`Jentoft
`
`(10) Patent No.:
`(45) Date of Patent:
`
`US 7,463,145 B2
`Dec. 9, 2008
`
`US007463 l45B2
`
`(54) SECURITY lVIONITORING ARRANGEMENT
`AND METHOD USING A COMMON FIELD
`OF VIEW
`
`Inventor: Keith Jentoft, Circle Pines, MN (US)
`(75)
`(73) Assignee: RSI Video Technologies, Inc., White
`Bear Lake, MN (US)
`
`( * ) Notice:
`
`Subject to any disclaimer, the term of this
`patent is extended or adjusted under 35
`USC 15409) by 412 days
`
`6,271,752 B1
`5,411,209 131
`6,476,858 B1
`6,504,479 B1
`6,690,414 B2
`6’700’487 B2
`6,759,957 B2
`2002/0171557 A1
`2003/0065407 A1
`2003/0193553 A1
`2003/0202117 A1
`
`8/2001 Vaios
`5/2002 Lyons e131,
`11/2002 Ramirez Diaz etal.
`1/2003 L
`t
`1.
`2/2004 L:::)Sn:t:La
`3/2004 Lyons et a_1'
`7/2004 Murakam1 et al.
`11/2002 Wegener
`4/2003 Johnson et a1.
`10/2003 Suzuki
`10/2003 Garner
`
`(21) Appl.No.: 11/388,764
`
`Filed:
`
`(22)
`(65)
`
`Mar. 24, 2006
`Prior Publication Data
`
`(Continued)
`FOREIGN PATENT DOCUMENTS
`
`US 2007/0063840 A1
`
`Mar. 22, 2007
`
`DE
`
`101 50 745 A 1
`
`4/2003
`
`Related U.S. Application Data
`
`(60) Provisional application No. 60/719,369, filed on Sep.
`22, 2005,
`
`.
`(Continued)
`
`(51)
`
`Primary Examiner—Donnie L Crosland
`(74) Attorney, Agent, or Fzrm—Crawford Maunu PLLC
`
`(57)
`
`ABSTRACT
`
`_
`
`.
`.
`.
`‘A.‘°°°rd‘“‘5 ‘O °‘:ede’t‘a‘:‘P1e embt°:11‘¥“f“‘(’1a“?“‘e§.ra1‘1*F1 S‘”'T°1‘11
`§1ii§”§§1geZ§“§1‘Z1uZ,fs°Snuflivriiiin‘§e$o?rfo“§§ns:°Lif1;nmi
`sion gt a target area of a facility, a second sensor to sense
`movement, an image-capture device, and a base unit. The
`image-capture device captures images in response to anintru-
`sion indication from the intrusion sensor and in response to a
`movement 1nd1cat1on from the second sensor. The base umt
`integrates a direction of view of the second sensor and of the
`image-capture device, thereby directing the second sensor to
`sense in the target area in which the images are captured by
`the image-capture device.
`
`22 Claims, 4 Drawing Sheets
`
`
`
`|.xuMbu1|‘-uiawvnu
`an
`
`
`
`POI 1007
`
`Int CL
`(2006.01)
`G083 13/00
`(2006.01)
`G08B 19/00
`(2006.01)
`H04N 7/18
`(2006.01)
`G08B 1/08
`(52) U.S. Cl.
`..................... .. 340/541; 340/517; 340/521;
`340/522; 340/565; 340/539.17; 340/693.1;
`382/103; 348/152; 348/154; 348/155
`(58) Fielgfg/gllgsssigfagigg ggzrcslg
`’
`’
`’
`’
`‘
`’
`4%/154 155’
`1
`fil f
`h h,
`’
`,
`1,
`e or Comp ete Seam lstory‘
`ee app lcauon
`References Cited
`U.S. PATENT DOCUMENTS
`
`S
`
`(56)
`
`4,857,912 A
`5,448,290 A
`5,703,368 A
`5,819,124 A
`
`8/1989 Everett, Jr. et al.
`9/1995 Van Zeeland
`12/1997 Tomooka et 211.
`10/1998 Sonmer etal.
`
`1
`
`POI 1007
`
`
`
`US 7,463,145 B2
`Page 2
`
`U.S. PATENT DOCUMENTS
`
`2004/0109059 A1
`2004/0155781 A1
`2004/0205823 A1
`2004/0205824 A1
`2005/0024206 A1
`2005/0134450 A1
`2005/0134454 A1
`
`6/2004 Kawakita
`8/2004 DeO111e
`10/2004 Tsai
`10/2004 Tsai
`2/2005 Samarasekera et al.
`6/2005 Kovach
`6/2005 Eskildsen
`
`FOREIGN PATENT DOCUMENTS
`
`EP
`EP
`Ep
`Ep
`EP
`
`676 733 A
`811 959 A
`0 356 326 A2
`1 115 254 A2
`1 363 260 A1
`
`10/1995
`12/1997
`3/1993
`7/2001
`11/2003
`
`EP
`EP
`GB
`GB
`
`JP
`JP
`W0
`W0
`
`W0
`W0
`W0
`W0
`W0
`
`1 499 098 A1
`1316 933 B1
`2 325 548 A
`2 358 504 A
`
`1/2005
`8/2006
`“/1998
`7/2001
`
`A
`
`2003233889
`2005071054
`WO 88/07474
`W0 00/03357
`
`WO 02/46919 A2
`WO 2004/064355 A2
`WO 2004/079684 Al
`WO 2004/114648 A2
`WO 2005/065196 A2
`
`8/2003
`3/2005
`1/1988
`1/2000
`
`6/2002
`7/2004
`9/2004
`12/2004
`7/2005
`
`2
`
`
`
`U.S. Patent
`
`Dec. 9,2008
`
`Sheet 1 of4
`
`US 7,463,145 B2
`
`intrusion Sensor lnput 10
`
`Motion Sensor 20
`
`Data Processor
`30
`
`Communication
`interface
`15
`
`FIG. 1A
`
`Sensor Communication Path 40
`
`Local (Video) Data Storage
`50
`
`Central Processing 55
`
`XCVR 60
`
`
`
`
`<%————
`
`Telephone Channel
`70
`
`Broadband (Cable)
`(T Channel 75
`
`
`
`3
`
`
`
`U.S. Patent
`
`Dec. 9,2008
`
`Sheet 2 of4
`
`US 7,463,145 B2
`
`
`
`Sensor Triggered
`
`
`1 1 0
`
` Y
`
`es
`
`120 \
`
`130
`
`
`
`
`
`
`JR/Motion Detectorlcamera
`Armed
`
`Camera Set to “READY”
`
`140-‘
`
`Motion Detected
`
`
`
`es
`
`Y
`
`150\
`
`
`
`Motion Triggers IR/Motion
`Detector
`
`
`
`
`
`
`
`1 60 \
`
`Camera Turns ‘ON’ and
`
`Captures \fideo
`
`Video Sent to Control Panel
`
`
`
`170
`
`FIG. 1B
`
`4
`
`
`
`U.S. Patent
`
`Dec. 9,2008
`
`Sheet 3 of4
`
`US 7,463,145 B2
`
`5
`
`
`
`U.S. Patent
`
`Dec. 9,2008
`
`Sheet 4 of4
`
`US 7,463,145 B2
`
`310
`
`Intrusion sensor activated
`
` image-capture
`device active?
`
`
`
`xceeded Dela
`Time
`
`340
`
`350
`
` Condition
`Detected
`
`Yes
`
`Yes
`
`Report Status
`
`Yes
`
`Image search for condition
`
`
` 370
`
`330
`
`
`
`Report Alarm Condition
`
`FIG. 3
`
`6
`
`
`
`US 7,463,145 B2
`
`1
`SECURITY MONITORING ARRANGEMENT
`AND METHOD USING A COMMON FIELD
`OF VIEW
`
`RELATED PATENT DOCUMENTS
`
`This patent document claims benefit under 35 U.S.C. §
`ll9(e) to U.S. Provisional Patent Application No. 60/719,
`369, entitled “Security Monitoring Arrangement and Method
`with Privacy Control,” filed on Sep. 22, 2005.
`
`FIELD OF THE INVENTION
`
`The present invention is directed to a security arrangement
`and method for monitoring the inside of a facility or resi-
`dence.
`
`BACKGROUND
`
`In order to protect residents, employees, personal property,
`and the like, security monitoring systems are used to monitor
`a variety of facilities and to sense the presence of an unwanted
`intruder. Many such security systems are connected to a cen-
`tral control unit and monitored by an operator who can alert
`the appropriate emergency services in the event of an
`unwanted intruder. Typically, a home monitoring security
`system includes a combination of sensing devices and alarm
`devices and some also include cameras. To achieve the maxi-
`
`these devices are distributed
`mum monitoring coverage,
`throughout the interior of the facility.
`Security systems that employ cameras are advantageous in
`that they are able to record activity associated with a sus-
`pected breach of the facility. In some instances, however, the
`cameras record the regular activities of the facilities’ resi-
`dents and/or employees. The cameras also record activities
`that are falsely perceived to be security breaches such as pet
`behaviors and authorized users that have been accidentally
`locked out.
`
`In specific situations, such as those having the potential to
`violate the privacy of authorized residents and/or employees
`of the facility, such comprehensive recordation by the secu-
`rity cameras may be undesirable. Since unwanted intruders
`couldbreach the security of a facility while the inhabitants are
`present, it is necessary for the security monitoring system to
`be frmctioning at all times. However, having cameras con-
`stantly being triggered to record the inhabitants’ daily living
`and working routines is a dramatic invasion of the inhabit-
`ants’ privacy, and is burdensome with respect to false triggers.
`Further, the monitoring and recording ofguests’ activities can
`be just as invasive.
`The above-discussed issues have presented challenges to
`developing a home and/or facility security monitoring system
`that provides maximum coverage while minimizing one or
`more of the above-identified issues.
`
`SUMMARY
`
`The present invention is directed to the above and related
`types of integrated security systems. These and other aspects
`of the present invention are exemplified in a number of illus-
`trated implementations and applications, some of which are
`shown in the figures and characterized in the claims section
`that follows.
`
`Various aspects of the present invention are applicable to
`an integrated security arrangement. The arrangement
`includes an intrusion sensor to sense an intrusion at a target
`area of a facility, a second sensor to sense movement, an
`
`10
`
`15
`
`25
`
`30
`
`35
`
`40
`
`45
`
`50
`
`55
`
`60
`
`65
`
`2
`
`image-capture device, and a base unit. The image-capture
`device captures images in response to an intrusion indication
`from the intrusion sensor and in response to a movement
`indication from the second sensor. The base unit integrates a
`direction of view of the second sensor and of the image-
`capture device, thereby directing the second sensor to sense in
`the target area in which the images are captured by the image-
`capture device.
`Other aspects of the present invention are applicable to a
`method for manufacturing an integrated security apparatus
`that is responsive to an intrusion sensor that senses an intru-
`sion at a target area of a facility. The method includes provid-
`ing a base unit, a second sensor to sense movement, and an
`image-capture device. The image-capture device captures
`images in response to both an intrusion indication from the
`intrusion sensor and to a movement indication from the sec-
`
`ond sensor. The method also includes securing the second
`sensor and the image-capture device to the base unit to inte-
`grate a direction of view of the second sensor and of the
`image-capture device. This integration directs the second
`sensor to sense in the target area in which the images are
`captured by the image-capture device.
`Other aspects of the present invention are applicable to a
`security system where a second sensor and image-capture
`device are not physically integrated inside the same housing.
`In one such example, an embodiment is arranged with an
`intrusion sensor to sense an intrusion at a target area of a
`facility, a second sensor to sense movement, and an i1nage-
`capture device. The second sensor bears a special relationship
`( e.g., located sufficiently near and aligned) with the image-
`capture device to form a common field of view, such that the
`fields of view for both devices overlap without the devices
`being located inside a common housing. The image-capture
`device captures images in response to an intrusion indication
`from the intrusion sensor and in response to a movement
`indication from the second sensor.
`
`invention is not
`The above summary of the present
`intended to describe each illustrated embodiment or every
`implementation of the present invention. The figures and
`detailed description that follow more particularly exemplify
`these embodiments.
`
`BRIEF DESCRIPTION OF THE DRAWINGS
`
`The invention may be more completely understood in con-
`sideration ofthe detailed description of various embodiments
`of the invention in connection with the accompanying draw-
`ings, in which:
`FIG. 1A illustrates an integrated security system, accord-
`ing to an example embodiment of the present invention;
`FIG. 1B is a flow diagram of how an integrated security
`system detects an intruder, according to an example embodi-
`ment of the present invention;
`FIG. 2A is a view of an integrated security system installed
`in a room in a normal operating state, according to an example
`embodiment of the present invention;
`FIG. 2B is a view of an integrated security system installed
`in a room and responding to an intruder entering a residence,
`according to an example embodiment of the present inven-
`tion;
`FIG. 2C is a view of an integrated security system installed
`in a room and responding to an intruder in the residence,
`according to an example embodiment of the present inven-
`tion; and
`FIG. 3 is a flow diagram of generating a security system
`status report, according to an example embodiment of the
`present invention.
`
`7
`
`
`
`US 7,463,145 B2
`
`3
`While the invention is amenable to various modifications
`
`and alternative forms, specifics thereof have been shown by
`way of example in the drawings and will be described in
`detail. It should be understood, however, that the intention is
`not necessarily to limit the invention to the particular embodi-
`ments described. On the contrary, the intention is to cover all
`modifications, equivalents, and alternatives falling within the
`spirit and scope of the invention as defined by the appended
`claims.
`
`DETAILED DESCRIPTION
`
`The present invention is believed to be applicable to a
`variety of different approaches and arrangements for provid-
`ing security services. The invention has been found to be
`particularly advantageous for addressing security monitoring
`needs in a residence or private-office environment.
`According to an example embodiment, a security system
`utilizes cameras to detect and identify intruders. The system
`includes an integrated camera/motion detector that is respon-
`sive to intrusion conditions. The camera’s smart-behavior
`
`results in reduced power consumption and mitigates privacy
`concerns on various levels. A system user sets up zones with
`at least one intrusion sensor (e.g., door/window contacts or
`glass-break detectors) for each zone around the perimeter of
`a facility and sets up corresponding carnera/motion detectors
`in the interior of the facility. The intrusion sensors are acti-
`vated (armed) by a system user, using, e.g., a keypad on a
`security panel, a remote control fob, or a phone call with
`DTMF. This allows for a complete activation of the system
`when the system user leaves the facility as well as a partial
`perimeter activation of the facility when the system user (or
`other authorized person) is present. Thus, when the user is
`present the camera remains “off” unless appropriately trig-
`gered by the motion detector. However, the motion detector
`also remains “off” unless it is armed by a corresponding
`intrusion sensor. Therefore, cameras record images inside the
`facility when both an intrusion sensor has been tripped and a
`motion detector has detected motion.
`
`Another example embodiment is directed to an integrated
`security arrangement. The arrangement includes an intrusion
`sensor to sense an intrusion at a target area of a facility, a
`second sensor to sense movement, an image-capture device,
`and a base unit. The image-capture device captures images in
`response to an intrusion indication from the intrusion sensor
`and in response to a movement indication from the second
`sensor. The base unit integrates a direction of view of the
`second sensor and of the image-capture device,
`thereby
`directing the second sensor to sense in the target area in which
`the images are captured by the image-capture device.
`FIG. IA illustrates an example embodiment of an inte-
`grated security system, according to the present invention. A
`base unit 35 is located in the interior of a facility and inte-
`grates a motion sensor 20, a camera 25, a data processor 30,
`and a communication interface 15. In one implementation the
`motion sensor is a passive infrared (PIR) sensor, which
`detects infrared energy in a target area and, in connection with
`a processor 30, recognizes changes in infrared energy (e.g.,
`temperature changes) to detect motion. Depending on the size
`of the facility, multiple base units are located throughout the
`facility’s interior, with a control panel 45 acting as a conven-
`tional communication hub for the facility. When the base unit
`35 receives an intrusion signal 10 from an intrusion sensor
`(via communication interface 15), the motion sensor 20 is
`activated. As shown in FIG. 1A, this communication interface
`15 interfaces the intrusion sensor input 10 to the control panel
`45. This sensor input 10 can therefore inform either the base
`
`10
`
`15
`
`25
`
`30
`
`35
`
`40
`
`45
`
`50
`
`55
`
`60
`
`65
`
`4
`
`unit 35 or the control panel 45 to arm the motion sensor 20.
`When unarmed, the motion sensor 20 will not be able to
`activate camera 25 but may still detect motion. The motion
`sensor 20 can detect motion in its field of view, and once the
`motion sensor is armed, the motion sensor is able to activate
`the camera 25. The motion sensor 20 and the camera 25 are
`
`positioned such that both devices have overlapping fields of
`detection. Thus, images of the source of the detected motion
`are recorded by the camera without requiring any intervening
`adjustment or alignment. The recorded images are processed
`by a data processor 30, which can be integrated with the
`motion sensor 20 and the camera 25 in a base unit 35 as
`
`shown, or may be located remotely and electrically coupled to
`the base unit 35.
`
`It will be appreciated that the data processor 30 can be
`implemented, for example, in the form of a high-speed pro-
`cessor such as a DSP (including an ALU) and/or a more
`general-purpose processor that may be optionally pro-
`grammed for video data (de)compression. Thus, various
`embodiments may include a variety of combinations of pro-
`cessing operations with one or more aspects ofthe processing
`operations performed at one or more local or remote proces-
`sors. For example, both video data storage and compression
`may be performed in the base unit 35 by the data processor 3 0.
`When the processor is located remotely, the data storage may
`still occur in base unit 35, but compression of the video data
`could be implemented in the remote processor. Another
`embodiment may involve data storage in the base unit 35
`without any compression ofthe video data. Moreover, each of
`the above operations may be performed in combination with
`a central processor 55, as further discussed below.
`In example implementations the base unit 35 is a battery-
`operated, wireless device having both motion sensing and
`image-capture capabilities. For further information on such a
`device, reference may be made to concurrently filed provi-
`sional application Ser. No. 60/785,570 filed on Mar. 24, 2006,
`entitled “Motion-Image Monitoring Method and Device” ,
`which is herein fully incorporated by reference. In certain
`implementations, data processor 30 is configured to preserve
`battery life by communicating in accordance with appropriate
`power-saving protocols. For example implementations
`related to communicative coupling and data transfer among
`the above-discussed devices in accordance with appropriate
`protocols, reference may be made to U.S. application Ser. No.
`l 1/389,673 filed on Mar. 24, 2006, entitled “Spread Spectrum
`Communications for Building-Security Systems” and Euro-
`pean Patent Application Publication No. EP 1 363 260 filed
`on May 6, 2003, entitled “Procédé de communication radiof-
`réquence entre plusieurs dispositifs et systeme de surveil-
`lance mettant en ceuvre un tel procédé,” which are herein
`fully
`incorporated
`by
`reference. The
`power-saving
`approaches also provide for limited activation of the above-
`discussed camera such that the privacy of the inhabitants of a
`residence or facility is largely maintained.
`The recorded images are transmitted over a bi-directional
`sensor communication path 40 to a control panel 45. In one
`implementation, the sensor communication path 40 is wire-
`less and can be employed, e.g., as described in the above two
`incorporated patent documents. The transmitted images may
`be encrypted by the data processor 30 before being transmit-
`ted to the control panel 45. The control panel 45 includes a
`local storage area for the recorded images 50, the central
`processing unit 55, and a transceiver 60. The control panel 45
`is located within the same facility as the base unit 35. The
`central processor 55 receives images from each of the base
`units located within the facility. Similar to the above discus-
`sion, the central processor 55 may perform a variety of pro-
`
`8
`
`
`
`US 7,463,145 B2
`
`5
`cessing operations alone or in combination with data proces-
`sor 30. The images may optionally be stored in data storage 50
`for further review or processing. The control panel 45
`includes a battery backup power source 65 in the event of a
`loss of power, e.g., a natural disaster or an intruder disables
`power to the facility. The transceiver 60 further transmits
`signals including system status reports or recorded images via
`a telephone charmel 70 or cable channel 75 to outside moni-
`toring facilities. The telephone channel 70 and cable channel
`75 are not limited to PSTN or broadband charmels; they may
`be part ofa GSl\/I/CDMA network. Outside monitoring facili-
`ties may include a private security company or a local law
`enforcement station.
`
`In another example embodiment, when an intrusion sensor
`senses an intruder breaching the facility (e.g., door/window
`contact is tripped), the intrusion signal 10 is transmitted
`directly to the control panel 45. The control panel 45 arms one
`or more base units 35 in the same zone as where the intrusion
`
`signal 10 originated. The base unit(s) 35 respond as discussed
`above. In this system architecture, the control panel 45 is the
`master and the sensors and control devices (e.g., keypads,
`keyfobs) are slave devices. The radio link in this architecture
`is a star topology with the control panel 45 at the center ofthe
`network. The branches include base units 35 and external
`
`links, e.g., telephone channel 70 and broadband charmel 75.
`Other aspects of the present invention are applicable to a
`security system where a second sensor and image-capture
`device are not physically integrated inside the same housing.
`In one such example, an embodiment is arranged with an
`intrusion sensor to sense an intrusion at a target area of a
`facility, a second sensor to sense movement, and an image-
`capture device. The second sensor bears a special relationship
`(e.g., located sufiiciently near and aligned) with the image-
`capture device to form a common field of view, such that the
`fields of view for both devices overlap without the devices
`being located inside a common housing. The image-capture
`device captures images in response to a11 intrusion indication
`from the intrusion sensor and in response to a movement
`indication from the second sensor.
`
`In more specific embodiments, the various arrangements
`permit the devices to be situated in different ways to provide
`the common field of view. For example, horizontal move-
`ment, vertical movement, or horizontal and vertical move-
`ment can be provided for each of the motion sensor and the
`image-capture device, with their movements mirrored to
`maintain the integrated field of view. More particularly, such
`mirrored movement can be provided by using a ratchet-like
`mechani sm with devices to provide increment adjustments in
`the horizontal and/or vertical directions; the skilled artisan
`would appreciate that such adjustment can be implemented
`using servo-control motors or be manually implemented
`using conventional position-stabilizers that permit step-wise/
`incremental rotation.
`In a related embodiment, horizontal movement, vertical
`movement, or horizontal and vertical movement can be pro-
`vided for either or both the motion sensor and the image-
`capture device by way of conventional electronically-imple-
`mented pan/tilt/zoom operation(s) but with their movements
`coordinated to maintain the integrated field of view. For
`image-capture, such pan/tilt/zoom operation is commonly
`used in digital video-recording devices. The motion detector
`may also be manipulated to alter the field of view.
`In more specific embodiments, the various arrangements
`can be implemented with a spatial relationship between the
`motion sensor and the image-capture device by using a com-
`mon backplate to which each of the motion sensor and the
`image-capture device are mounted and/or a template for
`
`10
`
`15
`
`25
`
`30
`
`35
`
`40
`
`45
`
`50
`
`55
`
`60
`
`65
`
`6
`aligning the motion sensor and the image-capture device for
`mounting on a wall, where contoured portions of the respec-
`tive backs of the motion sensor and the image-capture device
`may provide an offset for biasing the direction of view.
`In other specific embodiments, the various arrangements
`permit for such above-described devices to be situated such
`that their movement is pre- set before they are used or dynami-
`cally controlled while in use with automated or semi-auto-
`mated coordination provided by the control circuitry and/or
`personnel at a remote-site center. Such coordinated move-
`ment, while maintaining a common field of view, benefits a
`variety of monitoring and/or security applications.
`FIG. 1B illustrates a process for detecting an intruder,
`according to an example embodiment of the present inven-
`tion. The process shown in FIG. 1B may be implemented, for
`example, using a security system such as that shown in FIG.
`1A or otherwise described herein. An intrusion sensor, such
`as a window or door contact, located at a perimeter of a
`facility detects whether the contact subject, window or door,
`has been breached 110. If, for example, a window has been
`opened, the window contact (intrusion sensor) sends a signal
`to a corresponding integrated motion sensor/camera located
`at the interior of the facility. Upon receipt of the intrusion
`signal, the motion sensor is activated 120 and the integrated
`camera is set to a “ready” mode without initiating recording
`130. The motion detector remains activated 140 and when
`
`motion is detected, the integrated motion sensor/camera is
`again triggered 150. Once motion is detected, the camera
`turns “on” and captures images of the source of the motion
`160. The video images are sent to a central control panel for
`further evaluation 170. Further evaluation may include deter-
`mining (manually or automatically using, e.g., machine
`visions) whether the source ofthe motion is human, an animal
`such as a pet, or another moving object. If the source is
`determined to be human, further evaluation may reveal
`whether any identifying images were captured, whether the
`human is an intruder or an inhabitant of the facility, and face
`recognition may be used to identify a previously unknown
`person intruding on the facility.
`FIGS. 2A-C illustrate another example embodiment of a
`security system installed in a room. FIG. 2A shows the secu-
`rity system in a normal operating mode with the window
`contact 210 armed. In certain implementations a glass-break
`detector may be used as an intrusion sensor. The base unit
`235, including both a motion sensor 220 and a camera 225, is
`located on a wall inside the bedroom. Both the motion sensor
`220 and the camera 225 detect and monitor an area of the
`bedroom that includes the window and the bed. FIG. 2B
`illustrates the entrance of an intruder into the bedroom. For
`
`example, when the window is opened, the window contact
`210 senses the breach ofthe facility and signals the base unit
`235. In response to the signal, the motion sensor 220 is armed
`while the camera remains inactivated. FIG. 2C illustrates the
`
`intruder approaching the bed and the security system record-
`ing the unwanted activity as it occurs. The motion detector
`220 detects the intruder walking toward the bed which trig-
`gers the camera to turn “on” and begin recording the intrud-
`er’s movements. In one embodiment the security system may
`sound an alarm to scare the intruder into halting the unwanted
`activity. In other embodiments an alarm may be delayed until
`the recorded images are evaluated to verify that the intruder is
`an unwanted assailant and not a false alarm, e.g., a pet, or an
`inhabitant sneaking into the residence after curfew.
`FIG. 3 illustrates an approach to processing recorded
`images in a security system, according to another embodi-
`ment ofthe present invention. An intrusion sensor is activated
`at block 310 when an intruder breaches the perimeter of a
`
`9
`
`
`
`US 7,463,145 B2
`
`7
`facility. If a motion sensor/image-capture device detects
`motion at block 320, an alarm condition is reported at block
`330 and an image search is initiated at block 340. The alarm
`condition may be transmitted to, for example, a central con-
`trol panel, a law enforcement agency, a private security moni-
`toring facility, a cell phone, or a personal computer.
`With the image search at block 340 the motion sensor/
`image-capture device generates video data. The video data is
`processed at block 350 to evaluate whether the source of the
`motion is captured in the video data and whether the source of
`the motion can be identified. For example, if the source is a
`false trigger such as a pet or authorized employee/inhabitant
`that was locked out, the system can identify the false trigger
`and cease further security or alarm activities. Ifthe intruder is
`recorded, a status report is transmitted to the appropriate
`authorities at block 360. If the intruder is not detectable, the
`system determines whether a predetermined amount of time
`has been exceeded at block 370. If the video data searching
`has not exceeded the predetermined time delay, the system
`continues searching the data for images of the intruder. How-
`ever, if the predetermined time delay has been exceeded, a
`status report is transmitted and other means are optionally
`implemented to identify and apprehend the intruder, such as
`by sounding an alarm and/or alerting authorities or other
`security personnel.
`the motion detectors, while
`In another embodiment,
`always powered, are also always in a state of motion sensing.
`Thus, if motion is detected shortly before an intrusion signal
`is transmitted, the control panel and/or base unit can recog-
`nize the chain of events as an authorized person within the
`monitored zone merely opening a window or door. This
`aspect is also advantageous as a “privacy” feature insofar as
`maintaining the image sensor in a disabled mode; images of
`the authorized person within the monitored zone would not be
`captured when the window is opened. The system is pro-
`grammed to recognize alternate orders of signal transmission
`as corresponding to permitted behavior, thereby reducing the
`potential for the security system creating, and responding to,
`a false alarm.
`
`In another example embodiment, the home entry intrusion
`sensor (e.g., front door contact) corresponds to a delayed-
`response motion sensor such that the transmission of the
`motion indication is delayed to accommodate a security sys-
`tem control keypad located near the entrance. In another zone
`located nearby, such as a kitchen, the motion indication is not
`delayed when motion is detected. The system recognizes that
`motion sensed in the nearby room (e.g., person setting gro-
`cery bags down in the kitchen) following a delayed sensing of
`motion in the entry zone is likely an authorized user and an
`alarm will not sound for a predetermined length oftime. Ifthe
`system is not deactivated or reset before the predetermined
`length of time expires, the alarm will sound. The number of
`nearby zones configured with such a relationship with the
`delayed motion indication in the entry zone should be limited
`to ensure that an actual intruder is not provided enough time
`to traverse the premises without being detected.
`While certain aspects of the present invention have been
`described with reference to several particular example
`embodiments, those skilled in the art will recognize that many
`changes may be made thereto without departing from the
`spirit and scope ofthe present invention. Aspects ofthe inven-
`tion are set forth in the following claims.
`What is claimed is:
`
`1. An integrated security arrangement, comprising:
`an intrusion sensor to sense an intrusion at a target area of
`a facility;
`a self-powered detection device including:
`
`10
`
`15
`
`25
`
`30
`
`35
`
`40
`
`45
`
`50
`
`55
`
`60
`
`65
`
`8
`a second sensor to sense movement;
`a non-Altemating Current (AC) power source;
`an image-capture device to capture images in response
`to an intrusion indication from the intrusion sensor
`and to a movement indication from the second sensor;
`an electronic circuit to control power drawn from the
`non-AC power source by the second sensor and the
`image-capture device,
`the electronic circuit,
`in
`response to receiving an intrusion indication from the
`intrusion sensor, increasing power drawn from the
`second sensor by arming the second sensor and, in
`response to receiving a movement indication from the
`second sensor, increasing the power drawn from the
`image-capture device by arming the image-capture
`device; and
`a base unit, powered by the non-AC power source, inte-
`grating the electronic circuit,
`the non-AC power
`source second sensor and the image-capture device,
`and directing the second sensor to sense in the target
`area in which the images are captured by the image-
`capture device.
`2. The integrated security arrangement of claim 1, wherein
`the intrusion sensor generates a signal that arms the second
`sensor in response to sensing the intrusion, and wherein the
`non-AC power source is a battery circuit.
`3. The integrated security arrangement of claim 1, wherein,
`the electronic circuit processes the captured images and
`wherein the control of power drawn from the non-AC power
`source by the second sensor and the image-capture device
`includes powering up and down portions ofthe image-capture
`device and the second sensor.
`
`4. The integrated security arrangement of claim 3, further
`including a wall-mountable housing to contain the base unit,
`the non-AC power source, the electronic circuit, the second
`scnsor and thc imagc-capturc dcvicc.
`5. The integrated security arrangement of claim 1, further
`including a housing to contain the base unit, the second sen-
`sor, and the image-capture device.
`6. The integrated security arrangement of claim 1, further
`including a communication device to transmit wireless sig-
`nals to a remotely-located central controller, and a housing to
`contain the communication device, the base unit, the second
`sensor, and the image-capture device.
`7. The integrated security arrangement of claim 1, wherein
`the second sensor is a passive infrared sensor.
`8. The integrated security arrangement of claim 1,