Integrated security system

Information

  • Patent Grant
  • 6504479
  • Patent Number
    6,504,479
  • Date Filed
    Thursday, September 7, 2000
    24 years ago
  • Date Issued
    Tuesday, January 7, 2003
    21 years ago
Abstract
An integrated security system (10) for monitoring a premises (12) to detect an intrusion onto the premises comprises a video system for providing video representations of the premises, an alarm system for providing an indication of an intrusion onto the premises, an access control system for allowing authorized entrance onto the premises, a processing device connected to the video security system, the alarm system, and the access control system for producing a signal indicative of an intrusion onto the premises, and a monitoring center connected to the processing device for receiving the signal indicative of an intrusion onto the premises.
Description




CROSS-REFERENCE TO RELATED APPLICATIONS




None




STATEMENT REGARDING FEDERALLY SPONSORED RESEARCH OR DEVELOPMENT




Not applicable.




BACKGROUND OF THE INVENTION




This invention relates to an integrated security system located at a site to be protected, and more particularly, to an integrated security system that combines an image based video security system, a burglar alarm system, and an access control system to detect the presence of an intrusion onto the site.




Conventional security systems are an amalgam of separate and distinct components, often provided by different vendors, which do not take advantage of similarities in function and implementation of the components. Burglar alarm systems are typically used to protect a building by employing a series of make/break contacts and sensors such as P.I.R. (passive infrared) sensors, vibration sensors, and microwave sensors, which are strategically placed at doors, windows, and other potential entry points. When any of the sensors are interrupted an alarm is sounded or relayed back to a control station located within the building, nearby the building, or remotely to a central control station of the security company employed to protect the building. Access control systems are also used to protect a building and provide for physical entry via the use of card access, facial recognition, or other identification systems. The same user may require both card access and control of the burglar alarm system such that upon entry to the building the user must proceed to the burglar alarm system control panel to disable it within a predetermined time. In addition, an in-place video security system may report alarms when motion is detected. This system may also require disabling either by the operator or via a signal from the burglar alarm control panel after the operator disables the alarm panel. Upon exit from the building, the same operator may be required to enable both the burglar alarm and video security system and to disallow entry of other personnel using the access control system. All of these systems may connect to a central monitoring station via separate communications channels such that a facility may require three phone lines to report alarm or status conditions and to receive updates of their respective databases. On site visits from three different vendors or three different personnel from the same vendor may be required to change the programming of each system.




In U.S. Pat. No. 6,069,655 there is described an image processing based video security system in which false alarm rates are substantially eliminated by implementation of image processing techniques such as described in co-assigned U.S. Pat. Nos. 5,937,092 and 5,956,424. 6,097,429 and 6,091,771 respectively describe a site control unit and a workstation for use with the system. A key feature of the security system is detection of motion in an image obtained from a video camera, processing of the image to determine if the motion is true motion as opposed to the perceived effects of lighting changes or the like, and if true motion, the classification of the source of that motion as being of a target class or of a different class. Image processing, motion detection, and image classification are all performed onsite by the site control unit with an alarm being provided to a monitoring location only if detected motion is classified as caused by the target class.




The separate implementations of functions may be traced to the historical use of such systems for different purposes, the cost of implementing such systems, and the relatively recent advent of video security systems. The present invention takes advantage of recent advances in computer power and software to eliminate the redundancies between systems and eliminate the necessity of separate communications channels for each system.




This invention relates to an integrated security system physically located at a site being protected. The integrated security system contains the functionality of any or all components of a burglar alarm, an access control system, and a video security system. Whereas it is common to find separate and distinct burglar alarm, access control, and video systems and components at any location, an integrated security system of the present invention is unique. The integrated security system includes a site control unit which is capable of locally controlling all aspects of the burglar alarm system, the access control system, and the video security system, provides a common database for reducing redundancies in the control of all of the systems, and provides a common communications channel for alarm reporting and exchange of information with a remote monitoring center.




BRIEF SUMMARY OF THE INVENTION




Among the several objects of the invention may be noted the use of an integrated security system to control all aspects of the burglar alarm, access control, and video security functions positioned at a facility to be protected or monitored. The integrated security system may be locally controllable by an operator or security personnel at the site, or by remote control from a control center located some distance away. The remoteness of the control center may be substantial; i.e., transcontinental, without the performance of on-site security being effected, or with the outputs from the site to the remote control center being degraded in any manner.




Another object of the invention is the provision of a common database for control of a combined burglar alarm, access control, and video security system. The common database containing information related to user IDs, access control numbers, times of operation, entry and exit delays, allowed personnel for access and control of the functions of the system, and other related information used by the integrated system to control the operation of the system and the reporting of alarms. The use of the common database reduces the need for operator intervention and changing of parameters separately for each function of burglar alarm, access control, and video security employed in the integrated security system.




A third object of the invention is the use of a common communications channel for exchange of information and the reporting of alarms from the combination of the burglar alarm system, the access control system, and the video security system. The communications channel is capable of only being used so long as required to send and receive appropriate data and instructions or to report an alarm to the remote monitoring center.




A further object of the present invention is to provide an integrated security system which can be remotely programmed or have associated software which can be easily upgraded.




Another object of the invention is to provide the control of a burglar alarm system which may include, but not be limited to, the sensing of any device which indicates an alarm condition such as make/break contacts, PIR devices, radar detectors, etc. The integrated security system is also capable of reporting the indicated alarm conditions, and controlling the times when the burglar alarm system is active, including entry and exit delays.




Another object of the invention is to provide an integrated security system which is capable of controlling a video security system which may include, but not be limited to, the sensing of any motion which indicates an alarm condition, the recording of video images for local or remote viewing, including snapshots and video recordings, the recording of audio, the ability to look at live video and listen to live audio remotely via the communications channel, the ability to send live audio or a recorded announcement, and the ability to transfer any video or audio recording over the communications channel. The video security system includes as inputs a single or a plurality of image and audio generating devices either visual, infrared, ultraviolet or radar images and acoustic devices not necessarily limited to the range of human vision or hearing.




A further object of the invention is to provide an integrated security system which can control an access control system which may include, but not be limited to, allowing access only during certain hours of operation, allowing access to designated personnel, reporting of unauthorized access attempts, and storing a history of access personnel and times.




The integrated security system of the present invention is also capable of having a common interface which is used to control all of the functions or operations of the video security system, the alarm system, and the access control system from a monitoring center or a remote control station. Additionally, the monitoring center or the remote control station may include a common database to store information relating to the alarm system, the access control system, and the video security system. The monitoring center may further have a single workstation which is capable of accessing all of the features and functions of the burglar alarm system, the access control system, and the video security system.




These and other objects and advantages of the present invention will become apparent after considering the following detailed specification in conjunction with the accompanying drawings, wherein:











BRIEF DESCRIPTION OF THE DRAWINGS





FIG. 1

is a block diagram of an integrated security system constructed according to the present invention;





FIG. 2

is a block diagram of video and audio components associated with the integrated security system;





FIG. 3

is a block diagram of sensor and control components associated with the integrated security system





FIG. 4

is a representation of a facility in which the integrated security system of the present invention is installed;





FIG. 5

is a simplified representation of the integrated security system having a single site control unit used in conjunction with a local monitoring station;





FIG. 6

is a simplified representation of the integrated security system having multiple site control units used in conjunction with a local monitoring station;





FIG. 7

is a simplified representation of the integrated security system having multiple site control units used in conjunction with a remote monitoring station;





FIG. 8

is a simplified representation of the integrated security system having two different facilities used in conjunction with a remote monitoring system; and





FIG. 9

is a block diagram of a site control unit of the integrated security system of the present invention.











DETAILED DESCRIPTION OF THE INVENTION




Referring to the drawings, wherein like numbers refer to like items, number


10


identifies a preferred embodiment of an integrated security system constructed according to the present invention.

FIG. 1

shows the integrated security system


10


which is used to monitor an installation, a building, or a facility


12


to detect the presence of an intrusion. Within the facility


12


is a site control unit (SCU)


14


and connected to the SCU


14


are control components


16


, sensor components


18


, video and audio components


20


, and bidirectional components


22


. The control components


16


, sensor components


18


, video and audio components


20


, and bi-directional components


22


are all connected to the SCU


14


via connections


24


,


26


,


28


, and


30


, respectively. For example, the connection


28


may be video cable with control signals being RS-232 or RS-485.




The SCU


14


further provides an output over a connection


32


through communications termination equipment (CTE)


34


. The connection


32


may be through an Ethernet type cabling system. The CTE


34


transmits and receives signals over a communications channel


36


to and from a monitoring center


38


. An individual or an operator (not shown) is located within the monitoring center


38


to determine if an intrusion has been detected at the facility


12


or to examine the status of the facility


12


. The operator evaluates information provided from the SCU


14


to determine if police, fire, medical, or other authorities need to be contacted. The monitoring center


38


includes communications termination equipment


40


which is connected to a video server (VS)


42


, a customer database


44


, and a central alarm computer


46


, which are all interconnected with a plurality of workstations


48


. The workstations


48


are used to display video images, control recording of the video images, display alarms, display contact data or information, display and modify customer data or other information to service alarms, manage the customer database


44


, and to communicate with and control the SCU


14


. The VS


42


, customer database


44


, central alarm computer


46


, and the workstations


48


may be interconnected using an Ethernet type connection system or network. Examples of the constructions and functions of the VS


42


, the central alarm computer


46


, and the workstations


48


are disclosed in U.S. Pat. No. 6,069,655, which is incorporated herein by this reference. The customer database


44


may be any commercially available or a custom software product or package which may be configured to include information concerning the owner of the facility


12


, the location or address of the facility


12


, and who should be contacted in the event of an alarm or an intrusion. Further, the database


44


may be used to provide non-video information to the display associated with the workstation


48


. For example, the workstation


48


will be provided with video images from the video security system and the database


44


can provide information corresponding to the video images. Additionally, the customer database


44


may be included in the central alarm computer


46


. Although a number of workstations


48


have been shown, it is also possible to having only one workstation


48


in the monitoring center


38


.




In addition to the common communications channel


36


, a backup or redundant communications channel


50


may be employed. The channel


50


is connected between the facility


12


and the monitoring center


38


by using communications termination equipment (CTE


2


)


52


located within the facility


12


and communications termination equipment (CTE


2


)


54


located within the monitoring center


42


. The CTE


2




52


may be connected to the SCU


14


via a connection


56


. Although not shown, the CTE


2




54


may be connected to the video server


42


, the customer database


44


, and the central alarm computer


46


as the CTE


40


. Thus all functions of the integrated security system


10


can be maintained even when the primary communications link


36


fails, is not available, or is interrupted. Examples of the communications termination equipment


34


,


40


,


52


, and


54


may be an ISDN router or a phone line dial-up.




An important feature of the present invention is the use of the single or common communications channel


36


to control and communicate with all features and functions of the SCU


14


and the components


16


-


22


. The communications channel


36


may be any convenient channel including standard telephone service, ISDN, DSL, Internet, dedicated cable, local area network, wide area network, wireless, or any communications channel available to connect between the SCU


14


and the monitoring center


38


. The actual channel is immaterial as long as sufficient capability exists to transfer video, audio, command, control, and data at the required rates. The communications channel


50


may be the same as the communications channel


36


. However, the communications channel


36


will be a high speed channel or a high speed connection while the communications channel


50


may be a phone line. A second feature of the invention is the use of a common database within the SCU


14


for all data related to the operation and control of the components


16


-


22


. A third feature of the invention is the use of the customer database


44


at the monitoring center


38


which is used to store and manage all data for the components


16


-


22


located at the customer premises


12


. A fourth feature of the invention is the use of a single workstation interface at the monitoring center


38


to access all the features and functions of components


16


-


22


. A fifth feature of the invention is the combining of all of the functions of previously separate systems such as a video security system, a burglar alarm system, and an access control system into the integrated security system


10


such that individual video security, burglar alarm, and access control functions may not be distinguishable although they are presented here as individual functions to better illustrate the concepts.




With reference now to

FIG. 2

, a detailed block diagram of the video and audio components


20


are illustrated. A speaker


100


and a microphone


102


are connected to the SCU


14


via connections


104


and


106


, respectively. The speaker


100


is used to play a recorded message or for an operator to issue an audio or verbal message in the facility


12


. The microphone


102


is used to allow the operator to listen for any sounds inside or outside the facility


12


. A plurality of cameras


108


,


110


,


112


,


114


,


116


, and


118


are connected to the SCU


14


in various ways. For example, the camera


108


is directly connected to the SCU


14


via a connection


120


. Video signals from the camera


108


are sent directly over the connection


120


to the SCU


14


. The camera


110


is also connected directly to the SCU


14


via a connection


122


. However, movement of the camera


110


may be controlled by a pan, tilt, and zoom (PTZ) controller


124


. The PTZ controller


124


allows the SCU


14


to control the movement of the camera


110


to obtain the best possible image. The cameras


112


-


118


are connected to the SCU


14


through a video mulitplexor (MUX)


126


and are also controlled by the PTZ controller


124


. The video MUX


126


allows for the selection of one of the cameras


112


-


118


for viewing purposes. Additionally, a selection of a composite image from a combination of the cameras


112


-


118


may also be selected. For example, the images from the cameras


112


-


118


may be presented as a single image in a quad format on a display of the workstation


48


. The video MUX


126


is connected to the SCU


14


via a connection


128


which provides video images from the cameras


112


-


118


to the SCU


14


. Another connection


130


is provided from the SCU


14


to the video MUX


126


to control the operation of the video MUX


126


. A video cassette recorder (VCR)


132


is also connected to the SCU


14


via a connection


134


. Video images may be sent to the VCR


132


or received from the VCR


132


over the connection


134


. Another connection


136


connects the SCU


14


to the VCR


132


to control the operation of the VCR


132


.




It should be understood that not all of the video and audio components may be present in any facility


12


and that other similar components may be used, although such components have not been specifically shown or described. Additionally, the number of components which have been depicted may change dependent upon the particular requirements of the facility


12


. For example, although four cameras


112


-


118


are shown, it is possible to have more cameras connected to the video MUX


126


. As is known, the output of the cameras


108


-


118


may be digital or analog, color or black and white, and the frame rate of each of the cameras


108


-


118


is determined by the camera type.





FIG. 3

depicts a detailed block diagram of the control components


16


, the sensor components


18


, and the bidirectional components


22


. The control components


16


may comprise output devices such as a door latch


140


, a light


142


, and a siren


144


. The control components


16


are connected through one or more interface devices


146


to the SCU


14


via a connection


148


. The connection


148


may use a standard type interface such as RS-232 or RS-485. The interface devices


146


are used to convert signals between the formats used by the SCU


14


and the components


140


,


142


, and


144


. Not all of the components


140


-


144


need to be used in the facility


12


and other similar components may be used although not specifically identified.




The sensor components


18


are shown to comprises a card reader


150


, a fingerprint reader or scanner


152


, a passive infrared detector (PIR)


154


, a magnetic contact


156


, a stolen property detector


158


, and a fire alarm switch


160


. Other type sensors (not shown) may be used as part of the sensor components


18


. For example, smoke detectors, alarm pulls, and motion detectors may be used. Again, not all of the components


150


-


160


may be required in the facility


12


. Additionally, there may be a plurality of these components


150


-


160


in the facility


12


.




The bi-directional components


22


may comprise a keypad/display device


162


which is used to enter information and read data from the system


10


. The device


162


may control all of the functions of the system


10


within the facility


12


. For example, the keypad/display device


162


may be used to control a burglar alarm system in the facility


12


. The device


162


may arm or disarm the burglar alarm system. Further, the device


162


may be used to gain access into the facility


12


. The device


162


is directly connected to the SCU


14


without the need of an interface device


146


.




Referring now to

FIG. 4

, the facility


12


is representative of the type of location, premises, or building with which the integrated security system


10


is employed is shown. In particular, the facility


12


has windows W and doors D which need to be monitored to determine if an intrusion is occurring or has occurred. The windows W may, for example, be provided with sensors S


1


and each of the doors D with a sensor S


2


. Each door D may also be provided with an access control unit A


1


. The windows W and/or doors D may also be provided with lights L


1


, door locks L


2


, or other actuators that are controlled via the SCU


14


located on the premises


12


. Both sensors S


1


and S


2


may be conventional make/break sensors, although sensor S


1


may be a vibration sensor. A motion sensor S


3


may be installed in a passage through the facility


12


to detect movement of an individual through the passage. This may be passive infrared, radar, or other type. A sensor S


4


may be used to detect vibration near a perimeter fence F. The sensor S


4


may also be a laser beam or other intrusion means. Sensors S


1


-S


4


, access control unit A


1


, lights L


1


, and actuators L


2


are all well known in the art. Although the interface between the sensors S


1


-S


4


, the access control unit A


1


, the lights L


1


, the actuator L


2


, and the SCU


14


has been described as being via RS-485 interface boxes, it is also possible to have a direct connection to the SCU


14


or a connection via other interfaces such as RS-232. A plurality of video cameras C is strategically located both inside and outside the facility


12


. Outputs from the cameras C are routed to the SCU


14


via the connections, such as the connections


120


,


122


, or


128


shown in FIG.


2


. Additionally, the outputs from the access control panels A


1


, the sensors S


1


-S


4


, the lights L


1


, and the actuators L


2


are transmitted to the SCU


14


via the connections.




If any of the sensors S


1


-S


4


, the actuators L


2


, or the access control panels A


1


detects an intrusion into the facility


12


, an alarm signal is sent from the SCU


14


through the CTE


34


and the communications channel


36


to the CTE


40


in the monitoring center


38


. An operator, located at the monitoring center


38


, may request to view video from the cameras


108


-


118


, to verify the presence of an intrusion. This allows the operator to reject the alarm if no visual identification or verification of the threat can be made. Alternatively, if the operator determines that the threat condition does exist, then the appropriate authorities may be contacted. In addition, due to the integrated nature of the SCU


14


, the operator may control certain actions, such as turning the lights L


1


on or opening or closing the locks L


2


. The system


10


may also have positioned or located at the facility


12


speakers S, such as the speakers


100


, and microphones M, such as the microphones


102


, which are connected to the SCU


14


. The speakers S may be used for playing a recorded message or for an operator to issue an audio or verbal message. The microphones M are employed to allow the operator to listen for any sounds within or outside of the facility


12


. Any audio signals picked up from the microphones M may help to verify an intrusion. Further, the speakers S and the microphones M may be incorporated into any of the cameras


108


-


118


.




The SCU


14


can intelligently look at video provided by each of the cameras C to determine if an intruder is present within any of the areas in the field of view of the cameras C. If it is determined that this is so, the SCU


14


sends an alarm signal to the monitoring center


38


in order for the operator to investigate. In this manner, the operator does not have to continuously monitor unchanging video with which there is a low probability of an intrusion. In addition, due to the integrated nature of the system


10


the operator may command certain actions such as turning one or more of the lights L


1


on, playing a recorded announcement over the speakers S, removing access control privileges from the access control panels A


1


, examining the status of other sensors S


1


-S


4


, or otherwise controlling the customer premises equipment as the situation warrants.




The access control panels A


1


may be conveniently located on the premises


12


such that when the sensors S


1


-S


4


are armed and someone enters the premises


12


, the person can enter an appropriate code at the nearest panel A


1


to signify that the entry is authorized, no intrusion has occurred, and hence no false alarm condition exists. Additionally, entry of an appropriate code may also disarm the cameras C, the sensors S


1


-S


4


, or disarm preselected zones or areas within the facility


12


. Alternatively, due to the integrated system


10


, when someone enters the premises using the access control panels A


1


, the cameras C may send a signal to the monitoring station


38


for an operator to visually verify that the person seeking entrance to the facility


12


is authorized. Those skilled in the art will appreciate that many such synergies in operation will accrue from the integrated security system


10


. For example, if the vibration sensor S


4


is activated due to a storm or other natural circumstance, the cameras C may be activated to verify the alarm condition. If no alarm condition is detected, then no alarm is sent to the monitoring center


38


. As another example, consider that those authorized to access the system


10


may use passkeys or other means which may be lost or stolen. A digital recorder integrated within the SCU


14


may record every person who enters the building


12


using the access control panels A


1


. The video can be indexed via the access code and time to provide a means to verify the entry of the person using the passkey was in fact the owner of the key. This may also prevent users from “loaning” their key to unauthorized personnel or allowing unauthorized personnel access to the facility


12


if they are aware that there is a video record of every entry. Also, the stolen property detector


158


, which is also known as an electronic article surveillance device or sensor (EAS), can be used in combination with the digital recorder to record and tag the video whenever the detector


158


is activated.




In addition to the alarm advantages, the integrated system


10


presents advantages for remote access when no alarm condition exists. The operator to located at the monitoring center


38


can command the SCU


14


to cycle through the cameras C under its control to execute a “walk about” of the premises


12


as detailed in U.S. Pat. No. 6,097,429, entitled “Site Control Unit for Video Security System”. In addition, the condition of each of the sensors S


1


-S


4


, the lights L


1


, the actuators L


2


, the cameras C, the speakers S, and the microphones M may be examined. This allows for the reduction in needed guard services as further described and detailed in U.S. Pat. No. 6,097,429.




Although the integrated security system


10


has thus far been illustrated and described as being at a facility


12


and a monitoring center


38


which are remote from each other, the system


10


can be configured in a variety of ways using one or more SCU's


14


. In

FIG. 5

, both the SCU


14


and the monitoring center


38


are located at the same site or within the facility


12


. The SCU


14


is connected to the monitoring center


38


by the communications channel


36


. Depending on the amount of monitoring utilized at a site


12


, two or more SCUs,


14




a


and


14




b,


for example, may be located at the site


12


and both SCUs


14




a


and


14




b


are locally controlled from the same monitoring center


38


. This arrangement is shown in FIG.


6


. Further, the monitoring center


38


may be connected to the SCU


14




a


by the communications channel


36


. The SCU


14




a


serves as a primary SCU and is connected to the SCU


14




b,


which serves as a secondary SCU, by a connection


180


.





FIGS. 7

illustrates the situation where two or more SCU's


14




a


and


14




b


are located at the site


12


and the monitoring center


38


is at a remote location. The SCU's


14




a


and


14




b


can be remotely operated or controlled from the monitoring center


38


over the communications channel


36


. Again, the SCU


14




a


serves as the primary SCU and the SCU


14




b


serves as the secondary SCU. The SCU's


14




a


and


14




b


are connected via the connection


180


. An example of two different facilities


12




a


and


12




b


being monitored by a single remote monitoring center


38


is shown in FIG.


8


. The monitoring center


38


is connected to each of the facilities


12




a


and


12




b


via communications channels


36




a


and


36




b,


respectively. Within each of the facilities


12




a


and


12




b


are SCU's


14




a


and


14




b.


In this manner, a single remote monitoring center


38


can monitor and control the site control units


14




a


and


14




b


in different facilities


12




a


and


12




b.


As can be appreciated, there are various other configurations of the integrated security system


10


which are possible and contemplated.




With reference now to

FIG. 9

, a block diagram of the site control unit


14


is shown. The site control unit


14


comprises an SCU controller


200


which is connected to an image processor


202


and a video processor


204


. Both of these processors


202


and


204


are disclosed in U.S. Pat. Nos. 6,069,655 and 6,097,429, which such disclosures being incorporated herein by these references. The controller


200


is further connected to a PTZ controller


206


and a MUX controller


208


. In this manner, video signals or images may be received by the controller


200


from any of the cameras


108


-


118


or C located at a facility


12


and control signals may be sent to the cameras C or the PTZ controller


124


. The SCU controller


200


is also connected to an audio interface


210


and an audio processor


212


. This allows the controller


200


to send signals to the speakers S or receive signals from the microphones M. An interface device communications device


214


is connected to the controller


200


which allows the controller


200


to communicate with the interface devices


146


. As has been discussed, the interface devices


146


are connected to various components such as the door latch


140


, the lights


142


, the siren


144


, the card reader


150


, the fingerprint reader


152


, the PIR


154


, the magnetic contact


156


, and the stolen property detector


158


.




The controller


200


further comprises an associated database


216


. The database


216


may be used to store information related to user IDs, access control numbers, times of operation, entry and exit delays, allowed personnel for access and control of the functions of the system


10


, the location of the sensors S


1


-S


4


, lights L


1


, actuators L


2


, access control panels A


1


, cameras C, speakers S, and microphones M located at a particular facility


12


. The controller


200


also has an SCU/SCU interface


218


for connecting the SCU


14


to one or more other SCU's


14


. For example, the SCU


14


may serve as the primary SCU within the facility


12


and the interface


218


is used for sending and receiving signals from one or more other SCU's


14


at the facility. As discussed above, these other SCU's


14


serve as secondary SCU's.




The controller


200


is also capable of transmitting and receiving information over the connection


32


through the CTE


34


. The CTE


34


is in turn connected to the communications channel


36


, although such connection is not illustrated in FIG.


9


. The CTE


2




52


is connected to the SCU controller


200


via the connection


56


. In case the channel


36


is broken, interrupted, or otherwise impaired, the controller


200


is connected to the monitoring center


38


via the CTE


2




52


and the communications channel


50


. A power supply


220


is provided as part of the SCU


14


and the supply


220


is connected to a standard


120


VAC source.




The SCU controller


200


may take various forms. For purposes of example only, the controller


200


may include a microprocessor based system having memory means, storage means, and other associated circuitry. The controller


200


may be constructed from off the shelf components or such components may be custom made for the specific application. The controller


200


may include a program that controls the various operations of the controller


200


and the SCU


14


. It is also possible that the database


216


may be incorporated into the controller


200


thereby reducing the number of actual components required for the SCU


14


.




In operation, the controller


200


is capable of responding to commands from one of the workstations


48


located at the monitoring center


38


. For example, if the SCU


14


determines that an alarm condition is present, such as one of the sensors S


1


being opened which corresponds to one of the windows W being opened, then a signal is provided to the controller


200


. The controller


200


is programmed to take several actions at this point. One such action would be to check the database


216


to determine the location of the window W. Once the location is determined, the controller


200


can turn on one of the cameras C positioned at that location. The controller


200


can then receive video images from the camera C and send such images to the monitoring center


38


over the communications channel


36


. Further, prior to sending the images, the controller


200


can determine if the intrusion should be a true alarm condition. For example, the initially sensed intrusion may be a cat in the facility


12


which may not pose a security risk. In this situation, the controller


200


can differentiate between human and non-human motion and not submit an alarm signal or indication to the monitoring center


38


. The controller


200


is also capable of sending images from the cameras C to the monitoring center


38


or to the VCR


132


for recording of these images for later use.




It is a particular feature of the controller


200


to process acquired images or video from the cameras C in order to detect an actual intrusion onto the facility


12


and to inform an operator located at the monitoring center


38


of such an event, while not providing false alarms. When an intrusion is detected by the controller


200


, a wide bandwidth communications channel


36


is established between the controller


200


and the monitoring center


36


for transmission of full resolution snapshots or compressed video images of the intrusion for viewing at the monitoring center


36


. The operator, at one of the workstations


48


, can select snapshots for viewing and can create a mosaic of snapshots for review. The snapshots or the video images may be stored for later use and review.




There are a number of other features concerning the SCU


14


that are important for the overall operation and performance of the integrated security system


10


. First, while the SCU


14


is normally powered from the standard


120


VAC supplied to the facility


12


, the SCU


14


is also connected to an uninterrupted power supply (UPS). The UPS (not shown) maintains power to the SCU


14


for prolonged periods of time if there is a power failure, thus enabling the SCU


14


to fully perform its operations. Second, to ensure that the video input to the SCU


14


has not been tampered with, the SCU


14


performs a self-check procedure to verify that a video signal is present, that there is content from the scene being observed, and that the source is from the desired camera. Third, the SCU's


14


utilized a substantial amount of software, the SCU's


14


are designed to facilitate remote upgrading and updating of its software from the monitoring center


38


. With the SCU's


14


being remotely located over a wide territory, it would be cumbersome to individually access each SCU


14


to upgrade or update the different software employed by the SCU


14


. The monitoring center


38


can provide the upgraded or updated software over the communications channel


36


.




The cameras


108


-


118


and C are preferably television cameras. It will be appreciated by those skilled in the art that the cameras


108


-


118


may be black and white cameras, color cameras, or a combination of both may be used in the facility


12


. The cameras


108


-


118


may conform to an analog television format standard such as the RS


170


or CCIR standards, or the camera input may be digital. Depending upon the area where the cameras


108


-


118


are located and positioned, some or all of the cameras


108


-


118


may be low light cameras. The cameras


108


-


118


also do not need to operate in the visible portion of the light spectrum. The cameras


108


-


118


may include IR (infrared) cameras or UV (ultra violet) cameras depending upon the application. The image provided from the cameras


108


-


118


may be created from the RF (radio frequency) portion of the spectrum in which instance such cameras may be high resolution SAR images, or an acoustic image can be produced from the acoustic portion of the spectrum. It will be understood that while an installation will typically employ only one type of camera


108


-


118


(black and white or color TV cameras, for example), the SCU


14


can process images created from a combination of all of the cameras


108


-


118


or image sensors discussed above and employed at the same time in the facility


12


. As use of the facility


12


changes, for example warehouse space is changed to office space, one type camera can be replaced with another type camera without effecting the overall performance of the SCU


14


.




What has been described is an integrated security system


10


which is used to monitor and control various video functions, alarm functions, and access control functions located at a facility


12


. A monitoring center


38


may be positioned or located either locally or remote from the facility


12


. The integrated security system


10


also comprises a site control unit


14


and any facility


12


being monitored may include one or more site control units


14


. The site control unit


14


can accommodate a plurality of cameras C which can be color, black and white, and analog or digital. The cameras C have pan, tilt, and zoom capabilities and the cameras C also have high resolution video. Audio acquisition can also be employed at the facility


12


and acquired audio is interleaved with processed video to provide a system operator both visual and audio monitoring capabilities.




Monitoring of status of the integrated security system


10


includes determining whether the sensors are functioning properly may be handled or performed by the SCU


14


. In this manner, the status of the integrated system


10


is constantly being monitored without intervention from the monitoring center


38


. In the event of a component or sensor failure, any of the cameras C may be armed to cover the location of the failed device.




From all that has been said, it will be clear that there has been shown and described herein an integrated security system which fulfills the various objects and advantages sought therefor. It will be apparent to those skilled in the art, however, that many changes, modifications, variations, and other uses and applications of the subject integrated security system possible and contemplated. All changes, modifications, variations, and other uses and applications which do not depart from the spirit and scope of the invention are deemed to be covered by the invention, which is limited only by the claims which follow.



Claims
  • 1. An integrated security system for managing the security of a premises to detect an intrusion onto the premises comprising:visual means for visually monitoring the premises and for providing a video signal indicative of an intrusion; alarm means for determining whether an intrusion onto the premises has occurred, the alarm means providing a signal indicative of an intrusion; access control means for providing authorized access onto the premises, the access control means providing a signal indicative of an unauthorized access; processing means interconnected with the visual means, the alarm means, and the access control means, the processing means producing a signal indicative of an intrusion onto the premises in response to receiving a signal from the visual means, the alarm means, or the access control means; and monitoring means connected to the processing means for receiving the signal indicative of an intrusion onto the premises, the monitoring means comprising a workstation having a video display means capable of displaying the video signal, and further comprising a database which provides non-video data corresponding to the video signal being displayed by the video display means.
  • 2. The integrated security system of claim 1 wherein the processing means comprises control means for controlling operation of the visual means, the alarm means, and the access control means.
  • 3. The integrated security system of claim 2 wherein the monitoring means is capable of accessing the control means to control operation of the visual means, the alarm means, and the access control means.
  • 4. The integrated security system of claim 1 wherein the processing means comprises means for checking the status of the visual means, the alarm means, and the access control means.
  • 5. The integrated security system of claim 1 wherein the processing means comprises means for storing information corresponding to user IDs, access control numbers, times of operation, entry and exit delays, allowed personnel for access and control of the functions of the system, the location of the visual means, the alarm means, and the access control means in the premises.
  • 6. The integrated security system of claim 1 wherein the processing means comprises a storing means for storing data corresponding to user IDs, access control numbers, times of operation, entry and exit delays, allowed personnel for access and control of the functions of the system, the location of the visual means, the alarm means, and the access control means in the premises and the monitoring means comprises means for updating the data in the storing means.
  • 7. The integrated security system of claim 1 further comprising a first communications channel connected between the processing means and the monitoring means for transmitting and receiving signals to and from the processing means and the monitoring means.
  • 8. The integrated security system of claim 7 comprising a second communications channel connected between the processing means and the monitoring means for transmitting and receiving signals to and from the processing means and the monitoring means.
  • 9. The integrated security system of claim 8 wherein the second communications channel is used whenever the first communications channel is not available.
  • 10. The integrated security system of claim 1 wherein the processing means further comprises control means, the control means determining whether a signal indicative of an intrusion has been received from the alarm means, and once received, the control means controlling operation of the visual means for verifying an intrusion.
  • 11. The integrated security system of claim 10 wherein the control means further comprises means for controlling operation of the access control means.
  • 12. The integrated security system of claim 1 further comprising a common, local data entry device for arming and disarming the alarm means.
US Referenced Citations (17)
Number Name Date Kind
4006460 Hewitt et al. Feb 1977 A
4308911 Mandl Jan 1982 A
4511886 Rodriguez Apr 1985 A
4532507 Edson et al. Jul 1985 A
4651143 Yamanaka Mar 1987 A
4750197 Denekamp et al. Jun 1988 A
4857912 Everett, Jr. et al. Aug 1989 A
5461372 Busak et al. Oct 1995 A
5479148 Umemoto Dec 1995 A
5936666 Davis Aug 1999 A
5937092 Wootton et al. Aug 1999 A
6026165 Marino et al. Feb 2000 A
6060994 Chen May 2000 A
6091771 Seeley et al. Jul 2000 A
6097429 Seeley et al. Aug 2000 A
6163257 Tracy Dec 2000 A
6275172 Curtis et al. Aug 2001 B1