The present invention relates to alarm systems in general. In particular, the present invention relates to deterrent alarm systems.
Areas, such as ATM vestibules, lobby entrance ways, stair wells and covered passage ways, may at certain times receive low pedestrian traffic flow. The reasons for this low flow vary. For example, the area itself might be isolated or secluded. Alternately, an area that normally receives moderate to high flow during business hours, receives low traffic flow outside of business hours, during the evening and early morning in particular. As a result, a person is less likely to feel safe in any of these areas during low traffic times, and as such is less likely to visit these areas during these times, thereby resulting in further reduced traffic flow.
For an example of the potential consequences of further reduced traffic flow, consider an ATM vestibule. For many, ATMs have become the exclusive medium through which they conduct bank business. The 24-hour per day availability and widespread presence of ATMs are two advantages over traditional teller banking. ATM banking does have its perils. A late night ATM user's only form of security may be a surveillance camera and a card-activated door, which often times does not work. Robberies do occur. Also, homeless people may use the vestibules as temporary shelters. As a result, the ATM vestibule appears less secure to a potential ATM user. As such, the user is less likely to use the ATM, which inconveniences the user and the results in lost business for the bank or financial institution.
It is an object of the present invention to provide a system to obviate or mitigate at least some of the above-presented problems.
The present invention provides a method for controlling a deterrent alarm system for a monitored area comprising the steps of activating an alarm; detecting the presence of a person in the monitored area; and, de-activating the alarm in response to the detected presence of the person.
The method may include the additional steps of detecting the absence of the person in the monitored area; and, re-activating the alarm in response to the detected absence of the person.
The alarm may be de-activated temporarily for a period of time. The period of time may be user-defined.
The detecting of the presence of the person may be one of sensing a motion of the person and an input from the person.
The method may involve the additional steps of monitoring for at least one of an additional motion of the person and an additional input from the person; detecting the respective at least one of additional motion and additional input; and, resetting the deactivation period of time and counting down the reset deactivation period of time for each respective at least one of additional motion and additional input detected.
The present invention also provides a deterrent alarm system for a monitored area comprising an alarm; an alarm controller in communication with the alarm for activating and de-activating the alarm; and, a detector in communication with the alarm controller for detecting a person in the monitored area and communicating to the controller one of an indication that the person is detected and an indication that no person is detected, the controller de-activating the alarm in response to the indication that the erson is detected and activating the alarm in response to the indication that no person is detected.
The detector may be one of a motion sensor and an input device, such as a computer readable medium, a keypad, a microphone, and a door sensor.
The system may further comprise a deactivation timer in communication with the alarm controller for setting and counting down the deactivation period of time and communicating the expiry of the deactivation period of time to the controller.
Preferred embodiments of the present invention are described below with reference to the accompanying drawings in which:
Referring to
Referring to
Referring to
Referring to
Referring to
In an alternate embodiment, the input may include opening a door to the monitored area. For example, the door may be equipped with a door sensor, which senses that the door to the monitored area has been opened, thereby indicating the presence of the person in the monitored area. It will be apparent to those skilled in the art that any door sensor that is capable of sensing that a door with which it is associated may be employed.
In a further alternate embodiment, the input may include entering a keystroke on a keypad located in or at an entrance to the monitored area. It will be apparent to those skilled in the art that any known keypad may be employed.
In a still further embodiment, the input may include a sound generated by the person in the monitored area that is detected by a sound detector, such as a microphone. It will be apparent to those skilled in the art that any known sound detector may be employed.
Referring to
Referring to
Referring to
Referring to
Step 6300 of
Referring to
Referring to
The detector 15 is configured to detect a person 18 in the monitored area 20. If the detector 15 detects a person 18 in the area 20, it communicates to the controller 13 an indication that a person is detected. The controller 13 is configured to deactivate the alarm 11 in response to the communicated indication. If the detector 15 detects that no person 18 is in the area 20, or does not detect a person 18 in the area 20, it communicates to the controller 13 an indication that no person 18 is detected. The controller 13, in response to the communicated indication that no person 18 was detected, either de-activates the alarm 11 if it has been deactivated previously, or does not deactivate the alarm 11 if it is activated presently.
The monitored area may be an ATM vestibule, a lobby entrance way, a secluded passageway (such as an underground walkway), or any area that receives low pedestrian traffic at certain times of the day. A user of the system 10 may activate the system at a set time of the day (e.g., dusk of early evening).
The detector 15 is a motion detector (or sensor), which is configured to detect a motion of a person within the monitored area. In a preferred embodiment, the motion detector is a narrow band motion detector. For example, the motion detector may be the Can Trex-IT as manufactured by Kantech of Toronto, Canada. It will, however, be apparent to those skilled in the art that any known motion detector that is able to detect a motion of a person and communicate this detection to the alarm controller 13 may be employed.
In an alternate embodiment of the present invention, the detector 15 is an input device. The input device may be a reader into which a computer readable medium is inserted and read. For example, the reader may be a magnetic card reader into which a magnetic card, such as an ATM card, is inserted. It will be apparent to those skilled in the art that any computer readable medium and corresponding reader may be employed, such as a smart card and an RFID.
In an alternate embodiment, the input device may be a keypad into which a person enters a keystroke. The keypad may be a button on a tenant directory in a lobby entrance way.
In a further alternate embodiment, the input device is a microphone or sound detector, which detects a sound generated by a person in the monitored area 20. The input device might also be a biometric interface or reader, such as a retinal scanner or a thumb or fingerprint reader.
In a still further alternate embodiment, the input device is a door sensor connected to a door to the monitored area 20. The door sensor senses that the door to the monitored area 20 has been opened and communicates an indirection that the door has been opened, and as such a person has been detected, to the alarm controller 13, which in response deactivates the alarm.
The controller 13 deactivates the alarm 11 temporarily for a deactivation period of time, which in a preferred embodiment is user-defined.
Referring to
Referring to
When the system 10 is activated, the alarm 11 is activated as a result. The alarm 11 may be one of auditory or visual (such as flashing lights, or a light of a different colour or intensity). Alternately, the alarm may be both auditory and visual. Once activated, the alarm 11 remains activated until system 10 is deactivated by a system user, or deactivated in response to the detected presence of a person 18 in the monitored area 20.
In a preferred embodiment, as the person 18 enters the monitored area 20, he or she opens the door 22. A door sensor 41 may be associated with the door 22, such that when the person 18 opens the door 22, the door sensor 41 senses that the door 22 has opened; i.e., the door sensor 41, acting as an input device, receives an input (the door opening) indicating the presence of a person 18 in the area 20. The door sensor 41 then communicates the received input (i.e., the door opening) to the alarm controller 13, which in response to the received communication deactivates the alarm 11. It will be apparent to those skilled in the art that any door sensor capable of sensing that a door has been opened, and communicating the door opened condition may be employed.
Referring to
Referring to
In a preferred embodiment, a second detector 15 motion detector is positioned in the area 20 at or near the ATM 24, such that as the person 18 operates the ATM 24, the detector 15 detects the person 18 and communicates the detection to the alarm controller 13, which in turn deactivates the alarm 11. This second detector 15 is also preferably positioned at a height between waist and shoulder height of an average person.
Referring to
As the person 18 leaves the area 20, he or she passes through the detection range of the first motion detector, which is again communicated to the alarm controller 13 and the alarm is deactivated once again.
In a preferred embodiment, the alarm 11 is deactivated temporarily for a deactivation period of time, which may be pre-defined or defined by the system 10 user. To this card, the alarm controller 13 further includes a timer 27, which is in communication with a timer controller 29 and an alarm switch 31, which activates and deactivates the alarm 11. In an alternate embodiment, the timer 27 and timer controller 29 do not form a part of the alarm controller 13, but rather form a separate component that interacts and communicates with the alarm controller 13.
In a preferred embodiment, a deactivation period of time is selected by the system user. The timer 27 is then set to the selected deactivation period of time. When the detector 15 detects the presence of the person 18 in the area 20, it communicates the indication of detection to the alarm controller 13, which includes the alarm switch 31 and the timer controller 29. The switch 31 deactivates the alarm 11 in response to the communicated indication from the detector 15. The timer controller 29, also in response to the communicated indication from the detector 15, activates the timer 27, which then begins to count down the deactivation period of time. At the expiration of the deactivation period of time, the timer 27 communicates the expiration to the switch 31, which in response to the communicated expiration activates the alarm 11.
If, during the deactivation period of time, the detector 15 detects an additional motion and/or input from the person 18 in the area 20, it communicates this additional indication to the alarm controller 13 and timer controller 29. The timer controller 29, in response to this additional communicated indication, resets the timer 27 to the deactivation period of time and the timer 27 starts counting down the reset deactivation period of time. In a preferred embodiment, as long as the detector 15 continues to communicate additional indications to the alarm controller 13 that the person 18 is present in the area 20, the timer controller 29 resets the timer 27 and as a result the alarm 11 remains deactivated. When the person 18 exits the area 20, the detector 15 will no longer detect the person 18 in the area 20. The timer 27 then continues to count down the deactivation period of time. When the time expires, the timer 27 communicates the expiry of the deactivation period of time to the alarm switch 31 which in response activates the alarm 11.
Alternately, when the person 18 enters the area 20 and once in the area 20 remains still, out of view or no longer generates a detectable input, the detector 15 no longer detects an additional motion and/or input. Since no additional motion and/or input is detected, the timer continues to count down the deactivation period of time. When the time expires, the timer 27 communicates the expiry of the deactivation period of time to the alarm switch 31, which in response activates the alarm 11.
Referring to
In a preferred embodiment, as the person 18 enters the entrance way, he or she opens the door. The door sensor 41 is associated with the door 22 and communicates to the alarm controller 13 an indication that the door has been opened (and as such the person 18 has been detected). The alarm controller 13 then deactivates the alarm 11. The lobby entrance way may also be equipped with motion detectors, which would detect the person's presence.
The person 18 then approaches the tenant directory and interacts with the directory input device 39 by either pressing a button associated with the tenant of interest, or entering a series of keypad strokes that allows the person to communicate with the tenant. On the person 18 interacting with the directory device 39, the device 39 communicates to the alarm controller 13 (with which it is in communication) an indication that a person has been detected. The alarm controller 13, in response, deactivates the alarm 11.
The above description is intended in an illustrative rather than a restrictive sense. Variations may be apparent to those skilled in the art without departing from the spirit and scope of the invention as defined by the claims set out below.
Number | Date | Country | Kind |
---|---|---|---|
2,470,244 | Jun 2004 | CA | national |