throbber
(12) Ulllted States Patent
`Jentoft
`
`(10) Patent No.:
`(45) Date of Patent:
`
`US 7,463,145 B2
`Dec. 9, 2008
`
`US007463 l45B2
`
`(54) SECURITY lVIONITORING ARRANGEMENT
`AND METHOD USING A COMMON FIELD
`OF VIEW
`
`Inventor: Keith Jentoft, Circle Pines, MN (US)
`(75)
`(73) Assignee: RSI Video Technologies, Inc., White
`Bear Lake, MN (US)
`
`( * ) Notice:
`
`Subject to any disclaimer, the term of this
`patent is extended or adjusted under 35
`USC 15409) by 412 days
`
`6,271,752 B1
`5,411,209 131
`6,476,858 B1
`6,504,479 B1
`6,690,414 B2
`6’700’487 B2
`6,759,957 B2
`2002/0171557 A1
`2003/0065407 A1
`2003/0193553 A1
`2003/0202117 A1
`
`8/2001 Vaios
`5/2002 Lyons e131,
`11/2002 Ramirez Diaz etal.
`1/2003 L
`t
`1.
`2/2004 L:::)Sn:t:La
`3/2004 Lyons et a_1'
`7/2004 Murakam1 et al.
`11/2002 Wegener
`4/2003 Johnson et a1.
`10/2003 Suzuki
`10/2003 Garner
`
`(21) Appl.No.: 11/388,764
`
`Filed:
`
`(22)
`(65)
`
`Mar. 24, 2006
`Prior Publication Data
`
`(Continued)
`FOREIGN PATENT DOCUMENTS
`
`US 2007/0063840 A1
`
`Mar. 22, 2007
`
`DE
`
`101 50 745 A 1
`
`4/2003
`
`Related U.S. Application Data
`
`(60) Provisional application No. 60/719,369, filed on Sep.
`22, 2005,
`
`.
`(Continued)
`
`(51)
`
`Primary Examiner—Donnie L Crosland
`(74) Attorney, Agent, or Fzrm—Crawford Maunu PLLC
`
`(57)
`
`ABSTRACT
`
`_
`
`.
`.
`.
`‘A.‘°°°rd‘“‘5 ‘O °‘:ede’t‘a‘:‘P1e embt°:11‘¥“f“‘(’1a“?“‘e§.ra1‘1*F1 S‘”'T°1‘11
`§1ii§”§§1geZ§“§1‘Z1uZ,fs°Snuflivriiiin‘§e$o?rfo“§§ns:°Lif1;nmi
`sion gt a target area of a facility, a second sensor to sense
`movement, an image-capture device, and a base unit. The
`image-capture device captures images in response to anintru-
`sion indication from the intrusion sensor and in response to a
`movement 1nd1cat1on from the second sensor. The base umt
`integrates a direction of view of the second sensor and of the
`image-capture device, thereby directing the second sensor to
`sense in the target area in which the images are captured by
`the image-capture device.
`
`22 Claims, 4 Drawing Sheets
`
`
`
`|.xuMbu1|‘-uiawvnu
`an
`
`
`
`POI 1007
`
`Int CL
`(2006.01)
`G083 13/00
`(2006.01)
`G08B 19/00
`(2006.01)
`H04N 7/18
`(2006.01)
`G08B 1/08
`(52) U.S. Cl.
`..................... .. 340/541; 340/517; 340/521;
`340/522; 340/565; 340/539.17; 340/693.1;
`382/103; 348/152; 348/154; 348/155
`(58) Fielgfg/gllgsssigfagigg ggzrcslg
`’
`’
`’
`’
`‘
`’
`4%/154 155’
`1
`fil f
`h h,
`’
`,
`1,
`e or Comp ete Seam lstory‘
`ee app lcauon
`References Cited
`U.S. PATENT DOCUMENTS
`
`S
`
`(56)
`
`4,857,912 A
`5,448,290 A
`5,703,368 A
`5,819,124 A
`
`8/1989 Everett, Jr. et al.
`9/1995 Van Zeeland
`12/1997 Tomooka et 211.
`10/1998 Sonmer etal.
`
`1
`
`POI 1007
`
`

`
`US 7,463,145 B2
`Page 2
`
`U.S. PATENT DOCUMENTS
`
`2004/0109059 A1
`2004/0155781 A1
`2004/0205823 A1
`2004/0205824 A1
`2005/0024206 A1
`2005/0134450 A1
`2005/0134454 A1
`
`6/2004 Kawakita
`8/2004 DeO111e
`10/2004 Tsai
`10/2004 Tsai
`2/2005 Samarasekera et al.
`6/2005 Kovach
`6/2005 Eskildsen
`
`FOREIGN PATENT DOCUMENTS
`
`EP
`EP
`Ep
`Ep
`EP
`
`676 733 A
`811 959 A
`0 356 326 A2
`1 115 254 A2
`1 363 260 A1
`
`10/1995
`12/1997
`3/1993
`7/2001
`11/2003
`
`EP
`EP
`GB
`GB
`
`JP
`JP
`W0
`W0
`
`W0
`W0
`W0
`W0
`W0
`
`1 499 098 A1
`1316 933 B1
`2 325 548 A
`2 358 504 A
`
`1/2005
`8/2006
`“/1998
`7/2001
`
`A
`
`2003233889
`2005071054
`WO 88/07474
`W0 00/03357
`
`WO 02/46919 A2
`WO 2004/064355 A2
`WO 2004/079684 Al
`WO 2004/114648 A2
`WO 2005/065196 A2
`
`8/2003
`3/2005
`1/1988
`1/2000
`
`6/2002
`7/2004
`9/2004
`12/2004
`7/2005
`
`2
`
`

`
`U.S. Patent
`
`Dec. 9,2008
`
`Sheet 1 of4
`
`US 7,463,145 B2
`
`intrusion Sensor lnput 10
`
`Motion Sensor 20
`
`Data Processor
`30
`
`Communication
`interface
`15
`
`FIG. 1A
`
`Sensor Communication Path 40
`
`Local (Video) Data Storage
`50
`
`Central Processing 55
`
`XCVR 60
`
`
`
`
`<%————
`
`Telephone Channel
`70
`
`Broadband (Cable)
`(T Channel 75
`
`
`
`3
`
`

`
`U.S. Patent
`
`Dec. 9,2008
`
`Sheet 2 of4
`
`US 7,463,145 B2
`
`
`
`Sensor Triggered
`
`
`1 1 0
`
` Y
`
`es
`
`120 \
`
`130
`
`
`
`
`
`
`JR/Motion Detectorlcamera
`Armed
`
`Camera Set to “READY”
`
`140-‘
`
`Motion Detected
`
`
`
`es
`
`Y
`
`150\
`
`
`
`Motion Triggers IR/Motion
`Detector
`
`
`
`
`
`
`
`1 60 \
`
`Camera Turns ‘ON’ and
`
`Captures \fideo
`
`Video Sent to Control Panel
`
`
`
`170
`
`FIG. 1B
`
`4
`
`

`
`U.S. Patent
`
`Dec. 9,2008
`
`Sheet 3 of4
`
`US 7,463,145 B2
`
`5
`
`

`
`U.S. Patent
`
`Dec. 9,2008
`
`Sheet 4 of4
`
`US 7,463,145 B2
`
`310
`
`Intrusion sensor activated
`
` image-capture
`device active?
`
`
`
`xceeded Dela
`Time
`
`340
`
`350
`
` Condition
`Detected
`
`Yes
`
`Yes
`
`Report Status
`
`Yes
`
`Image search for condition
`
`
` 370
`
`330
`
`
`
`Report Alarm Condition
`
`FIG. 3
`
`6
`
`

`
`US 7,463,145 B2
`
`1
`SECURITY MONITORING ARRANGEMENT
`AND METHOD USING A COMMON FIELD
`OF VIEW
`
`RELATED PATENT DOCUMENTS
`
`This patent document claims benefit under 35 U.S.C. §
`ll9(e) to U.S. Provisional Patent Application No. 60/719,
`369, entitled “Security Monitoring Arrangement and Method
`with Privacy Control,” filed on Sep. 22, 2005.
`
`FIELD OF THE INVENTION
`
`The present invention is directed to a security arrangement
`and method for monitoring the inside of a facility or resi-
`dence.
`
`BACKGROUND
`
`In order to protect residents, employees, personal property,
`and the like, security monitoring systems are used to monitor
`a variety of facilities and to sense the presence of an unwanted
`intruder. Many such security systems are connected to a cen-
`tral control unit and monitored by an operator who can alert
`the appropriate emergency services in the event of an
`unwanted intruder. Typically, a home monitoring security
`system includes a combination of sensing devices and alarm
`devices and some also include cameras. To achieve the maxi-
`
`these devices are distributed
`mum monitoring coverage,
`throughout the interior of the facility.
`Security systems that employ cameras are advantageous in
`that they are able to record activity associated with a sus-
`pected breach of the facility. In some instances, however, the
`cameras record the regular activities of the facilities’ resi-
`dents and/or employees. The cameras also record activities
`that are falsely perceived to be security breaches such as pet
`behaviors and authorized users that have been accidentally
`locked out.
`
`In specific situations, such as those having the potential to
`violate the privacy of authorized residents and/or employees
`of the facility, such comprehensive recordation by the secu-
`rity cameras may be undesirable. Since unwanted intruders
`couldbreach the security of a facility while the inhabitants are
`present, it is necessary for the security monitoring system to
`be frmctioning at all times. However, having cameras con-
`stantly being triggered to record the inhabitants’ daily living
`and working routines is a dramatic invasion of the inhabit-
`ants’ privacy, and is burdensome with respect to false triggers.
`Further, the monitoring and recording ofguests’ activities can
`be just as invasive.
`The above-discussed issues have presented challenges to
`developing a home and/or facility security monitoring system
`that provides maximum coverage while minimizing one or
`more of the above-identified issues.
`
`SUMMARY
`
`The present invention is directed to the above and related
`types of integrated security systems. These and other aspects
`of the present invention are exemplified in a number of illus-
`trated implementations and applications, some of which are
`shown in the figures and characterized in the claims section
`that follows.
`
`Various aspects of the present invention are applicable to
`an integrated security arrangement. The arrangement
`includes an intrusion sensor to sense an intrusion at a target
`area of a facility, a second sensor to sense movement, an
`
`10
`
`15
`
`25
`
`30
`
`35
`
`40
`
`45
`
`50
`
`55
`
`60
`
`65
`
`2
`
`image-capture device, and a base unit. The image-capture
`device captures images in response to an intrusion indication
`from the intrusion sensor and in response to a movement
`indication from the second sensor. The base unit integrates a
`direction of view of the second sensor and of the image-
`capture device, thereby directing the second sensor to sense in
`the target area in which the images are captured by the image-
`capture device.
`Other aspects of the present invention are applicable to a
`method for manufacturing an integrated security apparatus
`that is responsive to an intrusion sensor that senses an intru-
`sion at a target area of a facility. The method includes provid-
`ing a base unit, a second sensor to sense movement, and an
`image-capture device. The image-capture device captures
`images in response to both an intrusion indication from the
`intrusion sensor and to a movement indication from the sec-
`
`ond sensor. The method also includes securing the second
`sensor and the image-capture device to the base unit to inte-
`grate a direction of view of the second sensor and of the
`image-capture device. This integration directs the second
`sensor to sense in the target area in which the images are
`captured by the image-capture device.
`Other aspects of the present invention are applicable to a
`security system where a second sensor and image-capture
`device are not physically integrated inside the same housing.
`In one such example, an embodiment is arranged with an
`intrusion sensor to sense an intrusion at a target area of a
`facility, a second sensor to sense movement, and an i1nage-
`capture device. The second sensor bears a special relationship
`( e.g., located sufficiently near and aligned) with the image-
`capture device to form a common field of view, such that the
`fields of view for both devices overlap without the devices
`being located inside a common housing. The image-capture
`device captures images in response to an intrusion indication
`from the intrusion sensor and in response to a movement
`indication from the second sensor.
`
`invention is not
`The above summary of the present
`intended to describe each illustrated embodiment or every
`implementation of the present invention. The figures and
`detailed description that follow more particularly exemplify
`these embodiments.
`
`BRIEF DESCRIPTION OF THE DRAWINGS
`
`The invention may be more completely understood in con-
`sideration ofthe detailed description of various embodiments
`of the invention in connection with the accompanying draw-
`ings, in which:
`FIG. 1A illustrates an integrated security system, accord-
`ing to an example embodiment of the present invention;
`FIG. 1B is a flow diagram of how an integrated security
`system detects an intruder, according to an example embodi-
`ment of the present invention;
`FIG. 2A is a view of an integrated security system installed
`in a room in a normal operating state, according to an example
`embodiment of the present invention;
`FIG. 2B is a view of an integrated security system installed
`in a room and responding to an intruder entering a residence,
`according to an example embodiment of the present inven-
`tion;
`FIG. 2C is a view of an integrated security system installed
`in a room and responding to an intruder in the residence,
`according to an example embodiment of the present inven-
`tion; and
`FIG. 3 is a flow diagram of generating a security system
`status report, according to an example embodiment of the
`present invention.
`
`7
`
`

`
`US 7,463,145 B2
`
`3
`While the invention is amenable to various modifications
`
`and alternative forms, specifics thereof have been shown by
`way of example in the drawings and will be described in
`detail. It should be understood, however, that the intention is
`not necessarily to limit the invention to the particular embodi-
`ments described. On the contrary, the intention is to cover all
`modifications, equivalents, and alternatives falling within the
`spirit and scope of the invention as defined by the appended
`claims.
`
`DETAILED DESCRIPTION
`
`The present invention is believed to be applicable to a
`variety of different approaches and arrangements for provid-
`ing security services. The invention has been found to be
`particularly advantageous for addressing security monitoring
`needs in a residence or private-office environment.
`According to an example embodiment, a security system
`utilizes cameras to detect and identify intruders. The system
`includes an integrated camera/motion detector that is respon-
`sive to intrusion conditions. The camera’s smart-behavior
`
`results in reduced power consumption and mitigates privacy
`concerns on various levels. A system user sets up zones with
`at least one intrusion sensor (e.g., door/window contacts or
`glass-break detectors) for each zone around the perimeter of
`a facility and sets up corresponding carnera/motion detectors
`in the interior of the facility. The intrusion sensors are acti-
`vated (armed) by a system user, using, e.g., a keypad on a
`security panel, a remote control fob, or a phone call with
`DTMF. This allows for a complete activation of the system
`when the system user leaves the facility as well as a partial
`perimeter activation of the facility when the system user (or
`other authorized person) is present. Thus, when the user is
`present the camera remains “off” unless appropriately trig-
`gered by the motion detector. However, the motion detector
`also remains “off” unless it is armed by a corresponding
`intrusion sensor. Therefore, cameras record images inside the
`facility when both an intrusion sensor has been tripped and a
`motion detector has detected motion.
`
`Another example embodiment is directed to an integrated
`security arrangement. The arrangement includes an intrusion
`sensor to sense an intrusion at a target area of a facility, a
`second sensor to sense movement, an image-capture device,
`and a base unit. The image-capture device captures images in
`response to an intrusion indication from the intrusion sensor
`and in response to a movement indication from the second
`sensor. The base unit integrates a direction of view of the
`second sensor and of the image-capture device,
`thereby
`directing the second sensor to sense in the target area in which
`the images are captured by the image-capture device.
`FIG. IA illustrates an example embodiment of an inte-
`grated security system, according to the present invention. A
`base unit 35 is located in the interior of a facility and inte-
`grates a motion sensor 20, a camera 25, a data processor 30,
`and a communication interface 15. In one implementation the
`motion sensor is a passive infrared (PIR) sensor, which
`detects infrared energy in a target area and, in connection with
`a processor 30, recognizes changes in infrared energy (e.g.,
`temperature changes) to detect motion. Depending on the size
`of the facility, multiple base units are located throughout the
`facility’s interior, with a control panel 45 acting as a conven-
`tional communication hub for the facility. When the base unit
`35 receives an intrusion signal 10 from an intrusion sensor
`(via communication interface 15), the motion sensor 20 is
`activated. As shown in FIG. 1A, this communication interface
`15 interfaces the intrusion sensor input 10 to the control panel
`45. This sensor input 10 can therefore inform either the base
`
`10
`
`15
`
`25
`
`30
`
`35
`
`40
`
`45
`
`50
`
`55
`
`60
`
`65
`
`4
`
`unit 35 or the control panel 45 to arm the motion sensor 20.
`When unarmed, the motion sensor 20 will not be able to
`activate camera 25 but may still detect motion. The motion
`sensor 20 can detect motion in its field of view, and once the
`motion sensor is armed, the motion sensor is able to activate
`the camera 25. The motion sensor 20 and the camera 25 are
`
`positioned such that both devices have overlapping fields of
`detection. Thus, images of the source of the detected motion
`are recorded by the camera without requiring any intervening
`adjustment or alignment. The recorded images are processed
`by a data processor 30, which can be integrated with the
`motion sensor 20 and the camera 25 in a base unit 35 as
`
`shown, or may be located remotely and electrically coupled to
`the base unit 35.
`
`It will be appreciated that the data processor 30 can be
`implemented, for example, in the form of a high-speed pro-
`cessor such as a DSP (including an ALU) and/or a more
`general-purpose processor that may be optionally pro-
`grammed for video data (de)compression. Thus, various
`embodiments may include a variety of combinations of pro-
`cessing operations with one or more aspects ofthe processing
`operations performed at one or more local or remote proces-
`sors. For example, both video data storage and compression
`may be performed in the base unit 35 by the data processor 3 0.
`When the processor is located remotely, the data storage may
`still occur in base unit 35, but compression of the video data
`could be implemented in the remote processor. Another
`embodiment may involve data storage in the base unit 35
`without any compression ofthe video data. Moreover, each of
`the above operations may be performed in combination with
`a central processor 55, as further discussed below.
`In example implementations the base unit 35 is a battery-
`operated, wireless device having both motion sensing and
`image-capture capabilities. For further information on such a
`device, reference may be made to concurrently filed provi-
`sional application Ser. No. 60/785,570 filed on Mar. 24, 2006,
`entitled “Motion-Image Monitoring Method and Device” ,
`which is herein fully incorporated by reference. In certain
`implementations, data processor 30 is configured to preserve
`battery life by communicating in accordance with appropriate
`power-saving protocols. For example implementations
`related to communicative coupling and data transfer among
`the above-discussed devices in accordance with appropriate
`protocols, reference may be made to U.S. application Ser. No.
`l 1/389,673 filed on Mar. 24, 2006, entitled “Spread Spectrum
`Communications for Building-Security Systems” and Euro-
`pean Patent Application Publication No. EP 1 363 260 filed
`on May 6, 2003, entitled “Procédé de communication radiof-
`réquence entre plusieurs dispositifs et systeme de surveil-
`lance mettant en ceuvre un tel procédé,” which are herein
`fully
`incorporated
`by
`reference. The
`power-saving
`approaches also provide for limited activation of the above-
`discussed camera such that the privacy of the inhabitants of a
`residence or facility is largely maintained.
`The recorded images are transmitted over a bi-directional
`sensor communication path 40 to a control panel 45. In one
`implementation, the sensor communication path 40 is wire-
`less and can be employed, e.g., as described in the above two
`incorporated patent documents. The transmitted images may
`be encrypted by the data processor 30 before being transmit-
`ted to the control panel 45. The control panel 45 includes a
`local storage area for the recorded images 50, the central
`processing unit 55, and a transceiver 60. The control panel 45
`is located within the same facility as the base unit 35. The
`central processor 55 receives images from each of the base
`units located within the facility. Similar to the above discus-
`sion, the central processor 55 may perform a variety of pro-
`
`8
`
`

`
`US 7,463,145 B2
`
`5
`cessing operations alone or in combination with data proces-
`sor 30. The images may optionally be stored in data storage 50
`for further review or processing. The control panel 45
`includes a battery backup power source 65 in the event of a
`loss of power, e.g., a natural disaster or an intruder disables
`power to the facility. The transceiver 60 further transmits
`signals including system status reports or recorded images via
`a telephone charmel 70 or cable channel 75 to outside moni-
`toring facilities. The telephone channel 70 and cable channel
`75 are not limited to PSTN or broadband charmels; they may
`be part ofa GSl\/I/CDMA network. Outside monitoring facili-
`ties may include a private security company or a local law
`enforcement station.
`
`In another example embodiment, when an intrusion sensor
`senses an intruder breaching the facility (e.g., door/window
`contact is tripped), the intrusion signal 10 is transmitted
`directly to the control panel 45. The control panel 45 arms one
`or more base units 35 in the same zone as where the intrusion
`
`signal 10 originated. The base unit(s) 35 respond as discussed
`above. In this system architecture, the control panel 45 is the
`master and the sensors and control devices (e.g., keypads,
`keyfobs) are slave devices. The radio link in this architecture
`is a star topology with the control panel 45 at the center ofthe
`network. The branches include base units 35 and external
`
`links, e.g., telephone channel 70 and broadband charmel 75.
`Other aspects of the present invention are applicable to a
`security system where a second sensor and image-capture
`device are not physically integrated inside the same housing.
`In one such example, an embodiment is arranged with an
`intrusion sensor to sense an intrusion at a target area of a
`facility, a second sensor to sense movement, and an image-
`capture device. The second sensor bears a special relationship
`(e.g., located sufiiciently near and aligned) with the image-
`capture device to form a common field of view, such that the
`fields of view for both devices overlap without the devices
`being located inside a common housing. The image-capture
`device captures images in response to a11 intrusion indication
`from the intrusion sensor and in response to a movement
`indication from the second sensor.
`
`In more specific embodiments, the various arrangements
`permit the devices to be situated in different ways to provide
`the common field of view. For example, horizontal move-
`ment, vertical movement, or horizontal and vertical move-
`ment can be provided for each of the motion sensor and the
`image-capture device, with their movements mirrored to
`maintain the integrated field of view. More particularly, such
`mirrored movement can be provided by using a ratchet-like
`mechani sm with devices to provide increment adjustments in
`the horizontal and/or vertical directions; the skilled artisan
`would appreciate that such adjustment can be implemented
`using servo-control motors or be manually implemented
`using conventional position-stabilizers that permit step-wise/
`incremental rotation.
`In a related embodiment, horizontal movement, vertical
`movement, or horizontal and vertical movement can be pro-
`vided for either or both the motion sensor and the image-
`capture device by way of conventional electronically-imple-
`mented pan/tilt/zoom operation(s) but with their movements
`coordinated to maintain the integrated field of view. For
`image-capture, such pan/tilt/zoom operation is commonly
`used in digital video-recording devices. The motion detector
`may also be manipulated to alter the field of view.
`In more specific embodiments, the various arrangements
`can be implemented with a spatial relationship between the
`motion sensor and the image-capture device by using a com-
`mon backplate to which each of the motion sensor and the
`image-capture device are mounted and/or a template for
`
`10
`
`15
`
`25
`
`30
`
`35
`
`40
`
`45
`
`50
`
`55
`
`60
`
`65
`
`6
`aligning the motion sensor and the image-capture device for
`mounting on a wall, where contoured portions of the respec-
`tive backs of the motion sensor and the image-capture device
`may provide an offset for biasing the direction of view.
`In other specific embodiments, the various arrangements
`permit for such above-described devices to be situated such
`that their movement is pre- set before they are used or dynami-
`cally controlled while in use with automated or semi-auto-
`mated coordination provided by the control circuitry and/or
`personnel at a remote-site center. Such coordinated move-
`ment, while maintaining a common field of view, benefits a
`variety of monitoring and/or security applications.
`FIG. 1B illustrates a process for detecting an intruder,
`according to an example embodiment of the present inven-
`tion. The process shown in FIG. 1B may be implemented, for
`example, using a security system such as that shown in FIG.
`1A or otherwise described herein. An intrusion sensor, such
`as a window or door contact, located at a perimeter of a
`facility detects whether the contact subject, window or door,
`has been breached 110. If, for example, a window has been
`opened, the window contact (intrusion sensor) sends a signal
`to a corresponding integrated motion sensor/camera located
`at the interior of the facility. Upon receipt of the intrusion
`signal, the motion sensor is activated 120 and the integrated
`camera is set to a “ready” mode without initiating recording
`130. The motion detector remains activated 140 and when
`
`motion is detected, the integrated motion sensor/camera is
`again triggered 150. Once motion is detected, the camera
`turns “on” and captures images of the source of the motion
`160. The video images are sent to a central control panel for
`further evaluation 170. Further evaluation may include deter-
`mining (manually or automatically using, e.g., machine
`visions) whether the source ofthe motion is human, an animal
`such as a pet, or another moving object. If the source is
`determined to be human, further evaluation may reveal
`whether any identifying images were captured, whether the
`human is an intruder or an inhabitant of the facility, and face
`recognition may be used to identify a previously unknown
`person intruding on the facility.
`FIGS. 2A-C illustrate another example embodiment of a
`security system installed in a room. FIG. 2A shows the secu-
`rity system in a normal operating mode with the window
`contact 210 armed. In certain implementations a glass-break
`detector may be used as an intrusion sensor. The base unit
`235, including both a motion sensor 220 and a camera 225, is
`located on a wall inside the bedroom. Both the motion sensor
`220 and the camera 225 detect and monitor an area of the
`bedroom that includes the window and the bed. FIG. 2B
`illustrates the entrance of an intruder into the bedroom. For
`
`example, when the window is opened, the window contact
`210 senses the breach ofthe facility and signals the base unit
`235. In response to the signal, the motion sensor 220 is armed
`while the camera remains inactivated. FIG. 2C illustrates the
`
`intruder approaching the bed and the security system record-
`ing the unwanted activity as it occurs. The motion detector
`220 detects the intruder walking toward the bed which trig-
`gers the camera to turn “on” and begin recording the intrud-
`er’s movements. In one embodiment the security system may
`sound an alarm to scare the intruder into halting the unwanted
`activity. In other embodiments an alarm may be delayed until
`the recorded images are evaluated to verify that the intruder is
`an unwanted assailant and not a false alarm, e.g., a pet, or an
`inhabitant sneaking into the residence after curfew.
`FIG. 3 illustrates an approach to processing recorded
`images in a security system, according to another embodi-
`ment ofthe present invention. An intrusion sensor is activated
`at block 310 when an intruder breaches the perimeter of a
`
`9
`
`

`
`US 7,463,145 B2
`
`7
`facility. If a motion sensor/image-capture device detects
`motion at block 320, an alarm condition is reported at block
`330 and an image search is initiated at block 340. The alarm
`condition may be transmitted to, for example, a central con-
`trol panel, a law enforcement agency, a private security moni-
`toring facility, a cell phone, or a personal computer.
`With the image search at block 340 the motion sensor/
`image-capture device generates video data. The video data is
`processed at block 350 to evaluate whether the source of the
`motion is captured in the video data and whether the source of
`the motion can be identified. For example, if the source is a
`false trigger such as a pet or authorized employee/inhabitant
`that was locked out, the system can identify the false trigger
`and cease further security or alarm activities. Ifthe intruder is
`recorded, a status report is transmitted to the appropriate
`authorities at block 360. If the intruder is not detectable, the
`system determines whether a predetermined amount of time
`has been exceeded at block 370. If the video data searching
`has not exceeded the predetermined time delay, the system
`continues searching the data for images of the intruder. How-
`ever, if the predetermined time delay has been exceeded, a
`status report is transmitted and other means are optionally
`implemented to identify and apprehend the intruder, such as
`by sounding an alarm and/or alerting authorities or other
`security personnel.
`the motion detectors, while
`In another embodiment,
`always powered, are also always in a state of motion sensing.
`Thus, if motion is detected shortly before an intrusion signal
`is transmitted, the control panel and/or base unit can recog-
`nize the chain of events as an authorized person within the
`monitored zone merely opening a window or door. This
`aspect is also advantageous as a “privacy” feature insofar as
`maintaining the image sensor in a disabled mode; images of
`the authorized person within the monitored zone would not be
`captured when the window is opened. The system is pro-
`grammed to recognize alternate orders of signal transmission
`as corresponding to permitted behavior, thereby reducing the
`potential for the security system creating, and responding to,
`a false alarm.
`
`In another example embodiment, the home entry intrusion
`sensor (e.g., front door contact) corresponds to a delayed-
`response motion sensor such that the transmission of the
`motion indication is delayed to accommodate a security sys-
`tem control keypad located near the entrance. In another zone
`located nearby, such as a kitchen, the motion indication is not
`delayed when motion is detected. The system recognizes that
`motion sensed in the nearby room (e.g., person setting gro-
`cery bags down in the kitchen) following a delayed sensing of
`motion in the entry zone is likely an authorized user and an
`alarm will not sound for a predetermined length oftime. Ifthe
`system is not deactivated or reset before the predetermined
`length of time expires, the alarm will sound. The number of
`nearby zones configured with such a relationship with the
`delayed motion indication in the entry zone should be limited
`to ensure that an actual intruder is not provided enough time
`to traverse the premises without being detected.
`While certain aspects of the present invention have been
`described with reference to several particular example
`embodiments, those skilled in the art will recognize that many
`changes may be made thereto without departing from the
`spirit and scope ofthe present invention. Aspects ofthe inven-
`tion are set forth in the following claims.
`What is claimed is:
`
`1. An integrated security arrangement, comprising:
`an intrusion sensor to sense an intrusion at a target area of
`a facility;
`a self-powered detection device including:
`
`10
`
`15
`
`25
`
`30
`
`35
`
`40
`
`45
`
`50
`
`55
`
`60
`
`65
`
`8
`a second sensor to sense movement;
`a non-Altemating Current (AC) power source;
`an image-capture device to capture images in response
`to an intrusion indication from the intrusion sensor
`and to a movement indication from the second sensor;
`an electronic circuit to control power drawn from the
`non-AC power source by the second sensor and the
`image-capture device,
`the electronic circuit,
`in
`response to receiving an intrusion indication from the
`intrusion sensor, increasing power drawn from the
`second sensor by arming the second sensor and, in
`response to receiving a movement indication from the
`second sensor, increasing the power drawn from the
`image-capture device by arming the image-capture
`device; and
`a base unit, powered by the non-AC power source, inte-
`grating the electronic circuit,
`the non-AC power
`source second sensor and the image-capture device,
`and directing the second sensor to sense in the target
`area in which the images are captured by the image-
`capture device.
`2. The integrated security arrangement of claim 1, wherein
`the intrusion sensor generates a signal that arms the second
`sensor in response to sensing the intrusion, and wherein the
`non-AC power source is a battery circuit.
`3. The integrated security arrangement of claim 1, wherein,
`the electronic circuit processes the captured images and
`wherein the control of power drawn from the non-AC power
`source by the second sensor and the image-capture device
`includes powering up and down portions ofthe image-capture
`device and the second sensor.
`
`4. The integrated security arrangement of claim 3, further
`including a wall-mountable housing to contain the base unit,
`the non-AC power source, the electronic circuit, the second
`scnsor and thc imagc-capturc dcvicc.
`5. The integrated security arrangement of claim 1, further
`including a housing to contain the base unit, the second sen-
`sor, and the image-capture device.
`6. The integrated security arrangement of claim 1, further
`including a communication device to transmit wireless sig-
`nals to a remotely-located central controller, and a housing to
`contain the communication device, the base unit, the second
`sensor, and the image-capture device.
`7. The integrated security arrangement of claim 1, wherein
`the second sensor is a passive infrared sensor.
`8. The integrated security arrangement of claim 1,

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket