first of all, in detecting an extraordinary event, occurring in a monitored environment, by means of the sensors controlled by the control and management unit of a first system.
  • the data string will comprise at least one item of information chosen among the geolocation coordinates of the monitored environment, the type of extraordinary event detected, the data (images, measurements, surveys) acquired by the dedicated sensors for their storage.
  • the computer will activate, by means of the centralized computer, the sensors of the systems arranged within regions that are adjacent to the region in which the extraordinary event has occurred, for the acquisition of additional data related to such regions, and their sending to the centralized computer for their storage.
  • the present invention solves the above problems, by devising a security and alarm system which is difficult to tamper with.
  • the security and alarm system ensures to the emergency service personnel to establish the most correct operational strategy based on detailed information.
  • the security and alarm system leads neighbors and/or people who are in the area to intervene directly.
  • an alarm indicator indicating the exact address and the related type of extraordinary event
  • neighbors and passers-by will be keener to intervene, feeling more involved (compared to a simple siren which emits a sound without being able to precisely identify the origin or know the reason of the emission thereof).
  • the system according to the invention allows people who are in the area to identify in a fast and certain manner the place where the reported problem has occurred.

Abstract

The security and alarm system of the type comprising at least one control and management unit, at least one sensor and at least one alarm indicator, in which the least one control and management unit, in turn, comprises a module for remote connection to a centralized computer exclusively accessible to the emergency service personnel, to reference the data received from the at least one control and management unit, the at least one sensor comprising image acquisition apparatuses, the centralized computer having tracing and identification means of at least one person detected by said image acquisition apparatuses based on an alarm signal received from the at least one alarm indicator.

Description

SECURITY AND ALARM SYSTEM
Technical Field
The present invention relates to a security and alarm system.
Background Art
The need to increase the security of dwelling houses continues to grow and hence there is an increasing use of control systems suitable for signaling break- ins or burglaries or problems of other nature.
The control systems (generally) comprise a control unit to which are linked numerous sensors (including of different type) and which is suitable for triggering an alarm device.
The alarm device can consist of a telephone dialer (for sending calls or alarm messages), of a siren, of a light indicator and the like, or of a combination of these.
The sensors can be used to highlight a burglary (e.g., the power circuits which close through the doors and windows and which undergo an interruption of power continuity in case of the doors/windows or the micro-switches, etc., being opened) or can be used to detect environmental information (real cameras, presence detectors, heat detectors and the like).
Unfortunately, the systems of this type can be subject to tampering by ill- intentioned persons, or suffer damage following problems of other nature (e.g., a fire which has damaged the alarm device will not be signaled externally, despite its destroying premises).
In many cases, therefore, the systems of known type are insufficient to ensure a good standard of security for the environments they protect.
Finally, it must be specified that the systems of known type only permit signaling the anomaly to the emergency services (police force, firemen, etc.). Solely on the basis of the signaling from an alarm system (or the signaling of a person warned solely by the alarm system), furthermore, the emergency service personnel will be unable to verify the seriousness of the problem (thereby consequently establishing the best operating strategy).
A further problem of alarm systems of known type involves their scarce capacity to provoke the direct intervention of neighbors and/or persons who are in the area: the type of emitted signal (generally the sound of a siren) is not normally enough to arouse interest, inasmuch as too generic and makes the corresponding source hard to identify.
Description of the Invention
The main aim of the present invention is to pinpoint and identify, following an alarm signal, the persons involved in an extraordinary event in an automated way, filtering the identification data acquired in a univocal and rapid way.
Another object of the present invention is to solve the aforementioned problems, by devising a security and alarm system which is difficult to tamper with.
Another object of the invention is to devise a security and alarm system that ensures to the emergency service personnel to establish the most correct operational strategy based on detailed information.
Yet another object of the invention is to devise a security and alarm system that leads neighbors and/or people who are in the area to intervene directly.
A further object of the invention is to devise a security and alarm system that enables people who are in the area a certain and rapid identification of the place where the reported problem has occurred.
Finally, another object of the present invention is to realize an affordable security and alarm system, relatively simple to make and of safe application. This aim and these objects are achieved by a security and alarm system of the type comprising at least one control and management unit, at least one sensor and at least one alarm indicator, characterized in that said at least one control and management unit comprises a module for remote connection to a centralized computer exclusively accessible to the emergency service personnel to reference the data received from said at least one unit, said at least one sensor comprising image acquisition apparatuses, said centralized computer, upon an alarm signal received from a specific unit, sending a signal for the activation of the respective image acquisition sensors to the units of the contiguous systems for monitoring.
This aim and these objects are also achieved by means of a process for the management of security and alarm systems that, in a first embodiment consists in: processing metadata based on the images acquired by at least one sensor, in a monitored environment;
sending the metadata to a centralized computer;
in case of reception of an alarm signal sent from an alarm indicator based on a detected person:
analyzing the metadata for the identification and tracing of the person;
interrogating at least one of the sensors to obtain at least one image of the person.
In parallel, in a second embodiment, the process for the management of security and alarm systems consists in:
detecting an extraordinary event, which has occurred in a monitored environment, by means of said sensors controlled by said control and management unit of a first system;
sending a string of data related to the extraordinary event, via said remote connection module, to said centralized computer, said data string comprising at least one item of information chosen among the geolocation coordinates of the monitored environment, the type of extraordinary event detected, the images acquired by the dedicated sensors and the like, for their storage;
- activating, by means of said centralized computer, the sensors of the systems arranged within regions that are adjacent to the region in which the extraordinary event has occurred, for the acquisition of additional data related to said regions and their sending to said centralized computer for their storage.
Further characteristics and advantages of the invention will become better evident from the description of a preferred, but not exclusive, embodiment of security and alarm system according to the invention.
Embodiments of the Invention
With reference to a first embodiment, the security and alarm system comprises at least one sensor, at least one control and management unit, and at least one alarm indicator.
Preferably, the sensor comprises image acquisition apparatuses placeable in an area to be monitored and the number of which is variable according to the extension of the latter.
It cannot also be ruled out that the image acquisition apparatuses are placed at the access and/or exit points of the area to be monitored.
In this case, it cannot be ruled out that the image acquisition apparatuses are high-definition cameras, or alternatively radio-frequency sensors for detecting identification data from mobile devices (smartphones or the like).
According to the invention, the control and management unit comprises a remote connection module to a centralized computer exclusively accessible to first aid operators, to reference the data received from one or more control and management units.
The control and management unit is of the type of an electronic control unit operatively connected to the centralized computer and to the image acquisition apparatuses.
Depending on the extension of the area to be monitored, the control and management unit is connected to a plurality of image acquisition apparatuses; in other words, a single system can comprise a plurality of control and management units operatively connected the one to the other, and respectively connected to a plurality of image acquisition apparatuses and wherein each control and management unit represents the connection node between the alarm indicators, the image acquisition apparatuses and the centralized computer. In detail, the centralized computer has tracing and identification means of at least one person detected by the image acquisition apparatuses based on an alarm signal received from one or more alarm indicators.
With reference to a preferred embodiment, the alarm indicator is of the type of an alarm system associated with single dwelling and/or industrial units present in the area to be monitored.
Alternative embodiments cannot however be ruled out wherein the alarm indicator is a sensor, e.g. adapted to detect the emission of gas, smoke, or in general event occurrences of an environmental or fraudulent origin.
Once the alarm signal has been sent to the control and management unit, the latter acquires the identification data of the person by means of the image acquisition apparatuses.
The image acquisition apparatuses comprise metadata processing means; in detail, such metadata comprise a series of descriptive data of the person.
In other words, the metadata identify the person according to the structure, the color, the weight and the speed of movement of same.
Following the receiving of the alarm signal, the metadata are acquired and filed by the centralized computer.
In this regard, it should be noticed that the centralized computer comprises at least one metadata storage unit.
For the metadata storage and acquisition to take place, the image acquisition apparatuses comprise sending means of the metadata themselves to the centralized computer.
The identification of the person, i.e., the association of the metadatum corresponding to an identification image of the person itself, occurs by means of the interrogation of the centralized computer.
For this purpose, the centralized computer comprises interrogation means of the image acquisition means operatively connected to the control and management unit and adapted to receive at least one image of the person.
More specifically, the identification of the person, i.e., the association of the metadatum with the corresponding image occurs by means of analysis means. The tracing and identification means comprise analysis means for analyzing the metadata stored in the storage unit for the identification of the person.
Alternative embodiments cannot however be ruled out in which the image acquisition apparatuses, via the sending means, send the acquired images to the centralized computer, and the interrogation means of the image acquisition means trace the metadatum corresponding to the identified person only after the reception of the alarm signal.
In other words, the identification of the person occurs by means of the filing of images and the extrapolation of the meta datum corresponding to the person and the interrogation of the centralized computer by means of the meta datum; this means that the processing of the meta datum is done a posteriori with respect to the acquisition of the images, and the latter acts as a filtering element for the screening and tracing of the images showing the person.
The operation of the aforementioned embodiment is as follows.
The image acquisition apparatuses continuously acquire the metadata corresponding to images of the area to be monitored which are stored inside the storage unit of the centralized computer.
Following an extraordinary event, the alarm indicator sends the alarm signal to the control and management unit. The control and management unit, by means of the remote connection module, sends the alarm signal to the centralized computer. At this point, the analysis means identify and trace, by means of the metadata, the route covered by the person. At the same time, the interrogation means of the image acquisition means associate each metadatum corresponding to the person with the corresponding images showing him/her. In other words, the interrogation means interrogate the image acquisition means in order to trace and identify the person through the images showing him/her and which have been acquired by the image acquisition means themselves involved in his/her route within the area to be monitored.
With reference to a second embodiment, the security and alarm system according to the invention comprises at least one control and management unit, at least one sensor and at least one alarm indicator, in conformity with most existing traditional systems.
The innovative aspects of the present invention reside in the fact that at least one control and management unit of each system comprises, in turn, a remote connection module to a centralized computer accessible only to emergency service personnel to reference the data received from such at least one unit. In actual facts the information sent by the at least one control and management unit of a single system is sent and stored by means of the centralized computer: it is therefore a server suitable for collecting the data.
This server will only be accessible to emergency service personnel, including in such definition the police forces, first aid operators, firemen and anyone else appointed to carry out an investigation of a judicial nature.
It cannot be ruled out that the data be placed at the disposal of the owner of the alarm system which sent the signal, if necessary following the elimination of any sensitive data or confidential information (according to the provisions of local regulations).
It is specified that the sensors in the system according to the invention comprise image acquisition apparatuses: the acquired images will then be available to the emergency service personnel (which may refer to the centralized computer in real time).
In particular, it will be opportune to envisage that the centralized computer be constantly under the control of specific supervision personnel (e.g., the police force operating unit): depending on the type of alarm signal received, the appointed personnel can decide which service is to intervene (e.g., police forces, or first aid or firemen, or inter-force unit, etc.) and provide these with information suitable for defining the most correct intervention strategy.
It is important to specify that the centralized computer, upon an alarm signal received from a specific unit, will send a signal to the units of the contiguous systems for the activation of the respective sensors, for the acquisition of the images required to monitor the area.
By way of example, it is specified that, in case of an attempted theft in an apartment or in business premises, the activation of the sensors of the units of nearby systems may enable the police forces to get the images which are detected by all the sensors present in the area.
Such images might help identify criminals, their means of transport, facilitating investigations.
The fact that the data are, in any way, exclusively accessible to emergency service personnel implies that the use of the same by the authorized personnel will not result in any violation of the privacy laws in force.
Another example instead relates to the possibility of the sensors of a system detecting a fire.
In this case, the activation of nearby sensors (in particular those which detect images) could enable firemen to obtain further information on the size and extension of the fire itself, making it possible to plan the number of operating means required for correct intervention.
A further example relates to the detection of a gas leak by a first system according to the invention.
The activation of the sensors of nearby systems could permit measuring the amount of the leak (the rate of gas dilution in an open environment being known, the appointed personnel could estimate the amount of gas flowing out according to the maximum distance at which the sensors detect the presence thereof).
This information too is extremely important to enable operators to intervene with correct promptness and procedures.
According to a particular embodiment of sure practical and application interest, the remote connection module can preferably be made up of an Internet access device.
In such a case, therefore, the module can be a router, or an assembly constituted by a wireless transceiver and a wireless router, or an Internet key and the like. It cannot be ruled out on the other hand that the module consists of a transceiver of other nature (e.g., a radio-frequency transceiver) through which to send the information to the centralized computer and receive from this any sensor activation commands.
As already previously mentioned, the centralized computer advantageously comprises a memory apparatus for storing all the data received from the units associated therewith.
This way the computer memory apparatus also becomes a useful instrument for investigators that, after some time, should investigate in relation to the extraordinary event recorded.
The information collected in the memory apparatus of the centralized computer will in fact allow a deeper level of investigation than that currently possible (without using the systems according to the invention).
It must be specified that, within the field of the practical implementation of the present invention, the image acquisition apparatuses that can be used may be numerous and diversified; in particular, the possibility is indicated of using video cameras, still cameras, infrared scanners and the like.
It is found that the adoption of different types of image acquisition apparatuses can be adopted simultaneously so as to cross-check the data collected by same and extract a larger amount of information.
It must in any case be specified that the system also generally comprises other types of sensors, such as, e.g. sound recorders, smoke detectors, gas detectors, electrical mains connection detectors, detectors of the closure of doors and windows and shutters in general, presence detectors and the like.
Through the sound recorders it could be possible to detect the voices of ill- intentioned persons, therefore making it possible, e.g., to identify their exact number (if, for instance, some of them never transit in front of the previously- mentioned image acquisition apparatuses).
The smoke detectors can on the other hand be very useful for detecting a fire and estimating its extension (directly or through an interpolation of the values also read by the detectors of the contiguous systems).
Gas detectors permit detecting the presence of a leak (gas leak) and, as has already been said, the possibility of cross checking the data of the system that has sent the alarm with those of the contiguous systems also permits assessing the amount of the leak itself.
The electrical mains connection detectors, the detectors of the closure of doors and windows and shutters in general and the presence detectors are the instruments by means of which to identify any break- in attempts: in fact, ill- intentioned persons could try and tamper with the electrical mains connection to disable any anti-theft devices and could try and enter the protected premises by forcing or breaking a frame (window, door and the like).
In order to make the system according to the invention totally secure, including with respect to any tampering with the electrical mains connection, between each component and the electrical mains an electric battery for power continuity is interposed.
It is specified that, in such case, it will also be best to ensure that the Internet connection router (if this is an external component of the system and therefore, more specifically, the system uses an Internet connection already present in the environment) is energized by means of an uninterruptible power supply unit (or other similar device) in order to ensure the correct transmission of the data collected by the sensors to the centralized computer. It is also highlighted that the centralized computer, by means of the units of the contiguous systems connected thereto, will be suitable for the selective activation (i.e., single or according to specific predefined assemblies) of the corresponding image acquisition sensors, of the corresponding sound recorders, of the corresponding thermal detectors, of the corresponding smoke detectors, of the corresponding gas detectors, of the corresponding electrical mains connection detectors, for a monitoring of the region that is adjacent to the region of the unit that initially sent the alarm signal.
It will in fact be important to activate targeted monitoring in the area nearby the point where the system is located that sent the first alarm: upon theft or break-in attempts it will be useful for example to activate all the image acquisition apparatuses and/or the sound recorders (to record the transit of possible thieves or of their means of transport and allow their identification); if a fire or a gas leak occur, the respective detectors need to be activated to monitor the area and understand the real extent of the problem.
In all these cases the acquisition of other information by other type of sensors would be useless (and should occupy the memory of the centralized computer). It should also be specified that the centralized computer, by means of the units of the contiguous systems connected thereto, is also suitable for the selective activation of at least one alarm indicator for broadcasting the alarm signal in the whole region adjacent to the region of the unit that initially sent the alarm signal. The alarm indicators may be visual (flashing, perimeter lighting, spots focused on strategic areas) or sound emitting.
In particular, it is specified that the alarm indicator can validly comprise an alarm and can validly comprise an audio playback device for the emission of predefined messages, related to the type of alarm and the exact location of emission thereof.
The possibility is envisaged of using an audio playback device which contains in its memory numerous pre-recorded messages, relating to all the types of alarms associated with the system.
In point of fact therefore, the playback device, by means of its loudspeaker, can broadcast a high-volume audio message which identifies the type of extraordinary event, the address where it occurred and the time, possibly specifying that the corresponding emergency service has already been called in. For example, possible messages which can be repeated cyclically by the playback device could be: "Attempted theft in apartment A in X street at time HH.MM, signal sent to the Police"; "Fire in apartment A in X street at time HH.MM, signal sent to the Fire Department".
The adoption cannot be ruled out of a vocal synthesizer suitable for reading the messages created from time to time upon every detected extraordinary event.
The present invention also identifies a new operating mode of using the alarm systems, therefore a new management process of the security and alarm systems, only feasible with systems according to the invention.
The new process consists, first of all, in detecting an extraordinary event, occurring in a monitored environment, by means of the sensors controlled by the control and management unit of a first system.
After that, it will be necessary to send a string of data related to the extraordinary event, via the remote connection module, to the centralized computer.
The data string will comprise at least one item of information chosen among the geolocation coordinates of the monitored environment, the type of extraordinary event detected, the data (images, measurements, surveys) acquired by the dedicated sensors for their storage.
At this point the computer will activate, by means of the centralized computer, the sensors of the systems arranged within regions that are adjacent to the region in which the extraordinary event has occurred, for the acquisition of additional data related to such regions, and their sending to the centralized computer for their storage.
Advantageously, the present invention solves the above problems, by devising a security and alarm system which is difficult to tamper with.
Validly, as explained above, the security and alarm system according to the invention ensures to the emergency service personnel to establish the most correct operational strategy based on detailed information.
Usefully, the security and alarm system leads neighbors and/or people who are in the area to intervene directly. In fact, by hearing an alarm indicator indicating the exact address and the related type of extraordinary event, neighbors and passers-by will be keener to intervene, feeling more involved (compared to a simple siren which emits a sound without being able to precisely identify the origin or know the reason of the emission thereof).
Conveniently, the system according to the invention allows people who are in the area to identify in a fast and certain manner the place where the reported problem has occurred.
Effectively the security and alarm system according to the invention turns out to be of simple implementation and affordable cost, which make it a technical solution of safe application.
The invention thus conceived is susceptible of numerous modifications and variations, all falling within the inventive concept; moreover, all the details may be replaced with other technically equivalent elements.
In the embodiments illustrating individual characteristics, given in relation to specific examples, they may actually be interchanged with other different characteristics that exist in other examples of embodiment. In practice, the materials employed, as well as the dimensions, may be any according to requirements and the state of the art.
It is emphasized that the particular solution of providing metadata transmission means allows to realize a security and alarm system that enables the univocal identification and tracing of at least one person involved in an extraordinary event in a rapid and functional manner, thus eliminating the need by the emergency service personnel to view all the acquired data and greatly reducing the related intervention times on the location involved in this extraordinary event.

Claims

1) A security and alarm system of the type comprising at least one control and management unit, at least one sensor and at least one alarm indicator, characterized in that said at least one control and management unit, in turn, comprises a module for remote connection to a centralized computer exclusively accessible to the emergency service personnel, to reference the data received from said at least one control and management unit, said at least one sensor comprising image acquisition apparatuses, said centralized computer having tracing and identification means of at least one person detected by said image acquisition apparatuses based on an alarm signal received from said at least one alarm indicator.
2) The system according to claim 1, characterized in that said image acquisition apparatuses comprise metadata processing means, said metadata comprising a series of descriptive data of said person.
3) The system according to claim 2, characterized in that said image acquisition apparatuses comprise sending means of said metadata to said centralized computer.
4) The system according to one or more of the preceding claims, characterized in that said centralized computer comprises at least one storage unit of said metadata.
5) The system according to one or more of the preceding claims, characterized in that said tracing and identification means comprise analysis means for analyzing said metadata stored in said storage unit for the identification and the tracing of said person.
6) The system according to one or more of the preceding claims, characterized in that said centralized computer comprises interrogation means of said image acquisition means operatively connected to said control and management unit and adapted to receive at least one image of said person.
7) The system according to one or more of the preceding claims, characterized in that said tracing and identification means, upon said alarm signal received from said control and management unit, send a signal for the activation of the respective said image acquisition apparatuses to said control and management units of the contiguous systems for detecting said person.
8) The system according to one or more of the preceding claims, characterized in that said remote connection module is an Internet access device of the type preferably chosen among a router, an assembly constituted by a wireless transceiver and a wireless router, an Internet key and the like.
9) The system according to one or more of the preceding claims, characterized in that said centralized computer comprises a memory apparatus for storing all the data received from the units associated therewith.
10) The system according to one or more of the preceding claims, characterized in that said image acquisition apparatuses comprise video cameras, still cameras, thermal scanners, infrared scanners and the like.
11) The system according to one or more of the preceding claims, characterized in that said at least one sensor comprises sound recorders, smoke detectors, gas detectors, electrical mains connection detectors, detectors of the closure of doors and windows and shutters in general, presence detectors and the like.
12) The system according to one or more of the preceding claims, characterized in that between each component and the electrical mains an electric battery for power continuity is interposed.
13) The system according to one or more of the preceding claims, characterized in that said centralized computer is suitable for the selective activation, by means of the units of the contiguous systems connected thereto, of the corresponding image acquisition sensors, of the corresponding sound recorders, of the corresponding thermal detectors, of the corresponding smoke detectors, of the corresponding gas detectors, of the corresponding electrical mains connection detectors, for a monitoring of the region that is adjacent to the region of the unit that initially sent the alarm signal.
14) The system according to one or more of the preceding claims, characterized in that said centralized computer is suitable for the selective activation, by means of the units of the contiguous systems connected thereto, of one alarm indicator for broadcasting the alarm signal in the whole region adjacent to the region of the unit that initially sent the alarm signal.
15) The system according to one or more of the preceding claims, characterized in that said alarm indicator comprises an audio playback device for the emission of predefined messages, related to the type of alarm and the exact location of emission thereof.
16) A process for the management of security and alarm systems according to one or more of the preceding claims consisting in:
processing metadata based on the images acquired by at least one sensor, in a monitored environment;
sending said metadata to a centralized computer;
in case of reception of an alarm signal sent from an alarm indicator based on a detected per s on :
analyzing said metadata for the identification and tracing of said person; interrogating at least one of said sensors to obtain at least one image of said person.
17) The process for the management of security and alarm systems according to one or more of the preceding claims consisting in:
detecting an extraordinary event, which has occurred in a monitored environment, by means of said sensors controlled by said control and management unit of a first system;
sending a string of data related to the extraordinary event, via said remote connection module, to said centralized computer, said data string comprising at least one item of information chosen among the geolocation coordinates of the monitored environment, the type of extraordinary event detected, the images acquired by the dedicated sensors and the like, for their storage;
- activating, by means of said centralized computer, the sensors of the systems arranged within regions that are adjacent to the region in which the extraordinary event has occurred, for the acquisition of additional data related to said regions and their sending to said centralized computer for their storage.
PCT/IB2016/057138 2015-11-26 2016-11-25 Security and alarm system WO2017090004A2 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
EP16816389.7A EP3381022A2 (en) 2015-11-26 2016-11-25 Security system with metadata analysis

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
ITUB2015A005911A ITUB20155911A1 (en) 2015-11-26 2015-11-26 SAFETY AND ALARM SYSTEM
ITUB2015A005911 2015-11-26

Publications (2)

Publication Number Publication Date
WO2017090004A2 true WO2017090004A2 (en) 2017-06-01
WO2017090004A3 WO2017090004A3 (en) 2017-08-03

Family

ID=55485165

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/IB2016/057138 WO2017090004A2 (en) 2015-11-26 2016-11-25 Security and alarm system

Country Status (3)

Country Link
EP (1) EP3381022A2 (en)
IT (1) ITUB20155911A1 (en)
WO (1) WO2017090004A2 (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109427169A (en) * 2017-09-01 2019-03-05 湖南中南楷思科技发展有限公司 A kind of security protection system based on Internet of Things
GB2581222A (en) * 2019-02-05 2020-08-12 Ford Global Tech Llc Protecting property
CN111629165A (en) * 2020-07-28 2020-09-04 天津中新智冠信息技术有限公司 Alarm video processing method, device, equipment and storage medium

Family Cites Families (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CA2274572C (en) * 1999-06-07 2006-10-03 Strategic Vista International Inc. Security alarm system
WO2006106496A1 (en) * 2005-04-03 2006-10-12 Nice Systems Ltd. Apparatus and methods for the semi-automatic tracking and examining of an object or an event in a monitored site
US20060250236A1 (en) * 2005-05-04 2006-11-09 Ackley Donald E Pod-based wireless sensor system
US20120092161A1 (en) * 2010-10-18 2012-04-19 Smartwatch, Inc. Systems and methods for notifying proximal community members of an emergency or event
US9852613B2 (en) * 2013-09-10 2017-12-26 Telefonaktiebolaget Lm Ericsson (Publ) Method and monitoring centre for monitoring occurrence of an event
US9384656B2 (en) * 2014-03-10 2016-07-05 Tyco Fire & Security Gmbh False alarm avoidance in security systems filtering low in network
US20150312535A1 (en) * 2014-04-23 2015-10-29 International Business Machines Corporation Self-rousing surveillance system, method and computer program product

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109427169A (en) * 2017-09-01 2019-03-05 湖南中南楷思科技发展有限公司 A kind of security protection system based on Internet of Things
GB2581222A (en) * 2019-02-05 2020-08-12 Ford Global Tech Llc Protecting property
GB2581222B (en) * 2019-02-05 2021-03-03 Ford Global Tech Llc Protecting property
CN111629165A (en) * 2020-07-28 2020-09-04 天津中新智冠信息技术有限公司 Alarm video processing method, device, equipment and storage medium
CN111629165B (en) * 2020-07-28 2020-12-18 天津中新智冠信息技术有限公司 Alarm video processing method, device, equipment and storage medium

Also Published As

Publication number Publication date
EP3381022A2 (en) 2018-10-03
ITUB20155911A1 (en) 2017-05-26
WO2017090004A3 (en) 2017-08-03

Similar Documents

Publication Publication Date Title
US9852604B2 (en) Building security system
CA2814366C (en) System and method of post event/alarm analysis in cctv and integrated security systems
US20160309123A1 (en) Neighborhood camera linking system
US20090121861A1 (en) Detecting, deterring security system
EP2779130B1 (en) GPS directed intrusion system with real-time data acquisition
KR20190035187A (en) Sound alarm broadcasting system in monitoring area
CN101587630A (en) But the intelligent video monitoring system of filtering false alarm
US8781296B2 (en) Auditing system for misuse of an image information
WO2017090004A2 (en) Security and alarm system
KR20180066688A (en) Digital Social Shield System using Deep Active Semi-Supervised Learning
KR20090100841A (en) The automatic sensing movement and control method of vacant business office
EP2333735A1 (en) Filtering video events in a secured area using loose coupling within a security system
CA2933212A1 (en) System and method of smart incident analysis in control system using floor maps
CN205788640U (en) A kind of home alarm system
CN110310447A (en) Laboratory safety guard system
KR101741312B1 (en) Real-time monitoring system for home
CN116457851B (en) System and method for real estate monitoring
CN210515546U (en) Safety early warning device
CN106454252A (en) Positioning based building video monitoring system
CN116457851A (en) System and method for real estate monitoring
Otapo et al. OFFICE-AUTOMATED INTRUSION DETECTION SYSTEM (O-AIDS)
CN102457718A (en) Graphical bookmarking of video data with user inputs in video surveillance
KR20040096181A (en) Network linked system for monitoring and controlling emergency, a business method using the system and computer readable medium having stored thereon computer executable instruction for preforming the same

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 16816389

Country of ref document: EP

Kind code of ref document: A2

NENP Non-entry into the national phase in:

Ref country code: DE

WWE Wipo information: entry into national phase

Ref document number: 2016816389

Country of ref document: EP

ENP Entry into the national phase in:

Ref document number: 2016816389

Country of ref document: EP

Effective date: 20180626