The invention relates to security systems and improving the accuracy of security systems.
A major source of dissatisfaction with home security systems is that motion sensors of the systems are often triggered by pets or members of the household. When false alarms occur, they unnecessarily put people in the home in fear. False alarms sometimes also result in monetary fines being charged to the homeowner or renter, as well as loss of credibility of the homeowner or renter with emergency responders. As a result, some people disable the motion sensors of their security system, thus compromising their own security.
Current techniques for preventing false alarms caused by pets or family members have significant limitations. One known technique for preventing false alarms from being triggered by pets or family members relies on aiming the motion sensors of the security system above the height of pets so that they do not sense the pets' motion as they move around the home. This technique can work suitably for dogs, but can easily be defeated by a crawling intruder, and can be triggered by cats and other animals that climb. Another known technique relies on processing the projected sizes of objects on a sensor to determine whether the objects correspond to pets or intruders. This technique does not work well with large animals or when multiple animals are in close proximity to one another. Also, because the projected size of an object on a sensor will vary depending on how close to or how far away the object is from the sensor, the decisions that are made based on the projected size are not always accurate.
Accordingly, a need exists for way to determine when a security system sensor has sensed pets or family members as opposed to intruders so that the security system alarm is not triggered by pets or family members.
The invention provides a method and an apparatus for improving the accuracy of security systems. The apparatus comprises an input/output (I/O) interface and a processor. The I/O interface is configured to receive object location information from a first object-locating system and from a second object-locating system. The first object-locating system is capable of locating at least cooperative objects. The second object-locating system is capable of locating at least non-cooperative objects. A cooperative object is an object that cooperates with the apparatus by emitting or transmitting at least one signal from a signal emitting or transmitting device that is on or in the cooperative object to the first object-locating system to enable the first object-locating system to locate the cooperative object. A non-cooperative object is an object that is not a cooperative object. The object location information received by the I/O interface from the first object-locating system describes a location of a cooperative object in at least one dimension. The object location information received by the I/O interface from the second object-locating system describes a location of a non-cooperative object in at least one dimension.
The processor is configured to perform an object-type determination (OTD) algorithm, which processes the object location information to determine whether the location of the cooperative object is the same or substantially the same as the location of the non-cooperative object. If the processor determines that the location of the cooperative object is the same or substantially the same as the location of the non-cooperative object, the processor decides that the cooperative object and the non-cooperative object are the same object. If the processor determines that the location of the cooperative object is not the same or substantially the same as the location of the non-cooperative object, the processor decides that the cooperative object and the non-cooperative object are not the same object.
The method comprises receiving object location information from the first object-locating system and from a second object-locating system, and processing the object location information received from the first and second object-locating systems to determine whether or not the location of the cooperative object is the same or at least substantially the same as the location of the non-cooperative object. If a determination is made that the location of the cooperative object is the same or substantially the same as the location of the non-cooperative object, a decision is made that the cooperative object and the non-cooperative object are the same object. If a determination is made that the location of the cooperative object is not the same or substantially the same as the location of the non-cooperative object, a decision is made that the cooperative object and the non-cooperative object are not the same object.
In accordance with an embodiment of the invention, the algorithm is implemented as a computer software program embodied on a computer-readable medium. The program comprises instructions for receiving object location information from the first object-locating system and from a second object-locating system, and instructions for processing the object location information received from the first and second object-locating systems to determine whether or not the location of the cooperative object is the same or at least substantially the same as the location of the non-cooperative object. If it is determined that the location of the cooperative object is the same or substantially the same as the location of the non-cooperative object, then a decision is made that the cooperative object and the non-cooperative object are the same object. If it is determined that the location of the cooperative object is not the same or substantially the same as the location of the non-cooperative object, then it is decided that the cooperative object and the non-cooperative object are not the same object.
These and other features and advantages of the invention will become apparent from the following description, drawings and claims.
The invention is directed to a security system that uses two or more object-locating systems to determine whether a sensed object is a household member or an intruder. Household members include pets and/or human beings living in the home. One of the object-locating systems locates “cooperative” objects, which are household members. These objects are cooperative in that the household members wear or carry a device that communicates with the system to allow the system to determine the locations of the household members. Another of the object-locating systems locates non-cooperative objects, such as intruders, and typically also locates the cooperative objects. When an object is located by the second object-locating system, the security system of the invention determines whether the object location corresponds to a location of a cooperative object as determined by the first object-locating system. If so, the security system decides that the object is a household member and does not trigger the alarm. If not, the security system decides that the object is an intruder and may trigger the alarm. Optionally, the certainty of the decision may also be used to determine what if any action is to be taken. For example, a different type of alarm may be triggered by the system in borderline cases in which it cannot be decided with total certainty whether or not the object is a household member or an intruder.
The first object-locating system 2 may be any type of object-locating system that is capable of locating cooperative objects, which are household members in the exemplary embodiment. It should be noted that the phrase “household member”, as that phrase is used herein, is intended to denote human beings that live in the home, visitors who are allowed by the head of the household to be in the home, household pets, household robots, household appliances, etc.
The second object-locating system 3 may also be any type of object-locating system that is capable of locating non-cooperative objects within the home. A variety of such systems exist and are currently available. These systems include, for example, passive infrared (IR) systems, active IR systems, laser systems, imaging systems, etc. The invention is not limited to any particular system or technique for locating non-cooperative objects. Of course, these systems will typically also locate cooperative objects because the mere fact that an object cooperates with the first object-locating system 2 will not prevent the object from being located by the second object-locating system 3.
Preferably, the first object-locating system 2 uses radio frequency (RF) signals to locate household members. RF signals that uniquely identify a household member are emitted from and/or reflected by the household member and are received by one or more RF receivers installed within the home. The receivers decode the received signal and determine the location of the household member based on the decoded signal. The receivers may be part of respective transceivers.
In this example, the second object-locating system 3 uses an imaging system 18, e.g., a camera, that is capable of locating the cooperative object 19 by capturing one or more images of an object and processing the image or images to determine the location of the object 19. The “location” of an object, as that term is used herein, is intended to mean the position of an object in at least one dimension. As stated above, a variety of systems are available that are capable of determining the location of an object. The location information is then transmitted by the imaging system 18 over a wired or wireless link to the security system 1 of the invention, which may be located in a different room of the house, as shown.
The transceivers 16 and 17 of the first object-locating system 2 may be, for example, RF identification (RFID) transceivers that send RF signals to the cooperative object 19. In this case, the cooperative object 19 is wearing or carrying an RFID device 21 that responds to the RF signals transmitted by the RFID transceivers by outputting an RFID response signal. RFID devices typically do not require a power supply because they obtain their power from the signal received from the RFID transceiver. However, self-powered RFID devices may also be used. The RFID response signal includes a code that uniquely identifies the cooperative object 19. The RFID transceivers 16 and 17 receive the response signal, decode it, process the code, identify the object 19, and determine the location of the object. This location information is then transmitted over one or more electrical wires (not shown) or wirelessly to the security system 1 of the invention.
In accordance with an alternative embodiment, the cooperative object 19 is wearing or carrying an RF transmitter (not shown) instead of an RFID device, and the transceivers 16 and 17 are RF transceivers instead of RFID transceivers. The RF transmitter transmits an RF signal that is received, decoded and processed by the transceivers 16 and 17 to identify the object and determine the location of the object.
As described above with reference to
A variety of RF object locating techniques can be used by the cooperative object-locating system 2 to locate the object 19. Such RF techniques include, but are not limited to, techniques that use the Doppler effect and techniques that use triangulation. Also, while it is preferable for the RF signals to be coded to enable the cooperative object to be uniquely identified, this is not necessary to the successful operation of the invention. For example, in the case in which a single household member is to be located by the object-locating system 2, non-coded RF signals can be used to locate the cooperative object 19. However, for additional security reasons, it is preferred that the RF signal is coded in order to make it more difficult for an intruder to reproduce an RF signal that might fool the security system into making a determination that an intruder is a household member. The cooperative object 19 may be wearing or carrying a battery-powered RF device (not shown) that transmits an RF signal of a particular frequency. The transceivers 16 and 17 may instead be only receivers that receive the RF signals transmitted by the RF device and process the signals in accordance with, for example, a Doppler effect algorithm or a triangulation algorithm, to determine the location of the object.
Another alternative to using RFID techniques is to use a technique by which the cooperative object 19 transmits its own location in the house to the security system 1. For example, Global Positioning Satellite (GPS) technology may be used to locate the cooperative object 19 within the house. The security system 1 will then compare the GPS location information with the location information provided by the second object-locating system 3 and decide whether or not the location information defines the same location within the house.
The processor 30 may be any type of computational device, including, for example, a microprocessor, a microcontroller, a programmable gate array, a programmable logic array, an application specific integrated circuit (ASIC), a system on a chip (SOC), etc. The algorithm 50 is typically implemented as a software computer program executed by the processor 30. The program may be stored in memory device 40, which may be any type of computer-readable medium, including, for example, random access memory (RAM), dynamic RAM (DRAM), flash memory, read only memory (ROM) compact disk ROM (CD-ROM), digital video disks (DVDs), magnetic disks, magnetic tapes, etc. The invention also encompasses electrical, optical and acoustical signals modulated on appropriate carriers (e.g., electrical conductors, wireless carrier waves, optical waveguides, acoustical waveguides, etc.) in packets and in non-packet formats. The algorithm 50 may also be implemented in hardware, or in a combination of hardware and software or firmware.
If the processor 30 determines that the cooperative and the non-cooperative objects are not in the same location, or in substantially the same location, depending on how much tolerance is allowed, the processor 30 outputs a signal to the security system 1, which causes the alarm device 4 to be activated. If the processor 30 determines that the cooperative and the non-cooperative objects are in the same location, or in substantially the same location, the processor 30 may output a signal to the security system 1 to prevent it from activating the alarm device 4. One or the other or both of these actions may be taken by the processor 30, depending on how the security system 1 is configured. For example, it may not be necessary for the processor 30 to output a signal to prevent the alarm device from being activated, but only to output a signal if the alarm device is to be activated, or vice versa.
It should be noted that while the invention has been described as using a single cooperative object locating system 2 and a single non-cooperative object locating system 3, multiple cooperative object locating systems and/or multiple non-cooperative object locating systems could be used. The exemplary embodiments described above are used for the purpose of demonstrating that at least one of each type of system is used. Also, while the invention has been described with reference to its use in a home, the invention applies equally to other environments, such as offices, stores, etc., where after hours only authorized persons are allowed or expected to be on the premises. In addition, while the invention has been described for exemplary purposes as being used inside of a home, the invention may also be used outside of the home.
In accordance with another aspect of the invention, the security system 1 performs an Object-Locating (OL) algorithm that determines whether or not it is able to locate a cooperative object. If, for example, a pet wearing a collar that has an RFID device attached to it leaves the premises, the cooperative object-locating system 2 will no longer be able to detect the pet. The security system 1 will then provide some indication to the head of the household or other responsible person that the pet or the pet's collar cannot be located. This information may be used by the owner of the pet to cause a search for the pet or for the pet's collar to be conducted. The device worn by the cooperative object does not have to be an RFID device, but can be any device capable of transmitting a signal that uniquely identifies the object to the object-locating system 2, such as, for example, other types of devices that transmit coded RF signals, devices that transmit IR signals in a way that uniquely identifies the object, etc. Also, the device worn by the object may transmit periodically or only upon being polled by the object-locating system 2. The OL algorithm may be part of the OTD algorithm 50 described above or it may be a separate algorithm. In either case, the OL algorithm will typically be performed by the apparatus 20 described above with reference to
It should be noted that the invention has been described with reference to particular embodiments and that the invention is not limited to these embodiments. Those skilled in the art will understand, in view of the description provided herein, that variations can be made to the embodiments described herein and that all such variations are within the scope of the invention.
Number | Name | Date | Kind |
---|---|---|---|
6687386 | Ito et al. | Feb 2004 | B1 |
6720876 | Burgess | Apr 2004 | B1 |
7289881 | Ota et al. | Oct 2007 | B2 |
20060138220 | Persky | Jun 2006 | A1 |
20060277202 | Dempsey | Dec 2006 | A1 |
Number | Date | Country | |
---|---|---|---|
20080001738 A1 | Jan 2008 | US |