Synergism, Over Used & Unapplied

 

            There are two technologies markets that are in strong favor.  Cloud computing & Surveillance Security have generated tremendous interest in the market place. How about an opportunity that embraces both areas of interest based upon a recent US patent?  The patent is applicable to many applications and markets.  One of the more intriguing markets is Home Security.

 

Extending Home Security

 

            Traditional Home Security has used the doors, windows, and other points of entry into the home as the first line of threat detection.  It has worked well.  False alarms are rare, detection is very reliable, and the alert is immediate.  The sounding of an alert means the perimeter has been penetrated and the intruder has entered the premises.

 

            If the home is occupied the residences will have limited time and few options to protect themselves from the threat.  In a survey conducted in early 2010, home owners in a Houston suburb expressed a desire to extend the security perimeter to gain additional time to take action.  “As the threat enters the front door, I want to be exiting the rear door”, was a common sentiment.  If the security perimeter can be extended there are additional benefits that can be offered.  But, like all security systems, if the false alarms become excessive the system will be turned off, false alarm suppression is paramount. What are the benefits of Extending Security Perimeter?

 

1.                  Additional time to respond.  The greater the time the more options the owner/occupant will have to safe guard his family and possessions.  The time can be used to call for a third party response (private or local police), and provide them accurate information on the situation. 

 

2.                  The early detection capability should provide a description of the threat.  Is there more than one person?  Is the intruder(s) carrying any tools or weapons?  Is the intruder(s) moving in a deliberate fashion or moving quickly towards a specific point of entry?  This information helps the owner/occupant to avoid the threat.  This same information will greatly assist the first responder.

 

3.                  The “lying-in-wait” has become a more common tactic as armed home invasions have increased.  The intruder physically confronts the owner just prior to home entry.  This tactic effectively circumvents the existing security system by gaining control of the owner prior to sounding an alarm.  The only way to counter this threat is to detect the threat prior to returning home, and alerting authorities to converge on the scene.

 

4.                  Loitering is often a precursor to an attack.  A perimeter detection system that identifies loitering allows the owner to initiate defensive action by reporting the “suspicious loitering” and requesting an investigation. “Peeping Toms” are a form of loitering.   A routine police investigation will uncover the true motive and negate the threat.

 

5.                  Also, an expanded perimeter system could serve a dual function of monitoring the property and recording abnormal events.  The incursion of wild and domestic animals are situations with possible harmful consequences.  The owner/occupant desires the same information, but often the action can be deferred for later action.  Different areas of the USA have their own localized threats.  In some areas a roaming bear, an alligator, or a skunk are uncommon but recurring events.  The owner desires a capability to customize the system to fit their particular situation to obtain the maximum benefit.     

 

On June 15, 2010, we were granted a patent for an Infrared Security System & Method (ISSM), USPN: 7,738,008.  We believe that this patent has great market potential.  The ISSM provides an exterior security system that complements current home security systems.  The system provides the necessary performance and flexibility to meet the need. By extending the security perimeter and supplementing the scope of the security coverage, additional benefits are offered to the home security customer. 

 

ISSM’s performance is revolutionary.  The "method" used employs multiple cameras performing the detection, locating, classification, verification, and tracking using 3 dimensional closed form equations.  The power of this technique is it eliminates false alarms, which has been the Achilles’ heel of video analytics. 

 

Secondly, ISSM is interconnected via the wireless domain.  ISSM utilizes advance wireless technology from low bandwidth "cloud computing", LAN, still frame photos, up to and including video bandwidth real time displays.  The renting out of wireless space is a cash cow in today’s market.

 

            Home Security is illustrated in the HarmAlarm attached figure.  The heart of the security is formed by the two IR Camera located on the front of the home.  They are designated as “IR Data”.  The IR Cameras are hardwired to the central processor.  The Desk Top computer provides the threat definition algorithms established by the home owner using a “menu” selection.  When a threat is detected and verified, the threat image is transmitted via commercial cell-phone link to a handheld device.  This receiver is with the home owner, so they will receive the real time information were ever they are.  They can be miles away in their car or with friends, or they can be in bed late at night.  In either case they receive a threat warning, images of the isolated threat updated in real time, and the precise location of the threat with respect to the home.

  

            The connectivity shown is as hardwired reflecting the simplest form of ISSM.  The hardwired connections in many cases will be replaced with wireless, LAN or “Cloud Computing”.  The Processor maybe remotely hosted in a Central Processor.  The desk top computer may also be remote, using an Internet connection to select the security desired from a Menu.  These generalized connections are shown in the second attached figure.

 

Gary Ball

                                                                                                            President, IAI