Method and apparatus to reduce false alarms in exit/entrance situations for residential security monitoring
First Claim
1. A security monitoring system comprising:
- an alarm system having means for detecting an unauthorized individual in a structure;
at least one camera for capturing first image data of the unauthorized individual;
a memory for storing second image data of at least one individual authorized to be in the structure; and
transmitting means for transmitting third image data to a remote location upon the detection of the unauthorized individual, the third image data comprising at least portions of the first and second image data for comparison at the remote location.
5 Assignments
0 Petitions
Accused Products
Abstract
A security monitoring system including: an alarm system having detectors for detecting an unauthorized individual in a structure; at least one camera for capturing first image data of the unauthorized individual; a memory for storing second image data of at least one individual authorized to be in the structure; and a data link for transmitting third image data to a remote location upon the detection of the unauthorized individual. The third image data including at least portions of the first and second image data for comparison at the remote location. In a preferred implementation, the first image data includes image data of more than the face of the unauthorized individual and the system further includes a computer vision system for detecting the face of the unauthorized individual from the first image data. In such an implementation, the first and second image data are face images and are arranged in a picture having the unauthorized individual at a top portion of the picture and the authorized individuals arranged along a bottom row of the picture.
-
Citations
20 Claims
-
1. A security monitoring system comprising:
-
an alarm system having means for detecting an unauthorized individual in a structure;
at least one camera for capturing first image data of the unauthorized individual;
a memory for storing second image data of at least one individual authorized to be in the structure; and
transmitting means for transmitting third image data to a remote location upon the detection of the unauthorized individual, the third image data comprising at least portions of the first and second image data for comparison at the remote location. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 14, 15, 16, 17, 18, 19, 20)
-
-
13. A method for security monitoring of a structure, the method comprising the steps of:
-
storing second image data of at least one individual authorized to be in the structure;
detecting an unauthorized individual in the structure;
capturing first image data of the unauthorized individual; and
transmitting third image data to a remote location upon the detection of the unauthorized individual, the third image data comprising at least portions of the first and second image data for comparison at the remote location.
-
Specification