The technology described herein relates to the field of discrete or covert surveillance-communication devices and systems, and more particularly to such discrete devices and systems that include at least one miniature video surveillance camera and alerting-communication assemblies hidden in objects resembling office, commercial or household devices.
Surveillance products incorporating miniature cameras have proliferated in recent years. Miniature cameras can now be hidden in numerous locations such as in pocketbooks, behind walls, in ceilings and within ordinary objects. Many industries today use hidden cameras as an additional security measure in order to protect their inventory, premises and customers. For instance, financial institutions such as banks use hidden surveillance cameras to offer additional protection to their customers and to help guard against theft. Hidden video cameras are also being used more frequently in the home for the protection of children and personal property.
While it is oftentimes desirable to mount surveillance or closed circuit cameras in visible locations to create awareness that an area is being observed, it is also desirable in many situations to use hidden or discrete surveillance cameras. Such discrete surveillance cameras can be located almost anywhere in a room, e.g., in a speaker, in an exit sign, in the ceiling, in a smoke detector. In addition to discrete surveillance, additional alerting and/or communication capabilities are also needed.
Tragic events have created an increasing need for enhancing security within a classroom and at other places where people gather. Post-analysis of these events suggest that the incidents may have been resolved sooner if authorities had real-time intelligence regarding the specific whereabouts of assailants and their hostages or victims. In addition lives could have been saved if those in the advancing path of assailants could have been forewarned; allowing them to lock or barricade their areas, or to escape.
To provide improved safety and security to both students and staff in educational and other public settings, two discrete methods must be simultaneously employed:
1) Provide covert means for remote audio and visual monitoring of areas/rooms which may be proximal to the occurrence of a security event in real-time, and
2) Provide means by which visual alerts and audio/voice commands may be transmitted and annunciated from a central control facility into affected classrooms/areas.
To be effective, these in-situ devices/systems should be positioned at the front of a classroom, or at a position offering direct exposure and advantageous access to the population. To be covert, these facilities must be integrated into common-place fixtures that the population would not feel uncomfortable about, or that a terrorist would not suspect is being used to monitor his activities.
There is a long standing need to provide an integrated solution to the problems and situations described above. Past attempts at solutions by others include cobbled together obvious systems involving closed-circuit Television (CCTV) Cameras, public address speakers, and intercom systems that require persons to stand by the microphone/speaker panel and hold a button to communicate, which is not very practical during an emergency or terror attack.
U.S. patents directed to covert surveillance include the following:
While this patent and other previous methods have attempted to solve the problems that they addressed, none have utilized or disclosed a multi-alerting and communication security platform and system, as do embodiments of the technology described herein.
Therefore, a need exists for a solution to the above problems. The attributes and functionalities of the technology described herein provide this solution. The security platform and system according to embodiments of the invention substantially departs from the conventional concepts and designs of the prior art. It can be appreciated that there exists a continuing need for a new and improved security platform and system which can be used commercially. In this regard, the technology described herein substantially fulfills these objectives.
The foregoing information reflects the state of the art of which the inventors are aware and is tendered with a view toward discharging the inventors' acknowledged duty of candor in disclosing information that may be pertinent to the patentability of the technology described herein. It is respectfully stipulated, however, that the foregoing information do not teach or render obvious, singly or when considered in combination, the inventors' claimed invention.
The general purpose of the technology described herein, which will be described subsequently in greater detail, is to provide a security platform directed to a multi-alerting and communication security device disguised as a wall clock and a corresponding support system thereof.
The technology described herein pertains to a device having the appearance of a clock, e.g. a wall clock, for use in a classroom and other group settings that includes and implements safety and security functions in addition to the standard timekeeping application of such clocks. The clock face may be an analog or digital type. Bidirectional communication between the clock and a central monitoring and control facility is accomplished using computer networking infrastructure and protocols. This integrated system provides means to covertly monitor (audio and video) the area of installation from a remote location, and to provide audio and visual communications from a central control site (security office) into the crisis area.
In one aspect the technology described herein integrates elements to comprise a comprehensive in-situ security platform within an enclosure whose outward appearance would suggest nothing more than a common wall clock. This platform enables covert surveillance of the monitored area during crisis incidents, such as a terrorist attack. Concealment of its capabilities would make it unlikely that terrorists would target the platform for destruction. In this embodiment the clock device may be either an analog or digital clock and is ordinary in appearance to an outside observer. This clock device may be synchronized to a master clock whose accuracy is traceable to the National Institute of Standards and Technology (NIST), using wired or wireless infrastructure common to computer networks and communication protocols made standard by the Institute of Electrical and Electronics Engineers (IEEE) under their IEEE 802.xx family of specifications. School systems, airports, hospital campuses and factories all rely upon synchronized clock systems to ensure the accuracy of timekeeping and proper synchronization with other time-related systems (security, payroll, etc.).
A video capturing element, e.g. a camera, hidden within the clock device is unlikely to attract attention, as opposed to an obvious CCTV camera that a criminal/terrorist/vandal is apt to disable, destroy or steal. Likewise the general populace who may be the subject of surveillance activities will not feel uncomfortable being spied upon as would be the case of when a camera is obvious.
Using digital processes the camera's image can be transmitted to a central monitoring facility using corresponding data communications infrastructure. This approach reduces installation costs since it reduces the need for placing and wiring video cable, video amplifier and switching equipment. In one aspect the security platform may have a image recognition element to recognize selected images, e.g. a weapon.
In addition to the video image, a sound capturing element, e.g. a microphone, hidden within the security platform allows for the monitoring and transmission of speech and other sounds within the surveillance area. The sound may be digitized for transmission to a central monitoring facility. No intercom-type wiring needs to be pulled and installed, since the audio signal is carried over the network protocol. In one aspect the security platform may have a sound recognition element to recognize selected sounds, e.g. gun fire, screams, explosions, which triggers an alert to the central monitoring system.
To facilitate the providing of alerts from the central security facility to personnel in the crisis areas, as well as to provide a means of negotiating with a criminal suspect, the security platform may include an audio transmission element, e.g. a speaker, either internal to the clock or external and in communication with the security platform. In these embodiments security personnel can speak to assailants, hostages, or persons in the path of a crisis and be heard through the speaker. This communication may also be digitized and carried over the network protocol.
In one embodiment a visual alerting element, e.g. one or more strobe lights (which may be integrated within the security platform or may be external and in communication with the security platform) may be activated from the central security office. This element can provide a non-audible alert to protected personnel, which would not be noticed by criminals in nearby, but out-of-site locations. Such an indicator would also be useful to those persons who are hearing-impaired and who cannot respond to the audio messages. The strobe light element may be triggered (turned on or off) by a command from the central security office and carried over the communications infrastructure. The visual alerting element may be comprised of lights of different colors in order to indicate different conditions, e.g. red for danger, yellow for caution, green for return to normal and white for attention. These colors may also be used in conjunction with audio to indicate the approach of adverse weather conditions, e.g. severe thunderstorm, tornado, hurricane.
In one embodiment a motion detector element may be integrated into the security platform. In one aspect this may be implemented through real-time digital analysis of a video camera image or through using established sonar or PIR (Infra-Red) detection methods, thus enabling observers at a central security office to be alerted to activity in the monitored environment and/or to enable the start and stop of automated video image recording, as is typical with security camera operations. The status (active/inactive) of the motion detector output may be transmitted to the central security office over the network communications infrastructure. A motion detect condition may be set to trigger automatic audio/video recording, in a recording device or memory either within the security platform or at the remote central security office.
A single communications cable or wireless signal, e.g. radio or infra-red, may carry all data traffic to and from the in-situ security clock platform.
In one embodiment of the technology described herein sufficient memory, e.g. a compact flash, secure digital module, USB thumb drive, or other suitable permanent or removable format, is included to allow the internal storage of audio and/or video recordings as captured by a microphone and/or camera, and date/time-stamped incident logs as recorded by the microprocessor. These recordings may be forwarded to the central security office via command over the data communications interface, or by manually carrying a removeable media to the central security office where it can be read in a conventional reader device.
In one embodiment of the technology described herein a wireless receiver, e.g., radio, infra-red, within the security platform is capable of receiving a “Panic Alarm” from a person within the monitored area carrying a transmitter, e.g., fob, pendant, or from a wall-mounted, button-activated transmitter; such activation to trigger A/V recording and alerts to the central security office.
In one embodiment of the technology described herein canned messages, stored within memory of the security platform may be triggered by activation of locally attached sensors or by a signal received from the central security office.
In one embodiment of the technology described herein there is provision for attachment of external sensors to the microprocessor of the Security Platform, including, but not limited to, detectors for smoke, fire, CO2, etc.
An aspect of the technology described herein is that it is directed to covert audio and visual monitoring.
Another aspect of the technology described herein is that it is directed to providing alerts and/or instructions to selected areas.
Another aspect of the technology described herein is that it may be economically produced.
These and other features and advantages of the technology described herein will be presented in more detail in the following specification of the invention and the accompanying figures, which illustrate by way of example the principles of the invention.
There are additional features of the invention that will be described hereinafter and which will form the subject matter of the claims appended hereto. In this respect, before explaining at least one embodiment of the invention in detail, it is to be understood that the invention is not limited in its application to the details of construction and to the arrangements of the components set forth in the following description or illustrated in the drawings. The invention is capable of other embodiments and of being practiced and carried out in various ways. Also, it is to be understood that the phraseology and terminology employed herein are for the purpose of description and should not be regarded as limiting.
As such, those skilled in the art will appreciate that the conception, upon which this disclosure is based, may readily be utilized as a basis for the designing of other structures, methods and systems for carrying out the several purposes of the technology described herein. It is important, therefore, that the claims be regarded as including such equivalent constructions insofar as they do not depart from the spirit and scope of the technology described herein.
The technology described herein, together with further advantages thereof, may best be understood by reference to the following description taken in conjunction with the accompanying drawings in which:
The technology described herein will now be described in detail with reference to a few preferred embodiments thereof as illustrated in the accompanying drawings. In the following description, numerous specific details are set forth in order to provide a thorough understanding of the technology described herein. It will be apparent, however, to one skilled in the art, that the technology described herein may be practiced without some or all of these specific details. In other instances, well known operations have not been described in detail so not to unnecessarily obscure the technology described herein.
Referring now to
In an exemplary embodiment a security clock platform 100, 200, 300 involves the following separate subsystems integrated within the enclosure of a common wall clock:
One construction approach for an analog clock embodiment, security platform 100, is as follows:
One construction approach for an digital clock embodiment, security platform 200, is as follows:
Whether the invention is realized through an analog or a digital clock configuration, the flow of data, e.g., audio and video Signals, status information and controls, between the external interface (to/from a remote security office 500) and the various sub-systems that comprise the security platform is controlled by firmware executing on the uP/uC component of the security platform. This firmware serves as arbiter of data traffic and accomplishes its mission through the execution of communication protocols individualized and conventional for each of the devices and sub-systems to which it is connected by the electronic hardware.
The firmware may be resident within non-volatile memory components of the circuit board, or may be down-loaded from the central security office or other remote server through the network interface into protected volatile memory components of the electronic system. This capability would allow remote upgrades of system performance or capability to be down-loaded into the device.
From the foregoing, it will be appreciated that, although specific embodiments of the invention have been described herein for purposes of illustration, various modifications may be made without deviating from the spirit and scope of the invention. For example, many of the features and components described above in the context of a particular security platform and system configuration can be incorporated into other configurations in accordance with other embodiments of the invention. Accordingly, the invention is not limited except by the appended claims.