GB2589087A - Security apparatus, system and method - Google Patents
Security apparatus, system and method Download PDFInfo
- Publication number
- GB2589087A GB2589087A GB1916459.9A GB201916459A GB2589087A GB 2589087 A GB2589087 A GB 2589087A GB 201916459 A GB201916459 A GB 201916459A GB 2589087 A GB2589087 A GB 2589087A
- Authority
- GB
- United Kingdom
- Prior art keywords
- response
- security apparatus
- controller
- security
- sensor
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Withdrawn
Links
Classifications
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B13/00—Burglar, theft or intruder alarms
- G08B13/18—Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength
- G08B13/189—Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B15/00—Identifying, scaring or incapacitating burglars, thieves or intruders, e.g. by explosives
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B13/00—Burglar, theft or intruder alarms
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B25/00—Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems
- G08B25/002—Generating a prealarm to the central station
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B13/00—Burglar, theft or intruder alarms
- G08B13/18—Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength
- G08B13/189—Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems
- G08B13/19—Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using infrared-radiation detection systems
- G08B13/191—Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using infrared-radiation detection systems using pyroelectric sensor means
Landscapes
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Business, Economics & Management (AREA)
- Emergency Management (AREA)
- Burglar Alarm Systems (AREA)
- Alarm Systems (AREA)
Abstract
A security apparatus comprises a detection sensor for detecting intrusion into a monitored area, plural output devices including a light emitting device and an audio emitting device, and a controller for receiving an input from the sensor and for providing control signals to the output devices. The sensor sends first and second trigger signals to the controller upon detection of respective first and second trigger events. Upon receipt of the first trigger signal the controller activates one of the output devices to provide an initial response. Upon receipt of the second trigger signal the controller activates one of the output devices to provide an escalated response. The sensor may be a motion detector, a passive infra-red detector, a laser detector, a pressure sensor, a contact sensor, or a proximity sensor. The light emitting device may be an LED flood light, a halogen flood light, a flashing LED, or a strobe. The audio emitting device may provide an alarm, music, a voice signal, or a speech dialler.
Description
Intellectual Property Office Application No. GII1916459.9 RTM Date *10 January 2020 The following terms are registered trade marks and should be read as such wherever they occur in this document: WiFi Bluetooh Zigbee LoRa Intellectual Property Office is an operating name of the Patent Office www.gov.uk/ipo Security Apparatus, System and Method The present application relates to security apparatus, systems, and methods In particular apparatus, systems and methods for detecting and deterring intruders from private property, including homes and places of business, are described.
Background
A variety of different devices and methods are used for home security management Security lighting is employed as a simple deterrent; however this can be predictable in its operation and reduces in effectiveness over time. Moreover, security lighting has very little effect in securing an area or premises that is not overlooked by other individuals who could potentially respond to a security infringement.
Security alarms are also widely used, however these are generally only activated after an infringement into a building has already occurred There is also a real and significant risk of false and nuisance alarms which, as well as causing irritation to neighbours, reduce the effectiveness of such alarms over time.
Audio warnings systems are also known. However, many audio warning systems require human input upon notification of an intruder via a remote device or service such as a monitoring station. This method prevents full system automation and requires a remote device to be constantly accessible in order for the audio to operate.
In view of the deficiencies in existing systems, an improved security apparatus is desirable 20 Summary Aspects of the invention are set out in the independent claims and preferred features are set out in the dependent claims.
According to one aspect, there is provided a security apparatus for deterring infringement of a monitored area comprising: at least one intrusion detection sensor for detecting intrusion into the monitored area; and a plurality of output devices, the output devices comprising at least one light emitting device and at least one audio emitting device; a controller for receiving an input from the at least one sensor and for providing control signals to at least one of the plurality of output devices; wherein the at least one sensor is arranged to detect a first trigger event arid to send a first trigger signal to the controller; wherein, on receipt of the first trigger signal, the controller is arranged to control at least one of the plurality of output devices to provide an output at an initial response level; wherein the at least one sensor is further arranged to detect a second trigger event and to send a second trigger signal to the controller; wherein, on receipt of the second trigger signal, the controller is arranged to control at least one of the plurality of output devices to provide an output at an escalated response level The security apparatus can therefore be implemented to provide a more effective deterrent for intruders from private property or from any monitored area or space. The apparatus enables an automated but intelligent response. As set out above, the device contains multiple deterring outputs and an escalating sequence of response levels. As described in more detail below, responses can include lighting, camera, strobe lighting, voice warning or message, alarm signal (or music), calling the home owner or a security service. The method of escalation of response provides a more effective deterrent than a single response and is therefore more likely to displace an intruder more quickly and before a further infringement occurs, for example at a property boundary or perimeter rather than at the entry points to a building itself The escalation also allows lower levels of warning to be set to trigger more sensitively, without nuisance alarms or causing annoyance to the neighbours, while the escalated response may only trigger if the intrusion becomes more serious or is ongoing over an extended period.
Optionally, at the initial response level, the controller is arranged to control one output device to provide an output. For example, a light, a recorded voice warning or a warning signal Optionally, at the escalated response level, the controller is arranged to control a plurality of output devices to provide an output, preferably to provide an output simultaneously. For example, a light may operate together with a warning signal or a voice warning may alternate with a warning alarm. "Simultaneous" operation of two output devices includes alternating operation or activation of each output device.
In one embodiment, at the escalated response level, the plurality of output devices include a light emitting device and an audio emitting device.
In one embodiment, the intrusion detection sensor comprises at least one of a motion detector, a passive infrared detector, a laser detector, a pressure sensor, a contact sensor or a proximity sensor. In a particular embodiment, the passive infrared detector (PIR) is a Quad 10 Pllt motion sensor with a range of 20m.
Optionally, the device further comprises a light detector such as a photocell. This can enable the device to operate differently under different ambient lighting conditions. For example, a security light may be activated at night or in dark conditions, but not during the day or an audio signal may be set to be louder during the day than at night Optionally, the at least one sensor is arranged to detect at least one further trigger event and to send at least one further trigger signal to the controller, wherein on receipt of each further trigger signal, the controller is arranged to control a plurality of output devices to provide an output at one or more further escalated levels. That is, continued or more serious infringements into the monitored area can lead to increasing escalating levels of response.
Optionally, the light emitting device comprises at least one of: a light emitting diode (LED) flood light, a halogen flood light, a flashing LED arrangement and a strobe light A suitable LED floodlight may comprise an LED while light illuminator with a 25m range In some embodiments, a camera may be implemented in or alongside the apparatus. The camera may operate in the visible light or infrared spectrum.
The audio emitting device may be configured to provide an alarm, music, or voice enunciator signal. In particular, the audio emitting device may include a speaker and integral amplifier. A speech dialler may also be provided in some systems to generate and transmit a programmable voice message or SNIS message or a message for sending over an IP network.
In some embodiments, the monitored area comprises a first region and a second region and the first trigger event comprises detecting an intrusion into the first region and the second trigger event comprises detecting an intrusion into the second region. This may enable the system to determine that a potential intruder is approaching closer to a target (such as a property) in a monitored area. The first region and second region may be monitored by a single sensor with two sensing zones or may each be monitored separately by separate sensors within the device.
Optionally, the first trigger event comprises detecting an intrusion into the monitored area and wherein the second trigger event comprises continuing to detect the intrusion after a predetermined time period.
In one embodiment, the apparatus further comprises a user interface for enabling a user to set parameters relating to the trigger events and the response levels For example, the user or technician setting up the system can enter settings such as the trigger events, set timings and set parameters for the various response levels.
The apparatus may further comprise memory means for storing at least one of control instructions, output signals and a record of trigger events for the apparatus. The memory means may be a removable storage device such as an SD card or USB-connected storage device or internal memory connected to the controller of the device itself Optionally, the apparatus further comprises a microphone configured for the recording of custom messages and/or for enabling two-way communication. The custom messages may be output as part of the response to an infringement or may be used to alert a remote user or security assistant. Two-way communication may enable the potential intruder to speak to a human controller of the monitored area.
In some embodiments, the apparatus also includes an interface for receiving a remote control signal for remote control of the apparatus or for setting parameters for the apparatus. The interface may be a WiFi, BlueTooth-fm or Zigbee interface or another short-range wireless interface. A key fob may be used to arm the apparatus.
In some embodiments, the system may be implemented with a LoRaim interface or other low power wide area network interface. Such a connection can enable wireless control and monitoring.
A short range interface such as BlueToothTN4 may also be used for audio streaming and other short range control and communication.
In some embodiments, the apparatus further comprising an interface for an Internet protocol connection.
An interface such as any of those described above may be used to enable control of the apparatus via an application (App) provided on a user terminal such as a mobile telephone Control may include inputting configuration and set up parameters, activating or deactivating the device or arming or disarming the device.
Optionally,the apparatus further comprises a timer configured to delay at least one escalated response for a pre-determined time interval after the first response has been triggered.
There is also described herein a security system for deterring infringement of a monitored zone comprising: a plurality of security apparatus according to the first aspect or any of its optional features described herein, each security apparatus further comprising an interface for receiving control commands; a system controller, wherein the system controller is integrated into one of the security apparatus or wherein the system controller is provided as a separate element wherein the system controller sends control commands to each security apparatus to control the security apparatus to provide a first response in response to a first trigger event, the first response comprising a response by a first security apparatus; and an escalated response in response to a second trigger event, the second response comprising a response by more than one security apparatus.
The security system can therefore provide effective monitoring, control and deterrence of intrusion across a wider area, termed herein the monitored zone. This may be for example a housing plot or an office site. As described in more detail below, a number of security apparatus or devices such as those described above may be located at a number of positions with sensors arranged to monitor different parts of the zone. For example one or more devices may be positioned at the fence line or gate area of a property, with one or more devices at the boundaries of the property itself, such as over an entry door. A further layer of detection may be provided by placing devices within the property itself In a particular embodiment, using the network system, the devices can be positioned to trigger a response starting along the fence-line of a property, escalating towards the property line Preferably, sensors contained within the plurality of security apparatus are arranged to detect the presence of an infringer within a monitored zone that is larger than a monitored area covered by any one of the sensors. The sensors and output devices may be of a single type (that is, all of the devices may be identical) or may differ depending on their intended deployment position.
The system controller may be arranged to control the security apparatus to provide an escalated response in response to a change in position of an infringer within a monitored zone, optionally wherein the change in position is determined by the infringer being detected by sensors associated with different ones of the plurality of security apparatus. That is, the response may escalate as an infringer approaches a certain part of the zone, such as the property itself It will be appreciated that as the intruder moves, the intruder may pass out of the range of one sensor and into the range of another sensor.
Optionally, the system controller is arranged to control the security apparatus to provide an escalated response in response to detecting the presence of an infringer within a monitored zone for a predetermined a length of time That is, if the intruder remains within the monitored zone with or without moving, this may trigger escalation of the response in some embodiments, the system controller is arranged to control the security apparatus to de-escalate the response in response to a change in position of an infringer within a monitored zone, optionally wherein the change in position is determined by the infringer being detected by sensors associated with different ones of the plurality of security apparatus. De-escalation of the response may include stepping down from the escalated response to the first response level.
The system may further comprise a timer configured to delay at least one escalated response for a pre-determined time interval after the first response has been triggered.
According to a further aspect, there is provided a method of controlling a security apparatus for deterring infringement of a monitored area comprising: arranging at least one intrusion detection sensor to detect an intrusion into the monitored area; and providing a plurality of output devices, the output devices comprising at least one light emitting device and at least one audio emitting device; detecting by the at least one intrusion detection sensor a first trigger event; sending a first trigger signal from the sensor to a controller; controlling at least one of the plurality of output devices to provide an output at an initial response level; detecting by the at least one intrusion detection sensor a second trigger event; sending a second trigger signal from the sensor to the controller; controlling at least one of the plurality of output devices to provide an output at an escalated response level.
According to a further aspect there is provided a method of controlling a security system for deterring infringement of a monitored zone comprising: providing a plurality of security apparatus according to the first aspect or any of its preferred features described herein; arranging an intrusion detection sensor of each security apparatus to monitor a portion of the monitored zone; providing a system controller coupled to each security apparatus; sending control commands from the system controller to each security apparatus to control the security apparatus to provide a first response in response to a first trigger event, the first response comprising a response by a first security apparatus; and an escalated response in response to a second trigger event, the second response comprising a response by more than one security apparatus.
Also envisaged in the present disclosure is an App for controlling the apparatus or system as described above. A computer program or computer program product implemented on the apparatus or system described herein or on a controller for implementing the methods described are also disclosed.
Any system feature as described herein may also be provided as a method feature, and vice versa As used herein, means plus function features may be expressed alternatively in terms of their corresponding structure Any feature in one aspect of the invention may be applied to other aspects of the invention, in any appropriate combination In particular, method aspects may be applied to system aspects, and vice versa. Furthermore, any, some and/or all features in one aspect can be applied to any, some and/or all features in any other aspect, in any appropriate combination. It should also be appreciated that particular combinations of the various features described and defined in any aspects of the invention can be implemented and/or supplied and/or used independently.
Description
Embodiments of the present invention will now be described by way of example only and with reference to the accompanying drawings, in which: Figure 1 is a schematic diagram of a deterrent apparatus according to one embodiment; Figure 2 illustrates a device according to Fig. I implemented to protect a property, Figure 3 is a flow chart illustrating the method of operation of a deterrent apparatus according to one embodiment, Figure 4 is a schematic diagram of a deterrent system installation, comprising a network of deterrent devices, according to Fig 1, Figure 5 is a flow chart illustrating the method of operation of a deterrent apparatus according to a further example.
Figure 1 is a schematic diagram of a deterrent apparatus according to one embodiment. In particular, Fig. 1 illustrates an apparatus 100 comprising a controller 101, a sensor 102, and multiple output devices 103. In one embodiment, the sensor may be a passive infrared (PR) sensor. In other embodiments, alternative sensors such as dual-tech, lasers or pressure-sensors may be used. It will be appreciated that, although only one sensor is shown in Fig. I, other implementations may use more than one sensor of the same or different types.
In the preferred embodiment, the multiple output devices 103 shown in Fig. 1 output audio and light, respectively. Audio outputs may include a speaker and amplifier to facilitate an alarm, a voice enunciator output, a recorded message, music or similar. The apparatus may also include storage means, such as an SD card, to store custom messages, alarm signals or any other audio output. In a particular implementation, the system may include a wireless or wired interface for copying audio files from a computer or mobile device. Such an interface could also be used for copying configuration files on set up or for setting operation parameters. In one embodiment, the apparatus includes a microphone to enable the recording of custom messages, and/or two-way communication via speech dialling. Light outputs may include one or more of LED white light illuminators, flashing warning LEDs, strobe lights, or other light output known to a person skilled in the art. In one embodiment, although this is not shown in Fig. 1, the device also includes a camera with recording capabilities.
In a preferred embodiment, the apparatus can be mounted on the exterior of a property over an access point as shown in Fig. 2 A door access point, a gateway or window could be 30 monitored using the present device. In other embodiments, the apparatus can be mounted on exterior walls, fences or boundary lines belonging to the property. In some cases, such as monitoring a warehouse or business premises, or for use as part of a home automation system, it may be appropriate to mount the apparatus on a property interior. Once in position, the field of view and angle of view of the sensor is adjusted to cover the area that the user wishes to monitor. Other adjustments may also be enabled, for example relating to the sensitivity of the sensor and the timing between activation of the sensor and the alarm outputs, as described in more detail below.
Fig. 3 illustrates a method of operation for a deterrent apparatus according to one embodiment. When the sensor is triggered, a signal is sent to the controller which then sends a command to activate at least one of the multiple outputs. If the intruder does not retreat and the sensor remains triggered, the controller escalates the deterrent by activating subsequent outputs. An escalated response may include the same output devices operating in a more intense way, such as a louder or alarmed audio output, or flashing or brighter light output. An escalation in response may also include a plurality of output devices operating simultaneously. In an exemplar embodiment, once the sensor is triggered, the controller activates the light output to illuminate and deter the intruder; if the intruder does not retreat and the sensor remains triggered, the controller additionally activates the audio output to issue a warning message.
In some embodiments, the deterrent apparatus 100 further comprises a timer. The timer may employ a minimum time for which a sensor must remain triggered after activating the first response, before a subsequent escalated response may be initiated. This can prevent false escalated responses being triggered by innocent visitors, such as a postman, and thus a subsequent escalated response may only be activated if a person loiters around the property.
The apparatus is designed to operate automatically and autonomously, without intervention from an operator or owner of the device or the property it is securing. The operation of the device, including the timing and sequence of operation of the output devices is preferably pre-programmed in to the device prior to installation. This minimises the amount of set up required by the user.
Remote activation and/or deactivation of the deterrent device may also be possible, for 30 example via a key fob or web-based or app-based interface Where a remote interface to the device is provided, a pre-programmed operation sequence or parameters associated with such a sequence can be changed and modified by a user or installation technician. This can allow a user to customise the apparatus to a particular situation, for example to cause the device to activate or escalate its response more quickly or to change the volume or content of the warning messages The system may be arranged to be armed when the intruder alarm system is set, optionally with a delay before arming. For example, once the alarm system is armed the deterrent system may become active after 5 minutes. The system is disarmed once the alarm system is deactivated. Arming and disarming may be effected by a physical interface on the alarm system itself or via an app-based or web-based interface.
In another embodiment, the apparatus has wireless connectivity such as, but not limited to, WiFi, LoRa, and/or Bluetooth connections. In one embodiment, the Bluetooth connection can be used for audio streaming through the audio output. The apparatus may also include an Internet Protocol (W) interface to allow Internet of Things (IoT) connections and communicate with a remote device. This may allow the home owner or security services to monitor the property remotely and/or control the deterrent device, for example via an App.
This may also facilitate alerts sent to a remote device if the security system is triggered. In another embodiment, the device may store logs or provide service reports to the user.
Fig. 4 illustrates a deterrent system 200, wherein multiple deterrent apparatus 100 operate within a local wireless network (e.g. LAN). The multiple devices are distributed across the property and may be positioned up to the fence line. In the embodiment shown in Fig.4, the system comprises a master apparatus 201. In addition to the features of a regular deterrent apparatus 100, the master apparatus further comprises a master controller which coordinates and escalates the deterrent responses by remotely activating at least one output device in at least one of the deterrent apparatus 100. The master controller can communicate bi-directionally with each deterrent apparatus in the system. In another embodiment, the master controller may be a separate device that does not include the functionality of the security device but simply controls the plurality of security devices in the network.
The network of devices allows an escalated response that reacts to and is goverened by the position of the intruder within the controlled space. As the intruder progresses closer to the property, sensors in different deterrent apparatus are triggered. Referring to the example shown in Fig. 4, as the intruder crosses the fence line the sensor in apparatus 100a is triggered. Apparatus 100a sends a signal to alert the master controller that it has been triggered. A first deterrent response is coordinated by the controller and activated, e.g. a security light is turned on in apparatus 100a. As the intruder progresses down the path, the sensor in apparatus 100b is triggered. Apparatus 100b sends a signal to alert the master controller that it has been triggered. The master controller interprets the signal from 100b alongside the earlier signal from 100a to determine that the intruder has progressed closer to the property line, posing a greater threat. Thus a secondary deterrent response is activated of escalating intensity, e.g. a security light is turned on and a warning is issued in apparatus 100b. This is repeated for the triggering of the sensor within apparatus 100c and a third deterrent response is activated of further escalating intensity, e.g. a security light is turned on in apparatus 100b and a loud alarm is outputted from apparatus 100c and optionally also from apparatus 100a, 100b.
Similarly, the network of devices allows a de-escalation of response according to the position of the intruder. For example, if first and second deterrent responses are activated as described above, this could deter the intruder who may then retreat. This would result in re-triggering the sensor in apparatus 100a. 100a then re-sends a signal to the master controller which interprets the signal alongside the earlier signals from 100a and 100b to determine that the intruder has retreated further from the property line, posing a lesser threat. Thus the master controller may signal for the sequential or simultaneous deactivation of all active deterrent outputs.
The described invention allows the system to be tailored to each individual property as the number and position of deterrent devices within the system is at the discretion of the home owner. Due to the hierarchical levels of deterrent responses, this system facilitates less annoyance for neighbours as it doesn't immediately produce nuisance alarms. This also means that the lowest level of deterrent can be adjusted to trigger more sensitively as the response can be tuned accordingly. This can instantly alert property owners to the presence of visitors or trespassers on their property, rather than waiting until the threat level is considered high.
In some implementations, the deterrent system may be connected to third party systems such as Home Automation controllers that may then facilitate internal announcements or actions with internal lighting, window blind control or turning on televisions to effect the impression of inhabitants reacting to the events occurring outside.
In some embodiments, the deterrent system 200 further comprises a timer. The timer may employ a minimum time for which at least one sensor in the network, must remain triggered after the first response, before a subsequent escalated response can be initiated.
The minimum time may be programmed to imitate the time taken for a visitor to reach the property from the fence line and promptly recede. This may prevent false escalated responses being triggered by innocent visitors, such as a postman or delivery worker, and thus a subsequent escalated response may only be activated if a person loiters around the property.
Figure 5 illustrates a further example operation of a security apparatus as described herein. It will be appreciated that this example is illustrative only and the apparatus may be configured in a different way, but it provides a further specific example to assist the skilled person in implementing embodiments of the apparatus. When a PLR of the apparatus is triggered, the system determines whether it is currently armed. If not armed, a photocell determines whether it is currently dark. If not, the system takes no action. However, if it is dark, an LED array is turned on. The system waits for 30 seconds, based on an internal timer, and if there is no further triggering of the PIR sensor, the LED turns off and no further action is taken. If the PIR is triggered again, however, the apparatus is then set to an armed state.
If the PIR is triggered when the apparatus is in an armed state, the apparatus first determines whether it is dark, for example using a photocell. If not, an audio track (identified as Audio TRK1) is output through a speaker. This may be a voice warning, alarm or music. If it is dark, the audio track is output and an LED array is also switched on.
The apparatus waits to determine whether the PIR sensor is triggered again. If not, the LED is turned off. If the sensor is triggered again however, a second audio track (identified as Audio TRK2) is output. This may be, for example, a louder siren-type alarm or a voice warning with increase severity. In addition, an LED strobe light may be triggered.
The whole process illustrated in Figure 5 is intended to be implemented over a time period of about 20 seconds. However, the skilled person will appreciate that many of the parameters and responses illustrated in Figure 5 may be configured as appropriate for a particular implementation.
Alternative applications may exist within health and safety, where a network of devices can issue safety reminders or warnings when approaching dangerous areas e.g. on construction sites.
In summary, embodiments of the system provide an intelligent and automatic response that includes an escalating deterrent where necessary. The response provided by the system can depend on the trigger. For example, a response to a trigger caused by a passive infrared detector determining that an individual has entered into a monitored area may be at a lower level of escalation than a response to a trigger caused by a contact sensor determining that a door has been opened. Triggering of one response may also lead to other sensors being activated. For example, if a passive infrared detector determines that there has been a trespass into a monitored area and triggers a first response such as a light, the system may determine whether a pressure sensor has also been activated to determine whether the trespasser is likely to be human or animal and adjust the response accordingly.
The system can therefore provide a more effective deterrent without requiring direct user input in response to detection of an infringement While a specific architecture is shown, any appropriate hardware or software architecture may be employed. The above embodiments and examples are to be understood as illustrative examples. Further embodiments, aspects or examples are envisaged. It is to be understood that any feature described in relation to any one embodiment, aspect or example may be used alone, or in combination with other features described, and may also be used in combination with one or more features of any other of the embodiments, aspects or examples, or any combination of any other of the embodiments, aspects or examples.
Furthermore, equivalents and modifications not described above may also be employed without departing from the scope of the invention, which is defined in the accompanying claims.
Claims (1)
- Claims 1 A security apparatus for deterring infringement of a monitored area comprising: at least one intrusion detection sensor for detecting intrusion into the monitored area; 5 and a plurality of output devices, the output devices comprising at least one light emitting device and at least one audio emitting device, a controller for receiving an input from the at least one sensor and for providing control signals to at least one of the plurality of output devices; 113 wherein the at least one sensor is arranged to detect a first trigger event and to send a first trigger signal to the controller; wherein, on receipt of the first trigger signal, the controller is arranged to control at least one of the plurality of output devices to provide an output at an initial response level; wherein the at least one sensor is further arranged to detect a second trigger event and to send a second trigger signal to the controller; wherein, on receipt of the second trigger signal, the controller is arranged to control at least one of the plurality of output devices to provide an output at an escalated response level 2. The security apparatus according to claim I wherein, at the initial response level, the controller is arranged to control one output device to provide an output 3. The security apparatus according to claim I or 2 wherein, at the escalated response level, the controller is arranged to control a plurality of output devices to provide an output, preferably to provide an output simultaneously.4. The security apparatus according to any preceding claim wherein, at the escalated response level, the plurality of output devices include a light emitting device and an audio emitting device.The security apparatus according to any preceding claim wherein the intrusion detection sensor comprises at least one of a motion detector, a passive infrared detector, a laser detector, a pressure sensor, a contact sensor or a proximity sensor.6. The security apparatus according to any preceding claim wherein the at least one sensor is further arranged to detect at least one further trigger event and to send at least one further trigger signal to the controller; wherein on receipt of each further trigger signal, the controller is arranged to control a plurality of output devices to provide an output at one or more further escalated levels 7. The security apparatus according to any preceding claim wherein the light emitting device comprises at least one of an LED flood light, a halogen flood light, a flashing LED arrangement, and a strobe light.8. The security apparatus according to any preceding claim wherein the audio emitting device is configured to provide an alarm, music or voice enunciator signal, optionally wherein the audio emitting device comprises a speech dialler.9. The security apparatus according to any preceding claim wherein the monitored area comprises a first region and a second region and wherein the first trigger event comprises detecting an intrusion into the first region and the second trigger event comprises detecting an intrusion into the second region.10. The security apparatus according to any preceding claim wherein the first trigger event comprises detecting an intrusion into the monitored area and wherein the second trigger event comprises continuing to detect the intrusion after a predetermined time period.11. The security apparatus according to any preceding claim further comprising a user interface for enabling a user to set parameters relating to the trigger events and the response levels.12. The security apparatus according to any preceding claim further comprising memory means for storing at least one of control instructions, output signals and a record of trigger events for the apparatus.13. The security apparatus according to any preceding claim further comprising a microphone configured for the recording of custom messages and/or for enabling two-way communication 14. The security apparatus according to any preceding claim further comprising an interface for receiving a remote control signal for remote control of the apparatus or for setting parameters for the apparatus.15. The security apparatus according to any preceding claim further comprising an interface for an intemet protocol connection.16. The security apparatus according to any preceding claim further comprising a timer configured to delay at least one escalated response for a pre-determined time interval after the first response has been triggered.17. A security system for deterring infringement of a monitored zone comprising: a plurality of security apparatus according to any of claims 1 to 16, each security apparatus further comprising an interface for receiving control commands; a system controller, wherein the system controller is integrated into one of the security apparatus or wherein the system controller is provided as a separate element; wherein the system controller sends control commands to each security apparatus to control the security apparatus to provide a first response in response to a first trigger event, the first response comprising a response by a first security apparatus; and an escalated response in response to a second trigger event, the second response comprising a response by more than one security apparatus.18. The security system according to claim 17 wherein sensors contained within the plurality of security apparatus are arranged to detect the presence of an infringer within a monitored zone that is larger than a monitored area covered by any one of the sensors 19. The security system according to claim 17 or 18 wherein the system controller is arranged to control the security apparatus to provide an escalated response in response to a change in position of an infringer within a monitored zone, optionally wherein the change in position is determined by the infringer being detected by sensors associated with different ones of the plurality of security apparatus 20. The security system according to any of claims 17 to 19 wherein the system controller is arranged to control the security apparatus to provide an escalated response in response to detecting the presence of an infringer within a monitored zone for a predetermined a length of time.21. The security system according to any of claims 17 to 20 wherein the system controller is arranged to control the security apparatus to de-escalate the response in response to a change in position of an infringer within a monitored zone, optionally wherein the change in position is determined by the infringer being detected by sensors associated with different ones of the plurality of security apparatus.22. The security system according to any of claims 17 to 21 further comprising a timer configured to delay at least one escalated response for a pre-determined time interval after the first response has been triggered 23. A method of controlling a security apparatus for deterring infringement of a monitored area comprising: arranging at least one intrusion detection sensor to detect an intrusion into the monitored area; and providing a plurality of output devices, the output devices comprising at least one light emitting device and at least one audio emitting device; detecting by the at least one intrusion detection sensor a first trigger event; sending a first trigger signal from the sensor to a controller; controlling at least one of the plurality of output devices to provide an output at an initial response level; detecting by the at least one intrusion detection sensor a second trigger event; sending a second trigger signal from the sensor to the controller; controlling at least one of the plurality of output devices to provide an output at an escalated response level.24 A method of controlling a security system for deterring infringement of a monitored zone comprising: providing a plurality of security apparatus according to any of claims 1 to 16; arranging an intrusion detection sensor of each security apparatus to monitor a portion of the monitored zone; providing a system controller coupled to each security apparatus; sending control commands from the system controller to each security apparatus to control the security apparatus to provide a first response in response to a first trigger event, the first response comprising a response by a first security apparatus; and an escalated response in response to a second trigger event, the second response comprising a response by more than one security apparatus.
Priority Applications (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| GB1916459.9A GB2589087A (en) | 2019-11-12 | 2019-11-12 | Security apparatus, system and method |
Applications Claiming Priority (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| GB1916459.9A GB2589087A (en) | 2019-11-12 | 2019-11-12 | Security apparatus, system and method |
Publications (2)
| Publication Number | Publication Date |
|---|---|
| GB201916459D0 GB201916459D0 (en) | 2019-12-25 |
| GB2589087A true GB2589087A (en) | 2021-05-26 |
Family
ID=69062236
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| GB1916459.9A Withdrawn GB2589087A (en) | 2019-11-12 | 2019-11-12 | Security apparatus, system and method |
Country Status (1)
| Country | Link |
|---|---|
| GB (1) | GB2589087A (en) |
Cited By (1)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20230230463A1 (en) * | 2022-01-19 | 2023-07-20 | Youssef Abdallah | Methods and systems for monitoring and reporting security breach of a property |
Families Citing this family (1)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN115830784A (en) * | 2022-11-22 | 2023-03-21 | 中科蓝卓(北京)信息科技有限公司 | A track foreign object linkage monitoring device, monitoring system and monitoring method |
Citations (4)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20070252720A1 (en) * | 2006-04-27 | 2007-11-01 | U.S. Safety And Security, L.L.C. | Multifunction portable security system |
| WO2018060687A1 (en) * | 2016-09-27 | 2018-04-05 | Downey Graham Anthony | Improvements in alarm systems |
| US10163329B1 (en) * | 2017-06-24 | 2018-12-25 | Vivint, Inc. | Home alarm system |
| EP3471072A1 (en) * | 2017-10-12 | 2019-04-17 | Honeywell International Inc. | System and method for providing a plurality of alarm levels for a motion detector monitoring a region |
-
2019
- 2019-11-12 GB GB1916459.9A patent/GB2589087A/en not_active Withdrawn
Patent Citations (4)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20070252720A1 (en) * | 2006-04-27 | 2007-11-01 | U.S. Safety And Security, L.L.C. | Multifunction portable security system |
| WO2018060687A1 (en) * | 2016-09-27 | 2018-04-05 | Downey Graham Anthony | Improvements in alarm systems |
| US10163329B1 (en) * | 2017-06-24 | 2018-12-25 | Vivint, Inc. | Home alarm system |
| EP3471072A1 (en) * | 2017-10-12 | 2019-04-17 | Honeywell International Inc. | System and method for providing a plurality of alarm levels for a motion detector monitoring a region |
Cited By (2)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20230230463A1 (en) * | 2022-01-19 | 2023-07-20 | Youssef Abdallah | Methods and systems for monitoring and reporting security breach of a property |
| US12106642B2 (en) * | 2022-01-19 | 2024-10-01 | Youssef Abdallah | Methods and systems for monitoring and reporting security breach of a property |
Also Published As
| Publication number | Publication date |
|---|---|
| GB201916459D0 (en) | 2019-12-25 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| US8504103B2 (en) | Cellular home security system | |
| US6107930A (en) | Security system keypad illuminated by proximate motion | |
| US20070182543A1 (en) | Intelligent Home Security System | |
| US10539938B2 (en) | Method of smart scene management using big data pattern analysis | |
| US10685557B2 (en) | Emergency notification system | |
| GB2589087A (en) | Security apparatus, system and method | |
| CN107302649A (en) | Camera system for the perimeter of building | |
| US7400242B2 (en) | Exit arming delay security system and method | |
| JP5870470B2 (en) | Monitoring system | |
| KR100878047B1 (en) | Security system and method using tension sensing sensor | |
| US10887562B2 (en) | Camera device for the exterior region of a building | |
| WO2018060687A1 (en) | Improvements in alarm systems | |
| CA3010659A1 (en) | Systems and methods for providing a plurality of alarm levels for a motion detector monitoring a region | |
| WO2000048151A1 (en) | Improvements in or relating to control and/or monitoring systems | |
| JP4061338B2 (en) | Intrusion detection device | |
| US9633536B1 (en) | Motion sensor alarm and sprinkler device | |
| JPH10162256A (en) | Burglar system | |
| KR20240031515A (en) | System for observing intruding objects for protecting electric power facilities and method for respondng | |
| CN204360490U (en) | A kind of LED warning system | |
| WO2022243449A1 (en) | Security monitoring system and method | |
| JP2005038115A (en) | Intruder monitoring method and apparatus | |
| Tasie et al. | Design and Implementation of Intruder Detector System with SMS Alert | |
| JPH01271897A (en) | Guard system | |
| JP3102082U (en) | Security alarm | |
| JP2000149159A (en) | Invasion warning device |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| WAP | Application withdrawn, taken to be withdrawn or refused ** after publication under section 16(1) |