METHOD OF SENSOR DATA FUSION FOR PHYSICAL SECURITY SYSTEMS
First Claim
Patent Images
1. A method of sensor data fusion, the method comprising:
- receiving data inputs from one or more sensors in a physical security system of a monitored area overlaid with a grid defining a plurality of locations;
selecting one or more potential paths of one or more potential intruders through the monitored area using an iterative process, taking into consideration a sequence of sensor inputs and assumed limitations on mobility of the one or more potential intruders; and
producing a confidence metric for each selected potential path.
1 Assignment
0 Petitions
Accused Products
Abstract
A method of sensor data fusion in a physical security system of a monitored area is provided. The method comprises receiving data inputs from one or more sensors in the physical security system, with the monitored area being overlaid with a grid defining a plurality of locations. The method further comprise selecting one or more potential paths of one or more potential intruders through the monitored area using an iterative process, which takes into consideration a sequence of sensor inputs and assumed limitations on the mobility of the one or more potential intruders. A confidence metric is then produced for each selected potential path.
45 Citations
20 Claims
-
1. A method of sensor data fusion, the method comprising:
-
receiving data inputs from one or more sensors in a physical security system of a monitored area overlaid with a grid defining a plurality of locations; selecting one or more potential paths of one or more potential intruders through the monitored area using an iterative process, taking into consideration a sequence of sensor inputs and assumed limitations on mobility of the one or more potential intruders; and producing a confidence metric for each selected potential path. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 20)
-
-
10. A method of sensor data fusion in a physical security system for a monitored area, the method comprising:
-
(a) receiving data inputs from one or more sensors in the physical security system, wherein the monitored area is overlaid with a grid defining a plurality of locations; (b) determining an elapsed time from a difference between a time reference for a current iteration and a time reference used for a previous iteration in response to the inputs from the one or more sensors; (c) determining a total number of locations kept in one or more retained paths based on the elapsed time, including the locations added to one or more prefix paths in the current iteration; (d) initializing an index for iteration over all state values used for a current location; (e) computing a target-is-at-state metric at the current location; (f) accumulating a target-is-at-state metric into a current-sensor-indication metric for all locations in the grid; (g) repeating steps (e) and (f) if the number of the current iteration is less than a total number of locations in the grid; (h) replacing the current-sensor-indication metric with an arithmetic mean; (i) initializing an index for iteration over all state values used for the current location; (j) generating and evaluating all possible new paths to the current location; (k) storing a new set of paths that have been retained for the current location; (l) repeating steps (j) and (k) if the number of the current iteration is less than the total number of locations in the grid; (m) initializing an index for iteration over all state values used for the current location; (n) normalizing one or more metrics for all retained paths for the current location; (o) replacing the prefix paths with the new paths in the current iteration; (p) repeating steps (n) and (o) if the number of the current iteration is less than the total number of locations in the grid; (q) evaluating the metrics for all retained paths to determine if an alarm condition exists; and (r) storing the time reference used for the current iteration. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17, 18, 19)
-
Specification