The present disclosure pertains generally to installing intrusion sensors and more particularly to systems and methods for guiding intrusion sensor installation.
A variety of different buildings have security systems that monitor for indications of intrusion, fire and other undesirable events. When installing the myriad of sensors that may be included in a security system within a large facility, the installer may not know exactly what areas might be covered by the detection pattern of a particular sensor. Moreover, each type and model of sensor may have a detection pattern that is unique to that particular type and/or model of sensor. For example, and with respect to intrusion sensors, there are a variety of brands and models of motion detection sensors. There are a variety of brands and models of glass break detection sensors. It can be difficult for the installer to know the exact detection patterns of each intrusion sensor they are installing, and thus the installer may not recognize whether the installed intrusion sensors provide adequate coverage for a particular building space, or whether there are gaps in the coverage, known as blind spots. A need remains for a system for helping an installer to more efficiently install security sensors such as intrusion sensors within a security system.
This disclosure relates generally to installing security sensors such as intrusion sensors within a security system. As an example, a method includes displaying on a display a representation of a building space. A user is allowed to enter a user input via a user interface in order to place a representation of each of a plurality of intrusion sensors at a location on the representation of the building space that corresponds to an actual or planned installation location of the corresponding intrusion sensor in the building space, each of the plurality of intrusion sensors being a non-video based motion sensor and/or a glass break sensor and each having a predefined detection zone representative of a geographic area that the corresponding intrusion sensor covers. The representation of a building space and the placement location of each of the plurality of intrusion sensors is stored. A visual representation of the predefined detection zone for each of the placed intrusion sensors is displayed on the representation of the building space.
As another example, a non-transient, computer-readable storage medium has instruction stored on the storage medium. When the instructions are executed by one or more processors of a mobile devices, the one or more processors are caused to display a representation of a building space on a display of the mobile device. The one or more processors are caused to allow a user, via a user interface of the mobile device, to place a representation of each of a plurality of intrusion sensors at a location on the representation of the building space that corresponds to an actual or planned installation location of the corresponding intrusion sensor in the building space, each of the plurality of intrusion sensors being a non-video based motion sensor and/or a glass break sensor and each having a predefined detection zone representative of a geographic area that the corresponding intrusion sensor covers. The one or more processors are caused to display on the display of the mobile device a visual representation of the predefined detection zone for each of the placed intrusion sensors on the representation of the building space.
As another example, a system includes a memory for storing a representation of a building space, a user interface including a display, and a controller that is operably coupled to the memory and the user interface. The controller is configured to display on the display of the user interface at least part of the representation of the building space, and to allow a user to place via the user interface a representation of each of a plurality of intrusion sensors at a location on the representation of the building space that corresponds to an actual or planned installation location of the corresponding intrusion sensor in the building space, each of the plurality of intrusion sensors being a non-video based motion sensor and/or a glass break sensor and each having a predefined detection zone representative of a geographic area that the corresponding intrusion sensor covers. The controller is configured to display on the display a visual representation of the predefined detection zone for each of the placed intrusion sensors on the representation of the building space.
As another example, a mobile device is used to plan installation of a plurality of intrusion sensors within a building space, the mobile device including a user interface including a display, each of the plurality of intrusion sensors having a detection pattern that is unique to each intrusion sensor. A representation of the building space is displayed on a display of the mobile device. A plurality of intrusion sensors that were or will be installed within the building space are displayed on the display of the mobile device and an installer is allowed to drag and drop each displayed intrusion sensor to a location on the representation of the building space that corresponds to an actual or planned installation location of that intrusion sensor in the building space. A detection pattern for each of the intrusion sensors that were dragged and dropped onto the representation of the building space is superimposed on the representation of the building space displayed on the display of the mobile device. Blind spots are determined by detecting portions of the building space that are not reached by the detection patterns of each of the intrusion sensors. The determined blind spots are superimposed onto the representation of the building space that is displayed on the display of the mobile device.
As another example, a mobile device may be used in a method of planning installation of a plurality of intrusion sensors within a building space, the mobile device including a user interface including a display, each of the plurality of intrusion sensors having a detection pattern that is unique to each intrusion sensor. An installer is allowed to drag and drop each of a plurality of intrusion sensors onto a representation of the building space that corresponds to an installation location of that intrusion sensor in the building space. A three-dimensional detection pattern for each of the intrusion sensors is downloaded from a cloud-based database. Each of the three-dimensional detection patterns are compared with a three-dimensional volumetric representation of the building space in order to evaluate for blind spots. The detection patterns and the blind spots are displayed on the representation of the building space.
The preceding summary is provided to facilitate an understanding of some of the features of the present disclosure and is not intended to be a full description. A full appreciation of the disclosure can be gained by taking the entire specification, claims, drawings, and abstract as a whole.
The disclosure may be more completely understood in consideration of the following description of various illustrative embodiments of the disclosure in connection with the accompanying drawings, in which:
While the disclosure is amenable to various modifications and alternative forms, specifics thereof have been shown by way of example in the drawings and will be described in detail. It should be understood, however, that the intention is not to limit aspects of the disclosure to the particular illustrative embodiments described. On the contrary, the intention is to cover all modifications, equivalents, and alternatives falling within the spirit and scope of the disclosure.
The following description should be read with reference to the drawings wherein like reference numerals indicate like elements. The drawings, which are not necessarily to scale, are not intended to limit the scope of the disclosure. In some of the figures, elements not believed necessary to an understanding of relationships among illustrated components may have been omitted for clarity.
All numbers are herein assumed to be modified by the term “about”, unless the content clearly dictates otherwise. The recitation of numerical ranges by endpoints includes all numbers subsumed within that range (e.g., 1 to 5 includes 1, 1.5, 2, 2.75, 3, 3.80, 4, and 5).
As used in this specification and the appended claims, the singular forms “a”, “an”, and “the” include the plural referents unless the content clearly dictates otherwise. As used in this specification and the appended claims, the term “or” is generally employed in its sense including “and/or” unless the content clearly dictates otherwise.
It is noted that references in the specification to “an embodiment”, “some embodiments”, “other embodiments”, etc., indicate that the embodiment described may include a particular feature, structure, or characteristic, but every embodiment may not necessarily include the particular feature, structure, or characteristic. Moreover, such phrases are not necessarily referring to the same embodiment. Further, when a particular feature, structure, or characteristic is described in connection with an embodiment, it is contemplated that the feature, structure, or characteristic may be applied to other embodiments whether or not explicitly described unless clearly stated to the contrary.
The installer 12 may capture or otherwise obtain a representation of the building space 10. This may include downloading a representation of the building space 10. This may include using a camera built into the mobile device 16 to take a picture or video of the building space 10. The mobile device 16 may be configured to allow the installer 12 to indicate a proposed or actual installation location for each of the sensors 14, such as by superimposing a representation of each of the sensors 14 at a corresponding location on the representation of the building space that corresponds to the actual or planned installation location of the corresponding intrusion sensor in the building space 10. The mobile device 16 may obtain or be programmed with information describing the detection pattern for each sensor 14, and may compare the detection patterns for each sensor 14 with a volumetric representation of the building space 10 in order to ascertain where gaps in sensor coverage exist. This allows the installer 12 to see the impact of the proposed installation location of each of the sensors 14, and thus allows the installer 12 to change the proposed installation location, or to move one or more already installed sensors 14, in order to reduce or even eliminate undesirable blind spots in sensor coverage.
In some cases, the mobile device 16 may communicate wirelessly with a cloud-based server 18. In some instances, the mobile device 16 may rely upon information stored by the cloud-based server 18 that describes the detection pattern of each of a number of different brands of sensors 14 and for each of a variety of different models (within a particular brand) of sensors 14. In some instances, the mobile device 16 may analyze the detection patterns and determine where there may be gaps in sensor coverage. In some cases, the cloud-based server 18 may receive from the mobile device 16 a representation of the building space 10 and/or placement locations of the sensors 14, and the cloud-based server 18 may utilize the detection patterns to ascertain where the gaps in sensor coverage may exist. The cloud-based server 18 may then provide to the mobile device 16 the representation of the building space 10 with the detection patterns of each sensor 14 superimposed onto the representation of the building space 10 and possible blind spots identified. It is contemplated that the mobile device 16 may perform all of the processing, the cloud-based server 18 may perform all of the processing, or the mobile device 16 and the cloud-based server 18 may each perform some of the processing. These are just examples, and it is contemplated that any suitable hardware implementation may be used.
In some cases, an example detection pattern for a Passive InfraRed (PIR) sensor may have a detection range of about 20 feet extending outwardly from the PIR sensor. In some cases, a PIR sensor may have a horizontal detection range that is about minus 45 degrees to about positive 45 degrees and a vertical detection range that is about minus 15 degrees to about positive 15 degrees, although some PIR sensors have a “look down” feature that expands the vertical detection range. Thus, the detection pattern for a PIR sensor may be considered as an expanding three-dimensional cone. A glass break sensor may have a range of about 25 feet in any direction, as long as there aren't obstructions that would get in the way. Other sensors may have different detection patterns.
The system 20 includes a memory 22 for storing a representation of the building space 10. The representation may be a floor plan, for example, or a photo of the building space 10. The representation may be a two-dimensional image of the building space 10, although in some cases the representation is a three-dimensional image of the building space 10. In some cases, the representation may be or may be extracted from a Building Information Model (BIM) of the building space 10.
The illustrative system 20 includes a user interface 24 that includes a display 26. A controller 28 is operably coupled to the memory 22 and to the user interface 24. The user interface 24 may include a representation of a keyboard, such as on a touch screen display, in which the case the touch screen display is the display 26.
The controller 28 is configured to display on the display 26 of the user interface 24 at least part of the representation of the building space 10. The controller 28 is configured to allow a user to place via the user interface 24 a representation of each of a plurality of intrusion sensors 14 at a location on the representation of the building space 10 that corresponds to an actual or planned installation location of the corresponding intrusion sensor 14 in the building space 10. Each of the plurality of intrusion sensors 14 may be a non-video based motion sensor and/or a glass break sensor and each may have a predefined detection zone representative of a geographic area that the corresponding intrusion sensor covers. For example, a non-video based motion sensor may include a Passive Infrared (PIR) motion sensor, an ultrasonic based motion sensor and/or a microwave based motion sensor (e.g. mm-wave radar). A non-video based glass break sensor may include a microphone and one or more electronic filters that are configured to identity sound patterns that match breaking glass. These are just examples. Smoke detectors may have a detection zone, and placement of smoke detectors may be aided in a similar manner. The controller 28 is configured to display on the display 26 a visual representation of the predefined detection zone for each of the placed intrusion sensors 14 on the representation of the building space 10. An example of this is shown in
In some instances, the controller 28 is further configured to determine one or more blind spots in the building space 10 that are not covered by any of the predefined detection zones of the placed intrusion sensors 14 and to highlight on the representation of the building space 10 one or more of the blind spots on the representation of the building space 10. In some instances, the building space 10 may have a first security zone with a first security level and a second security zone with a second security level, wherein highlighting one or more of the blind spots on the representation of the building space 10 includes highlighting the blind spots that correspond to the first security zone in a first format and highlighting the blind spot that corresponds to the second security zone in a second format. For example, in some cases, the blind spots in low security zones of the building space 10 are shown in phantom or not shown at all, while blind spots in high security zones may be shown in red.
In some cases, the controller 28 (or server 18) is configured to identify a region in the building space 10 where the predefined detection zones of two or more intrusion sensors overlap, and to group the corresponding placed intrusion sensors into a first group. During operation of the security system, the controller 28 (or server 18) may be configured to monitor an output of each of the intrusion sensors for detected intrusion events and to assign a greater confidence level over a default confidence level to those detected intrusion events that are detected to be occurring at a common time by two or more of the intrusion sensors in the first group.
Alternatively, or in addition, the controller 28 (or server 18) may be configured to identify a region in the building space 10 where the predefined detection zones of two or more intrusion sensors overlap in an overlap region, and group the corresponding placed intrusion sensors into a first group. During operation, the controller 28 (or server 18) may be configured to monitor an output of each of the intrusion sensors for detected intrusion events and to identify a location of an object in the building space 10 to be in the overlap region when detected intrusion events are detected to be occurring at a common time by two or more of the intrusion sensors 14 in the first group. This may help localize the detected intrusion event I the building space 10.
In some cases, the plurality of intrusion sensors include non-video based motion sensors such as but not limited to Passive InfraRed (PIR) motion detectors and/or ultrasonic motion detection sensors. The plurality of intrusion sensors may include a glass break detector. In some cases, the predefined detection zone representative of a geographic area of at least one of the plurality of intrusion sensors may include a three dimensional cone with a particular cone length and a particular cone angle.
The method 40 includes determining one or more blind spots in the building space that are not covered by any of the predefined detection zones of the placed intrusion sensors, as indicated at block 50. The one or more blind spots are highlighted on the representation of the building space, as indicated at block 52. In some instances, the building space may have a first security zone with a first security level and a second security zone with a second security level, and highlighting one or more of the blind spots on the representation of the building space may include highlighting the blind spots that correspond to the first security zone and not highlighting the blind spot that corresponds to the second security zone. In some instances, the building space has a first security zone with a first security level and a second security zone with a second security level, and highlighting one or more of the blind spots on the representation of the building space may include highlighting the blind spots that correspond to the first security zone in a first format and highlighting the blind spot that corresponds to the second security zone in a second format. The first format may include a first color, for example, and the second format may include a second color that is different from the first color.
A region in the building space where the predefined detection zones of two or more intrusion sensors overlap may be identified, and the corresponding placed intrusion sensors may be grouped into a first group, as indicated at block 64. Subsequent to installation, and during operation of the security system, an output of each of the intrusion sensors may be monitored for detected intrusion events, as indicated at block 66. A greater confidence level over a default confidence level may be assigned to detected intrusion events that are detected to be occurring at a common time by two or more of the intrusion sensors in the first group, as indicated at block 68.
A region in the building space where the predefined detection zones of two or more intrusion sensors overlap in an overlap region is identified, and the corresponding placed intrusion sensors are grouped into a first group, as indicated at block 80. Subsequent to installation and during operation of the security system, an output of each of the intrusion sensors is monitored for detected intrusion events, as indicated at block 82. A location of an object in the building space is identified as being in the overlap region when detected intrusion events are detected to be occurring at a common time by two or more of the intrusion sensors in the first group, as indicated at block 84.
In some cases, the one or more processors are caused to identify one or more blind spots in the building space that are not covered by any of the predefined detection zones of the placed intrusion sensors, as indicated at block 94. The one or more processors may be caused to highlight on the representation of the building space one or more of the blind spots on the representation of the building space, as indicated at block 96. In some cases, the building space has a first security zone with a first security level and a second security zone with a second security level, and highlighting one or more of the blind spots on the representation of the building space may include highlighting the blind spots that correspond to the first security zone in a first format and highlighting the blind spot that corresponds to the second security zone in a second format. In some cases, the predefined detection zone representative of a geographic area of at least one of the plurality of intrusion sensors may include a three-dimensional cone with a particular cone length and a particular cone angle.
A plurality of intrusion sensors that were or will be installed within the building space are displayed on the display of the mobile device, as indicated at block 104. An installer is allowed to drag and drop each displayed intrusion sensor to a location on the representation of the building space that corresponds to an actual or planned installation location of that intrusion sensor in the building space, as indicated at block 106. An identify of each of the intrusion sensors that were or will be installed within the building space may be received from the installer. For example, the identity of each of the intrusion sensors may be received via the user interface of the mobile device. In some cases, the identify of each of the intrusions sensors may be received by scanning a code such as a QR code or a barcode on each of the intrusions sensors using a camera of the mobile device. A detection pattern for each of the intrusion sensors that were dragged and dropped onto the representation of the building space is determined and then superimposed on the representation of the building space displayed on the display of the mobile device, as indicated at block 108. In some cases, the detection patterns for each of the intrusion sensors may be looked up in a cloud-based server, but this is not required.
Blind spots are determined by detecting portions of the building space that are not covered or otherwise reached by the detection patterns of each of the intrusion sensors, as indicated at block 110. The determined blind spots are superimposed onto the representation of the building space that is displayed on the display of the mobile device, as indicated at block 112. In some cases, determining blind spots may be determined by one or more processors of the mobile device. In some cases, determining blind spots may be determined by one or more processors of a remote server (or other hardware device) that is in communication with the mobile device. In some cases, the method 100 may include finding areas in which the detection pattern of two or more intrusion sensors overlap, and a greater confidence level may be assigned to sensor alarms that are triggered within an overlap area.
In some cases, each blind spot may be evaluated in accordance with a security level assigned to a particular area of the building space. For blind spots within an area with a low security level assigned to it, displaying the blind spots may be displayed in a first color and blind spots within an area with a high security level assigned to it, may be displayed the blind spots in a second color.
In some cases, the mobile device, remote server and/or other hardware device may automatically suggest to the installer a placement location and in some cases a sensor brand/model for one or more new sensors and/or modified installation locations for existing sensors to reduce undesirable blinds spots. This may be done by processing the location and dimensions of the building space, along with the known detection pattern of available intrusion sensors, to produce an optimum selection of intrusion sensor types at optimum placement locations in the building space. This may not only help reduce the time required to install the intrusion sensors, but may also reduce the overall cost of the security system by using less intrusion sensors while achieving a desired coverage.
In some cases, the method 114 may further include finding areas in which the three-dimensional detection pattern of two or more intrusion sensors overlap, as indicated at block 124. During operation of the security system, a greater confidence level may be assigned to sensor alarms that are triggered within an overlap area, as indicated at block 126.
A first detection pattern 146 is superimposed onto the representation 130 and represents the detection pattern of the first motion detector 142. A second detection pattern 148 is superimposed onto the representation 130 and represents the detection pattern of the second motion detector 144. The first detection pattern 146 and the second detection pattern 148 can be seen as three-dimensional cones that each extend outwardly from their corresponding sensor locations. It will be appreciated that the second detection pattern 148 is different than the first detection pattern 146. It will also be appreciated that there is a small overlap area 150 where the first detection pattern 146 overlaps with the second detection pattern 148. By comparing the first detection pattern 146 and the second detection pattern 148 with the open workspace 140, it can be seen that a blind spot 152 exists in the upper left corner of the open workspace 140. While the blind spot 152 is shown as a circular or ovoid graphics icon, it will be appreciated that the blind spot 152 actually extends further into the area not covered by the first detection pattern 146 and/or the second detection pattern 148. A glass break detection sensor 160, labeled GB1, is installed in the open lounge 138. A third detection pattern 156 corresponding to the glass break detection sensor 160 is superimposed on the representation 130.
Those skilled in the art will recognize that the present disclosure may be manifested in a variety of forms other than the specific embodiments described and contemplated herein. Accordingly, departure in form and detail may be made without departing from the scope and spirit of the present disclosure as described in the appended claims.