This invention relates generally to security systems, and more particularly to a security system with passive and active components.
A security system is active when persons are willing to have their activities monitored. Otherwise, the security system is passive.
Passive security systems typically use cameras, microphones and motion sensors. In passive systems, it is difficult to identify the persons in the environment being monitored. For example, a complex and expensive face recognition subsystem may need to be employed in the environment to identify people. This makes it difficult to deploy and maintain passive systems in large environments requiring, perhaps, hundreds if not thousands of cameras. In general, most conventional passive security systems are incapable of reliably identifying people in a large scale environment.
Active systems typically use access control panels, keyboards, fingerprint detectors, security cards, or badges to positively identify people in the environment. The problem with active systems is that it is difficult, if not impossible, to distribute identification means to a large population. If the environment is also accessible to the general public the positive pre-identification of all people is impossible. Also, the people in the environment often need to directly interact with an authentication device, which may be inconvenient.
Therefore, there is a need for an inexpensive and simple system that can concurrently distinguish between friend and foe in large environments.
A network in an environment includes passive sensors with associated sensor identifications.
A set of active badges with associated badge identification, wherein each badge is associated with an object.
A particular sensor broadcasts a packet in response to detecting a particular object. The packet includes the sensor identification and a time, and only if the particular object is associated with a particular badge then the badge appends the badge identification to the packet and broadcasts the appended packet, and the particular sensor receives and rebroadcasts the appended packet for further processing to passively and actively monitor the environment.
The embodiments use a wireless network of passive sensor nodes 101, and active badges 120. As an advantage, both the sensors and the badges are relatively inexpensive, making large-scale deployment of the security system a reality.
The passive network of our previous work is described in our U.S. Patent Publications 2008-0130949 and 2008-0130951, both incorporated herein by reference.
As shown in
The node also includes a passive motion sensor, e.g., an infrared detector. The detector has a range of only a few meters, hence detected object are well localized.
Each sensor is associated with a sensor identification number (SID) 111. The location of the sensor is known. The sensor detects 210 an event caused by an object 102, such as a person, moving within the short range of the sensors. The event has an associated time 112. A packet 110 including the SID 111 and time 112 is broadcast 220 by the sensor node in response to detecting the event. The packet can be further processed 150 to determine a trajectory 103 of the object over time. The processing can be centralized or distributed.
It should be noted, that this aspect of the invention detects all moving objects in the environment, whether or not the objects are authorized, i.e., associated with a badge.
An active badge 120 is arranged on an “authorized” object to be monitored. As defined herein, an authorized object is a person whose identity is known to the system.
The badge has an associated personnel identification number (PID) 113. The active badge receives 230 the packet 110 and determines a radio signal strength indicator (RSSI) 114 for the packet. The badge appends 240 the PID 111 and the RSSI 114 to the received packet, and rebroadcasts 250 the packet. The updated packet is received by the sensor, and rebroadcast so that it can be centrally processed 150 to track the object.
In response to the processing, the security system can generate various responses. If the detected person does not generate the appended packet, then the person is unknown or unauthorized and appropriate signals 151 can be generated depending on the location of the person, and further tracking can be performed while the unknown person remains in the environment. If there is an appended packet, then appropriate access to the environment can granted depending on the location of the person.
The RSSI 114 can be used to distinguish the case where the object is simultaneously detected by more than one sensor, or when another sensor detects an unrelated motion. In this case, the packet with the largest RSSI is from the nearest sensor.
The security system solves the problem where the environment admits unauthorized and authorized person. For example, a building can include authorized staff as well casual visitors. In this case, our system only signals an appropriate alarm if an unauthorized person is at an unauthorized location. In a retail setting, the presence of a customer can be detected and signaled to a sales person.
Applications that are enabled by our system include visitor and staff tracking in health care, educational, hospitality, military, law enforcement, home, industrial, and entertainment environments for routine as well as forensic applications.
Although the invention has been described by way of examples of preferred embodiments, it is to be understood that various other adaptations and modifications can be made within the spirit and scope of the invention. Therefore, it is the object of the appended claims to cover all such variations and modifications as come within the true spirit and scope of the invention.