Intruder detection through trajectory analysis in monitoring and surveillance systems
First Claim
1. A security monitoring system comprising:
- at least one camera for monitoring a path of an individual inside and/or outside a structure;
a recorder for recording the monitoring of the individual;
trajectory analysis means for computing a trajectory of the path of the individual from the recorded monitoring;
comparison means for comparing the trajectory against a stored database of known trajectories; and
an alarm system for transmitting an alarm signal based on the comparison.
3 Assignments
0 Petitions
Accused Products
Abstract
A security monitoring system including one or more cameras for monitoring a path of an individual, a recorder for recording the monitoring of the individual, trajectory analyzer for computing a trajectory of the path of the individual from the recorded monitoring, comparator for comparing the trajectory against known trajectories, and an alarm system for transmitting an alarm signal if the trajectory does not match one of the known trajectories. Further, the system may include a database for storing image data for each authorized individual of the structure and a recognition system for comparing images of the individual from the one or more cameras with the stored image data in the database. The alarm system transmits the alarm signal if the trajectory does not match one of the known trajectories and the individual is an authorized individual or if the individual is not an authorized individual.
-
Citations
19 Claims
-
1. A security monitoring system comprising:
-
at least one camera for monitoring a path of an individual inside and/or outside a structure;
a recorder for recording the monitoring of the individual;
trajectory analysis means for computing a trajectory of the path of the individual from the recorded monitoring;
comparison means for comparing the trajectory against a stored database of known trajectories; and
an alarm system for transmitting an alarm signal based on the comparison. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
a database for storing image data for each authorized individual of the structure; and
a recognition system for comparing images of the individual from the at least one camera with the stored image data in the database and for determining if the individual is one of the authorized individuals.
-
-
9. The security monitoring system of claim 8, wherein the stored image data in the database are face images and the recognition system is a face recognition system.
-
10. The security monitoring system of claim 8, wherein the alarm system transmits the alarm signal if the trajectory does not match one of the known trajectories and the individual is determined not to be one of the authorized individuals.
-
11. The security monitoring system of claim 8, wherein the alarm system does not transmit the alarm signal if the trajectory does match one of the known trajectories or the individual is determined to be one of the authorized individuals.
-
12. A method for monitoring a structure, the method comprising the steps of:
-
monitoring a path of an individual inside and/or outside the structure;
recording the monitoring of the individual;
computing a trajectory of the path of the individual from the monitoring;
comparing the trajectory against a stored database of known trajectories; and
determining whether to transmit an alarm signal based on the comparison. - View Dependent Claims (13, 14, 15, 16, 17, 18, 19)
storing image data for each authorized individual of the structure; and
comparing images of the individual from at least one camera with the stored image data in a database and determining if the individual is one of the authorized individuals.
-
-
17. The method of claim 16, wherein the determining step comprises transmitting the alarm signal if the trajectory does not match one of the known trajectories and the individual is determined not to be one of the authorized individuals.
-
18. The method of claim 16, wherein the determining step comprises not transmitting the alarm signal if the trajectory does match one of the known trajectories or the individual is determined to be one of the authorized individuals.
-
19. The method of claim 16, wherein if the determining step determines that the trajectory does not match one of the known trajectories and the individual is determined to be one of the authorized individuals, the method further comprises the step of adding the trajectory to the known trajectories.
Specification