SYSTEM AND METHOD FOR INTRUDER DETECTION
First Claim
Patent Images
1. A system for detecting intruders, comprising:
- a transmitter configured to produce a plurality of energy beams;
a first receiver is provided at a first height, wherein first receiver is configured to detect a first beam from said plurality of energy beams;
a second receiver is provided at a second height different from said first height, wherein second receiver is configured to detect a second beam from said plurality of energy beams; and
a processor receiving signals from said first receiver and said second receiver, said processor configured to detect a presence of an object by determining when one of said plurality of beams is at least partially interrupted, said processor further configured to determine a general height of the object based on whether said first receiver or said second receiver did or did not detect one of said beams from said plurality of beams, andan RFID reader activated by said processor when the presence of the object is detected, wherein said processor further is configured to distinguish whether the object is an intruder or a non-intruder by communicating with an RFID tag carried by non-intruders, and if no valid RFID tag is found, then the processor signals an alert, and provides a period of time for an access code to be entered before the processor reports an alarm condition.
4 Assignments
0 Petitions
Accused Products
Abstract
A beam-interrupt detection based system can provide functionalities such as counting of intruders crossing a given beam. A plurality of such beams at different heights can also allow distinguishing different-sized intruders. A recording can be triggered by detection of intruder movement, thereby improving the efficiency of recording and reviewing information indicative of presence and movement of intruders in a monitored area. Non-intruders can be distinguished from intruders by querying an RFID tag carried by non-intruders.
20 Citations
18 Claims
-
1. A system for detecting intruders, comprising:
-
a transmitter configured to produce a plurality of energy beams; a first receiver is provided at a first height, wherein first receiver is configured to detect a first beam from said plurality of energy beams; a second receiver is provided at a second height different from said first height, wherein second receiver is configured to detect a second beam from said plurality of energy beams; and a processor receiving signals from said first receiver and said second receiver, said processor configured to detect a presence of an object by determining when one of said plurality of beams is at least partially interrupted, said processor further configured to determine a general height of the object based on whether said first receiver or said second receiver did or did not detect one of said beams from said plurality of beams, and an RFID reader activated by said processor when the presence of the object is detected, wherein said processor further is configured to distinguish whether the object is an intruder or a non-intruder by communicating with an RFID tag carried by non-intruders, and if no valid RFID tag is found, then the processor signals an alert, and provides a period of time for an access code to be entered before the processor reports an alarm condition. - View Dependent Claims (2, 3, 16, 17, 18)
-
-
4. A system for detecting intruders, comprising:
-
a transmitter configured to produce a plurality of energy beams; a first receiver is provided at a first position, wherein said first receiver is configured to detect one of said plurality of beams; a second receiver is provided at a second position different from said first position, wherein said second receiver is configured to detect one of said plurality of beams; and a processor receiving signals from said first receiver and said second receiver, said processor configured to detect a presence of an object by determining when one of said plurality of beams is at least partially interrupted, said processor further configured to determine a general size of the object based on whether said first receiver or said second receiver did or did not detect one of said beam from said plurality of beams, and an RFID reader activated by said processor when the presence of the object is detected, wherein said processor further is configured to distinguish whether the object is an intruder or a non-intruder by communicating with an RFID tag carried by non-intruders, and if no valid RFID tag is found, then the processor signals an alert, and provides a period of time for an access code to be entered before the processor reports an alarm condition. - View Dependent Claims (5, 6, 7, 8, 9, 15)
-
-
10. A system for detecting intruders, comprising:
-
a transmitter configured to produce a first plurality of energy beams transmitted in a first direction and a second plurality of energy beams transmitted in a second direction different from said first direction; a first set of receivers provided at different positions, wherein each receiver in said first set of receivers is configured to detect one of said first plurality of beams; a set of second receivers is provided at different positions, wherein each receiver in said second set of receivers is configured to detect one of said second plurality of beams; and a processor receiving signals from said first set of receivers and said second set of receivers, said processor configured to detect a presence of an object by determining when one of said beams from said first and second plurality of beams is at least partially interrupted, said processor further configured to determine a general size of the object based on which beam from said first and second plurality of beams was at least partially interrupted, and to determine information regarding movement of the object based on whether the at least partially interrupted beam was from said first plurality of beams or said second plurality of beams; and
said processor further is configured to distinguish whether the object is an intruder or a non-intruder by using an RFID reader to communicate with an RFID tag carried by non-intruders. - View Dependent Claims (11, 12, 13, 14)
-
Specification