throbber
||l||||||||||||||||||||||||||||||l||l|||||Ill
`
`USO()?864983B2
`
`(12)
`
`United States Patent
`
`Dronge
`
`(10) Patent No.:
`(45; Date of Patent:
`
`US 7,864,983 B2
`Jan. 4, 2011
`
`SECURITY ALARM SYSTEM
`
`6.396.535 Bl
`
`S.-‘"2002 Waters:
`
`Isleyelal.
`3-‘"2003
`3.-‘"2003 Chang
`4."2{)'U3
`Ito et al.
`8.-‘£004 Shemcsh clal.
`3="2Ui)5 Wolfe
`
`
`
`.... .. 348-"159
`382-"I00
`
`6.5_“s'2,‘}t')1 B2
`6.538.689 Bl "‘
`6.545.115 131*
`6.782.847 Bl
`6.8643189 B2
`
`[Continued]
`FOREIGN PATENT DOCUMENTS
`
`(54)
`
`(76)
`
`Inventor; Mark Dronge. 33 Kenwood Rd.
`Tenally. NJ (US) 07670
`
`(‘°‘)
`
`Notice:
`
`Subject to any disclaimer. the term oftlijs
`patent is extended or adjusted under 35
`U.S.C. 15403) by 4? days.
`
`(21)
`
`_1‘\pp1.No.: 12l430,463
`
`(22)
`
`Filed:
`
`Apr. 27. 2009
`
`(65)
`
`(63)
`
`(60)
`
`(51)
`
`(52)
`(58)
`
`(56)
`
`Prior Publication Data
`
`1311'
`
`10122294
`
`3.-‘Z003
`
`US 20()9)'0225166 Al
`
`Sep. 10. 2009
`
`Related U.S. Application Data
`
`Continuation ofapplication No. 111692.430. filed on
`Mar. 28. 2007, now Pat. No. 7,526,105.
`
`Provisional application No. 601743.894. filed on Mar.
`29. 2006. provisional application No. 601804.660.
`filed on Jun. 14, 2006.
`
`(2006.01)
`
`Int. Cl.
`G06K 9/09
`382/107: 348i"1-‘-1-3
`U.S. (Ii.
`3823100.
`Field ofClassification Search
`382K103. 106. 107. 159. 170. 18}. 190. 195.
`382.1203. 206: 3481142. 143. 152. 155. 159.
`348-I169
`See application file for complete search history.
`References Cited
`
`U.8. PATENT DOCUMENTS
`
`4.679.t}77 A
`5.091.780
`5.283.551
`5.473.311
`5.576.972
`5348.775
`5.864.640
`5.963.148
`6.069.655
`
`>>-ID->>3¢".>>
`
`“'
`
`“‘
`
`T.-" I 9 8')’
`2.’ 1992
`2.-' 1994
`I 2:’ l 995
`1 1.’ 1995
`5-" 1998
`I 1999
`1 0.-' I 999
`5."2flU(l
`
`‘i'uas:a el al.
`Pomerieau
`Guscott
`Hoseit
`Harrison
`Tsttchilcawa et .11.
`Nliramortti el al.
`Sekine er al.
`Seeley et al.
`
`348-"152
`
`(Continued)
`OTHER PUBLICATIONS
`
`“'l‘)\(' I.'1\'l3'l'Seven Security". 'l‘A('. Jan. 2006.
`
`(Continued)
`
`I’r.=‘)m:r_t-‘ E.\'z1niirrer Anatid lillatiiagar
`(74) ./tt.=‘rJrm*_t'. /Igem‘, or First: Brian Ro1‘l‘e
`
`(57)
`
`ABSTRACT
`
`Security alarm system for protecting a structure includes
`motion detectors eontieeled to calneras. liach camera has a
`dornialit state in which images are not obtained and an active
`state iI1 which images are obtained and is activated into the
`active state when an associated motion detector detects
`
`motion. A processor is coupled to the camera(s] and arranged
`to control
`the camera(s) and receive the image obtained
`thereby. A teleeomnttltticatiotis module is coupled to the pro-
`eessor. A handheld lCl(-:Ct)l111’I1ll1'1iC:t1i0nS unit lransrnils corri-
`mantle to the processor via the lelecommtitliealions modnie to
`cause the processor to provide images, obtained from the
`cantera(s). to the telecommtttlicatiotls module to be transmit-
`ted to the telecommunications unit.
`
`348-"I54
`
`20 Claims. 4 Drawing Sheets
`
`Policelfirelsecurity
`
`
`
`I-lnncl-licld
`Telecommunications
`unit
`
`Page 1 of14
`Page 1 of 14
`
`RPX Exhibit 1001
`RPX v. MD Security
`RPX V. MD Security
`
`RPX Exhibit 1001
`
`

`
`US. PATENT DOCUMENTS
`_
`_
`H2006 Rjgney et al.
`6,985.17! Bl *
`10.-‘Z006 Doyie.II
`1128.024 132
`l2-2006 SCTIITIEU
`1149.422 B2
`20030202102 Al* IUFZUG3 Shlota Ct :11.
`2DD4.r'D{}8l338 A1
`‘#2004 'l‘a.kcnaka
`200-’-ED215750 Al
`I0.-‘Z004 Sliip
`2l'J05a"0l5l85l Al
`7.-“Z005 Schnell
`2005.-13179553 Al
`852005 Fujie
`
`FOREIGN PATENT DOCUMENTS
`
`US 7,864,983 B2
`Page 2
`
`I
`348-149
`
`348.-“I59
`
`131’
`J1’
`J]:
`JP
`Jp
`_]'p
`W0
`
`1333302 A3
`I 140396
`5054193
`5323355
`7050325
`2034077350
`9323705
`
`ll-"2004
`(151989
`331993
`12.-[993
`3,-[995
`3’.-23,04
`751993
`
`OTHER PUBLICATIONS
`
`Supplementary European Search Repon for EP 0'.-‘ 75 4166 dated
`Oct. 15. 20 I0.
`
`EP
`
`[(130188 A}
`
`312000
`
`* (riled by cxanlimsr
`
`Page2of14
`Page 2 of 14
`
`

`
`U.S. Patent
`
`Jan. 4, 2011
`
`Sheet 1 of4
`
`US 7,864,983 B2
`
`Motion detector
`
`10
`
`I2
`
`14
`
`On-site Computer
`
`Homeownefs
`computer
`
`18
`
`P0] ice/’r'i1'e/secu1'ity
`
`42
`
`Effect
`
`Countermeasures
`
`Hand—he1d
`
`unit
`
`Telecommunications
`
`Page3of14
`Page 3 of 14
`
`

`
`US. Patent
`
`Jan. 4, 2011
`
`Sheet 2 of4
`
`US 7,864,983 B2
`
`Obtain image
`
`24
`
`Derive silhouette of
`
`object in image
`
`FIG. 2
`
`Compare derived
`silhouette to stored
`
`silhouettes
`
`
`22
`
` Is derived
`
`
`
`
` Sleep Mode
`
`silhouette
`
`indicative of a
`
`
`
`
`
`Assign counterrneasure(s)
`based on silhouette
`
`threat
`
`
`
`32
`
`Page4of14
`Page 4 of 14
`
`

`
`US. Patent
`
`Jan. 4, 2011
`
`Sheet 3 of4
`
`US 7,864,983 B2
`
`Page5of14
`Page 5 of 14
`
`

`
`US. Patent
`
`.1an.4, 2011
`
`Sheet 4 of 4
`
`US 7,864,983 B2
`
`Came1'a(s) with
`
`motion detecting
`mode and threat/
`
`identification analysis
`mode
`
`14
`
`On-site Computer
`
`Homeowner’ s
`
`computer
`
`Effect
`
`Countermeasures
`
`\ 2
`
`0/
`
`18
`
`Police/fire/security
`
`42
`
`Hand-held
`
`Telecommunications
`
`unit
`
`Page6of14
`Page 6 of 14
`
`

`
`US 7,864,983 B2
`
`2
`
`1
`SECURITY ALARM SYSTEM
`
`CROSS REFERENCE TO RELATED
`APPLICATIONS
`
`an intruder i11 the detection area. In this regard. reference is
`made to Yuasa et al. which is said to describe use of a frame
`
`subtraction technique to derive the presence of an object and
`conveyance of this infonnation to a remote location for view-
`ing by a human.
`Seelcy et al. describes a security system in which video
`cameras send images from a site control unit {SCU) to a
`central station which may be remote from the SCU. Video
`signals from the cameras are directed to an image processor
`section which detennines the presence of an intruder and
`classifies the intruder.
`
`Saylor et al. describes a security system wherein images
`obtained from a security camera are transinittcd over the
`Internet to be seen on a computer. Other ways to be informed
`ofthe existence of an alarm condition are also mentioned.
`German Patent Publication No. 1')l.'~l 10122294 describes an
`
`alarm system which undertakes different actions based on
`detection of an animal in a detection area.
`
`W0 ‘T06 describes a video detection system in which
`different objects are recognized by comparing a set of shape
`features (e.g._. an outline). derived from comparison of an
`instantaneously obtained image to previously obtained
`images. to sets of features of humans and animals.
`.11’ ‘350 describes a technique for detemiining whether an
`object is a human by comparing the silhouette of the object to
`previously registered silhouette information.
`
`SUMMARY OF THE INVENTION
`
`3o
`
`An embodiment of an alarm system for protecting a stmc-
`ture in accordance with the invention includes at least one
`
`This application is a continuation of U .S. patent applica-
`tion Ser. No. 111692.430 filed Mar. 28. 2007, now US. Pat.
`No.
`';'.526_.l05_. and which claims priority under 35 USC.
`-§’l ]9(e) of lJ.S. provisional patent application Ser. No.
`601743.894 filed Mar. 29. 2006. and U.S. provisional patent
`application Ser. No. 60i‘804.tS60 filed 11111. 14. 2006. all of
`which are incorporated by reference herein.
`
`10
`
`FIELD OF THE INVENTION
`
`‘lhe present invention relates generally to a system and
`method for enabling an individual interested in the integrity
`ofa structure to communicate with an alari11 system on the
`structure and obtain information about the structure and its
`
`environment. eg. images from cameras mounted on or
`around the structure.
`
`The present invention also relates generally to an alarm
`system which is designed to dcterrnine whether a threat to
`private property exists and more particularly. to an alarm
`system for a house or other structure where the presence ofa
`threat is primarily posed by wild animals.
`"lhe present invention also relates to an alarm system for
`determining the presence ofa threat posed by wild animals to
`an unoccupied house or other structure and which provides
`for remote activation of security features to reduce or eli1ni-
`nate the potential threat.
`
`BACKGROUND OF THE INVENTION
`
`motion detector arranged to have a lield of view extemal of
`the structure and including an area proximate the structure
`and at least one camera associated with and coupled to each
`motion detector and wherein each camera is arranged relative
`to the associated motion detector(s) such that the camera has
`a field of view encompassing at least part of the field of view
`of the associated motion detectorfs). Each camera has a dor-
`mant state in which images are not obtained and an active
`state in which images are obtained and is activated into the
`active state when the associated motion detector detects
`motion. A processor is coupled to the camera(s) and arranged
`to control
`the camera(s) and receive the image obtained
`thereby. A telecommunications module is coupled to the pro-
`cessor and capable ofcomrnunications over a telecommuni-
`cations network. A handheld telecommunications unit is pro-
`vided for transmitting commands to the processor via the
`tclec ommtutications tnodule to cau
`the processor to provide
`images to the teleconnnunications module to be transmitted
`to the telecommunications unit. The commands can also
`cause the processor to direct the carnera(s) to provide images
`thereto.
`
`3.5
`
`4t":
`
`45
`
`50
`
`55
`
`6t;
`
`In the prior art. there are numerous alarm systems which
`are installed in connection with houses and other structure for
`alerting residents or security personnel to a threat to the house
`or the individuals therein. For example. alarm systems are
`known which generate loud noises when a door is opened
`without authorization or a window is broken. andlor which
`notify security personnel of such conditions to enable such
`personnel to respond to the house.
`Some patents and patent publications that describe such
`security‘ Systerns include: U Pat. Nos. 4.697.077 (Yuasa et
`al.). 5.283.551 (Guscott). 5.576.972 (Harrison). 5.825.412
`(Hobson et al.). 5.937.092 (Wootton et al.), 6.069.655 (Seeley
`ct al.). 6.400.265 (Saylor et al.). German Patent Publication
`No. DE 10122294, Intcmational Patent Publication No. WO
`98128706 (W0 ‘ 706) and Japanese Patent No. JP2004-077350
`(JP '350}.
`(iuscott describes an intrusion alarm system including a
`triggering sensor and a linear array of sensors triggered to
`sample an area of interest when activated by the triggering
`A method for protecting a structure in accordance with the
`sensor. Differences in the sample inlrared emissions enable a
`invention includes arranging a plurality of motion detmtors
`determination of the object as a human or a dog.
`on or around the structure. each in a position in which its field
`Harrison describes a monitoring system including various
`of view includes an area proximate the structure. arranging a
`sensors_. one of which is an optical sensor. and data from all of
`plurality of cameras on or around the structure, each camera
`tl1e sensors is directed to a neural network computer wltich
`being associated with one or more of the motion detectors
`analyzes the data and detects and identifies the objects in the
`such that the camera has a field of view encompassing at least
`sensed area which may be people. animals or objects.
`part of the field of view of any associated motion detector.
`Hobson et al. describes a video detection system for moni-
`providing a processor which controls the at least one camera
`toring railroad crossings wherein a camera views the railroad
`and receives the image obtained by the at least one camera.
`crossing and establishes the presence of objects and the size
`coupling a teleoomrnunications module coupled to the pro-
`thereof. An alarm is sounded based on the size of the object.
`cessor,
`the telecomntunications module being capable of
`communications over a telecommunications network. and
`Wootton et al. describes a security system in which images
`transmitting commands from a handheld teleco111n1ttnica-
`of a detection area are sensed and compared with previously
`obtained images to determine the presence and movement of
`tions unit to the processor via the telecommunications mod-
`Page7of14
`Page 7 of 14
`
`

`
`US 7,864,983 B2
`
`3
`
`ule to cause the processor to provide images to the telecom-
`munications module
`to
`be
`transmitted
`to
`the
`
`telecornmtmications unit. The commands may also cause the
`processor to direct the carnera[s) to obtain images.
`The foregoing provides a new and improved system and
`method for enabling an individual interested in the integrity
`of a structure to communicate with an alarm system on the
`structure and obtain information about the structure and its
`environrnent, e.g.,
`images from cameras mounted on or
`around the structure.
`
`5
`
`ll]
`
`Another embodiment of a security system in accordance
`with the invention is designed to distinguish or discriminate
`between animals and humans with a view toward accurately
`determining a threat to private property which requires a
`response. The security system includes one or more motion
`detectors connected to one or more cameras which are con-
`
`nected to a computer which is connected in turn to a data
`comnumication or transmission device that can inform a
`
`homeowner oil‘ premises. the police. fire department andfor
`private security firm ofthe existence ofan intrusion condition
`based on the images obtained by the camera.
`In use. a motion detector detects motion in the field ofview
`of an associated camera which then obtains one or more
`images. which presumably include the cause ofthe motion. A
`processor connected with the camera derives a silhouette of
`the object that triggered the motion from the obtained image
`(s). through image comparison with images taken without the
`object therein. A processor analyzes the silhouettes by com-
`paring them to previously obtained silhouettes. such as those
`ofvarious animals and humans having ditferent sizes. A clas-
`sification of the silhouette is obtained and depending on what
`object the silhouette is determined to correspond to. i.e.. its
`ideittification,
`liirther action or countermeasures is taken.
`This further action may be:
`the object is classified as “no
`threat" and the system stays in stand-by or the object is
`classified as “hostile" or a threat and a message or warning is
`sent to a distant computer. the property’s owner's homepage.
`the police andfor a private security firm.
`More specifically, one embodiment of an alarm system for
`protecting a structure in accordance with the invention
`includes at least one motion detector arranged to have a field
`of view external ofthe structure and including an area proxi-
`mate the structure_. and at least one camera associated with
`each motion detector. each camera being arranged relative to
`the associated motion detector such that it has a field of view
`
`encompassing at least part of the field of view of the associ-
`ated motion detector. Each camera has a dormant state in
`
`10
`
`25
`
`3ti
`
`35
`
`4t":
`
`45
`
`which images are not obtained and an active state in which
`images are obtained and being activated into the active state
`when the associated motion detector detects motion such that
`
`50
`
`4
`each motion detector is associated with two or more cameras
`(preferably located at different positions) whose field ofview
`partly or entirely encompasses the field ofview of the motion
`detector. ln this manner. two images including the source of
`motion are obtained and independently analyzed in the man-
`ner described above. Dillerent rules of object identification
`can be formulated for siniations where the object identifica-
`tion is different. For each motion detector. there may be an
`exclusive set of two or more cameras. or alternatively. each
`camera can be associated with more than one motion detector
`
`so that it obtains an image when any of its associated motion
`detectors detects motion.
`When two or more cameras obtain images of or containing
`the same object, which may arise in a situation where these
`cameras have an overlapping field ofview relative to a single
`motion detector and are all activated by motion detected by
`that motion detector. images from cameras containing the
`object may be analyzed by the processor to obtain depth
`information about the object. This is similar to a stereo-vision
`concept and various techniques to derive depth information
`about an object contained in two or more images from differ-
`ent imaging devices or cameras are known to those skilled in
`the art. The depth information can be used to aid the processor
`in the object identification task. i.e.. the object classification.
`This aspect of using multiple cameras to obtain images cori-
`taining a common object. derive depth information about the
`object and use the depth information to obtain an identifica-
`tion of the object may be applied independent of the presence
`and particular arrangement of motion detectors and cameras
`described above. l-lowever, the presence of motion detectors
`to activate the cameras would be beneficial.
`’l"hus_. one
`embodiment of the invention contemplates multiple cameras
`associated with each of at
`least one motion detector and
`
`arranged to be activated to obtain images of an object whose
`motion is detected by those cameras. These images can be
`analyzed to obtain depth information about the object. i.e.. the
`distance from a known object to this moving object. and also
`to obtain identification information about this object for the
`purpose of detemiining whether this identified object at the
`determined distance is a threat.
`
`As to the processor’s reaction to the object identification. it
`can be programmed to assign a classification of“no threat” or
`“hostile“ based on the object identification. The library of
`stored silhouettes preferably includes silhouettes oflarge and
`small animals and large and small humans in which case. the
`processor can be programmed to assign the hostile c1assifi-
`cation to large animals and humans and the no threat classi-
`fication to small animals and humans. Other possible differ-
`entiations of classifications may be based on size. When a
`hostile classification is generated, the processor also prefer-
`ably activates countermeasures based on the object identifi-
`cation. For example. the processor can command the alami
`system to generate the audible andfor visual alami in prox-
`imity to the structure andfor command a communication sys-
`tem to generate a communication about the condition of the
`structure and forward the communication to the remote des-
`
`tination, e.g._. a police station. a fire station, a terminal moni-
`tored by an owner of the structure. or a private security sta-
`stored silhouettes and retrieve the object identification asso-
`tion. The communication can include one or more images
`ciated with the exact or closest match. The processor reacts to
`obtained by the ca1nera[s) or one or more images derived
`the detection of motion by the motion detector based on the
`from the images obtained by the camera(s).
`object identification.
`Various associations of the cameras and motion detectors
`An exemplifying method liar protecting a structure in
`accordance with the invention includes arranging a plurality
`are possible. There may be a one-to-one correspondence or
`of motion detectors on or around the structure, each in a
`association between motion detectors and cameras, i.e.. each
`position in which its field of view includes an area proximate
`motion detector has a single and exclusive camera whose field
`the structtire. and arranging a plurality of cameras on or
`of view encompasses the field of view of the motion detector.
`There may be an overlapping camera arrangement wherein
`around the structure. each camera being associated with one
`Page8of14
`Page 8 of 14
`
`that camera obtains an image of the source of the motion
`detected by the associated motion detector. A processor is
`coupled to each camera and arranged to receive the image
`obtained thereby. derive a silhouette of any objects in the
`image. compare the silhouettes to a library of stored silhou-
`ettes having associated object identification to determine an
`exact or closest match of the derived silhouette to one of the
`
`55
`
`60
`
`65
`
`

`
`US 7,864,983 B2
`
`5
`or more oftlte motion detector such that the camera has a field
`of view encompassing at least pan of the field ofview of any
`associated motion detector: The cameras have a dormant state
`
`in which images are not obtained and an active state in which
`images are obtained and are activated into the active state
`when an associated motion detector detects motion such that
`the camera then obtains an image of the source ofthe motion
`detected by the associated motion detector. A processor is
`provided which receives images obtained by the cameras,
`derives a silhouette of any objects in the image. compares the
`silhouettes to a library of stored silhouettes having associated
`object identi fication to detcmii in: an exact or closest match of
`the derived silhouette to one of the stored silhouettes and
`retrieves the object identification associated with the exact or
`closest match. One or more countermeasures to the detection
`of motion by the motion detectors are generated based on the
`object identification when the obj ect is identified as a poten-
`tial threat to the structure.
`
`A classification of"lto threat" or “hostile” can be assigned
`by the processor based on the object identification. in which
`case, the countermeasure can be generated only when the
`classification is hostile. Countermeasures can include gener-
`ating an audible andfor visual alarm in proximity to the struc-
`ture andlor generating at least one communication about the
`condition of the structure based on the object identification
`and lbrwarding t.he communication to the remote destination.
`e.g.. a police station. a fire stat ion. a terminal monitored by an
`owner of the structure, or a private security station. The com-
`munication can include one or more images obtained from the
`cameras andfor one or more images derived from the images
`obtained from the cameras in the communication being for-
`warded to the remote destination.
`
`Another method for monitoring a premises in accordance
`with the invention includes arranging an alarm system in
`connection with the premises. integrating a te]ecommun.ica-
`tions module in connection with a computer of the alarm
`system. the teleconununicaticns module being capable of
`communications over a telecornmunications network. and
`programming the teleconununications module to receive
`commands from a handheld telecommunications unit over
`the leleconlmurticzlt ions network to enable activation and
`deactivation of the alarm system using the telecommunica-
`tions unit. The alarru system may include video cameras
`which obtain images of the premises. in which case. the
`images of the premises obtained by the video cameras can be
`transmitted upon receiving a command from the handheld
`telecommunications unit.
`
`When the telecomnuutications unit is a cellular telephone.
`it can transmit a code number to the teleconununications
`
`module to control activation. deactivation and adjustment of
`the alarm system. When the telecommunications unit is a
`messaging device, it can transmit a message to the telecom-
`munications module to control activation. deactivation and
`adjustment of the alamt system. When the telecommunica-
`tions unit is a camera telephone and the alarm system includes
`video cameras which obtain images of the premises.
`the
`images of the premises obtained by the video cameras can be
`transmitted to the camera telephone upon satisfaction of
`threat conditions as detemtined by the alann system.
`A system for monitoring a premises in accordance with the
`invention includes an alarm system ananged in connection
`with the premises and including various sensors. cameras and
`the like for detecting a threat to the premises and a telecom-
`munications module in connection with the sensors or a con-
`
`.3
`
`ll]
`
`1:-
`
`go
`
`25
`
`3U
`
`35
`
`4t":
`
`45
`
`55
`
`60
`
`trol component thereof. The teleconuuunications module is
`capable of commttnications over a telecolttmtulicatiolis net-
`work. A handheld telecornniunications unit is provided for
`Page9of14
`Page 9 of 14
`
`6
`
`transmitting commands to the teleconunttnications module to
`activate. deactivate and adjust the alamt system. The telecom-
`munications tmit may be an existing unit owned by the home-
`owner or alarm system monitor. such as a cellular telephone,
`iPod. PDA. laptop computer or desktop cotnputer and the
`like.
`When the alarm system includes video cameras which
`obtain images of the premises. it can transmit still-frame or
`motion picture images of the premises obtained by the video
`cameras upon receiving a conunand from the telecomrnuni-
`cations tmit. When the telecommunications unit is a cellular
`
`telephone. it can transmit a code number to the telecommu-
`nications module to control activation, deactivation and
`adjustment of the alamt system. When the teleco1umunica—
`tions unit is a messaging device. it can transmit a message to
`the telecoirununications module to control activation. deacti-
`vation and adjustment of the alarm system. When the tele-
`communications unit is a camera telephone and the alami
`system includes video cameras which obtain images of the
`premises. the alarm system can transmit still-framcormotion
`picture images ofthe premises obtained by the video cameras
`to the camera telephone upon satisfaction ofthreat conditions
`as determined by the alann system.
`Other zmd further objects. advantages and features of the
`present invention will be understood by reference to the fol-
`lowing specification in conjunction with the annexed draw-
`ings. wherein like parts have been given like numbers.
`
`BRIEF DESCRIPTION OF THE DRAWINGS
`
`The invention. together with further objects and advan-
`tages thereof. may best be understood by reference to the
`following description taken in conjunction with the accom-
`panying drawings wherein like reference numerals identify
`like elements.
`FIG. 1 is a schematic of a first embodiment of an alarm
`system in accordance with the invention.
`FIG. 2 is a flow chart of the manner in which an object is
`classified in the alarm system in accordance with the inven-
`tion.
`
`FIG. 3 is an overview ofa house equipped with the alarm
`system in accordance with the invention.
`FIG. 4 is a schematic of a second embodiment of an alarm
`system in accordance with the invention.
`
`DETAILED DESCRIPTION OF THE INVENTION
`
`Referring to the accompanying drawings. 1"‘ IG. 1 shows a
`schematic of one exemplifying embodiment of an alarm sys-
`tem in accordance with the invention which includes, at the
`site at which the alarm system is installed. one or more motion
`detectors 10. one or more cameras 12 and an on-site computer
`14.
`
`Each motion detector 10 is mounted to the house. apart-
`ment or other premises or structure being monitored. herein-
`after referred to as a house for simplicity sake. or on a struc-
`ture around the house which could be dedicated to the
`motmting ofthc motion detector 10. For example. a motion
`detector could be mounted to the exterior wall ofthe house. to
`a post around the house. to a tree around the house. or to the
`roofof the house. The premises or structure being monitored
`may be any type of premises or structure which is typically
`monitored for security purposes. including but not limited to.
`a warehouse. a boatyard, a business, a boat, or a land vehicle
`such as one with a locating system.
`[Each motion detector 10 is mounted sttch that its field of
`view. i.c.. the field in which it detects motion. is arotmd the
`
`

`
`7
`
`US 7,864,983 B2
`
`ll]
`
`3ti
`
`Motion detectors I0 can be standard. otT-tl1e-sl1ell'compo-
`nents which provide a signal indicative of the presence of
`motion above a threshold. In this case. small objects which
`might be blown aloft by wind. such as leaves. would not
`trigger tl1c motion detector to provide an output signal. 1’ur-
`ther. the particular motion detectors selected could be those
`which only detect animate objects. e.g.. htunans or animals.
`In this case. if a fence post in a field of view of a motion
`detector 10 is being tilted by the wind. it would also not cause
`the motion detector to provide an output signal.
`Each camera 12 is mounted to the house or on a structure
`around the house which could be dedicated to the motmting of
`the camera 12. For example, a camera could be mounted to the
`exterior wall of the house. to a post around the house. to a tree
`around the house. or to the roof of the house.
`
`house in which an intruder could approach the house. For
`example. a motion detector 10 could be arranged to have a
`field of view in a path leading to the house. a field of view
`encompassing a length ofa fence around the house or a field
`or a Field of view adjacent the house. e.g.. adjacent one or
`more windows of the house.
`With reference to FIG. 3 wherein the outline of a generic
`house 34 is shown. there are four motion detectors IDA, 10B.
`10C, 101) motmted to the house 34 at its corners so as to
`provide overlapping fields of view. Each field of view 36A.
`36B. 36C and 36D extends over an approximate 180 degree
`range a sttflicient distance from the house. the exact distance
`depending on the type and construction o fthe motion detector
`installed in the alarm system. Of course. the number. place-
`ment and coverage area of the motion detectors will usually
`vary depending on such factors as the plan outline of the
`house. the location ofdoors and windows and the surrounding
`area.
`
`8
`Each field ofview 38A. 38B, 38C. 38D, 38E. 38F. 38G, 38H
`extends over an approximate 180 degree range a sufficient
`distance from the house_. the exact distance depending on the
`type and construction of the cameras installed in the alarm
`system. As shown in FIG. 3. each fieldofview 36./\. 36B. 36C
`and 36]) of the motion detectors 10A. 1013.
`l0(.‘ and 10].)
`overlaps with a plurality of fields of view 38A. 38B. 38C.
`38D. 38E. 38F. 38G, 38H of cameras 12A. 12B. 12C. 12D.
`12lE_. 121-‘. 12G. 121-]. Thus. when motion is detector by one of
`the motion detectors 10. several cameras 12 will be triggered
`to obtain images. For example. when motion is detected by
`motion detector 10A. cameras l2A. 1213. 12C and 12D will
`obtain images.
`Cameras can also be provided to visualize the house. or
`parts thereof. e.g.. a camera can be mounted on a post distant
`from the door and directed toward the door to obtain an image
`of the house including the door. The same would also be
`applicable for images of the windows.
`Ofcourse. the number, placement and coverage area 0 f the
`cameras will usually vary depending on such factors as the
`location of the motion detectors. the plan outline ofthe house.
`the location ofdoors and windows and the surrounding area.
`Cameras 12 can be standard. oil‘-the-shell" components
`which obtain images in individual frames and as in some
`conventional cameras. can be equipped with a light which is
`triggered when the ambient light
`is less than a threshold.
`(.‘an1eras can also be used wl1icl1 are infrared cameras which
`obtain infrared images. This is possible since, as discussed
`below, only the outline of the object causing the motion is
`needed for image processing.
`The on-site computer 14 is connected to all ofthe cameras
`12. On-site computer 14 can also be connected to the motion
`detectors III and control the cameras 12. i.e.. the image-taking
`step. based on signals provided by the motion detectors.
`Alternatively. the cameras 12 are directly connected to the
`associated motion detector[s) 10 and take an image without
`involvement of the on-site cornputer 14.
`An advantage of coupling the cameras 12 to the motion
`detectors It] is that the cameras do not continually operate and
`obtain images of the envirorunent around or including the
`house. Rather. the cameras 12 L e only activated to obtain
`images when motion is detected by the associated one(s] of
`the motion detectors II). This conserves electricity or battery
`power and is thus especially useful when the cameras are
`operating on battery power.
`Computer 14 includes hardware and software components
`which perform, among other fiinctions, image processing.
`That is. the computer 14 receives data from the cameras 12. in
`any form in which images can be conveyed electronically. and
`analyzes the images in a unique manner to analyze the threat
`level of the source of the motion. It is possible that only a
`single camera 12 will be taking an image of the area surro1md-
`ing the house and providing this image in electronic fomi to
`the in-site computer 14. Alternatively. the on-site computer
`14 will receive images from multiple cameras 12. all triggered
`by one motion detector. or from multiple cameras triggered
`by motion detected by multiple motion detectors. e.g.. when
`the source of motion moves through the fields of view of
`multiple motion detectors.
`A preferred image processing teclmique is shown sche-
`it is also possible that a single camera 12 l1as a field of view
`matically i11 FIG. 2. The first step 22 for on-site computer 14
`which encompasses the field of view of multiple motion
`is to obtain an image. The image processing step is explained
`detectors 18. In this case. when any of a plurality of Inotion
`for the individual processing of a single image. If multiple
`detectors 10 detects motion. that camera 12 will be triggered
`images

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket