False alarm avoidance in security systems
First Claim
Patent Images
1. An intrusion detection panel comprises:
- a processor device;
a memory in communication with the processor device; and
a storage device that stores a program of computing instructions for execution by the processor using the memory, the program comprising instructions configured to cause the processor to;
receive first sensor data from a first sensor that is of a first sensor type, the first sensor data being of a binary signal type, and which is sent to the intrusion detection panel, which first sensor data is an indication of an forced entry intrusion detected by the first sensor;
receive second sensor data from a second sensor that is of a second, different type the second sensor data sent to the intrusion detection panel, with the second sensor data including an indication of a detection condition and metadata information comprising data regarding a state of an environment within the range of the second sensor, the metadata information provided from processing of the second sensor data by the second sensor;
receive third sensor data from a third sensor that is of a third sensor type that sends the third sensor data to the intrusion detection panel, with the third sensor data being an indication of a perimeter presence detected by the third sensor;
determine that the first sensor indicated the presence of an alarm condition;
upon an assertion that the processor determined the presence of an alarm condition from the first sensor, the processor is further configured to;
analyze the metadata received from the second sensor to validate whether the indicated alarm condition processed from the first sensor is a valid alarm condition or a false alarm condition;
analyze the third sensor data received from the third sensor to validate existence of a perimeter presence at a time coincident with the indication of the alarm condition; and
produce an alarm when the analysis of the metadata from the second sensor and the existence of a perimeter presence validates the assertion of the alarm condition provided from the first sensor.
5 Assignments
0 Petitions
Accused Products
Abstract
Embodiments of intrusion detection systems are described and which include an intrusion detection panel that receives binary and metadata sensor data from which the presence of an alarm condition is detected. In addition sensor devices analyze sensor data received from other sensor devices that are in a peer to peer relationship with the corresponding sensor device to validate whether the indicated alarm condition is a valid alarm or a false alarm.
13 Citations
13 Claims
-
1. An intrusion detection panel comprises:
-
a processor device; a memory in communication with the processor device; and a storage device that stores a program of computing instructions for execution by the processor using the memory, the program comprising instructions configured to cause the processor to; receive first sensor data from a first sensor that is of a first sensor type, the first sensor data being of a binary signal type, and which is sent to the intrusion detection panel, which first sensor data is an indication of an forced entry intrusion detected by the first sensor; receive second sensor data from a second sensor that is of a second, different type the second sensor data sent to the intrusion detection panel, with the second sensor data including an indication of a detection condition and metadata information comprising data regarding a state of an environment within the range of the second sensor, the metadata information provided from processing of the second sensor data by the second sensor; receive third sensor data from a third sensor that is of a third sensor type that sends the third sensor data to the intrusion detection panel, with the third sensor data being an indication of a perimeter presence detected by the third sensor; determine that the first sensor indicated the presence of an alarm condition;
upon an assertion that the processor determined the presence of an alarm condition from the first sensor, the processor is further configured to;analyze the metadata received from the second sensor to validate whether the indicated alarm condition processed from the first sensor is a valid alarm condition or a false alarm condition; analyze the third sensor data received from the third sensor to validate existence of a perimeter presence at a time coincident with the indication of the alarm condition; and produce an alarm when the analysis of the metadata from the second sensor and the existence of a perimeter presence validates the assertion of the alarm condition provided from the first sensor. - View Dependent Claims (2, 3, 4)
-
-
5. An intrusion detection system comprises:
-
an intrusion detection panel; a first plurality of first type sensors each one configured to output to the intrusion detection panel, a binary signal that indicates the presence or absence of an event; a second plurality of second type sensors configured to output raw sensor data and determined metadata that are sent to the intrusion detection panel, the metadata comprising information resulting from processing of inputs by the second type sensors with the information comprising data regarding a state of an environment within the range of the second type sensors; a third plurality of third type sensors that send third type sensor data to the intrusion detection panel, with the third type sensor data being an indication of or absence of a perimeter presence detected by one or more of the third plurality of sensors; the intrusion detection panel coupled to the first, second and third type sensors, the intrusion detection panel comprising circuitry to; receive binary signals from the first plurality of sensors and raw sensor data and metadata from the second plurality of sensors, and the third type sensor data; determine that a first one of the first plurality of sensors indicates the presence of an alarm condition; analyze the metadata received from at least some of the second plurality of sensors to validate whether the indicated alarm condition is a valid alarm or a false alarm; analyze the third type sensor data received from the one or more of the plurality of third type sensors to validate existence of a perimeter presence at a time coincident with the indication of the alarm condition; and raise an alarm when the first one of the first plurality of sensors and the at least some of the second plurality of sensors confirm the presence of an alarm condition and the analysis of the third type of sensor data validates existence of a perimeter presence at a time coincident with the indication of the alarm condition. - View Dependent Claims (6, 7, 8, 9, 10, 11, 12, 13)
-
Specification