TRANSMITTING A SECURITY ALERT WHICH INDICATES A LOCATION IN A RECIPIENT'S BUILDING
20230368627 · 2023-11-16
Inventors
Cpc classification
G08B25/005
PHYSICS
G08B25/001
PHYSICS
G08B7/064
PHYSICS
G08B25/006
PHYSICS
International classification
G08B7/06
PHYSICS
G08B13/08
PHYSICS
Abstract
A system is configured to obtain detection data from one or more detector devices (31-36), detect a possible intruder in a first building (51) based on the detection data, determine a location (63) associated with the possible intruder based on the detection data, select a receiver (71) by comparing the location with multiple locations, and obtain building information associated with the receiver. This building information describes a second building (52). The system is further configured to determine, based on the building information and the location of the possible intruder, a location (68) in or around the second building from which the possible intruder is expected to be visible, and transmit a security alert to the receiver. The security alert comprises a request requesting the receiver or a user of the receiver to look at the first building from the location in or around the second building.
Claims
1. A system for transmitting a security alert in response to detecting a possible intruder in a first building, said system comprising: at least one input interface; at least one output interface; and at least one processor configured to: obtain, via said at least one input interface, detection data from one or more detector devices, detect said possible intruder in said first building based on said detection data, determine a location associated with said possible intruder based on said detection data, select a receiver from a plurality of receivers by comparing said location associated with said possible intruder with a plurality of locations associated with said plurality of receivers, obtain building information associated with said receiver, said building information describing a second building, determine, based on said building information and said location of said possible intruder, a location in or around said second building from which said possible intruder is expected to be visible, and transmit, via said at least one output interface, a security alert to said receiver, to be displayed by said receiver or output via speech by said receiver, said security alert comprising location information indicative of said location in or around said second building and instructions requesting a user of said receiver to look at said first building from said location in or around said second building.
2. A system as claimed in claim 1, wherein said at least one processor is configured to select a lighting device from a plurality of lighting devices based on said location of said potential intruder and control, via said at least one output interface, said lighting device to render a light effect, and wherein said request requests said user of said receiver to look in the direction of said light effect.
3. A system as claimed in claim 1, wherein said at least one processor is configured to determine a direction from said location in or around said second building to said location of said possible intruder and include said direction in said security alert, and wherein said request requests said user of said receiver to look in said direction.
4. A system as claimed in claim 1, wherein said at least one processor is configured to select said receiver from said plurality of receivers based on selecting a receiver of a user which has been determined to be at said second building.
5. A system as claimed in claim 1, wherein said at least one processor is configured to select said receiver from said plurality of receivers based on selecting a receiver of which the user is predetermined to be a friend and/or is associated with a previous security alert transmitted and/or has signed up for receiving security alerts and/or is designated, based on a predetermined analysis, as a reliable inspector.
6. A system as claimed in claim 1, wherein said at least one processor is configured to transmit, via said at least one output interface, a further security alert to said receiver at a later time, said further security alert comprising a further request requesting said user of said receiver to go to said first building.
7. A system as claimed in claim 2, wherein said at least one processor is configured to: select a further receiver from said plurality of receivers based on said comparison of said location associated with said possible intruder with said plurality of locations associated with said plurality of receivers, obtain further building information associated with said further receiver, said further building information describing a third building, determine, based on said further building information and said location of said possible intruder, a location in or around said third building from which said possible intruder is expected to be visible, and transmit, via said at least one output interface, a further security alert to said further receiver, said further security alert comprising further location information indicative of said location in or around said third building and a further request requesting a user of said further receiver to look at said first building from said location in or around said third building.
8. A system as claimed in claim 1, wherein said at least one processor is configured to determine said location associated with said possible intruder based on a location of at least one of said one or more detector devices.
9. A system as claimed in claim 1, wherein said at least one processor is configured to determine a risk level based on said detection data and include said risk level in said security alert.
10. A system as claimed in claim 9, wherein said at least one processor is configured to determine from said detection data whether a door or window was forcefully opened and determine said risk level based on whether said door or window was forcefully opened.
11. A system as claimed in claim 1, wherein said at least one processor is configured to: transmit, via said at least one output interface, a message to another receiver, said other receiver being associated with said first building, said message requesting approval for transmitting said security alert to said receiver, and if said approval has been received from said other receiver, transmit said security alert to said receiver.
12. A system as claimed in claim 1, wherein said at least one processor is configured to select said receiver from said plurality of receivers based on activities currently being performed by users of said plurality of receivers.
13. A method of transmitting a security alert in response to detecting a possible intruder in a first building, said method comprising: obtaining, by a processor, via a receiver, detection data from one or more detector devices; detecting, by the processor, said possible intruder in said first building based on said detection data; determining, by the processor, a location associated with said possible intruder based on said detection data; selecting, by the processor, a receiver from a plurality of receivers by comparing said location associated with said possible intruder with a plurality of locations associated with said plurality of receivers; obtaining, by the processor, building information associated with said receiver, said building information describing a second building; determining by the processor, based on said building information and said location of said possible intruder, a location in or around said second building from which said possible intruder is expected to be visible; and transmitting, by the processor, via a transmitter, a security alert to said receiver, to be displayed by said receiver or output via speech by said receiver, said security alert comprising location information indicative of said location in or around said second building and a request requesting a user of said receiver to look at said first building from said location in or around said second building.
14. A computer program product for a computing device, and computing device comprising a receiver, a transmitter, and a processing unit, the computer program product comprising computer program code to perform the method of claim 13 when the computer program product is run on the processing unit of the computing device.
Description
BRIEF DESCRIPTION OF THE DRAWINGS
[0039] These and other aspects of the invention are apparent from and will be further elucidated, by way of example, with reference to the drawings, in which:
[0040]
[0041]
[0042]
[0043]
[0044]
[0045]
[0046]
[0047]
[0048]
[0049] Corresponding elements in the drawings are denoted by the same reference numeral.
DETAILED DESCRIPTION OF THE EMBODIMENTS
[0050]
[0051] If a possible intruder is detected in bedroom 64 of house 51, then this intruder may be visible from the window 69 of the house 53 by a person 72. A security alert may then be transmitted to the mobile device 15 of person 72. If a possible intruder is detected in bedroom 63 of house 51, then this intruder may be visible from the window 69 of the house 53 by person 72 and from the window 68 of the house 52 by person 71. A security alert may then be transmitted to the mobile device 15 of person 72 and the mobile device 14 of person 71.
[0052]
[0053] The computer 1 comprises a receiver 3, a transmitter 4, a processor 5, and storage means 7. The processor 5 is configured to obtain, via the receiver 3, detection data from the detector devices 31-36, detect the possible intruder in the first building based on the detection data, and determine a location associated with the possible intruder based on the detection data. The processor 5 may be configured to determine the location associated with the possible intruder based on a location of at least one of the one or more detector devices 31-36, for example.
[0054] The processor 5 is further configured to select a person, e.g. person 71 and/or person 72 of
[0055] The processor 5 is further configured to determine, based on the building information and the location of the possible intruder, a location in or around the second building from which the possible intruder is expected to be visible, and transmit, via the transmitter 4, a security alert to the person. The security alert comprises location information indicative of the location in or around the second building and a request requesting the person to look at the first building from the location in or around the second building. The security alert may be transmitted to the selected person by transmitting it to a mobile device of the selected person, e.g. mobile device 14 and/or mobile device 15, or to a device (e.g. smart speaker) near the selected person, for example.
[0056] The processor 5 may be further configured to transmit, via the transmitter 4, a message to another person who is associated with the first building, e.g. to a mobile device 13 of the owner or renter of the first building. This message requests approval of this other person for transmitting the security alert to the selected person. The processor 5 may be configured to transmit the security alert to the selected person after the approval has been received from the other person.
[0057] In the embodiment of the computer 1 shown in
[0058] The receiver 3 and the transmitter 4 may use one or more wired and/or wireless communication technologies such as Ethernet and/or Wi-Fi (IEEE 802.11) to communicate over the Internet 11, for example. In an alternative embodiment, multiple receivers and/or multiple transmitters are used instead of a single receiver and a single transmitter. In the embodiment shown in
[0059] In the embodiment of
[0060] A first embodiment of the method of transmitting a security alert in response to detecting a possible intruder in a first building is shown in
[0061] A step 109 comprises obtaining building information associated with the person. The building information describes a second building. A step 111 comprises determining, based on the building information and the location of the possible intruder, a location in or around the second building from which the possible intruder is expected to be visible. A step 113 comprises transmitting a security alert to the person. The security alert comprises location information indicative of the location in or around the second building and a request requesting the person to look at the first building from the location in or around the second building. Steps 107-113 may be repeated one or more times for one or more further persons.
[0062] A step 121 is performed after step 113, at a later time. Step 121 comprises determining whether the detection of the possible intruder detection has been resolved, e.g. whether the police has already been called/dispatched or whether the absence of an intruder has been confirmed. If the detection has not been resolved yet, a step 123 is performed. Step 123 comprises transmitting a further security alert to one of the persons to which the first security alert was transmitted. The further security alert comprises a further request requesting the person to go to the first building.
[0063] A second embodiment of the method of transmitting a security alert in response to detecting a possible intruder in a first building is shown in
[0064] A step 141 comprises transmitting a message to another person, who is associated with the first building, typically the owner/renter of the first building. The message requests approval for transmitting the security alert to the person selected in step 107. This message may or may not identify this person. A step 143 comprise checking whether the approval has been received from this other person. If it is determined in step 143 that this approval has been received, step 109 is performed next.
[0065] Step 109 comprises obtaining building information associated with the person selected in step 107. This building information describes a second building. Step 111 comprises determining, based on the building information and the location of the possible intruder, a location in or around the second building from which the possible intruder is expected to be visible.
[0066] Next, a step 145 comprises determining a risk level based on the detection data obtained in step 101. For example, step 145 may comprise determining from the detection data whether a door or window was forcefully opened and determining the risk level based on whether the door or window was forcefully opened.
[0067] Step 113 comprises transmitting a security alert to the person. The security alert comprises location information indicative of the location in or around the second building and a request requesting the person to look at the first building from the location in or around the second building. In the embodiment of
[0068] There are various ways to detect security related events. The system preferably knows when users are home or away (either through user input or through geofencing). When users are not at home, a security mode may be activated automatically. During this mode, detection of presence will result in transmission of security alerts. Presence may be detected by motion sensors, door/window sensors, devices with RF-based presence sensing, use of light switches, acoustic sensors, for example.
[0069] After detection of the event, characteristics of that event are analyzed. These characteristics may include: [0070] Confidence level [0071] Location of detected event [0072] Time [0073] Contextual Information
[0074] Confidence level: Depending on the type of sensor, the confidence level of the detected event might vary. For example, if RF-based sensing is used, the sensor might see a disturbance of the RF signal that could be caused by either an animal or a small human being or the postman approaching the front door from the outside. If the RF sensing event is accompanied by a PIR sensor simultaneously firing/triggering in the same space, the confidence level is increased. At the same time, someone activating the light using a power switch or physical controller gives almost hundred percent confidence that someone is present.
[0075] Light may be used to actively increase the confidence level (e.g. switching the lights on with bright light or with a flashing pattern). If an intruder is present in the space, he will normally shun light and will most likely to use the wall switch to manually switch the light again off after the light was “somehow” automatically switched on. This button press event will result in a 100% confidence that a person is present. The confidence levels may also include the freshness of RF sensing baselines (e.g. representing an empty house). A fresher baseline increases the confidence in the RF sensing event detection. If the confidence level is below a certain (e.g. user-configurable) threshold, security alerts are transmitted to one or more other persons (e.g. neighbors) to determine whether the security company or the police needs to be involved.
[0076] Location of detected event: The event might be detected in different locations of the house. For example, presence might be detected on the driveway in front of the house. This might be caused by a person passing by the house on the pavement. But the event might also be detected near the door in the back garden, which is not a normal way to approach or enter the home. Similarly, in the house, the presence may be detected in the living room, which for example can be caused by the cleaning person. However, detecting someone in the bedroom would be suspicious if it is not part of the agreement with the cleaning service. In the bedroom, while the cleaning person is present, WiFi-based RF sensing may also be employed to detect unwanted activities and alert the owner and/or renter of the house.
[0077] Time: For example, some events might be detected in daytime (with daylight), while others might be detected in the middle of the night.
[0078] Contextual Information: Contextual information may be captured at the time of the detected presence. For example, information may be obtained from connected sensors such as a light level sensor (to indicate whether the light in the room was switched on), a microphone (to indicate whether voices were heard in the room), a camera, and/or a temperature sensor (to indicate whether a window is broken or door is open). These could be added as metadata of the presence detection event. Contextual information may also be obtained from WiFi-based sensing, which is known to be capable to detect a human's breathing. 60 GHz WiFi has been shown in labs to be capable to detect heart beats. The breathing or heartbeat of a burglar will be faster due to higher stress than of a normal occupant.
[0079] RF-based sensing may also be used to detect rapid acceleration/deceleration of a person or object. For instance, RF-based sensing with 5 GHz WiFi is known to be able to perform fall detection of a person by detecting the −5 g negative acceleration of a person hitting the floor. High-bandwidth WiFi sensing may be performed to detect the rapid acceleration related to the breaking open of a house door with force. In addition, if glass of a window or glass door is broken, the wireless signal propagation pattern within the room and hence the wireless multi-path WiFi CSI will change. This may be determined as the likely break-in point of a burglary.
[0080] Upon detecting presence, a security alert is transmitted to one or more persons (e.g. neighbors if the confidence level does not exceed a certain threshold). If neighbors with a view on the room where the possible intruder has been detected are not at home, a security alert may be transmitted to other neighbors, e.g. further down the road. This security alert may comprise a user interface (UI) with visualization that includes information about the rooms/location where presence was detected, the time of the detected presence, the confidence level, contextual information, and historic presence sensing data, for example.
[0081] The UI may comprise a floor plan visualization with the relevant presence detection information presented as an overlay at the right location. The overlay can be either 2D or 3D (VR). Possibly, a UI control element (e.g. slider) can be used to scroll through time and show historic/predictive information. This could be used to determine that a burglar, if any, has left the house via the backdoor of the house and the garden-door, for example.
[0082] Typically, the visualization is adapted to the characteristics of the recipient of the security alert (e.g. neighbor). These characteristics may include: [0083] Location [0084] Status/availability [0085] Notification device [0086] Type/role of the recipient
[0087] Location. The current location of the recipient. This location can be compared to the location of the detected event.
[0088] Status/availability. The current status or availability of the recipient is analyzed. For example, if the recipient is not online or in do-not-disturb mode, the notification will be transmitted to another recipient. For instance, if WhatsApp is used for transmitting the security alert, it is checked whether the person has been recently active on his phone.
[0089] Notification device. If the notification is presented on a smart watch less information is visualized than when it is presented on a tablet or TV screen.
[0090] Type/role of the recipient. The recipient might be assigned a certain role. For example, the primary contact may be given full visibility of all information while secondary contacts may only get a part of this information.
[0091] Information represented in the visualization may include: [0092] Risk level of the event [0093] Current state of the security alert response [0094] Confidence score of the crowd-enabled inspection work [0095] Real-time visualization of the crowd responses
[0096] Risk level of the event. There may be a difference in the risk level for a neighbor depending on the class of suspected event. The neighbor may be asked to perform an inspection whether, as suspected by the presence sensing system in the garden, there is really an unwanted animal (e.g. a turkey or deer) eating the flowers in the back garden. The ground truth about whether a deer is in the garden may be used by an AI algorithm, for instance, to activate the water sprinkler to drive away the deer.
[0097] On the other extreme, the presence sensing system may believe that there is an unidentified human present in the house. Moderate risk levels include the neighbor being asked by the home security system to check the whereabouts of the cleaner or of an elderly person in the house. For instance, a person suffering from dementia is not meant to go to the carpentry workbench room of the house, as he is no longer trusted to operate equipment safely without supervision.
[0098] Current state of the security alert response. The event-verification chain of the home security system may include several steps. A first step may involve a visual inspection from only the outside of the house, which is performed for instance by a neighbor with a view on the detection location. The UI presented to the neighbor doing the inspection includes a location from where in his house the neighbor should do the inspection and may, for example, display the likely entry point of the possible intruder in the house or a direction in which the neighbor should look. The UI may also indicate whether the possible intruder is still inside the house or has most likely left the house. Upon the neighbor verifying a broken open door or window, the home security system, as a second step, initiates a call to the police by the neighbor, possibly after a verification step with the owner/renter of the house. In most countries, the police only dispatches officers if a human—rather than a home security system—has confirmed a real burglary.
[0099] Upon calling the police, additional details may be displayed on the UI such as the people count of the possible intruders, their motion trail through the building and the suspected current location of the possible intruder. This information might also be shared with the police and visualized on a UI on their systems, e.g. screen in control center, mobile device display, or in-car display.
[0100] Confidence score of the crowd-enabled inspection work. A crowd ranking algorithm may evaluate different crowd members to provide a ‘likelihood’ score of correct determination and willingness to respond. Optionally, only a vetted crowd of inspectors may be used for the home monitoring. As more of the verification steps are completed, the displayed confidence level whether there is really an intruder will increase. For instance, the home owner may see in the UI that a first neighbor has already inspected the front door and found nothing unusual, while a second neighbor has agreed to inspect the garden-side house door by looking over his garden fence and the second neighbor thinks that the back door may be open and is right now talking to the police, but the police has not agreed to come.
[0101] Real-time visualization of the crowd responses. The UI may display different visualizations of the crowd responses to different neighbors (who are responding), as well as showcasing different details of the planned next steps. For instance, it may be visualized that three neighbors have been alerted with WhatsApp and two of them agreed in the app to look at the house and one of it is right now looking but has not observed anything unusual in the last five minutes.
[0102] The UI may also allow a neighbor to accept or decline the next verification step, which the system proposes to him (e.g. is the neighbor willing to directly himself call the police or rather wants a three-way conference call between the owner, the neighbor and the police). The responding neighbor may also link his own home security system to the home security system that has detected the possible intruder. The UI may then display the combined sensing of the two houses, e.g. to establish the movement pattern of the possible intruder in the garden.
[0103]
[0104] The miniature floorplan 85 indicates that the person should go to the window of one of his bedrooms. Instructions 86 indicate that the person should please look in the direction of the green light from the indicated window. In the example of
[0105]
[0106] A third embodiment of the method of transmitting a security alert in response to detecting a possible intruder in a first building is shown in
[0107] In the embodiment of
[0108] Next, a step 163 comprises filtering the list obtained in step 161 to remove persons who have not been determined to be at home. Then, a step 165 comprises determining whether the filtered list obtained in step 163 includes one or more preferred persons. For example, a person who is designated as a friend, is associated with a previous security alert transmitted on behalf of the person, has signed up for receiving security alerts, or is designated as a reliable inspector may be considered to be a preferred person. Furthermore, a person who has been determined to be at home with at most a predetermined number of other persons (e.g. none or one) in the home may be considered to be a preferred person.
[0109] If it is determined in step 165 that the filtered list obtained in step 163 includes one or more preferred persons, a step 169 is performed. Otherwise, a step 167 is performed. Step 169 comprises selecting the one or more preferred persons from the filtered list obtained in step 163 by further removing non-preferred persons from the list. Step 167 comprises selecting all persons from the filtered list obtained in step 163. In an alternative embodiment, security alerts are only transmitted to preferred persons and step 167 is omitted.
[0110] A step 171 is performed after step 167 or step 169 has been performed. Step 171 comprises checking whether the list obtained in step 167 or step 169 is empty. If not, step 109 is performed next. If it is determined in step 171 that the list is empty, this means that there is currently no person to transmit a security alert to and step 173 is performed next. Step 173 comprises waiting for a while, e.g. waiting for a predetermined period or waiting until someone from the list obtained in step 161 arrives home.
[0111] Step 109 comprises obtaining building information associated with the person. The building information describes a second building. Step 111 comprises determining, based on the building information and the location of the possible intruder, a location in or around the second building from which the possible intruder is expected to be visible. Step 113 comprises transmitting a security alert to the person. The security alert comprises location information indicative of the location in or around the second building and a request requesting the person to look at the first building from the location in or around the second building.
[0112] The embodiments of
[0113] The embodiments of
[0128] In the embodiments of
[0129]
[0130] As shown in
[0131] The memory elements 304 may include one or more physical memory devices such as, for example, local memory 308 and one or more bulk storage devices 310. The local memory may refer to random access memory or other non-persistent memory device(s) generally used during actual execution of the program code. A bulk storage device may be implemented as a hard drive or other persistent data storage device. The processing system 300 may also include one or more cache memories (not shown) that provide temporary storage of at least some program code in order to reduce the quantity of times program code must be retrieved from the bulk storage device 310 during execution. The processing system 300 may also be able to use memory elements of another processing system, e.g. if the processing system 300 is part of a cloud-computing platform.
[0132] Input/output (I/O) devices depicted as an input device 312 and an output device 314 optionally can be coupled to the data processing system. Examples of input devices may include, but are not limited to, a keyboard, a pointing device such as a mouse, a microphone (e.g. for voice and/or speech recognition), or the like. Examples of output devices may include, but are not limited to, a monitor or a display, speakers, or the like. Input and/or output devices may be coupled to the data processing system either directly or through intervening I/O controllers.
[0133] In an embodiment, the input and the output devices may be implemented as a combined input/output device (illustrated in
[0134] A network adapter 316 may also be coupled to the data processing system to enable it to become coupled to other systems, computer systems, remote network devices, and/or remote storage devices through intervening private or public networks. The network adapter may comprise a data receiver for receiving data that is transmitted by said systems, devices and/or networks to the data processing system 300, and a data transmitter for transmitting data from the data processing system 300 to said systems, devices and/or networks. Modems, cable modems, and Ethernet cards are examples of different types of network adapter that may be used with the data processing system 300.
[0135] As pictured in
[0136] Various embodiments of the invention may be implemented as a program product for use with a computer system, where the program(s) of the program product define functions of the embodiments (including the methods described herein). In one embodiment, the program(s) can be contained on a variety of non-transitory computer-readable storage media, where, as used herein, the expression “non-transitory computer readable storage media” comprises all computer-readable media, with the sole exception being a transitory, propagating signal. In another embodiment, the program(s) can be contained on a variety of transitory computer-readable storage media. Illustrative computer-readable storage media include, but are not limited to: (i) non-writable storage media (e.g., read-only memory devices within a computer such as CD-ROM disks readable by a CD-ROM drive, ROM chips or any type of solid-state non-volatile semiconductor memory) on which information is permanently stored; and (ii) writable storage media (e.g., flash memory, floppy disks within a diskette drive or hard-disk drive or any type of solid-state random-access semiconductor memory) on which alterable information is stored. The computer program may be run on the processor 302 described herein.
[0137] The terminology used herein is for the purpose of describing particular embodiments only and is not intended to be limiting of the invention. As used herein, the singular forms “a,” “an,” and “the” are intended to include the plural forms as well, unless the context clearly indicates otherwise. It will be further understood that the terms “comprises” and/or “comprising,” when used in this specification, specify the presence of stated features, integers, steps, operations, elements, and/or components, but do not preclude the presence or addition of one or more other features, integers, steps, operations, elements, components, and/or groups thereof.
[0138] The corresponding structures, materials, acts, and equivalents of all means or step plus function elements in the claims below are intended to include any structure, material, or act for performing the function in combination with other claimed elements as specifically claimed. The description of embodiments of the present invention has been presented for purposes of illustration, but is not intended to be exhaustive or limited to the implementations in the form disclosed. Many modifications and variations will be apparent to those of ordinary skill in the art without departing from the scope and spirit of the present invention. The embodiments were chosen and described in order to best explain the principles and some practical applications of the present invention, and to enable others of ordinary skill in the art to understand the present invention for various embodiments with various modifications as are suited to the particular use contemplated.