VISION BASED SYSTEM FOR DETECTING A BREACH OF SECURITY IN A MONITORED LOCATION
First Claim
1. A vision based computer-implemented method for detecting a breach of security in a monitored location, the method comprising:
- storing a succession of events defining the breach of security and an action to be performed in response to detecting the breach of security, said succession of events comprising two or more events and a predetermined sequence in which said events are performed;
receiving a stream of images of said location from an image capturing device;
defining at least a first zone and a second zone within said images;
detecting a first sequence of events matching the predetermined sequence in said images, including;
detecting a first event in the first zone; and
detecting a second event in the second zone;
wherein at least one of the first event and the second event represent detection of a source of activity in a corresponding zone;
performing the action associated with the breach of security, in response to detecting the first sequence.
0 Assignments
0 Petitions
Accused Products
Abstract
Vision based system and method for detecting a breach of security in a monitored area. One or more sequences of events are stored in the system. Each sequence of events includes a different combination of events and an order in which the events have occurred. An action is associated with each sequence of events such as triggering an alarm, generating an audible sound, calling 911 etc. when the events detected by the system match a given sequence the action associated with that sequence is performed. The system receives an image stream of the area and detects the events occurring in the images including the detection of a human body, its size and location within the monitored area. The system may be activated at all time without requiring people in the monitored area to change their normal behavior.
63 Citations
39 Claims
-
1. A vision based computer-implemented method for detecting a breach of security in a monitored location, the method comprising:
-
storing a succession of events defining the breach of security and an action to be performed in response to detecting the breach of security, said succession of events comprising two or more events and a predetermined sequence in which said events are performed; receiving a stream of images of said location from an image capturing device; defining at least a first zone and a second zone within said images; detecting a first sequence of events matching the predetermined sequence in said images, including; detecting a first event in the first zone; and detecting a second event in the second zone;
wherein at least one of the first event and the second event represent detection of a source of activity in a corresponding zone;performing the action associated with the breach of security, in response to detecting the first sequence. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 38)
-
-
24. A vision based computer-implemented method for detecting a breach of security in a location including a body of water, the method comprising:
-
storing a succession of events defining the breach of security and an action to be performed in response to detecting the breach of security, said succession of events comprising two or more events and a predetermined sequence in which said events are performed; receiving a stream of images of said location from an image capturing device; defining at least a first zone defining the body of water and a second zone adjacent the body of water within said images; detecting a first sequence of events matching the predetermined sequence in said images, including; detecting a first event in said location; detecting a second event in said location; wherein at least one of the first event and the second event represents detection of a child alone in said location; performing the action associated with the breach of security, in response to detecting the first sequence. - View Dependent Claims (25, 26, 27, 28, 29, 30, 31, 32, 33, 39)
-
-
34. A vision based computer-implemented method for detecting a breach of security in a location including a body of water, the method comprising:
-
storing a succession of events defining the breach of security and an action to be performed in response to detecting the breach of security, said succession of events comprising two or more events and a predetermined sequence in which said events are performed; receiving a stream of images of said location from an image capturing device; defining at least a first zone defining the body of water and a second zone adjacent the body of water within said images; detecting a first sequence of events matching the predetermined sequence in said images, including; detecting a first event in said location; detecting a second event in said location; wherein at least one of the first event and the second event represents detection of a human body in said first zone; performing the action associated with the breach of security, in response to detecting the first sequence. - View Dependent Claims (35, 36)
-
-
37. A vision based computer-implemented method for detecting a breach of security in a monitored location, the method comprising:
-
storing a succession of events defining the breach of security and an action to be performed in response to detecting the breach of security, said succession of events comprising two or more events and a predetermined sequence in which said events are performed; receiving a stream of images of said location from an image capturing device; defining at least a first zone, a second zone adjacent the first zone, a third zone adjacent the second zone and an aperture through which people may enter or leave the location within said images, wherein the aperture is adjacent the first zone such the first zone separates between the aperture and the second zone; detecting a first sequence of events matching the predetermined sequence in said images, the first sequence including the following events; at T0 detecting appearance of a first human body in the aperture; at T1 detecting the first human body in the first zone and a second human body in the aperture; at T2 detecting the first human body in the second zone and the second human body in the first zone; at T4 detecting the first human body in the third zone and one of;
disappearance of the first human body from the second zone or disappearance of the second human body from the first zone;performing the action associated with the breach of security, in response to detecting the first sequence.
-
Specification