Television – Special applications – Observation of or from a specific location
Reexamination Certificate
2000-12-12
2004-02-10
Diep, Nhon (Department: 2613)
Television
Special applications
Observation of or from a specific location
C348S156000
Reexamination Certificate
active
06690414
ABSTRACT:
BACKGROUND OF THE INVENTION
1. Field of the Invention
The present invention relates generally to security monitoring systems and, more particularly, to a security monitoring system in which image data captured upon the occurrence of an alarm is transmitted to a remote location along with image data of authorized individuals for comparison by personnel at the remote location.
2. Prior Art
Security monitoring systems of the prior art, particularly residential security systems, typically utilize a box that monitors contact sensors for doors and windows and one or more infra-red sensors for area monitoring. When a contact is triggered or an infra-red sensor triggers, an alarm is sounded and a signal is sent via a data link such as a phone line to a central monitoring site. The central monitoring site typically initiates a set of phone calls, to the homeowner, to work, and/or to a designated neighbor to determine if the alarm signal was due to an unauthorized intruder or just to an accidental triggering by a family member or other authorized occupant of the structure.
If the alarm signal cannot be resolved by the phone calls, it is passed to the local police department. According to the International Association of Police Chiefs (www.theiacp.org), 94 to 98% of the calls passed to the police department turn out to be “false alarms” in the sense that they were not due to an unauthorized intruder, and alarm calls are responsible for 10 to 30% of all calls to the police.
Significant portions (over 70%) of “false alarms” are caused by what is referred to as exit/entrance conflicts. For instance, in the situation of a residential alarm system, the homeowner or other authorized occupant of a residence often arms the security system while leaving the residence and shortly thereafter realizes that they have forgotten something in the residence. As they return to the residence, they enter without disarming the system thereby causing an alarm to be sounded and/or an alarm signal to be sent to a central monitoring site, or in attempting to disarm the system in a hurry enter the wrong code with the same result. Similarly, the homeowner may arm the security system and remain inside the residence, such as during the night and may thereafter leave to get something outside the residence, e.g., the morning paper, thereby triggering a false alarm.
In view of the prior art, there is a need for a security monitoring system, which resolves these and other types of entry/exit conflicts.
SUMMARY OF THE INVENTION
Therefore it is an object of the present invention to provide a security monitoring system which reduces the number of false alarms inherent in the prior art security monitoring systems.
Accordingly, a security monitoring system is provided. The security monitoring system comprises: an alarm system having means for detecting an unauthorized individual in a structure; at least one camera for capturing first image data of the unauthorized individual; a memory for storing second image data of at least one individual authorized to be in the structure; and transmitting means for transmitting third image data to a remote location upon the detection of the unauthorized individual, the third image data comprising at least portions of the first and second image data for comparison at the remote location. The system can further comprise means for compressing the third image data prior to transmission to the remote location.
In a preferred implementation of the security monitoring system of the present invention, the at least one camera also captures the second image data to be stored in the memory. Means is preferably provided for commanding the at least one camera to capture the second image data. Preferably, the means for commanding the at least one camera to capture the second image data comprises entering a unique key sequence on a keypad associated with the alarm system.
In yet another preferred implementation of the security monitoring system of the present invention, the first image data comprises image data of more than the face of the unauthorized individual and the system further comprises a computer vision system for detecting the face of the unauthorized individual from the first image data. In such an implementation, the second image data comprises face image data of the authorized individual and the third image data comprises a comparison of face image data of the unauthorized and authorized individuals.
Preferably, the third image data is composed in a picture comprising a frame from the video image data arranged in a first portion and the still image data of the at least one individual authorized to be in the structure arranged in a second portion. More preferably, the first portion comprises a top portion of the picture and the second portion comprises a row of the still image data for each of the at least one individuals authorized to be in the structure arranged along a bottom portion of the picture.
Also provided are methods for security monitoring of a structure having the security monitoring system of the present invention.
REFERENCES:
patent: 5091780 (1992-02-01), Pomerleau
patent: 5164827 (1992-11-01), Paff
patent: 5606364 (1997-02-01), Kim
patent: 5657076 (1997-08-01), Tapp
patent: 5704008 (1997-12-01), Duvall, Jr.
patent: 5831669 (1998-11-01), Adrain
patent: RE36041 (1999-01-01), Turk et al.
patent: 5982418 (1999-11-01), Ely
patent: 5991429 (1999-11-01), Coffin et al.
patent: 6069653 (2000-05-01), Hudson
patent: 6069655 (2000-05-01), Seeley et al.
patent: 6111517 (2000-08-01), Atick et al.
patent: 6128397 (2000-10-01), Baluja et al.
patent: 6282649 (2001-08-01), Lambert et al.
patent: 6292575 (2001-09-01), Bortolussi et al.
patent: 6301370 (2001-10-01), Steffens et al.
patent: 0962894 (1999-08-01), None
patent: 0962894 (1999-12-01), None
patent: 2223614 (1990-04-01), None
patent: 2343945 (2000-05-01), None
patent: 11-328405 (1999-11-01), None
Rowley, H.A., et al., “Human Face Detection in Visual Scenes”, Advances in Neural Information Processing Systems 8, Proceedings of the 1995 Conference, pp. 875-881, 1996.
Rowley, H.A., et al., “Rotation Invariant Neural Network-Based Face Detection”, Proceedings, 1988 IEEE Computer Society Conference on Computer Vision and Pattern Recognition, pp. 38-44, 1998.
Raja, Y., et al., “Segmentation and Tracking Using Colour Mixture Models”, Computer Vision—ACCV '98, Third Asian Conference on Computer Vision, Hong Kong, China, Jan. 1998, Proceedings, vol. 1.
Lee, C.H., et al., “Automatic Human Face Location in Complex Background Using Motion and Color Information”, Pattern Recognition, vol. 29, No. 11, pp. 1887-1889, 1996.
Gutta, S., et al., “Face Surveillance”, Sixth International Conference on Computer Vision, The Institute of Electrical and Electronics Engineers, Inc., pp. 646-651.
Stauffer, C., “Automatic hierarchical classification using time-based co-occurrences”, IEEE Computer Society Technical Committee on Pattern Analysis and Machine Intelligence, vol. 2, pp. 333-339.
Grimson, W.E.L., et al., “Using adaptive tracking to classify and monitor activities in a site”, Proceedings 1988, IEEE Computer Society Conference on Computer Vision and Pattern Recognition, pp. 22-29, 1998.
Cohen-Solal Eric
Lyons Damian M.
Diep Nhon
Koninklijke Philips Electronics , N.V.
Thorne Gregory L.
LandOfFree
Method and apparatus to reduce false alarms in exit/entrance... does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Method and apparatus to reduce false alarms in exit/entrance..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Method and apparatus to reduce false alarms in exit/entrance... will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-3304622