System of electronic devices to detect and locate changes in a predetermined space for protection and security of places, persons, and goods.
Many place, person, and goods security and protection systems are realized by using of sensors of different types including, for example, thermal sensors, anti-intrusion sensors, chemical sensors, environmental microphones, and cameras. In order to provide the information necessary to protect and secure places, persons, and goods, it is necessary to use the information concerning any changes that occur in the space to be monitored. For example, and for the sake of clearness, a change that occurs in the monitored space might be the opening of a door or the presence of a person in a room who doesn't own an electronic identification paper.
The security and protection systems known so far activate an alarm whenever a change occurs in the space monitored by the security and protection system including, for example, the opening of a door or the appearance of a presence on the video display unit of a camera, which could be interpreted by video-analysis algorithms as an intrusion.
Unfortunately, said systems are not capable of selecting when a change in the monitored space represents a threat for the security and/or protection of that space without generating a high number of false alarms. Specifically, said systems are not capable of correlating to each other the signals coming from a variety of general sensors, i.e. sensors not having special characteristics and currently available on the market, to analyze all changes that could be potentially identified by all general sensors, even of different technologies, which monitor a given portion of the space to be monitored. A number of tests demonstrated that correlating the sensors results in substantially decreasing the number of false alarms, while increasing the selectivity of the protection and security system, by discriminating events pre-qualified by the user as relevant events from those non-relevant.
An accurate location of every individual change in the space represents a fundamental element to correlate the changes detected by the sensors to each other correctly.
Such a lack of selective capability of the security and protection systems known so far is partially counteracted by the adoption of a GPS for the geographical location, for instance, of the foreign body that caused a change in the monitored space.
Unfortunately the adoption of a GPS system has a number of drawbacks:
The drawbacks of the art known so far are overcome by a system of electronic devices for the detection, location, and correlation of changes in a space to be monitored for the protection and the security of that space, persons, and goods present in said space, which will be described below.
The system according to the present invention also identifies further improvements of the place, person, and goods protection and security system, also described below. The system according to the present invention is capable of correlating in an innovative and advantageous manner the changes of the signals coming from the sensors on the basis of criteria related to their coincidence in the space, thus allowing an accurate evaluation of the events and their classification either as relevant or non-relevant events on the basis of security rules pre-set by the user. This characteristic will be more widely illustrated in the description of
The system of electronic devices for the detection and location of changes in a predetermined space for the protection and security of places, persons, and goods according to the present invention is based on an architecture including at least two sensors, a first data processing electronic device, which is the user interface, and at least one second data processing device.
It is here pointed out that by sensor or sensors we mean a sensor or several sensors, as defined above, commonly available on the market, i.e. without any specific characteristics for being used in the frame of the present invention.
Said first data processing device is connected to the second data processing device. In a preferred embodiment, said first device is separate from the remaining components of the system and is preferably a personal computer, a smart phone, a tablet, or a terminal equipped with a user interface.
The second device, more complex than the first device, is equipped with first electronic means that reproduce the place to be monitored in a three-dimensional virtual reality with an appropriate fidelity on the basis of the mentioned place to be monitored. Let's point out that the degree of fidelity according to which the place to be monitored is reproduced in a three-dimensional virtual reality by the first electronic means depends on the monitoring requirements set by the user. For this reason, the words “appropriate fidelity” have been used to illustrate how the first electronic means reproduce the place to be monitored into a three-dimensional virtual reality.
If the place to be monitored is a square, the fidelity degree required to reproduce the square into the three-dimensional virtual reality is lower than in the case when the place to be monitored is a room. In a square the objects and the elements in general to be monitored have a greater dimension with respect to the objects and the elements in general to be monitored in a room: in a square, for instance, cars or persons have to be monitored, whereas in a room, for instance, paintings, vases, papers, persons have to be monitored. The fidelity degree required to reproduce a square into the three-dimensional virtual reality, in the example mentioned above, is lower than that required for the room according to the above mentioned example, the objects and the elements in general to be monitored in the square having greater dimensions than those present in the room.
Said second data processing device is adequately preset:
to acquire from the first device and store the security rules set by the system user for the place to be monitored;
to receive from the sensors data and/or signals, both referred to as “signals” here below;
to three-dimensionally map, continually as time goes by, the changes of the values that represent the signals received from the sensors in the mentioned three-dimensional virtual reality;
to process, for every portion of the three-dimensional virtual reality, all changes of the signals mapped thereon to take out the data suitable for the application of the security rules set by the user for said place to be monitored;
to correlate to each other the changes of the signals received from different sensors and referred to the same portion of space;
to apply the security rules set by the user for said place to be monitored on the basis of the processing of the changes of the mapped signals;
to activate the alarm signals specified by said rules on the first electronic device and/or on other external devices.
As mentioned above, the second data processing device maps the changes of the signals coming from the sensors as time goes by into the three-dimensional virtual reality. Such a mapping is carried out on the basis of: the subdivision of said virtual reality according to a cell-based three-dimensional grid; the association of the three-dimensional grid of every sensor and its respective signals with said cells.
In order to process the signals coming from the sensors appropriately, the second data processing device comprises one or several third data processing devices independent from and intercommunicating with each other. Each of said devices will be referred to as “Agent device” below.
Each Agent device is connected to at least one sensor and is capable of processing the signals of every sensor that it is connected to.
In order to process the signals coming from the sensors adequately, the second data processing device also comprises a fourth data processing device, referred to as Gateway below, capable of: identifying those Agent devices whose sensors have their signals associated with in sets of cells of the three-dimensional grid featuring a non-null intersection, referred to as “correlated Agents” below;
to activate a correlation between said thus identified Agent devices.
Every Agent device is capable of autonomously analyzing the signals coming from the sensors.
From the analysis of the changes of the said signals, every Agent device:
extrapolates the appearance of objects or events;
classifies said objects or events by type;
places said objects or events in the cells of the grid of the virtual reality;
alternatively calculates the probabilities of error or the reliability of correctness of the analysis made, in short referred to as “reliability” below.
By means of said features, every Agent device is capable of continually communicating to the remaining Agent devices correlated thereto its own results of the analysis and its respective reliability.
Therefore, every Agent device is capable of processing the results of the analysis and the reliability received from every correlated Agent together with its own results of the analysis and reliability, to get overall analysis results and an overall reliability. In the system according to the present invention, the overall analysis and the overall reliability are performed by an Agent device automatically identified on the basis of predetermined criteria and said Agent device communicates the results of the overall analysis and the overall reliability to the Gateway. Said communication takes place continually and, likewise, continually is identified, on the basis of the preset criteria, the Agent device that communicates the results of the overall analysis and the overall reliability to the Gateway.
Finally, the Gateway applies the security rules set by the user for said place to be secured and protected on the basis of the mentioned results of overall analysis and overall reliability, by activating the specified notification and/or alarm communications, for instance it activates a visual alarm, for instance a blinking light, or sends a signal to the first data processing device, for instance an audible signal or a message.
A second data processing device (4) is shown in dotted lines. Said second device (4) might be implemented on any hardware suitable for processing data, for instance a server.
The device (4) is connected to the first data processing device (3) and comprises first electronic means (5), not shown in the figure, which reproduce with an appropriate fidelity the place (A) to be monitored, not shown in the figure, into a three-dimensional virtual reality, not shown in the figure. In said second device (4) there are also second electronic means (6), not shown in the figure, capable of acquiring, storing the security rules set by the user for said place (A), receiving from the sensors (2) data and/or signals, three-dimensionally mapping in a continual manner as time goes by in said three-dimensional virtual reality the values that represent the signals coming from the sensors and the changes, processing, for each portion of the three-dimensional virtual reality, all signals mapped thereon to take out the data suitable for the application of the security rules set by the user for said place (A), applying the security rules set by the user for said place (A) on the basis of the processing of the mapped signals and activating the alarm signals specified by it on the first data processing device (3) and/or on other external devices.
The mapping into the three-dimensional virtual reality of the values that represent the signals coming from the sensors (2) as time goes by is performed by the second data processing device (4) on the basis of the subdivision of said virtual reality according to a cell-based three-dimensional grid, of the association with said cells of the three-dimensional grid of every sensor (2) and of its respective signal. Such a mapping is not shown in the figure because of evident difficulties of representation.
Each of said Agent devices (7) is suitable for autonomously analyzing the signals continually coming from the sensors, so as:
Each of said Agent devices (7) is also capable of continually communicating with the remaining Agent devices (7) correlated thereto every change, classification, positioning, all together referred to as “results of the analysis”, and its respective reliability, by processing the results of the analysis made received from every Agent device (7) correlated to its own results of analysis and reliability, all together referred to as “overall analysis and overall reliability”, and of continually communicating to the Gateway device (8), already mentioned in the summary of the invention, the overall analysis and the overall reliability. Said communication is implemented by an agent automatically identified on the basis of predetermined criteria.
The Gateway (8) is also capable of applying the security rules set by the user for said place (A) on the basis of the above defined overall analysis and overall reliability, by activating the notifications or alarms pre-determined by the user.
In the example shown in
As a matter of fact, each of said sensors detected a change and communicated its respective signal to the Agent device (71 or 72) that it is connected to.
Said Agent devices (71 and 72) identify that the appearance of objects or events did take place, in other words there was a change, as defined above in the summary of the invention. The change is positioned with reference to the cells of the virtual reality and is classified: in this example, it would be the presence of one person as shown in the graphical representation of
Number | Name | Date | Kind |
---|---|---|---|
3885090 | Rosenbaum | May 1975 | A |
20020057340 | Fernandez et al. | May 2002 | A1 |
20050035862 | Wildman et al. | Feb 2005 | A1 |
20050207487 | Monroe | Sep 2005 | A1 |
20080218331 | Baillot | Sep 2008 | A1 |
Number | Date | Country |
---|---|---|
WO 2007142777 | Dec 2007 | WO |
WO 2012153805 | Nov 2012 | WO |
Number | Date | Country | |
---|---|---|---|
20150097673 A1 | Apr 2015 | US |