TRANSMITTING A SECURITY ALERT WHICH INDICATES A LOCATION IN A RECIPIENT'S BUILDING

20230368627 · 2023-11-16

    Inventors

    Cpc classification

    International classification

    Abstract

    A system is configured to obtain detection data from one or more detector devices (31-36), detect a possible intruder in a first building (51) based on the detection data, determine a location (63) associated with the possible intruder based on the detection data, select a receiver (71) by comparing the location with multiple locations, and obtain building information associated with the receiver. This building information describes a second building (52). The system is further configured to determine, based on the building information and the location of the possible intruder, a location (68) in or around the second building from which the possible intruder is expected to be visible, and transmit a security alert to the receiver. The security alert comprises a request requesting the receiver or a user of the receiver to look at the first building from the location in or around the second building.

    Claims

    1. A system for transmitting a security alert in response to detecting a possible intruder in a first building, said system comprising: at least one input interface; at least one output interface; and at least one processor configured to: obtain, via said at least one input interface, detection data from one or more detector devices, detect said possible intruder in said first building based on said detection data, determine a location associated with said possible intruder based on said detection data, select a receiver from a plurality of receivers by comparing said location associated with said possible intruder with a plurality of locations associated with said plurality of receivers, obtain building information associated with said receiver, said building information describing a second building, determine, based on said building information and said location of said possible intruder, a location in or around said second building from which said possible intruder is expected to be visible, and transmit, via said at least one output interface, a security alert to said receiver, to be displayed by said receiver or output via speech by said receiver, said security alert comprising location information indicative of said location in or around said second building and instructions requesting a user of said receiver to look at said first building from said location in or around said second building.

    2. A system as claimed in claim 1, wherein said at least one processor is configured to select a lighting device from a plurality of lighting devices based on said location of said potential intruder and control, via said at least one output interface, said lighting device to render a light effect, and wherein said request requests said user of said receiver to look in the direction of said light effect.

    3. A system as claimed in claim 1, wherein said at least one processor is configured to determine a direction from said location in or around said second building to said location of said possible intruder and include said direction in said security alert, and wherein said request requests said user of said receiver to look in said direction.

    4. A system as claimed in claim 1, wherein said at least one processor is configured to select said receiver from said plurality of receivers based on selecting a receiver of a user which has been determined to be at said second building.

    5. A system as claimed in claim 1, wherein said at least one processor is configured to select said receiver from said plurality of receivers based on selecting a receiver of which the user is predetermined to be a friend and/or is associated with a previous security alert transmitted and/or has signed up for receiving security alerts and/or is designated, based on a predetermined analysis, as a reliable inspector.

    6. A system as claimed in claim 1, wherein said at least one processor is configured to transmit, via said at least one output interface, a further security alert to said receiver at a later time, said further security alert comprising a further request requesting said user of said receiver to go to said first building.

    7. A system as claimed in claim 2, wherein said at least one processor is configured to: select a further receiver from said plurality of receivers based on said comparison of said location associated with said possible intruder with said plurality of locations associated with said plurality of receivers, obtain further building information associated with said further receiver, said further building information describing a third building, determine, based on said further building information and said location of said possible intruder, a location in or around said third building from which said possible intruder is expected to be visible, and transmit, via said at least one output interface, a further security alert to said further receiver, said further security alert comprising further location information indicative of said location in or around said third building and a further request requesting a user of said further receiver to look at said first building from said location in or around said third building.

    8. A system as claimed in claim 1, wherein said at least one processor is configured to determine said location associated with said possible intruder based on a location of at least one of said one or more detector devices.

    9. A system as claimed in claim 1, wherein said at least one processor is configured to determine a risk level based on said detection data and include said risk level in said security alert.

    10. A system as claimed in claim 9, wherein said at least one processor is configured to determine from said detection data whether a door or window was forcefully opened and determine said risk level based on whether said door or window was forcefully opened.

    11. A system as claimed in claim 1, wherein said at least one processor is configured to: transmit, via said at least one output interface, a message to another receiver, said other receiver being associated with said first building, said message requesting approval for transmitting said security alert to said receiver, and if said approval has been received from said other receiver, transmit said security alert to said receiver.

    12. A system as claimed in claim 1, wherein said at least one processor is configured to select said receiver from said plurality of receivers based on activities currently being performed by users of said plurality of receivers.

    13. A method of transmitting a security alert in response to detecting a possible intruder in a first building, said method comprising: obtaining, by a processor, via a receiver, detection data from one or more detector devices; detecting, by the processor, said possible intruder in said first building based on said detection data; determining, by the processor, a location associated with said possible intruder based on said detection data; selecting, by the processor, a receiver from a plurality of receivers by comparing said location associated with said possible intruder with a plurality of locations associated with said plurality of receivers; obtaining, by the processor, building information associated with said receiver, said building information describing a second building; determining by the processor, based on said building information and said location of said possible intruder, a location in or around said second building from which said possible intruder is expected to be visible; and transmitting, by the processor, via a transmitter, a security alert to said receiver, to be displayed by said receiver or output via speech by said receiver, said security alert comprising location information indicative of said location in or around said second building and a request requesting a user of said receiver to look at said first building from said location in or around said second building.

    14. A computer program product for a computing device, and computing device comprising a receiver, a transmitter, and a processing unit, the computer program product comprising computer program code to perform the method of claim 13 when the computer program product is run on the processing unit of the computing device.

    Description

    BRIEF DESCRIPTION OF THE DRAWINGS

    [0039] These and other aspects of the invention are apparent from and will be further elucidated, by way of example, with reference to the drawings, in which:

    [0040] FIG. 1 depicts partial floorplans of three buildings of which one comprises multiple detector devices;

    [0041] FIG. 2 is a block diagram of an embodiment of the system;

    [0042] FIG. 3 is a flow diagram of a first embodiment of the method;

    [0043] FIG. 4 is a flow diagram of a second embodiment of the method;

    [0044] FIG. 5 shows a first example of a displayed security alert;

    [0045] FIG. 6 shows a second example of a displayed security alert;

    [0046] FIG. 7 shows a third example of a displayed security alert;

    [0047] FIG. 8 is a flow diagram of a third embodiment of the method; and

    [0048] FIG. 9 is a block diagram of an exemplary data processing system for performing the method of the invention.

    [0049] Corresponding elements in the drawings are denoted by the same reference numeral.

    DETAILED DESCRIPTION OF THE EMBODIMENTS

    [0050] FIG. 1 depicts partial floorplans of three buildings of which one comprises multiple detector devices. Each of the houses 51-53 comprises a hallway 61, a bathroom 62, two bedrooms 63 and 64 and a living room/kitchen 65. Houses 51 and 52 are separated by a road 57 and houses 51 and 53 are separated by a road 58. Six detector devices 31-36 have been installed in house 51. These detector devices 31-36 may be lighting devices that perform RF-based sensing, for example.

    [0051] If a possible intruder is detected in bedroom 64 of house 51, then this intruder may be visible from the window 69 of the house 53 by a person 72. A security alert may then be transmitted to the mobile device 15 of person 72. If a possible intruder is detected in bedroom 63 of house 51, then this intruder may be visible from the window 69 of the house 53 by person 72 and from the window 68 of the house 52 by person 71. A security alert may then be transmitted to the mobile device 15 of person 72 and the mobile device 14 of person 71.

    [0052] FIG. 2 shows an embodiment of the system for transmitting a security alert in response to detecting a possible intruder in a first building. In this first embodiment, the system is a computer 1. The computer 1 is connected to the Internet 11 and acts as a server. Six detector devices 31-36 have been installed in the first building, e.g. house 51 of FIG. 1. In the example of FIG. 2, the six detector devices 31-36 communicate with the computer 1 via a controller 23, e.g. a Hue bridge, and a wireless Internet access point 21.

    [0053] The computer 1 comprises a receiver 3, a transmitter 4, a processor 5, and storage means 7. The processor 5 is configured to obtain, via the receiver 3, detection data from the detector devices 31-36, detect the possible intruder in the first building based on the detection data, and determine a location associated with the possible intruder based on the detection data. The processor 5 may be configured to determine the location associated with the possible intruder based on a location of at least one of the one or more detector devices 31-36, for example.

    [0054] The processor 5 is further configured to select a person, e.g. person 71 and/or person 72 of FIG. 1, from a plurality of persons by comparing the location associated with the possible intruder with a plurality of locations associated with the plurality of persons and obtain building information associated with the person. The building information describes a second building.

    [0055] The processor 5 is further configured to determine, based on the building information and the location of the possible intruder, a location in or around the second building from which the possible intruder is expected to be visible, and transmit, via the transmitter 4, a security alert to the person. The security alert comprises location information indicative of the location in or around the second building and a request requesting the person to look at the first building from the location in or around the second building. The security alert may be transmitted to the selected person by transmitting it to a mobile device of the selected person, e.g. mobile device 14 and/or mobile device 15, or to a device (e.g. smart speaker) near the selected person, for example.

    [0056] The processor 5 may be further configured to transmit, via the transmitter 4, a message to another person who is associated with the first building, e.g. to a mobile device 13 of the owner or renter of the first building. This message requests approval of this other person for transmitting the security alert to the selected person. The processor 5 may be configured to transmit the security alert to the selected person after the approval has been received from the other person.

    [0057] In the embodiment of the computer 1 shown in FIG. 2, the computer 1 comprises one processor 5. In an alternative embodiment, the computer 1 comprises multiple processors. The processor 5 of the computer 1 may be a general-purpose processor, e.g. from Intel or AMD, or an application-specific processor. The processor 5 of the computer 1 may run a Windows or Unix-based operating system for example. The storage means 7 may comprise one or more memory units. The storage means 7 may comprise one or more hard disks and/or solid-state memory, for example. The storage means 7 may be used to store an operating system, applications and application data, for example.

    [0058] The receiver 3 and the transmitter 4 may use one or more wired and/or wireless communication technologies such as Ethernet and/or Wi-Fi (IEEE 802.11) to communicate over the Internet 11, for example. In an alternative embodiment, multiple receivers and/or multiple transmitters are used instead of a single receiver and a single transmitter. In the embodiment shown in FIG. 2, a separate receiver and a separate transmitter are used. In an alternative embodiment, the receiver 3 and the transmitter 4 are combined into a transceiver. The computer 1 may comprise other components typical for a computer such as a power connector. The invention may be implemented using a computer program running on one or more processors.

    [0059] In the embodiment of FIG. 2, the computer 1 receives data from the detector devices 31-36 via the bridge 23. In an alternative embodiment, the computer 1 receives data from one or more of the detector devices 31-36 without a bridge.

    [0060] A first embodiment of the method of transmitting a security alert in response to detecting a possible intruder in a first building is shown in FIG. 3. A step 101 comprises obtaining detection data from one or more detector devices. A step 103 comprises detecting the possible intruder in the first building based on the detection data. A step 105 comprises determining a location associated with the possible intruder based on the detection data. A step 107 comprises selecting a person from a plurality of persons by comparing the location associated with the possible intruder with a plurality of locations associated with the plurality of persons.

    [0061] A step 109 comprises obtaining building information associated with the person. The building information describes a second building. A step 111 comprises determining, based on the building information and the location of the possible intruder, a location in or around the second building from which the possible intruder is expected to be visible. A step 113 comprises transmitting a security alert to the person. The security alert comprises location information indicative of the location in or around the second building and a request requesting the person to look at the first building from the location in or around the second building. Steps 107-113 may be repeated one or more times for one or more further persons.

    [0062] A step 121 is performed after step 113, at a later time. Step 121 comprises determining whether the detection of the possible intruder detection has been resolved, e.g. whether the police has already been called/dispatched or whether the absence of an intruder has been confirmed. If the detection has not been resolved yet, a step 123 is performed. Step 123 comprises transmitting a further security alert to one of the persons to which the first security alert was transmitted. The further security alert comprises a further request requesting the person to go to the first building.

    [0063] A second embodiment of the method of transmitting a security alert in response to detecting a possible intruder in a first building is shown in FIG. 4. Step 101 comprises obtaining detection data from one or more detector devices. Step 103 comprises detecting the possible intruder in the first building based on the detection data obtained in step 101. Step 105 comprises determining a location associated with the possible intruder based on the detection data. Step 107 comprises selecting a person from a plurality of persons by comparing the location associated with the possible intruder with a plurality of locations associated with the plurality of persons.

    [0064] A step 141 comprises transmitting a message to another person, who is associated with the first building, typically the owner/renter of the first building. The message requests approval for transmitting the security alert to the person selected in step 107. This message may or may not identify this person. A step 143 comprise checking whether the approval has been received from this other person. If it is determined in step 143 that this approval has been received, step 109 is performed next.

    [0065] Step 109 comprises obtaining building information associated with the person selected in step 107. This building information describes a second building. Step 111 comprises determining, based on the building information and the location of the possible intruder, a location in or around the second building from which the possible intruder is expected to be visible.

    [0066] Next, a step 145 comprises determining a risk level based on the detection data obtained in step 101. For example, step 145 may comprise determining from the detection data whether a door or window was forcefully opened and determining the risk level based on whether the door or window was forcefully opened.

    [0067] Step 113 comprises transmitting a security alert to the person. The security alert comprises location information indicative of the location in or around the second building and a request requesting the person to look at the first building from the location in or around the second building. In the embodiment of FIG. 4, the security alert further comprises the risk level determined in step 145.

    [0068] There are various ways to detect security related events. The system preferably knows when users are home or away (either through user input or through geofencing). When users are not at home, a security mode may be activated automatically. During this mode, detection of presence will result in transmission of security alerts. Presence may be detected by motion sensors, door/window sensors, devices with RF-based presence sensing, use of light switches, acoustic sensors, for example.

    [0069] After detection of the event, characteristics of that event are analyzed. These characteristics may include: [0070] Confidence level [0071] Location of detected event [0072] Time [0073] Contextual Information

    [0074] Confidence level: Depending on the type of sensor, the confidence level of the detected event might vary. For example, if RF-based sensing is used, the sensor might see a disturbance of the RF signal that could be caused by either an animal or a small human being or the postman approaching the front door from the outside. If the RF sensing event is accompanied by a PIR sensor simultaneously firing/triggering in the same space, the confidence level is increased. At the same time, someone activating the light using a power switch or physical controller gives almost hundred percent confidence that someone is present.

    [0075] Light may be used to actively increase the confidence level (e.g. switching the lights on with bright light or with a flashing pattern). If an intruder is present in the space, he will normally shun light and will most likely to use the wall switch to manually switch the light again off after the light was “somehow” automatically switched on. This button press event will result in a 100% confidence that a person is present. The confidence levels may also include the freshness of RF sensing baselines (e.g. representing an empty house). A fresher baseline increases the confidence in the RF sensing event detection. If the confidence level is below a certain (e.g. user-configurable) threshold, security alerts are transmitted to one or more other persons (e.g. neighbors) to determine whether the security company or the police needs to be involved.

    [0076] Location of detected event: The event might be detected in different locations of the house. For example, presence might be detected on the driveway in front of the house. This might be caused by a person passing by the house on the pavement. But the event might also be detected near the door in the back garden, which is not a normal way to approach or enter the home. Similarly, in the house, the presence may be detected in the living room, which for example can be caused by the cleaning person. However, detecting someone in the bedroom would be suspicious if it is not part of the agreement with the cleaning service. In the bedroom, while the cleaning person is present, WiFi-based RF sensing may also be employed to detect unwanted activities and alert the owner and/or renter of the house.

    [0077] Time: For example, some events might be detected in daytime (with daylight), while others might be detected in the middle of the night.

    [0078] Contextual Information: Contextual information may be captured at the time of the detected presence. For example, information may be obtained from connected sensors such as a light level sensor (to indicate whether the light in the room was switched on), a microphone (to indicate whether voices were heard in the room), a camera, and/or a temperature sensor (to indicate whether a window is broken or door is open). These could be added as metadata of the presence detection event. Contextual information may also be obtained from WiFi-based sensing, which is known to be capable to detect a human's breathing. 60 GHz WiFi has been shown in labs to be capable to detect heart beats. The breathing or heartbeat of a burglar will be faster due to higher stress than of a normal occupant.

    [0079] RF-based sensing may also be used to detect rapid acceleration/deceleration of a person or object. For instance, RF-based sensing with 5 GHz WiFi is known to be able to perform fall detection of a person by detecting the −5 g negative acceleration of a person hitting the floor. High-bandwidth WiFi sensing may be performed to detect the rapid acceleration related to the breaking open of a house door with force. In addition, if glass of a window or glass door is broken, the wireless signal propagation pattern within the room and hence the wireless multi-path WiFi CSI will change. This may be determined as the likely break-in point of a burglary.

    [0080] Upon detecting presence, a security alert is transmitted to one or more persons (e.g. neighbors if the confidence level does not exceed a certain threshold). If neighbors with a view on the room where the possible intruder has been detected are not at home, a security alert may be transmitted to other neighbors, e.g. further down the road. This security alert may comprise a user interface (UI) with visualization that includes information about the rooms/location where presence was detected, the time of the detected presence, the confidence level, contextual information, and historic presence sensing data, for example.

    [0081] The UI may comprise a floor plan visualization with the relevant presence detection information presented as an overlay at the right location. The overlay can be either 2D or 3D (VR). Possibly, a UI control element (e.g. slider) can be used to scroll through time and show historic/predictive information. This could be used to determine that a burglar, if any, has left the house via the backdoor of the house and the garden-door, for example.

    [0082] Typically, the visualization is adapted to the characteristics of the recipient of the security alert (e.g. neighbor). These characteristics may include: [0083] Location [0084] Status/availability [0085] Notification device [0086] Type/role of the recipient

    [0087] Location. The current location of the recipient. This location can be compared to the location of the detected event.

    [0088] Status/availability. The current status or availability of the recipient is analyzed. For example, if the recipient is not online or in do-not-disturb mode, the notification will be transmitted to another recipient. For instance, if WhatsApp is used for transmitting the security alert, it is checked whether the person has been recently active on his phone.

    [0089] Notification device. If the notification is presented on a smart watch less information is visualized than when it is presented on a tablet or TV screen.

    [0090] Type/role of the recipient. The recipient might be assigned a certain role. For example, the primary contact may be given full visibility of all information while secondary contacts may only get a part of this information.

    [0091] Information represented in the visualization may include: [0092] Risk level of the event [0093] Current state of the security alert response [0094] Confidence score of the crowd-enabled inspection work [0095] Real-time visualization of the crowd responses

    [0096] Risk level of the event. There may be a difference in the risk level for a neighbor depending on the class of suspected event. The neighbor may be asked to perform an inspection whether, as suspected by the presence sensing system in the garden, there is really an unwanted animal (e.g. a turkey or deer) eating the flowers in the back garden. The ground truth about whether a deer is in the garden may be used by an AI algorithm, for instance, to activate the water sprinkler to drive away the deer.

    [0097] On the other extreme, the presence sensing system may believe that there is an unidentified human present in the house. Moderate risk levels include the neighbor being asked by the home security system to check the whereabouts of the cleaner or of an elderly person in the house. For instance, a person suffering from dementia is not meant to go to the carpentry workbench room of the house, as he is no longer trusted to operate equipment safely without supervision.

    [0098] Current state of the security alert response. The event-verification chain of the home security system may include several steps. A first step may involve a visual inspection from only the outside of the house, which is performed for instance by a neighbor with a view on the detection location. The UI presented to the neighbor doing the inspection includes a location from where in his house the neighbor should do the inspection and may, for example, display the likely entry point of the possible intruder in the house or a direction in which the neighbor should look. The UI may also indicate whether the possible intruder is still inside the house or has most likely left the house. Upon the neighbor verifying a broken open door or window, the home security system, as a second step, initiates a call to the police by the neighbor, possibly after a verification step with the owner/renter of the house. In most countries, the police only dispatches officers if a human—rather than a home security system—has confirmed a real burglary.

    [0099] Upon calling the police, additional details may be displayed on the UI such as the people count of the possible intruders, their motion trail through the building and the suspected current location of the possible intruder. This information might also be shared with the police and visualized on a UI on their systems, e.g. screen in control center, mobile device display, or in-car display.

    [0100] Confidence score of the crowd-enabled inspection work. A crowd ranking algorithm may evaluate different crowd members to provide a ‘likelihood’ score of correct determination and willingness to respond. Optionally, only a vetted crowd of inspectors may be used for the home monitoring. As more of the verification steps are completed, the displayed confidence level whether there is really an intruder will increase. For instance, the home owner may see in the UI that a first neighbor has already inspected the front door and found nothing unusual, while a second neighbor has agreed to inspect the garden-side house door by looking over his garden fence and the second neighbor thinks that the back door may be open and is right now talking to the police, but the police has not agreed to come.

    [0101] Real-time visualization of the crowd responses. The UI may display different visualizations of the crowd responses to different neighbors (who are responding), as well as showcasing different details of the planned next steps. For instance, it may be visualized that three neighbors have been alerted with WhatsApp and two of them agreed in the app to look at the house and one of it is right now looking but has not observed anything unusual in the last five minutes.

    [0102] The UI may also allow a neighbor to accept or decline the next verification step, which the system proposes to him (e.g. is the neighbor willing to directly himself call the police or rather wants a three-way conference call between the owner, the neighbor and the police). The responding neighbor may also link his own home security system to the home security system that has detected the possible intruder. The UI may then display the combined sensing of the two houses, e.g. to establish the movement pattern of the possible intruder in the garden.

    [0103] FIG. 5 shows a first example of a displayed security alert. The security alert is displayed on a display 19 of mobile device 14, e.g. by an app running on the mobile device 14. The title 81 (“security alert 1”) indicates that the security alert is the first security alert, transmitted in step 113 of FIG. 3. The address 84 of the first building in which a possible intruder has been detected is shown below the title 81: “crown street 225”. A miniature floorplan 85 indicates the location in the selected person's building from which the possible intruder may be visible and to which he should go. The selected person is the recipient of the security alert.

    [0104] The miniature floorplan 85 indicates that the person should go to the window of one of his bedrooms. Instructions 86 indicate that the person should please look in the direction of the green light from the indicated window. In the example of FIG. 5, the system selects a lighting device from a plurality of lighting devices based on the location of the potential intruder and controls the lighting device to render a (green) light effect. FIG. 6 shows a second example of a displayed security alert. In the example of FIG. 6, the system does not control a lighting device to render a light effect but determines a direction from the location in or around the second building to the location of the possible intruder and includes this direction in the security alert using direction symbol 88. In the example of FIG. 6, the instructions 89 indicate that the person should please look in the indicated direction from the window of the master bedroom. Instead of, or in addition to, describing with text where the user should go, the miniature floorplan 85 of FIG. 5 might be displayed.

    [0105] FIG. 7 shows a third example of a displayed security alert. The title 82 (“security alert 2”) indicates that the security alert is the second security alert, transmitted in step 123 of FIG. 3. This second security alert comprises instructions 93 that ask the recipient of the security alert to please go the indicated address. Furthermore, a risk level 92 (“4/10”) is displayed, which the system has determined based on the detection data. This, and the elapsed time indicator 91 (“elapse timed since security alert 1: 30 minutes”) allow the recipient of the second security alert to make a personal assessment on how safe it is to go to the indicated address.

    [0106] A third embodiment of the method of transmitting a security alert in response to detecting a possible intruder in a first building is shown in FIG. 8. Step 101 comprises obtaining detection data from one or more detector devices. Step 103 comprises detecting the possible intruder in the first building based on the detection data. Step 105 comprises determining a location associated with the possible intruder based on the detection data. Step 107 comprises selecting a person from a plurality of persons by comparing the location associated with the possible intruder with a plurality of locations associated with the plurality of persons.

    [0107] In the embodiment of FIG. 8, step 107 is implemented by steps 161 to 173. Step 161 comprises selecting persons who, from their own building, have a view on the location of the first building where the possible intruder has been detected. For example, if a possible intruder has been detected in bedroom 63 of house 51 of FIG. 1, then persons 71 and 72 may be selected, and if a possible intruder has been detected in bedroom 64 of house 51, then person 72 may be selected. Step 161 results in a list of selected persons.

    [0108] Next, a step 163 comprises filtering the list obtained in step 161 to remove persons who have not been determined to be at home. Then, a step 165 comprises determining whether the filtered list obtained in step 163 includes one or more preferred persons. For example, a person who is designated as a friend, is associated with a previous security alert transmitted on behalf of the person, has signed up for receiving security alerts, or is designated as a reliable inspector may be considered to be a preferred person. Furthermore, a person who has been determined to be at home with at most a predetermined number of other persons (e.g. none or one) in the home may be considered to be a preferred person.

    [0109] If it is determined in step 165 that the filtered list obtained in step 163 includes one or more preferred persons, a step 169 is performed. Otherwise, a step 167 is performed. Step 169 comprises selecting the one or more preferred persons from the filtered list obtained in step 163 by further removing non-preferred persons from the list. Step 167 comprises selecting all persons from the filtered list obtained in step 163. In an alternative embodiment, security alerts are only transmitted to preferred persons and step 167 is omitted.

    [0110] A step 171 is performed after step 167 or step 169 has been performed. Step 171 comprises checking whether the list obtained in step 167 or step 169 is empty. If not, step 109 is performed next. If it is determined in step 171 that the list is empty, this means that there is currently no person to transmit a security alert to and step 173 is performed next. Step 173 comprises waiting for a while, e.g. waiting for a predetermined period or waiting until someone from the list obtained in step 161 arrives home.

    [0111] Step 109 comprises obtaining building information associated with the person. The building information describes a second building. Step 111 comprises determining, based on the building information and the location of the possible intruder, a location in or around the second building from which the possible intruder is expected to be visible. Step 113 comprises transmitting a security alert to the person. The security alert comprises location information indicative of the location in or around the second building and a request requesting the person to look at the first building from the location in or around the second building.

    [0112] The embodiments of FIGS. 3, 4 and 8 differ from each other in multiple aspects, i.e. multiple steps have been added or replaced. In variations on these embodiments, only a subset of these steps is added or replaced and/or one or more steps is omitted. For example, step 145 of FIG. 4 may be omitted from the embodiment of FIG. 4 and/or added to the embodiments of FIGS. 3 and/or 8. The embodiments of FIGS. 3, 4 and 8 may be combined.

    [0113] The embodiments of FIGS. 3, 4 and 8, and variations thereof, may be extended in one or more of the following manners: [0114] The UI of the security alert (app) may also include a feedback screen to be filled in after the event/alert has been resolved by the owner/renter of the house and/or the neighbor, which can be used for training the AI algorithms. The owner/renter of the house may review the responses of the neighbor and correct them if necessary. For instance, after the neighbor has inspected the backdoor, and burglary was ruled out, he may notice that plants close to the door are moving in heavy wind. This feedback can be used to train the AI of the home security system. [0115] The UI of the security alert (app) may also include a reward element for the person performing the inspection. For instance, a crowd-enabled home security system may provide financial incentives for inspecting a house where a potential intruder has been detected. [0116] The security alerts may be transmitted to the neighbors after the burglar has left the house to minimize the safety risk for the neighbors. An average burglary takes eight minutes according to the FBI. Hence, the primary focus of the home security system may be to scare off the burglar with light effects and determine which rooms are affected by the burglary. [0117] The crowd enabled home security system may pay a context-dependent reward amount for a person, e.g. neighbor, performing the inspection. For instance, at midnight, a higher amount may be paid. If there is scarcity of inspectors, the price of the inspection may be raised. If no one responds to the security alert, the reward may be raised further. The user may be able to, upon receiving a message, adjust the maximum amount paid to the inspector. [0118] The UI of the security alert (app) may include an element where the responding neighbor can trigger an audio effect in the home where the burglar is and tell him that he is now coming over to inspect the house (so that the burglar is leaving more quickly). The audio message may be accompanied by an annoying light effect such as a stroboscopic lighting effect or a very fast flashing effect with changing light color and/or intensity. [0119] The UI of the security alert (app) may also include an element which rates the trustworthiness of the person who has performed the crowd-enabled inspection. It may use a star-rating similar to Uber drivers. [0120] In crowd-enabled home security systems, multiple people may be involved in inspecting one single event. The UI may display the assessment of the several inspectors, attach a confidence level for each inspector and weigh them to determine an overall confidence of the conclusion whether there was really an intruder. The user may be allowed to select a specific inspector or eliminate certain inspectors. [0121] The UI of the security alert (app) may also include a thank-you section enabling the user to thank a neighbor for performing the inspection. [0122] The UI of the security alert (app) may also display home monitoring messages which indicate, for instance, a likely water leakage in the basement and may ask the neighbor to check it out from the outside through the window. The lighting in the basement may be switched on to help the neighbor to see the water. The water leakage may be detected using RF-based sensing by detecting a change in RSSI/wireless multipath signals due to the water on the floor. [0123] The UI of the security alert (app) may enable the inspecting neighbor to take a photo or video, e.g. from his home, and annotate features on the photo or video, e.g. an open door or broken window. A first neighbor may be asked to inspect certain objects which are not in direct field of view of the security camera in the backyard. The UI may allow the first neighbor, who is living to the house to the right, to inspect and annotate objects (e.g. winter garden door is closed; no window broken in kids bedroom) and also highlight objects (e.g. a backdoor of the house) which he is not able to see from his inspecting position. Based on the feedback from the first neighbor that he could not see the backdoor, a second neighbor living on the house to the left may be asked to look over his garden wall and inspect the remaining object. The still remaining-to-be-inspected object may be highlighted by a light effect. [0124] Light effects may be used to walk the inspector step by step though the inspection and annotation process. For example, a first light effect may show a neighbor to inspect the window of the kids' bedroom. Afterwards, the light in the winter-garden may be activated so that neighbor knows he has now to check the window there and report the status in the app. Optionally, a visualization of the house may be used which represents the inspector's current field of view. The light effect in the bedroom may be activated by the end-user pressing on the specific part of the visualization of the house. [0125] In crowd-enabled home security, the UI of the security alert (app) may warn the inspector if the suspected position of the possible intruder gets too close to the inspector. The UI may make sure that the neighbor responding to the alert does not approach the house and if he nevertheless approaches, provide a stern warning about the security risks. [0126] The home security system may visualize to the inspector of the house the current location of the possible intruder by flashing the lights only in the room where the possible intruder is right now. By observing the light effect displayed from the outside of the house, the neighbor knows the possible intruder's position and can keep a safe distance. [0127] The location where the possible intruder has entered the house may be reported in the UI of the security alert (app). For instance, if it is suspected that a burglar has entered through the garden door, the UI may ask during the burglary the inspector to stay at safe distance, but to still try to take a picture or video from the burglar from the safety of his own house when the burglar is leaving the house again through the garden door. After the house is confirmed to be unoccupied, the UI assists the inspector to inspect whether a door or window has really been forcefully opened.

    [0128] In the embodiments of FIGS. 1 to 8, a person is selected from a plurality of persons, e.g. in step 107 of FIG. 3. In an alternative embodiment, a different type of receiver is selected from a plurality of receivers. For example, a display of a smart home instead may be selected from the plurality of receivers instead of an individual person.

    [0129] FIG. 9 depicts a block diagram illustrating an exemplary data processing system that may perform the method as described with reference to FIGS. 3, 4, and 8.

    [0130] As shown in FIG. 9, the data processing system 300 may include at least one processor 302 coupled to memory elements 304 through a system bus 306. As such, the data processing system may store program code within memory elements 304. Further, the processor 302 may execute the program code accessed from the memory elements 304 via a system bus 306. In one aspect, the data processing system may be implemented as a computer that is suitable for storing and/or executing program code. It should be appreciated, however, that the data processing system 300 may be implemented in the form of any system including a processor and a memory that is capable of performing the functions described within this specification. The data processing system may be an Internet/cloud server, for example.

    [0131] The memory elements 304 may include one or more physical memory devices such as, for example, local memory 308 and one or more bulk storage devices 310. The local memory may refer to random access memory or other non-persistent memory device(s) generally used during actual execution of the program code. A bulk storage device may be implemented as a hard drive or other persistent data storage device. The processing system 300 may also include one or more cache memories (not shown) that provide temporary storage of at least some program code in order to reduce the quantity of times program code must be retrieved from the bulk storage device 310 during execution. The processing system 300 may also be able to use memory elements of another processing system, e.g. if the processing system 300 is part of a cloud-computing platform.

    [0132] Input/output (I/O) devices depicted as an input device 312 and an output device 314 optionally can be coupled to the data processing system. Examples of input devices may include, but are not limited to, a keyboard, a pointing device such as a mouse, a microphone (e.g. for voice and/or speech recognition), or the like. Examples of output devices may include, but are not limited to, a monitor or a display, speakers, or the like. Input and/or output devices may be coupled to the data processing system either directly or through intervening I/O controllers.

    [0133] In an embodiment, the input and the output devices may be implemented as a combined input/output device (illustrated in FIG. 9 with a dashed line surrounding the input device 312 and the output device 314). An example of such a combined device is a touch sensitive display, also sometimes referred to as a “touch screen display” or simply “touch screen”. In such an embodiment, input to the device may be provided by a movement of a physical object, such as e.g. a stylus or a finger of a user, on or near the touch screen display.

    [0134] A network adapter 316 may also be coupled to the data processing system to enable it to become coupled to other systems, computer systems, remote network devices, and/or remote storage devices through intervening private or public networks. The network adapter may comprise a data receiver for receiving data that is transmitted by said systems, devices and/or networks to the data processing system 300, and a data transmitter for transmitting data from the data processing system 300 to said systems, devices and/or networks. Modems, cable modems, and Ethernet cards are examples of different types of network adapter that may be used with the data processing system 300.

    [0135] As pictured in FIG. 9, the memory elements 304 may store an application 318. In various embodiments, the application 318 may be stored in the local memory 308, the one or more bulk storage devices 310, or separate from the local memory and the bulk storage devices. It should be appreciated that the data processing system 300 may further execute an operating system (not shown in FIG. 9) that can facilitate execution of the application 318. The application 318, being implemented in the form of executable program code, can be executed by the data processing system 300, e.g., by the processor 302. Responsive to executing the application, the data processing system 300 may be configured to perform one or more operations or method steps described herein.

    [0136] Various embodiments of the invention may be implemented as a program product for use with a computer system, where the program(s) of the program product define functions of the embodiments (including the methods described herein). In one embodiment, the program(s) can be contained on a variety of non-transitory computer-readable storage media, where, as used herein, the expression “non-transitory computer readable storage media” comprises all computer-readable media, with the sole exception being a transitory, propagating signal. In another embodiment, the program(s) can be contained on a variety of transitory computer-readable storage media. Illustrative computer-readable storage media include, but are not limited to: (i) non-writable storage media (e.g., read-only memory devices within a computer such as CD-ROM disks readable by a CD-ROM drive, ROM chips or any type of solid-state non-volatile semiconductor memory) on which information is permanently stored; and (ii) writable storage media (e.g., flash memory, floppy disks within a diskette drive or hard-disk drive or any type of solid-state random-access semiconductor memory) on which alterable information is stored. The computer program may be run on the processor 302 described herein.

    [0137] The terminology used herein is for the purpose of describing particular embodiments only and is not intended to be limiting of the invention. As used herein, the singular forms “a,” “an,” and “the” are intended to include the plural forms as well, unless the context clearly indicates otherwise. It will be further understood that the terms “comprises” and/or “comprising,” when used in this specification, specify the presence of stated features, integers, steps, operations, elements, and/or components, but do not preclude the presence or addition of one or more other features, integers, steps, operations, elements, components, and/or groups thereof.

    [0138] The corresponding structures, materials, acts, and equivalents of all means or step plus function elements in the claims below are intended to include any structure, material, or act for performing the function in combination with other claimed elements as specifically claimed. The description of embodiments of the present invention has been presented for purposes of illustration, but is not intended to be exhaustive or limited to the implementations in the form disclosed. Many modifications and variations will be apparent to those of ordinary skill in the art without departing from the scope and spirit of the present invention. The embodiments were chosen and described in order to best explain the principles and some practical applications of the present invention, and to enable others of ordinary skill in the art to understand the present invention for various embodiments with various modifications as are suited to the particular use contemplated.