`
`USO()?864983B2
`
`(12)
`
`United States Patent
`
`Dronge
`
`(10) Patent No.:
`(45; Date of Patent:
`
`US 7,864,983 B2
`Jan. 4, 2011
`
`SECURITY ALARM SYSTEM
`
`6.396.535 Bl
`
`S.-‘"2002 Waters:
`
`Isleyelal.
`3-‘"2003
`3.-‘"2003 Chang
`4."2{)'U3
`Ito et al.
`8.-‘£004 Shemcsh clal.
`3="2Ui)5 Wolfe
`
`
`
`.... .. 348-"159
`382-"I00
`
`6.5_“s'2,‘}t')1 B2
`6.538.689 Bl "‘
`6.545.115 131*
`6.782.847 Bl
`6.8643189 B2
`
`[Continued]
`FOREIGN PATENT DOCUMENTS
`
`(54)
`
`(76)
`
`Inventor; Mark Dronge. 33 Kenwood Rd.
`Tenally. NJ (US) 07670
`
`(‘°‘)
`
`Notice:
`
`Subject to any disclaimer. the term oftlijs
`patent is extended or adjusted under 35
`U.S.C. 15403) by 4? days.
`
`(21)
`
`_1‘\pp1.No.: 12l430,463
`
`(22)
`
`Filed:
`
`Apr. 27. 2009
`
`(65)
`
`(63)
`
`(60)
`
`(51)
`
`(52)
`(58)
`
`(56)
`
`Prior Publication Data
`
`1311'
`
`10122294
`
`3.-‘Z003
`
`US 20()9)'0225166 Al
`
`Sep. 10. 2009
`
`Related U.S. Application Data
`
`Continuation ofapplication No. 111692.430. filed on
`Mar. 28. 2007, now Pat. No. 7,526,105.
`
`Provisional application No. 601743.894. filed on Mar.
`29. 2006. provisional application No. 601804.660.
`filed on Jun. 14, 2006.
`
`(2006.01)
`
`Int. Cl.
`G06K 9/09
`382/107: 348i"1-‘-1-3
`U.S. (Ii.
`3823100.
`Field ofClassification Search
`382K103. 106. 107. 159. 170. 18}. 190. 195.
`382.1203. 206: 3481142. 143. 152. 155. 159.
`348-I169
`See application file for complete search history.
`References Cited
`
`U.8. PATENT DOCUMENTS
`
`4.679.t}77 A
`5.091.780
`5.283.551
`5.473.311
`5.576.972
`5348.775
`5.864.640
`5.963.148
`6.069.655
`
`>>-ID->>3¢".>>
`
`“'
`
`“‘
`
`T.-" I 9 8')’
`2.’ 1992
`2.-' 1994
`I 2:’ l 995
`1 1.’ 1995
`5-" 1998
`I 1999
`1 0.-' I 999
`5."2flU(l
`
`‘i'uas:a el al.
`Pomerieau
`Guscott
`Hoseit
`Harrison
`Tsttchilcawa et .11.
`Nliramortti el al.
`Sekine er al.
`Seeley et al.
`
`348-"152
`
`(Continued)
`OTHER PUBLICATIONS
`
`“'l‘)\(' I.'1\'l3'l'Seven Security". 'l‘A('. Jan. 2006.
`
`(Continued)
`
`I’r.=‘)m:r_t-‘ E.\'z1niirrer Anatid lillatiiagar
`(74) ./tt.=‘rJrm*_t'. /Igem‘, or First: Brian Ro1‘l‘e
`
`(57)
`
`ABSTRACT
`
`Security alarm system for protecting a structure includes
`motion detectors eontieeled to calneras. liach camera has a
`dornialit state in which images are not obtained and an active
`state iI1 which images are obtained and is activated into the
`active state when an associated motion detector detects
`
`motion. A processor is coupled to the camera(s] and arranged
`to control
`the camera(s) and receive the image obtained
`thereby. A teleeomnttltticatiotis module is coupled to the pro-
`eessor. A handheld lCl(-:Ct)l111’I1ll1'1iC:t1i0nS unit lransrnils corri-
`mantle to the processor via the lelecommtitliealions modnie to
`cause the processor to provide images, obtained from the
`cantera(s). to the telecommtttlicatiotls module to be transmit-
`ted to the telecommunications unit.
`
`348-"I54
`
`20 Claims. 4 Drawing Sheets
`
`Policelfirelsecurity
`
`
`
`I-lnncl-licld
`Telecommunications
`unit
`
`Page 1 of14
`Page 1 of 14
`
`RPX Exhibit 1001
`RPX v. MD Security
`RPX V. MD Security
`
`RPX Exhibit 1001
`
`
`
`US. PATENT DOCUMENTS
`_
`_
`H2006 Rjgney et al.
`6,985.17! Bl *
`10.-‘Z006 Doyie.II
`1128.024 132
`l2-2006 SCTIITIEU
`1149.422 B2
`20030202102 Al* IUFZUG3 Shlota Ct :11.
`2DD4.r'D{}8l338 A1
`‘#2004 'l‘a.kcnaka
`200-’-ED215750 Al
`I0.-‘Z004 Sliip
`2l'J05a"0l5l85l Al
`7.-“Z005 Schnell
`2005.-13179553 Al
`852005 Fujie
`
`FOREIGN PATENT DOCUMENTS
`
`US 7,864,983 B2
`Page 2
`
`I
`348-149
`
`348.-“I59
`
`131’
`J1’
`J]:
`JP
`Jp
`_]'p
`W0
`
`1333302 A3
`I 140396
`5054193
`5323355
`7050325
`2034077350
`9323705
`
`ll-"2004
`(151989
`331993
`12.-[993
`3,-[995
`3’.-23,04
`751993
`
`OTHER PUBLICATIONS
`
`Supplementary European Search Repon for EP 0'.-‘ 75 4166 dated
`Oct. 15. 20 I0.
`
`EP
`
`[(130188 A}
`
`312000
`
`* (riled by cxanlimsr
`
`Page2of14
`Page 2 of 14
`
`
`
`U.S. Patent
`
`Jan. 4, 2011
`
`Sheet 1 of4
`
`US 7,864,983 B2
`
`Motion detector
`
`10
`
`I2
`
`14
`
`On-site Computer
`
`Homeownefs
`computer
`
`18
`
`P0] ice/’r'i1'e/secu1'ity
`
`42
`
`Effect
`
`Countermeasures
`
`Hand—he1d
`
`unit
`
`Telecommunications
`
`Page3of14
`Page 3 of 14
`
`
`
`US. Patent
`
`Jan. 4, 2011
`
`Sheet 2 of4
`
`US 7,864,983 B2
`
`Obtain image
`
`24
`
`Derive silhouette of
`
`object in image
`
`FIG. 2
`
`Compare derived
`silhouette to stored
`
`silhouettes
`
`
`22
`
` Is derived
`
`
`
`
` Sleep Mode
`
`silhouette
`
`indicative of a
`
`
`
`
`
`Assign counterrneasure(s)
`based on silhouette
`
`threat
`
`
`
`32
`
`Page4of14
`Page 4 of 14
`
`
`
`US. Patent
`
`Jan. 4, 2011
`
`Sheet 3 of4
`
`US 7,864,983 B2
`
`Page5of14
`Page 5 of 14
`
`
`
`US. Patent
`
`.1an.4, 2011
`
`Sheet 4 of 4
`
`US 7,864,983 B2
`
`Came1'a(s) with
`
`motion detecting
`mode and threat/
`
`identification analysis
`mode
`
`14
`
`On-site Computer
`
`Homeowner’ s
`
`computer
`
`Effect
`
`Countermeasures
`
`\ 2
`
`0/
`
`18
`
`Police/fire/security
`
`42
`
`Hand-held
`
`Telecommunications
`
`unit
`
`Page6of14
`Page 6 of 14
`
`
`
`US 7,864,983 B2
`
`2
`
`1
`SECURITY ALARM SYSTEM
`
`CROSS REFERENCE TO RELATED
`APPLICATIONS
`
`an intruder i11 the detection area. In this regard. reference is
`made to Yuasa et al. which is said to describe use of a frame
`
`subtraction technique to derive the presence of an object and
`conveyance of this infonnation to a remote location for view-
`ing by a human.
`Seelcy et al. describes a security system in which video
`cameras send images from a site control unit {SCU) to a
`central station which may be remote from the SCU. Video
`signals from the cameras are directed to an image processor
`section which detennines the presence of an intruder and
`classifies the intruder.
`
`Saylor et al. describes a security system wherein images
`obtained from a security camera are transinittcd over the
`Internet to be seen on a computer. Other ways to be informed
`ofthe existence of an alarm condition are also mentioned.
`German Patent Publication No. 1')l.'~l 10122294 describes an
`
`alarm system which undertakes different actions based on
`detection of an animal in a detection area.
`
`W0 ‘T06 describes a video detection system in which
`different objects are recognized by comparing a set of shape
`features (e.g._. an outline). derived from comparison of an
`instantaneously obtained image to previously obtained
`images. to sets of features of humans and animals.
`.11’ ‘350 describes a technique for detemiining whether an
`object is a human by comparing the silhouette of the object to
`previously registered silhouette information.
`
`SUMMARY OF THE INVENTION
`
`3o
`
`An embodiment of an alarm system for protecting a stmc-
`ture in accordance with the invention includes at least one
`
`This application is a continuation of U .S. patent applica-
`tion Ser. No. 111692.430 filed Mar. 28. 2007, now US. Pat.
`No.
`';'.526_.l05_. and which claims priority under 35 USC.
`-§’l ]9(e) of lJ.S. provisional patent application Ser. No.
`601743.894 filed Mar. 29. 2006. and U.S. provisional patent
`application Ser. No. 60i‘804.tS60 filed 11111. 14. 2006. all of
`which are incorporated by reference herein.
`
`10
`
`FIELD OF THE INVENTION
`
`‘lhe present invention relates generally to a system and
`method for enabling an individual interested in the integrity
`ofa structure to communicate with an alari11 system on the
`structure and obtain information about the structure and its
`
`environment. eg. images from cameras mounted on or
`around the structure.
`
`The present invention also relates generally to an alarm
`system which is designed to dcterrnine whether a threat to
`private property exists and more particularly. to an alarm
`system for a house or other structure where the presence ofa
`threat is primarily posed by wild animals.
`"lhe present invention also relates to an alarm system for
`determining the presence ofa threat posed by wild animals to
`an unoccupied house or other structure and which provides
`for remote activation of security features to reduce or eli1ni-
`nate the potential threat.
`
`BACKGROUND OF THE INVENTION
`
`motion detector arranged to have a lield of view extemal of
`the structure and including an area proximate the structure
`and at least one camera associated with and coupled to each
`motion detector and wherein each camera is arranged relative
`to the associated motion detector(s) such that the camera has
`a field of view encompassing at least part of the field of view
`of the associated motion detectorfs). Each camera has a dor-
`mant state in which images are not obtained and an active
`state in which images are obtained and is activated into the
`active state when the associated motion detector detects
`motion. A processor is coupled to the camera(s) and arranged
`to control
`the camera(s) and receive the image obtained
`thereby. A telecommunications module is coupled to the pro-
`cessor and capable ofcomrnunications over a telecommuni-
`cations network. A handheld telecommunications unit is pro-
`vided for transmitting commands to the processor via the
`tclec ommtutications tnodule to cau
`the processor to provide
`images to the teleconnnunications module to be transmitted
`to the telecommunications unit. The commands can also
`cause the processor to direct the carnera(s) to provide images
`thereto.
`
`3.5
`
`4t":
`
`45
`
`50
`
`55
`
`6t;
`
`In the prior art. there are numerous alarm systems which
`are installed in connection with houses and other structure for
`alerting residents or security personnel to a threat to the house
`or the individuals therein. For example. alarm systems are
`known which generate loud noises when a door is opened
`without authorization or a window is broken. andlor which
`notify security personnel of such conditions to enable such
`personnel to respond to the house.
`Some patents and patent publications that describe such
`security‘ Systerns include: U Pat. Nos. 4.697.077 (Yuasa et
`al.). 5.283.551 (Guscott). 5.576.972 (Harrison). 5.825.412
`(Hobson et al.). 5.937.092 (Wootton et al.), 6.069.655 (Seeley
`ct al.). 6.400.265 (Saylor et al.). German Patent Publication
`No. DE 10122294, Intcmational Patent Publication No. WO
`98128706 (W0 ‘ 706) and Japanese Patent No. JP2004-077350
`(JP '350}.
`(iuscott describes an intrusion alarm system including a
`triggering sensor and a linear array of sensors triggered to
`sample an area of interest when activated by the triggering
`A method for protecting a structure in accordance with the
`sensor. Differences in the sample inlrared emissions enable a
`invention includes arranging a plurality of motion detmtors
`determination of the object as a human or a dog.
`on or around the structure. each in a position in which its field
`Harrison describes a monitoring system including various
`of view includes an area proximate the structure. arranging a
`sensors_. one of which is an optical sensor. and data from all of
`plurality of cameras on or around the structure, each camera
`tl1e sensors is directed to a neural network computer wltich
`being associated with one or more of the motion detectors
`analyzes the data and detects and identifies the objects in the
`such that the camera has a field of view encompassing at least
`sensed area which may be people. animals or objects.
`part of the field of view of any associated motion detector.
`Hobson et al. describes a video detection system for moni-
`providing a processor which controls the at least one camera
`toring railroad crossings wherein a camera views the railroad
`and receives the image obtained by the at least one camera.
`crossing and establishes the presence of objects and the size
`coupling a teleoomrnunications module coupled to the pro-
`thereof. An alarm is sounded based on the size of the object.
`cessor,
`the telecomntunications module being capable of
`communications over a telecommunications network. and
`Wootton et al. describes a security system in which images
`transmitting commands from a handheld teleco111n1ttnica-
`of a detection area are sensed and compared with previously
`obtained images to determine the presence and movement of
`tions unit to the processor via the telecommunications mod-
`Page7of14
`Page 7 of 14
`
`
`
`US 7,864,983 B2
`
`3
`
`ule to cause the processor to provide images to the telecom-
`munications module
`to
`be
`transmitted
`to
`the
`
`telecornmtmications unit. The commands may also cause the
`processor to direct the carnera[s) to obtain images.
`The foregoing provides a new and improved system and
`method for enabling an individual interested in the integrity
`of a structure to communicate with an alarm system on the
`structure and obtain information about the structure and its
`environrnent, e.g.,
`images from cameras mounted on or
`around the structure.
`
`5
`
`ll]
`
`Another embodiment of a security system in accordance
`with the invention is designed to distinguish or discriminate
`between animals and humans with a view toward accurately
`determining a threat to private property which requires a
`response. The security system includes one or more motion
`detectors connected to one or more cameras which are con-
`
`nected to a computer which is connected in turn to a data
`comnumication or transmission device that can inform a
`
`homeowner oil‘ premises. the police. fire department andfor
`private security firm ofthe existence ofan intrusion condition
`based on the images obtained by the camera.
`In use. a motion detector detects motion in the field ofview
`of an associated camera which then obtains one or more
`images. which presumably include the cause ofthe motion. A
`processor connected with the camera derives a silhouette of
`the object that triggered the motion from the obtained image
`(s). through image comparison with images taken without the
`object therein. A processor analyzes the silhouettes by com-
`paring them to previously obtained silhouettes. such as those
`ofvarious animals and humans having ditferent sizes. A clas-
`sification of the silhouette is obtained and depending on what
`object the silhouette is determined to correspond to. i.e.. its
`ideittification,
`liirther action or countermeasures is taken.
`This further action may be:
`the object is classified as “no
`threat" and the system stays in stand-by or the object is
`classified as “hostile" or a threat and a message or warning is
`sent to a distant computer. the property’s owner's homepage.
`the police andfor a private security firm.
`More specifically, one embodiment of an alarm system for
`protecting a structure in accordance with the invention
`includes at least one motion detector arranged to have a field
`of view external ofthe structure and including an area proxi-
`mate the structure_. and at least one camera associated with
`each motion detector. each camera being arranged relative to
`the associated motion detector such that it has a field of view
`
`encompassing at least part of the field of view of the associ-
`ated motion detector. Each camera has a dormant state in
`
`10
`
`25
`
`3ti
`
`35
`
`4t":
`
`45
`
`which images are not obtained and an active state in which
`images are obtained and being activated into the active state
`when the associated motion detector detects motion such that
`
`50
`
`4
`each motion detector is associated with two or more cameras
`(preferably located at different positions) whose field ofview
`partly or entirely encompasses the field ofview of the motion
`detector. ln this manner. two images including the source of
`motion are obtained and independently analyzed in the man-
`ner described above. Dillerent rules of object identification
`can be formulated for siniations where the object identifica-
`tion is different. For each motion detector. there may be an
`exclusive set of two or more cameras. or alternatively. each
`camera can be associated with more than one motion detector
`
`so that it obtains an image when any of its associated motion
`detectors detects motion.
`When two or more cameras obtain images of or containing
`the same object, which may arise in a situation where these
`cameras have an overlapping field ofview relative to a single
`motion detector and are all activated by motion detected by
`that motion detector. images from cameras containing the
`object may be analyzed by the processor to obtain depth
`information about the object. This is similar to a stereo-vision
`concept and various techniques to derive depth information
`about an object contained in two or more images from differ-
`ent imaging devices or cameras are known to those skilled in
`the art. The depth information can be used to aid the processor
`in the object identification task. i.e.. the object classification.
`This aspect of using multiple cameras to obtain images cori-
`taining a common object. derive depth information about the
`object and use the depth information to obtain an identifica-
`tion of the object may be applied independent of the presence
`and particular arrangement of motion detectors and cameras
`described above. l-lowever, the presence of motion detectors
`to activate the cameras would be beneficial.
`’l"hus_. one
`embodiment of the invention contemplates multiple cameras
`associated with each of at
`least one motion detector and
`
`arranged to be activated to obtain images of an object whose
`motion is detected by those cameras. These images can be
`analyzed to obtain depth information about the object. i.e.. the
`distance from a known object to this moving object. and also
`to obtain identification information about this object for the
`purpose of detemiining whether this identified object at the
`determined distance is a threat.
`
`As to the processor’s reaction to the object identification. it
`can be programmed to assign a classification of“no threat” or
`“hostile“ based on the object identification. The library of
`stored silhouettes preferably includes silhouettes oflarge and
`small animals and large and small humans in which case. the
`processor can be programmed to assign the hostile c1assifi-
`cation to large animals and humans and the no threat classi-
`fication to small animals and humans. Other possible differ-
`entiations of classifications may be based on size. When a
`hostile classification is generated, the processor also prefer-
`ably activates countermeasures based on the object identifi-
`cation. For example. the processor can command the alami
`system to generate the audible andfor visual alami in prox-
`imity to the structure andfor command a communication sys-
`tem to generate a communication about the condition of the
`structure and forward the communication to the remote des-
`
`tination, e.g._. a police station. a fire station, a terminal moni-
`tored by an owner of the structure. or a private security sta-
`stored silhouettes and retrieve the object identification asso-
`tion. The communication can include one or more images
`ciated with the exact or closest match. The processor reacts to
`obtained by the ca1nera[s) or one or more images derived
`the detection of motion by the motion detector based on the
`from the images obtained by the camera(s).
`object identification.
`Various associations of the cameras and motion detectors
`An exemplifying method liar protecting a structure in
`accordance with the invention includes arranging a plurality
`are possible. There may be a one-to-one correspondence or
`of motion detectors on or around the structure, each in a
`association between motion detectors and cameras, i.e.. each
`position in which its field of view includes an area proximate
`motion detector has a single and exclusive camera whose field
`the structtire. and arranging a plurality of cameras on or
`of view encompasses the field of view of the motion detector.
`There may be an overlapping camera arrangement wherein
`around the structure. each camera being associated with one
`Page8of14
`Page 8 of 14
`
`that camera obtains an image of the source of the motion
`detected by the associated motion detector. A processor is
`coupled to each camera and arranged to receive the image
`obtained thereby. derive a silhouette of any objects in the
`image. compare the silhouettes to a library of stored silhou-
`ettes having associated object identification to determine an
`exact or closest match of the derived silhouette to one of the
`
`55
`
`60
`
`65
`
`
`
`US 7,864,983 B2
`
`5
`or more oftlte motion detector such that the camera has a field
`of view encompassing at least pan of the field ofview of any
`associated motion detector: The cameras have a dormant state
`
`in which images are not obtained and an active state in which
`images are obtained and are activated into the active state
`when an associated motion detector detects motion such that
`the camera then obtains an image of the source ofthe motion
`detected by the associated motion detector. A processor is
`provided which receives images obtained by the cameras,
`derives a silhouette of any objects in the image. compares the
`silhouettes to a library of stored silhouettes having associated
`object identi fication to detcmii in: an exact or closest match of
`the derived silhouette to one of the stored silhouettes and
`retrieves the object identification associated with the exact or
`closest match. One or more countermeasures to the detection
`of motion by the motion detectors are generated based on the
`object identification when the obj ect is identified as a poten-
`tial threat to the structure.
`
`A classification of"lto threat" or “hostile” can be assigned
`by the processor based on the object identification. in which
`case, the countermeasure can be generated only when the
`classification is hostile. Countermeasures can include gener-
`ating an audible andfor visual alarm in proximity to the struc-
`ture andlor generating at least one communication about the
`condition of the structure based on the object identification
`and lbrwarding t.he communication to the remote destination.
`e.g.. a police station. a fire stat ion. a terminal monitored by an
`owner of the structure, or a private security station. The com-
`munication can include one or more images obtained from the
`cameras andfor one or more images derived from the images
`obtained from the cameras in the communication being for-
`warded to the remote destination.
`
`Another method for monitoring a premises in accordance
`with the invention includes arranging an alarm system in
`connection with the premises. integrating a te]ecommun.ica-
`tions module in connection with a computer of the alarm
`system. the teleconununicaticns module being capable of
`communications over a telecornmunications network. and
`programming the teleconununications module to receive
`commands from a handheld telecommunications unit over
`the leleconlmurticzlt ions network to enable activation and
`deactivation of the alarm system using the telecommunica-
`tions unit. The alarru system may include video cameras
`which obtain images of the premises. in which case. the
`images of the premises obtained by the video cameras can be
`transmitted upon receiving a command from the handheld
`telecommunications unit.
`
`When the telecomnuutications unit is a cellular telephone.
`it can transmit a code number to the teleconununications
`
`module to control activation. deactivation and adjustment of
`the alarm system. When the telecommunications unit is a
`messaging device, it can transmit a message to the telecom-
`munications module to control activation. deactivation and
`adjustment of the alamt system. When the telecommunica-
`tions unit is a camera telephone and the alarm system includes
`video cameras which obtain images of the premises.
`the
`images of the premises obtained by the video cameras can be
`transmitted to the camera telephone upon satisfaction of
`threat conditions as detemtined by the alann system.
`A system for monitoring a premises in accordance with the
`invention includes an alarm system ananged in connection
`with the premises and including various sensors. cameras and
`the like for detecting a threat to the premises and a telecom-
`munications module in connection with the sensors or a con-
`
`.3
`
`ll]
`
`1:-
`
`go
`
`25
`
`3U
`
`35
`
`4t":
`
`45
`
`55
`
`60
`
`trol component thereof. The teleconuuunications module is
`capable of commttnications over a telecolttmtulicatiolis net-
`work. A handheld telecornniunications unit is provided for
`Page9of14
`Page 9 of 14
`
`6
`
`transmitting commands to the teleconunttnications module to
`activate. deactivate and adjust the alamt system. The telecom-
`munications tmit may be an existing unit owned by the home-
`owner or alarm system monitor. such as a cellular telephone,
`iPod. PDA. laptop computer or desktop cotnputer and the
`like.
`When the alarm system includes video cameras which
`obtain images of the premises. it can transmit still-frame or
`motion picture images of the premises obtained by the video
`cameras upon receiving a conunand from the telecomrnuni-
`cations tmit. When the telecommunications unit is a cellular
`
`telephone. it can transmit a code number to the telecommu-
`nications module to control activation, deactivation and
`adjustment of the alamt system. When the teleco1umunica—
`tions unit is a messaging device. it can transmit a message to
`the telecoirununications module to control activation. deacti-
`vation and adjustment of the alarm system. When the tele-
`communications unit is a camera telephone and the alami
`system includes video cameras which obtain images of the
`premises. the alarm system can transmit still-framcormotion
`picture images ofthe premises obtained by the video cameras
`to the camera telephone upon satisfaction ofthreat conditions
`as determined by the alann system.
`Other zmd further objects. advantages and features of the
`present invention will be understood by reference to the fol-
`lowing specification in conjunction with the annexed draw-
`ings. wherein like parts have been given like numbers.
`
`BRIEF DESCRIPTION OF THE DRAWINGS
`
`The invention. together with further objects and advan-
`tages thereof. may best be understood by reference to the
`following description taken in conjunction with the accom-
`panying drawings wherein like reference numerals identify
`like elements.
`FIG. 1 is a schematic of a first embodiment of an alarm
`system in accordance with the invention.
`FIG. 2 is a flow chart of the manner in which an object is
`classified in the alarm system in accordance with the inven-
`tion.
`
`FIG. 3 is an overview ofa house equipped with the alarm
`system in accordance with the invention.
`FIG. 4 is a schematic of a second embodiment of an alarm
`system in accordance with the invention.
`
`DETAILED DESCRIPTION OF THE INVENTION
`
`Referring to the accompanying drawings. 1"‘ IG. 1 shows a
`schematic of one exemplifying embodiment of an alarm sys-
`tem in accordance with the invention which includes, at the
`site at which the alarm system is installed. one or more motion
`detectors 10. one or more cameras 12 and an on-site computer
`14.
`
`Each motion detector 10 is mounted to the house. apart-
`ment or other premises or structure being monitored. herein-
`after referred to as a house for simplicity sake. or on a struc-
`ture around the house which could be dedicated to the
`motmting ofthc motion detector 10. For example. a motion
`detector could be mounted to the exterior wall ofthe house. to
`a post around the house. to a tree around the house. or to the
`roofof the house. The premises or structure being monitored
`may be any type of premises or structure which is typically
`monitored for security purposes. including but not limited to.
`a warehouse. a boatyard, a business, a boat, or a land vehicle
`such as one with a locating system.
`[Each motion detector 10 is mounted sttch that its field of
`view. i.c.. the field in which it detects motion. is arotmd the
`
`
`
`7
`
`US 7,864,983 B2
`
`ll]
`
`3ti
`
`Motion detectors I0 can be standard. otT-tl1e-sl1ell'compo-
`nents which provide a signal indicative of the presence of
`motion above a threshold. In this case. small objects which
`might be blown aloft by wind. such as leaves. would not
`trigger tl1c motion detector to provide an output signal. 1’ur-
`ther. the particular motion detectors selected could be those
`which only detect animate objects. e.g.. htunans or animals.
`In this case. if a fence post in a field of view of a motion
`detector 10 is being tilted by the wind. it would also not cause
`the motion detector to provide an output signal.
`Each camera 12 is mounted to the house or on a structure
`around the house which could be dedicated to the motmting of
`the camera 12. For example, a camera could be mounted to the
`exterior wall of the house. to a post around the house. to a tree
`around the house. or to the roof of the house.
`
`house in which an intruder could approach the house. For
`example. a motion detector 10 could be arranged to have a
`field of view in a path leading to the house. a field of view
`encompassing a length ofa fence around the house or a field
`or a Field of view adjacent the house. e.g.. adjacent one or
`more windows of the house.
`With reference to FIG. 3 wherein the outline of a generic
`house 34 is shown. there are four motion detectors IDA, 10B.
`10C, 101) motmted to the house 34 at its corners so as to
`provide overlapping fields of view. Each field of view 36A.
`36B. 36C and 36D extends over an approximate 180 degree
`range a sttflicient distance from the house. the exact distance
`depending on the type and construction o fthe motion detector
`installed in the alarm system. Of course. the number. place-
`ment and coverage area of the motion detectors will usually
`vary depending on such factors as the plan outline of the
`house. the location ofdoors and windows and the surrounding
`area.
`
`8
`Each field ofview 38A. 38B, 38C. 38D, 38E. 38F. 38G, 38H
`extends over an approximate 180 degree range a sufficient
`distance from the house_. the exact distance depending on the
`type and construction of the cameras installed in the alarm
`system. As shown in FIG. 3. each fieldofview 36./\. 36B. 36C
`and 36]) of the motion detectors 10A. 1013.
`l0(.‘ and 10].)
`overlaps with a plurality of fields of view 38A. 38B. 38C.
`38D. 38E. 38F. 38G, 38H of cameras 12A. 12B. 12C. 12D.
`12lE_. 121-‘. 12G. 121-]. Thus. when motion is detector by one of
`the motion detectors 10. several cameras 12 will be triggered
`to obtain images. For example. when motion is detected by
`motion detector 10A. cameras l2A. 1213. 12C and 12D will
`obtain images.
`Cameras can also be provided to visualize the house. or
`parts thereof. e.g.. a camera can be mounted on a post distant
`from the door and directed toward the door to obtain an image
`of the house including the door. The same would also be
`applicable for images of the windows.
`Ofcourse. the number, placement and coverage area 0 f the
`cameras will usually vary depending on such factors as the
`location of the motion detectors. the plan outline ofthe house.
`the location ofdoors and windows and the surrounding area.
`Cameras 12 can be standard. oil‘-the-shell" components
`which obtain images in individual frames and as in some
`conventional cameras. can be equipped with a light which is
`triggered when the ambient light
`is less than a threshold.
`(.‘an1eras can also be used wl1icl1 are infrared cameras which
`obtain infrared images. This is possible since, as discussed
`below, only the outline of the object causing the motion is
`needed for image processing.
`The on-site computer 14 is connected to all ofthe cameras
`12. On-site computer 14 can also be connected to the motion
`detectors III and control the cameras 12. i.e.. the image-taking
`step. based on signals provided by the motion detectors.
`Alternatively. the cameras 12 are directly connected to the
`associated motion detector[s) 10 and take an image without
`involvement of the on-site cornputer 14.
`An advantage of coupling the cameras 12 to the motion
`detectors It] is that the cameras do not continually operate and
`obtain images of the envirorunent around or including the
`house. Rather. the cameras 12 L e only activated to obtain
`images when motion is detected by the associated one(s] of
`the motion detectors II). This conserves electricity or battery
`power and is thus especially useful when the cameras are
`operating on battery power.
`Computer 14 includes hardware and software components
`which perform, among other fiinctions, image processing.
`That is. the computer 14 receives data from the cameras 12. in
`any form in which images can be conveyed electronically. and
`analyzes the images in a unique manner to analyze the threat
`level of the source of the motion. It is possible that only a
`single camera 12 will be taking an image of the area surro1md-
`ing the house and providing this image in electronic fomi to
`the in-site computer 14. Alternatively. the on-site computer
`14 will receive images from multiple cameras 12. all triggered
`by one motion detector. or from multiple cameras triggered
`by motion detected by multiple motion detectors. e.g.. when
`the source of motion moves through the fields of view of
`multiple motion detectors.
`A preferred image processing teclmique is shown sche-
`it is also possible that a single camera 12 l1as a field of view
`matically i11 FIG. 2. The first step 22 for on-site computer 14
`which encompasses the field of view of multiple motion
`is to obtain an image. The image processing step is explained
`detectors 18. In this case. when any of a plurality of Inotion
`for the individual processing of a single image. If multiple
`detectors 10 detects motion. that camera 12 will be triggered
`images