throbber
12 United States Patent
`
`10 Patent No.:
`
`9
`9
`US 7 864 983 B2
`
`Dronge
`
`(45) Date of Patent:
`
`Jan. 4, 2011
`
`US007864983B2
`
`(54) SECURITY ALARM SYSTENI
`
`(76)
`
`Inventor: Mark Dronge, 33 KeI1W00d Rd,
`TeI1aflysNJ (US) 07670
`Sub'ect to an disclaimer the term ofthis
`J
`.
`Y
`1
`patent is extended or adjusted under 35
`U.S.C. 154(b) by 47 days.
`
`( * ) Notice‘
`'
`
`6,396,535 B1
`6,532,901 B2
`6,538,689 B1*
`6,546,115 B1*
`6,782,847 B1
`6,864,789 B2
`
`5/2002 Waters
`3/2003 Isley et al.
`3/2003 Chang ...................... .. 348/159
`4/2003 Ito et a1.
`................... .. 382/100
`8/2004 Shemesh et 31'
`3/2005 Wolfe
`
`(21) Appl. No.: 12/430,463
`
`(22)
`
`Filed:
`
`Apr. 27, 2009
`
`(Continued)
`
`FOREIGN PATENT DOCUMENTS
`
`(65)
`
`Prior Publication Data
`
`DE
`
`10122294
`
`3/2003
`
`US 2009/0225166 A1
`
`Sep. 10, 2009
`
`Related U.S. Application Data
`
`(63) Continuation of application No. 11/692,430, filed on
`Mar. 28, 2007, now Pat. No. 7,526,105.
`
`(60) Provisional application No. 60/743,894, filed on Mar.
`29, 2006, provisional application No. 60/804,660,
`filed on Jun. 14, 2006.
`
`(51)
`
`Int. Cl.
`(2006.01)
`G06K 9/00
`(52) U.s. Cl.
`..................................... .. 382/107; 348/143
`(58) Field of Classification Search ............... .. 382/100,
`382/103,106,107,159,170,181,190,195,
`382/203, 206; 348/142, 143, 152, 155, 159,
`348/169
`See apphcation file for c0mp1ete Search history.
`_
`Referenees Clted
`U.S. PATENT DOCUMENTS
`
`(56)
`
`4,679,077 A
`5,091,780 A *
`5,283,551 A
`5,473,311 A
`5,576,972 A
`5,748,775 A
`5,864,640 A
`5,963,148 A
`6,069,655 A *
`
`7/1987 Yuasa eta .
`2/1992 Pomerleau ................ .. 348/152
`2/1994 Guscott
`12/1995 Hoseit
`11/1996 Harrison
`5/1998 Tsuchikawa et :11.
`1/1999 Miramonti et al.
`10/1999 Sekine et al.
`5/2000 Seeley et al.
`
`.............. .. 348/154
`
`Motion detector
`
`(Continued)
`
`OTHER PUBLICATIONS
`
`“TAC m\IETSeVen Secumyw’ TAC’ Jan’ 2006'
`(Continued)
`
`Primary Examiner—Anand Bhatnagar
`(74) Attorney, Agent, or Firm—Brian Roffe
`
`(57)
`
`ABSTRACT
`
`.
`.
`.
`Security alarm system for protecting a structure includes
`motion detectors connected to cameras. Each camera has a
`dormant state in which images are not obtained and an active
`state in which images are obtained and is activated into the
`active state when an associated motion detector detects
`motion. A processor is coupled to the camera(s) and arranged
`to control the camera(s) and receive the image obtained
`thereby. A telecommunications module is coupled to the pro-
`cessor. A handheld telecommunications unit transmits com-
`
`mands to the processor via the telecommunications module to
`cause the processor to provide images, obtained from the
`camera(s), to the telecommunications module to be transmit-
`ted to the telecommunications unit.
`
`20 Claims, 4 Drawing Sheets
`
`10
`
`14
`
`18
`
`42
`
`16
`
`On-site Computer
`
`Homeowner's
`computer
`
`Policelfrelsecurity
`
`Hand-held
`Telecommunications
`unit
`
`20/
`
`\
`
`Effect
`Countermeasures
`
`POI 1001
`
`1
`
`POI 1001
`
`

`
`US 7,864,983 B2
`Page 2
`
`U.S. PATENT DOCUMENTS
`
`1/2006 Rigney et al.
`6,985,172 B1*
`10/2006 Doyle, 11
`7,128,024 B2
`12/2006 Schnell
`7,149,422 B2
`2003/0202102 A1* 10/2003 Shiota et al.
`2004/0081338 A1
`4/2004 Takenaka
`2004/0215750 A1
`10/2004 Stilp
`2005/0151851 A1
`7/2005 Schnell
`2005/0179553 A1
`8/2005 Fujie
`
`............. .. 348/149
`
`.............. .. 348/159
`
`FOREIGN PATENT DOCUMENTS
`
`EP
`JP
`JP
`JP
`JP
`JP
`W0
`
`1388802 A2
`1140396
`5064193
`5323355
`7050325
`2004077350
`9323706
`
`11/2004
`6/1989
`3/1993
`12/1993
`2/1995
`3/2004
`7/1993
`
`OTHER PUBLICATIONS
`
`Supplementary European Search Report for EP 07 75 4166 dated
`Oct. 15, 2010
`
`EP
`
`1030188 A1
`
`8/2000
`
`* cited by examiner
`
`2
`
`

`
`U.S. Patent
`
`Jan. 4, 2011
`
`Sheet 1 of4
`
`US 7,864,983 B2
`
`Motion detector
`
`10
`
`Camera
`
`FIG. 1 12
`
`14
`
`On— site Computer
`
`Homeowner’ s
`
`computer
`
`18
`
`Po1ice/fire/security
`
`42
`
`Effect
`
`Countermeasures
`
`Hand—he1d
`
`unit
`
`Telecommunications
`
`3
`
`

`
`U.S. Patent
`
`Jan. 4, 2011
`
`Sheet 2 of4
`
`US 7,864,983 B2
`
`
`
`24
`
`Derive silhouette of
`
`object in image
`
`Compare derived
`silhouette to stored
`
`silhouettes
`
`FIG. 2
`
`
`22
`
` 26
`
`Sleep Mode
`
`
`
`
`
`
`Is derived
`
`silhouette
`
`indicative of a
`
`
`
`threat
`
`
`
`32
`
`
`
`As sign counterrneasure(s)
`based on silhouette
`
`
`
`4
`
`

`
`U.S. Patent
`
`Jan. 4, 2011
`
`Sheet 3 of4
`
`US 7,864,983 B2
`
`5
`
`

`
`U.S. Patent
`
`Jan. 4, 2011
`
`Sheet 4 of4
`
`US 7,864,983 B2
`
`Camera(s) with
`
`motion detecting
`mode and threat/
`identification analysis
`mode
`
`44
`
`14
`
`On—site Computer
`
`Homeowner’ s
`
`computer
`
`18
`
`Police/fire/security
`
`42
`
`Hand-held
`unit
`
`Telecommunications
`
`\
`
`20 /
`
`Effect
`
`Countermeasures
`
`6
`
`

`
`1
`SECURITY ALARM SYSTEM
`
`CROSS REFERENCE TO RELATED
`APPLICATIONS
`
`This application is a continuation of U.S. patent applica-
`tion Ser. No. 11/692,430 filed Mar. 28, 2007, now U.S. Pat.
`No. 7,526,105, and which claims priority under 35 U.S.C.
`§119(e) of U.S. provisional patent application Ser. No.
`60/743,894 filed Mar. 29, 2006, and U.S. provisional patent
`application Ser. No. 60/804,660 filed Jun. 14, 2006, all of
`which are incorporated by reference herein.
`
`FIELD OF THE INVENTION
`
`The present invention relates generally to a system and
`method for enabling an individual interested in the integrity
`of a structure to communicate with an alarm system on the
`structure and obtain information about the structure and its
`
`images from cameras mounted on or
`environment, e.g.,
`around the structure.
`
`The present invention also relates generally to an alarm
`system which is designed to determine whether a threat to
`private property exists and more particularly, to an alarm
`system for a house or other structure where the presence of a
`threat is primarily posed by wild animals.
`The present invention also relates to an alarm system for
`determining the presence of a threat posed by wild animals to
`an unoccupied house or other structure and which provides
`for remote activation of security features to reduce or elimi-
`nate the potential threat.
`
`BACKGROUND OF THE INVENTION
`
`In the prior art, there are numerous alarm systems which
`are installed ir1 connection witl1 houses and other structure for
`
`alerting residents or security personnel to a threat to the house
`or the individuals therein. For example, alarm systems are
`known which generate loud noises when a door is opened
`without authorization or a window is broken, and/or which
`notify security personnel of such conditions to enable such
`personnel to respond to the house.
`Some patents and patent publications that describe such
`security systems include: U.S. Pat. Nos. 4,697,077 (Yuasa et
`al.), 5,283,551 (Guscott), 5,576,972 (Harrison), 5,825,412
`(Hobson et al.), 5,937,092 (Wootton et al.), 6,069,655 (Seeley
`et al.), 6,400,265 (Saylor et al.), German Patent Publication
`No. DE 10122294, International Patent Publication No. WO
`98/28706 (WO ’706) and Japanese Patent No. JP2004077350
`(JP ’350).
`Guscott describes an intrusion alarm system including a
`triggering sensor and a linear array of sensors triggered to
`sample an area of interest when activated by the triggering
`sensor. Differences in the sample infrared emissions enable a
`determination of the object as a human or a dog.
`Harrison describes a monitoring system including various
`sensors, one of which is an optical sensor, and data from all of
`the sensors is directed to a neural network computer which
`analyzes the data and detects and identifies the objects in the
`sensed area which may be people, animals or objects.
`Hobson et al. describes a video detection system for moni-
`toring railroad crossings wherein a camera views the railroad
`crossing and establishes the presence of objects and the size
`thereof. An alarm is sounded based on the size of the object.
`Wootton et al. describes a security system in which images
`of a detection area are sensed and compared with previously
`obtained images to determine the presence and movement of
`
`10
`
`15
`
`25
`
`30
`
`35
`
`40
`
`45
`
`50
`
`55
`
`60
`
`65
`
`US 7,864,983 B2
`
`2
`
`an intruder in the detection area. In this regard, reference is
`made to Yuasa et al. which is said to describe use of a frame
`
`subtraction technique to derive the presence of an object and
`conveyance ofthis information to a remote location for view-
`ing by a human.
`Seeley et al. describes a security system in which video
`cameras send images from a site control unit (SCU) to a
`central station which may be remote from the SCU. Video
`signals from the cameras are directed to an image processor
`section which determines the presence of an intruder and
`classifies the intruder.
`Saylor et al. describes a security system wherein images
`obtained from a security camera are transmitted over the
`Internet to be seen on a computer. Other ways to be informed
`of the existence of an alarm condition are also mentioned.
`German Patent Publication No. DE 10122294 describes an
`
`alarm system which undertakes different actions based on
`detection of an animal in a detection area.
`
`WO ’706 describes a video detection system in which
`different objects are recognized by comparing a set of shape
`features (e.g., an outline), derived from comparison of an
`instantaneously obtained image to previously obtained
`images, to sets of features of humans and animals.
`JP ’350 describes a technique for determining whether an
`object is a human by comparing the silhouette of the object to
`previously registered silhouette information.
`
`SUMMARY OF THE INVENTION
`
`An embodiment of an alarm system for protecting a struc-
`ture in accordance with the invention includes at least one
`
`motion detector arranged to have a field of view external of
`the structure and including an area proximate the structure
`and at least one camera associated with and coupled to each
`motion detector and wherein each camera is arranged relative
`to the associated motion detector(s) such that the camera has
`a field of view encompassing at least part of the field of view
`of the associated motion detector(s). Each camera has a dor-
`mant state in which images are not obtained and an active
`state in which images are obtained and is activated into the
`active state when the associated motion detector detects
`
`motion. A processor is coupled to the camera(s) and arranged
`to control the camera(s) and receive the image obtained
`thereby. A telecommunications module is coupled to the pro-
`cessor and capable of communications over a telecommuni-
`cations network. A handheld telecommunications unit is pro-
`vided for transmitting commands to the processor via the
`telecommunications module to cause the processor to provide
`images to the telecommunications module to be transmitted
`to the telecommunications unit. The commands can also
`cause the processor to direct the camera(s) to provide images
`thereto.
`
`A method for protecting a structure in accordance with the
`invention includes arranging a plurality of motion detectors
`on or around the structure, each in a position in which its field
`of view includes an area proximate the structure, arranging a
`plurality of cameras on or around the structure, each camera
`being associated with one or more of the motion detectors
`such that the camera has a field ofview encompassing at least
`part of the field of view of any associated motion detector,
`providing a processor which controls the at least one camera
`and receives the image obtained by the at least one camera,
`coupling a telecommunications module coupled to the pro-
`cessor, the telecommunications module being capable of
`communications over a telecommunications network, and
`transmitting commands from a handheld telecommunica-
`tions unit to the processor via the telecommunications mod-
`
`7
`
`

`
`US 7,864,983 B2
`
`3
`ule to cause the processor to provide images to the telecom-
`munications module
`to
`be
`transmitted
`to
`the
`
`telecommunications unit. The commands may also cause the
`processor to direct the camera(s) to obtain images.
`The foregoing provides a new and improved system and
`method for enabling an individual interested in the integrity
`of a structure to communicate with an alarm system on the
`structure and obtain information about the structure and its
`
`images from cameras mounted on or
`environment, e.g.,
`around the structure.
`
`10
`
`Another embodiment of a security system in accordance
`with the invention is designed to distinguish or discriminate
`between animals and humans with a view toward accurately
`determining a threat to private property which requires a
`response. The security system includes one or more motion
`detectors connected to one or more cameras which are con-
`
`15
`
`nected to a computer which is connected in turn to a data
`communication or transmission device that can infom1 a
`
`homeowner off premises, the police, fire department and/or
`private security firm ofthe existence of an intrusion condition
`based on the images obtained by the camera.
`In use, a motion detector detects motion in the field ofview
`of an associated camera which then obtains one or more
`
`images, which presumably include the cause ofthe motion. A
`processor connected with the camera derives a silhouette of
`the object that triggered the motion from the obtained image
`(s), through image comparison with images taken without the
`object therein. A processor analyzes the silhouettes by coin-
`paring them to previously obtained silhouettes, such as those
`ofvarious animals and humans having different sizes. A clas-
`sification of the silhouette is obtained and depending on what
`object the silhouette is determined to correspond to, i.e., its
`identification, further action or countermeasures is taken.
`This further action may be: the object is classified as “no
`threat” and the system stays in stand-by or the object is
`classified as “hostile” or a threat and a message or warning is
`sent to a distant computer, the property’ s owner’s homepage,
`the police and/or a private security firm.
`More specifically, one embodiment of an alarm system for
`protecting a structure in accordance with the invention
`includes at least one motion detector arranged to have a field
`of view external of the structure and including an area proxi-
`mate the structure, and at least one camera associated with
`each motion detector, each camera being arranged relative to
`the associated motion detector such that it has a field of view
`
`25
`
`30
`
`35
`
`40
`
`45
`
`encompassing at least part of the field of view of the associ-
`ated motion detector. Each camera has a dormant state in
`
`which images are not obtained and an active state in which
`images are obtained and being activated into the active state
`when the associated motion detector detects motion such that
`
`50
`
`that camera obtains an image of the source of the motion
`detected by the associated motion detector. A processor is
`coupled to each camera and arranged to receive the image
`obtained thereby, derive a silhouette of any objects in the
`image, compare the silhouettes to a library of stored silhou-
`ettes having associated object identification to determine an
`exact or closest match of the derived silhouette to one of the
`
`stored silhouettes and retrieve the object identification asso-
`ciated with the exact or closest match. The processor reacts to
`the detection of motion by the motion detector based on the
`object identification.
`Various associations of the cameras and motion detectors
`
`are possible. There may be a one-to-one correspondence or
`association between motion detectors a11d cameras, i.e., each
`motion detector has a single and exclusive camera whose field
`of view encompasses the field of view of the motion detector.
`There may be an overlapping camera arrangement wherein
`
`55
`
`60
`
`65
`
`4
`each motion detector is associated with two or more cameras
`
`(preferably located at different positions) whose field ofview
`partly or entirely encompasses the field of view ofthe motion
`detector. In this manner, two images including the source of
`motion are obtained and independently analyzed in the man-
`ner described above. Different rules of object identification
`can be formulated for situations where the object identifica-
`tion is different. For each motion detector, there may be an
`exclusive set of two or more cameras, or alternatively, each
`camera can be associated with more than one motion detector
`
`so that it obtains an image when any of its associated motion
`detectors detects motion.
`
`When two or more cameras obtain images of or containing
`the same object, which may arise in a situation where these
`cameras have an overlapping field of view relative to a single
`motion detector and are all activated by motion detected by
`that motion detector, images from cameras containing the
`object may be analyzed by the processor to obtain depth
`information about the object. This is similar to a stereo-vision
`concept and various techniques to derive depth information
`about an object contained in two or more images from differ-
`ent imaging devices or cameras are known to those skilled in
`the art. The depth information can be used to aid the processor
`in the object identification task, i.e., the object classification.
`This aspect of using multiple cameras to obtain images con-
`taining a common object, derive depth information about the
`object and use the depth information to obtain an identifica-
`tion of the object may be applied independent ofthe presence
`and particular arrangement of motion detectors and cameras
`described above. However, the presence of motion detectors
`to activate the cameras would be beneficial. Thus, one
`embodiment of the invention contemplates multiple cameras
`associated with each of at least one motion detector and
`
`arranged to be activated to obtain images of an object whose
`motion is detected by those cameras. These images can be
`analyzed to obtain depth information about the object, i.e., the
`distance from a known object to this moving object, and also
`to obtain identification information about this object for the
`purpose of determining whether this identified object at the
`determined distance is a threat.
`
`As to the processor’s reaction to the object identification, it
`can be programmed to assign a classification of “no threat” or
`“hostile” based on the object identification. The library of
`stored silhouettes preferably includes silhouettes of large and
`small animals and large and small humans in which case, the
`processor can be programmed to assign the hostile classifi-
`cation to large animals and humans and the no threat classi-
`fication to small animals and humans. Other possible differ-
`entiations of classifications may be based on size. When a
`hostile classification is generated, the processor also prefer-
`ably activates countermeasures based on the object identifi-
`cation. For example, the processor can command the alarm
`system to generate the audible and/or visual alarm in prox-
`imity to the structure and/or command a communication sys-
`tem to generate a communication about the condition of the
`structure and forward the communication to the remote des-
`
`tination, e.g., a police station, a fire station, a terminal moni-
`tored by an owner of the structure, or a private security sta-
`tion. The communication can include one or more images
`obtained by the camera(s) or one or more images derived
`from the images obtained by the camera(s).
`An exemplifying method for protecting a structure in
`accordance with the invention includes arranging a plurality
`of motion detectors on or around the structure, each in a
`position in which its field of view includes an area proximate
`the structure, and arranging a plurality of cameras on or
`around the structure, each camera being associated with one
`
`8
`
`

`
`US 7,864,983 B2
`
`5
`or more ofthe motion detector such that the camera has a field
`
`of view encompassing at least part of the field of view of any
`associated motion detector. The cameras have a dormant state
`
`in which images are not obtained and an active state in which
`images are obtained and are activated into the active state
`when an associated motion detector detects motion such that
`
`5
`
`the camera then obtains an image of the source of the motion
`detected by the associated motion detector. A processor is
`provided which receives images obtained by the cameras,
`derives a silhouette of any objects in the image, compares the
`silhouettes to a library of stored silhouettes having associated
`object identification to determine an exact or closest match of
`the derived silhouette to one of the stored silhouettes and
`
`10
`
`retrieves the object identification associated with the exact or
`closest match. One or more countermeasures to the detection
`
`15
`
`of motion by the motion detectors are generated based on the
`object identification when the object is identified as a poten-
`tial threat to the structure.
`
`A classification of “no threat” or “hostile” can be assigned
`by the processor based on the object identification, in which
`case, the countermeasure can be generated only when the
`classification is hostile. Countermeasures can include gener-
`ating an audible and/or visual alarm in proximity to the struc-
`ture and/or generating at least one communication about the
`condition of the structure based on the object identification
`and forwarding the communication to the remote destination,
`e.g., a police station, a fire station, a terminal monitored by an
`owner of the structure, or a private security station. The coin-
`munication can include one or more images obtained from the
`cameras and/or one or more images derived from the images
`obtained from the cameras in the communication being for-
`warded to the remote destination.
`
`Another method for monitoring a premises in accordance
`with the invention includes arranging an alarm system in
`connection with the premises, integrating a telecommunica-
`tions module in connection with a computer of the alarm
`system, the telecommunications module being capable of
`communications over a telecommunications network, and
`programming the telecommunications module to receive
`commands from a handheld telecommunications unit over
`the telecommunications network to enable activation and
`
`deactivation of the alarm system using the telecommunica-
`tions unit. The alarm system may include video cameras
`which obtain images of the premises, in which case, the
`images of the premises obtained by the video cameras can be
`transmitted upon receiving a command from the handheld
`telecommunications unit.
`
`When the telecommunications unit is a cellular telephone,
`it can transmit a code number to the telecommunications
`
`module to control activation, deactivation and adjustment of
`the alarm system. When the telecommunications unit is a
`messaging device, it can transmit a message to the telecom-
`munications module to control activation, deactivation and
`adjustment of the alarm system. When the telecommunica-
`tions unit is a camera telephone and the alarm system includes
`video cameras which obtain images of the premises, the
`images of the premises obtained by the video cameras can be
`transmitted to the camera telephone upon satisfaction of
`threat conditions as determined by the alarm system.
`A system for monitoring a premises in accordance with the
`invention includes an alarm system arranged in connection
`with the premises and including various sensors, cameras and
`the like for detecting a threat to the premises and a telecom-
`munications module in connection with the sensors or a con-
`
`trol component thereof. The telecommunications module is
`capable of communications over a telecommunications net-
`work. A handheld telecommunications unit is provided for
`
`25
`
`30
`
`35
`
`40
`
`45
`
`50
`
`55
`
`60
`
`65
`
`9
`
`6
`transmitting commands to the telecommunications module to
`activate, deactivate and adjust the alarm system. The telecom-
`munications unit may be an existing unit owned by the home-
`owner or alarm system monitor, such as a cellular telephone,
`iPod, PDA, laptop computer or desktop computer and the
`like.
`
`When the alarm system includes video cameras which
`obtain images of the premises, it can transmit still-frame or
`motion picture images of the premises obtained by the video
`cameras upon receiving a command from the telecommuni-
`cations unit. When the telecommunications unit is a cellular
`telephone, it can transmit a code number to the telecommu-
`nications module to control activation, deactivation and
`adjustment of the alarm system. When the telecommunica-
`tions unit is a messaging device, it can transmit a message to
`the telecommunications module to control activation, deacti-
`vation and adjustment of the alarm system. When the tele-
`communications unit is a camera telephone and the alarm
`system includes video cameras which obtain images of the
`premises, the alarm system can transmit still-frame or motion
`picture images ofthe premises obtained by the video cameras
`to the camera telephone upon satisfaction ofthreat conditions
`as determined by the alarm system.
`Other and further objects, advantages and features of the
`present invention will be understood by reference to the fol-
`lowing specification in conjunction with the armexed draw-
`ings, wherein like parts have been given like numbers.
`
`BRIEF DESCRIPTION OF THE DRAWINGS
`
`The invention, together with further objects and advan-
`tages thereof, may best be understood by reference to the
`following description taken in conjunction with the accom-
`panying drawings wherein like reference numerals identify
`like elements.
`FIG. 1 is a schematic of a first embodiment of an alarm
`
`system in accordance with the invention.
`FIG. 2 is a flow chart of the manner in which an object is
`classified in the alarm system in accordance with the inven-
`tion.
`
`FIG. 3 is an overview of a house equipped with the alarm
`system in accordance with the invention.
`FIG. 4 is a schematic of a second embodiment of an alarm
`system in accordance with the invention.
`
`DETAILED DESCRIPTION OF THE INVENTION
`
`Referring to the accompanying drawings, FIG. 1 shows a
`schematic of one exemplifying embodiment of an alarm sys-
`tem in accordance with the invention which includes, at the
`site at which the alarm system is installed, one or more motion
`detectors 10, one or more cameras 12 and an on-site computer
`14.
`
`Each motion detector 10 is mounted to the house, apart-
`ment or other premises or structure being monitored, herein-
`after referred to as a house for simplicity sake, or on a struc-
`ture around the house which could be dedicated to the
`
`mounting of the motion detector 10. For example, a motion
`detector could be mounted to the exterior wall ofthe house, to
`a post around the house, to a tree around the house, or to the
`roof of the house. The premises or structure being monitored
`may be any type of premises or structure which is typically
`monitored for security purposes, including but not limited to,
`a warehouse, a boatyard, a business, a boat, or a land vehicle
`such as one with a locating system.
`Each motion detector 10 is mounted such that its field of
`view, i.e., the field in which it detects motion, is around the
`
`9
`
`

`
`US 7,864,983 B2
`
`7
`house in which an intruder could approach the house. For
`example, a motion detector 10 could be arranged to have a
`field of View in a path leading to the house, a field of View
`encompassing a length of a fence around the house or a field
`or a field of View adjacent the house, e.g., adjacent one or
`more windows of the house.
`
`With reference to FIG. 3 wherein the outline of a generic
`house 34 is shown, there are four motion detectors 10A, 10B,
`10C, 10D mounted to the house 34 at its comers so as to
`provide overlapping fields of View. Each field of View 36A,
`36B, 36C and 36D extends over an approximate 180 degree
`range a sufficient distance from the house, the exact distance
`depending on the type and construction ofthe motion detector
`installed in the alarm system. Of course, the number, place-
`ment and coverage area of the motion detectors will usually
`Vary depending on such factors as the plan outline of the
`house, the location ofdoors and windows and the surrounding
`area.
`
`Motion detectors 10 can be standard, off-the-shelf compo-
`nents which provide a signal indicative of the presence of
`motion above a threshold. In this case, small objects which
`might be blown aloft by wind, such as leaves, would not
`trigger the motion detector to provide an output signal. Fur-
`ther, the particular motion detectors selected could be those
`which only detect animate objects, e.g., humans or animals.
`In this case, if a fence post in a field of View of a motion
`detector 10 is being tilted by the wind, it would also not cause
`the motion detector to provide an output signal.
`Each camera 12 is mounted to the house or on a structure
`
`around the house which could be dedicated to the mounting of
`the camera 12. For example, a camera could be mounted to the
`exterior wall of the house, to a post around the house, to a tree
`around the house, or to the roof of the house.
`The mounting location of each camera 12 is selected in
`dependence on its field of View and the field of View of the
`motion detector 10 or motion detectors 12 with which it is
`
`associated. That is, in a preferred embodiment, each camera
`12 is triggered to obtain an image only when its associated
`motion detector 10 detects motion in the field of View of the
`
`motion detector 10. Since it is this motion (or the cause
`thereof) for which an image is sought, one or more of the
`cameras 12 must be positioned to be able to obtain an image
`of the portion of the field of View of the motion detector 10 in
`which motion is detected thereby. In some situations, a single
`camera 12 can be associated with each motion detector 10 and
`
`have substantially overlapping fields ofView so that when the
`motion detector 10 detects motion in its field of the View, the
`camera 12 is triggered to obtain an image which will neces-
`sarily encompass the source or cause of that motion. In other
`situations, two or more cameras 12 can be associated with
`each motion detector 10 and be spaced apart from one
`another. Each camera 12 would have a substantially overlap-
`ping field ofView with the motion detector 1 0 so that when the
`motion detector 10 detects motion in its field ofthe View, both
`cameras 12 are triggered to obtain images which will neces-
`sarily encompass the source or cause of that motion. The use
`ofmultiple cameras for each motion detector 10 will aid in the
`subsequent image processing routine, discussed more fully
`below.
`
`It is also possible that a single camera 12 has a field ofView
`which encompasses the field of View of multiple motion
`detectors 10. In this case, when any of a plurality of motion
`detectors 10 detects motion, that camera 12 will be triggered
`to obtain an image.
`With reference to FIG. 3, eight cameras 12A, 12B, 12C,
`12D, 12E, 12F, 12G, 12H are shown mounted to the house 34
`along its outer wall so as to provide overlapping fields ofView.
`
`10
`
`15
`
`20
`
`25
`
`30
`
`35
`
`40
`
`45
`
`50
`
`55
`
`60
`
`65
`
`8
`Each field ofview 38A, 38B, 38C, 38D, 38E, 38F, 38G, 38H
`extends over an approximate 180 degree range a sufficient
`distance from the house, the exact distance depending on the
`type and construction of the cameras installed in the alarm
`system. As shown in FIG. 3, each field ofView 36A, 36B, 36C
`and 36D of the motion detectors 10A, 10B, 10C and 10D
`overlaps with a plurality of fields of View 38A, 38B, 38C,
`38D, 38E, 38F, 38G, 38H of cameras 12A, 12B, 12C, 12D,
`12E, 12F, 12G, 12H. Thus, when motion is detector by one of
`the motion detectors 10, several cameras 12 will be triggered
`to obtain images. For example, when motion is detected by
`motion detector 10A, cameras 12A, 12B, 12C and 12D will
`obtain images.
`Cameras can also be provided to Visualize the house, or
`parts thereof, e.g., a camera can be mounted on a post distant
`from the door and directed toward the door to obtain an image
`of the house including the door. The same would also be
`applicable for images of the windows.
`Of course, the number, placement and coverage area ofthe
`cameras will usually Vary depending on such factors as the
`location ofthe motion detectors, the plan outline ofthe house,
`the location of doors and windows and the surrounding area.
`Cameras 12 can be standard, off-the-shelf components
`which obtain images in individual frames and as in some
`conventional cameras, can be equipped with a light which is
`triggered when the ambient light is less than a threshold.
`Cameras can also be used which are infrared cameras which
`obtain infrared images. This is possible since, as discussed
`below, only the outline of the object causing the motion is
`needed for image processing.
`The on-site computer 14 is connected to all of the cameras
`12. On-site computer 14 can also be connected to the motion
`detectors 10 and control the cameras 12, i.e., the image-taking
`step, based on signals provided by the motion detectors.
`Alternatively, the cameras 12 are directly connected to the
`associated motion detector(s) 10 and take an image without
`involvement of the on-site computer 14.
`An advantage of coupling the cameras 12 to

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket