Community Security System Using Intelligent Information Sharing

ABSTRACT

The present invention relates to a community security system capable of monitoring multiple, generally adjacent, consecutive private security areas to confirm human activity and engage sensory alerts. The community security system includes at least two private security areas having the capability of being networked together to enable information sharing. Each private security area is monitored by a private security system and contains one or more detection devices for monitoring and detecting activity occurring within the boundaries of the private security area. Information detected by detection devices within the private security areas can then communicate with other detection devices within the private security area or with the community security system to confirm activity, track activity across adjacent boundaries, engage sensory alerts and notify community members or authorities, as needed.

CROSS-REFERENCE TO RELATED APPLICATIONS

This application is a continuation of and claims priority to U.S. patentapplication Ser. No. 16/536,240, filed Aug. 8, 2019, which applicationis a continuation of and claims priority to U.S. patent application Ser.No. 15/329,988, which is a 371 national stage patent application thatclaims priority to International Application No. PCT/IB2015/002086 filedJul. 14, 2015, titled COMMUNITY SECURITY SYSTEM USING INTELLIGENTINFORMATION SHARING which claims priority of U.S. Provisional PatentApplication Ser. No. 62/120,292, filed on Feb. 24, 2015, titledCOMMUNITY SECURITY SYSTEM USING INTELLIGENT INFORMATION SHARING and U.S.Provisional Patent Application Ser. No. 62/033,404, filed on Aug. 5,2014, titled A SYSTEM TO DETECT AND DETER INTRUDERS WHEN THEY ENTER APRIVATE AREA WITHIN A COMMUNITY, which applications are incorporated byreference in this application in their entirety.

RELATED APPLICATIONS 1. Field of the Invention

This application relates generally to security systems and, moreparticularly, to community-based security systems using intelligentinformation gathering, processing and sharing.

2. Background

During the hours of darkness or other periods of vulnerability, aphysically secured building and/or other type of restricted zone is leftsusceptible to break-ins or other forms of attack due to an intruders'belief that these areas are unattended and therefore, the intruder isunlikely to be discovered.

Conventional intruder alarm systems will only detect the intruder oncethey have breached the physically secured building. An intruder relieson the knowledge that even when a conventional alarm system is triggeredthere is an expected minimum response time that provides a window ofopportunity for the intruder to conduct their illicit activities. If thebuilding is still occupied when the intruder enters, there is a highchance that a confrontation will occur without the owner/authorizedperson receiving any prior warning. This may lead to a violent act.

A conventional alarm system could be configured with external alarmsensors to provide an earlier alarm detection of a potential intruder. Aproblem with this method is the potential for false alarm triggerscaused by the external environmental conditions being difficult topredict and control. These false alarms cause the owner/authorized userand security monitoring company to lose confidence in the conventionalalarm system as a reliable indicator of an intruder incursion leading tothe conventional alarm system no longer being armed making the securitysystem mute.

A conventional alarm system is limited in its notification and isusually reliant on a security monitoring company to receive the alarmstatus and coordinate contact with the key holders, which may not beavailable at that time preventing a desired response and in somecountries preventing an official response, such as police response. Thisis usually an ongoing charged service with recurring monthly or annualfees. In most instances, the security monitoring company is not locatedin the same area/state, reducing its familiarity with the property underattack or the neighborhood in which it is located. This can have majorimpact on the execution and management of a suitable response. In thecase of the more frequent trend of an intruder entering a property whileit is still occupied, the conventional alarm system is usually not evenarmed due to the problems of setting up the alarm zones suitable forthat time of day.

A need therefore exists for an intelligent community-based system thatcan more effectively, quickly and intelligently monitor activities withprivate zones in a community and share relevant information withadjacent or consecutive zones within the community, creating an overallenhanced and highly effective security system.

SUMMARY

The present invention relates to a community security system capable ofmonitoring multiple, generally adjacent, consecutive private securityareas to confirm human activity and engage sensory alerts. The communitysecurity system includes at least two private security areas having thecapability of being networked together, directly and/or indirectlythrough a shared server, to enable information sharing.

Each private security area is monitored by a private security system andcontains one or more detection devices for monitoring and detectingactivity occurring within the boundaries of the private security area.Information detected by detection devices within the private securityareas can then communicate with other detection devices within theprivate security area or with the community security system to confirmactivity, track activity across adjacent boundaries, engage sensoryalerts and notify community members or authorities, as needed.

In one example of an implementation, the private or community securitysystems may be in communication with the system users, via personalmobile devices, to provide real-time, alerts to the system users,community or group members. The security systems may further be incommunication with, and managed by, a server that is able tointelligently monitor all activities within the system and communicate,as necessary, to individual users and/or community or group members.Geo-coordinate references associated with each of the members of thecommunity or individual private security areas as well as the locationof the detection devices within the community and/or private securityareas may be used to enhance the effectiveness of the system.

Optionally, the community system could group external cameras to createa community CCTV network accessible by all the community group membersto provide access to live camera views, camera movement control andprovide video history review to all of the community group members.

Other devices, apparatus, systems, methods, features and advantages ofthe invention will be or will become apparent to one with skill in theart upon examination of the following figures and detailed description.It is intended that all such additional systems, methods, features andadvantages be included within this description, be within the scope ofthe invention, and be protected by the accompanying claims.

BRIEF DESCRIPTION OF THE DRAWINGS

The invention may be better understood by referring to the followingfigures. The components in the figures are not necessarily to scale,emphasis instead being placed upon illustrating the principles of theinvention. In the figures, like reference numerals designatecorresponding parts throughout the different views.

FIG. 1 illustrates a communication network for a community securitysystem of the present invention.

FIG. 2 plan view of a private security area forming part of thecommunity security system of the present invention.

FIG. 3 is a block diagram of one example of an implementation of aprivate security system for monitoring a private security area in acommunity monitored as part of the community monitoring system of thepresent invention.

FIG. 4 depicts a block diagram of a master device of the privatesecurity system of FIG. 3.

FIG. 5 illustrates an example customer record stored in the database ofthe shared supervisory server of the community monitoring system.

FIG. 6 illustrates a drawing of multiple private security areas forminga community security system.

FIG. 7a depicts a flow diagram showing one example of an automatedmethod for determining how to set-up a private security system in aprivate security area.

FIG. 7b depicts a flow diagram showing one example of an automatedmethod for determining how to install a private security system in aprivate security area.

FIG. 8 depicts one example of an implementation of a flow diagram forthe system handling of an approaching intruder detected by the securitysystem.

FIG. 9 depicts one example of an implementation of a flow diagram forthe sharing of detection information.

FIG. 10 depicts a flow diagram of one example of an implementation of apanic feature for use in connection with a community user's mobiledevice.

DETAILED DESCRIPTION

As described in FIG. 1 and will further described below in connectionwith FIG. 2-10, the present invention relates to a community securitysystem 100 capable of monitoring multiple, generally adjacent,consecutive private security areas 102 in a community to confirm humanactivity, engage sensory alerts 309, 310 (see FIG. 3) and determine theintelligent selection and/or automation of relevant equipment, such as acommunity CCTV camera 128. Each private security area 102 in thecommunity is generally monitored by a private security system 101 thatmonitors the area external to a residential home or business 130 withincertain predetermined perimeter boundaries 105. The private securitysystems 101 have the capability of being networked together to enableinformation sharing, thereby creating an intelligent community securitysystem 100. FIG. 1 illustrates one example of a communications networkfor the intelligent community security system 100.

Each private security system 101 in the community includes detectiondevices 104 that use a detection field of view to detect humans 115moving within various predefined horizontally and/or vertically spaceddetection zones 107 within the private security area 102. Thesedetection zones 107 may be established by the overlapping of fields ofview or separately defined detection planes determined during theinstallation process. Each private security area 102 is divided intovarious detection zones 107 monitored by one or more separate detectiondevice 104. As illustrated in FIG. 1, any detection information may beshared with adjacent or consecutive private security areas 102 throughnetwork communications via a master device 120 and shared supervisoryserver 122.

The detection devices 104 located within the private security areas 102can communicate with other detection devices 104 in the private securityarea and with a master device 120 using a self-forming and propagatingdata communications network 401 (FIG. 4) formed between detectiondevices 104 and/or the master device 120 within the private securityareas 102 and/or between adjacent or consecutive private security areas102, using multiple redundant data pathways. The master device 120 couldpass/act as a gateway to disperse this information via the Internet 124to the shared supervisory server 122 for determination. As illustrated,the master device 120 can also communicate directly with user's mobiledevice 111 to disperse information to the user's from the system and/orgather user information relevant to the operations of the system. Forpurposes of this application, a “mobile device” is any computing devicethat provides internet and/or cellular phone access, and may include,but not be limited to phones, table computers, wearable computers (e.g,glasses, watches, head-mounted displays), personal digital assistants,calculators, cameras, pagers, personal navigation devices, robots, gameconsoles, media player, mobile personal computers, etc. Applicationsrunning on mobile devices may be referred to as personal mobile deviceapplications 313 (FIG. 3).

In operation, information gathered by individual detection devices 104can be shared across multiple security areas 102 within the communitysecurity system 100 to confirm human activity and engage sensory alerts309, 310. This gathered and shared information allows for human activityto be monitored throughout a community and across adjacent privatesecurity areas 102. Real world geo-coordinate equipment tagging,real-time GPS co-ordinate referencing of personal mobile devices 111 andreal-time data analysis may be used to manage the relevant communitymembers for response and assess risk to individual properties or privatesecurity areas 102 within the community security system 100.

Geo-coordinate equipment tagging and pre-determined detection zones 107can be attached to detection devices 104 within a community securitysystem 100 during installation, which can be used to manage the relevantsharing of information throughout the community security system 100.Real-time GPS co-ordinate application 313 (FIG. 3) for personal mobiledevices for individual users/community members may also be used tofacilitate relevant notification of alarm detections (i.e., determinenotification response times) and control other events, such asdetermining the intelligent selection and/or automation of relevantequipment and/or the arming and disarming of private security systems101. Additionally, real-time GPS co-ordinates for personal mobiledevices 111 can be obtained and used to respond to personalpanic/distress calls by community members, which could also enablenearby private security systems 101 to activate sensory alerts 309, 310and notify other nearby community security systems 100 of distress oralarm situations.

The private security systems 101 can be programed to enable theself-learning of general patterns that could, for example, enableautomatic arming and disarming of the private security system 101 tooccur automatically or notify users of variations within the generalpatterns when they occur to enable manual intervention.

The community security system 100 could include a community CCTV camerasystem by grouping external cameras 128 located on private securityareas 102 or public community areas into a single camera networkaccessible by all of the community group members. The community CCTVnetwork could then provide access to live camera views 329, cameramovement control 318 and store and provide video history 325 review toall of the community security system 100 group members. (FIG. 3)

The various system particulars of the community security system 100 andthe private security system 101 generally described above are describedin further detail below in connection with the respective figures.

A. Physical System Overview

In general, the present invention relates to a community security system100 where one or more private security areas 102 are being monitored andprotected by individually networked private security systems 101.

A private security system 101 monitoring a private security area 102 canbe a stand-alone system; however, the usefulness and functionality ofthe private security system 101, as explained below, can be greatlyenhanced when single private security systems 101 monitoring privatesecurity areas 102 within a community are networked to create anintelligent community security system 100.

While not exclusive, the present invention can relate to the monitoring,detection and notification of security breaches employed in singleprivate security systems 101 in private security areas 102, which canform the basis for a larger community security system 100. Theemployment of one example of a single private security system 101 in aprivate security area 102 is described below.

FIG. 2 illustrates a plan view of the private security area 102 of FIG.1 that may be monitored by a private security system 101 of the presentinvention to notify the owners of the private security system 101 of thepresence of intruders 115. The private security area 102 to be monitoredis defined, generally, by the property lines or by a specified areawithin the property lines or extending around any protected area orstructure 130. The monitored area defined by established perimeterboundaries 105 may be deemed a restricted area. In sum, the privatesecurity area 102 can be defined by the area that the private securitysystem 101 owner requires monitoring by designating perimeter boundaries105, which may surround, for example, a physical structure 130.

The private security system 101 used within each private security area102, such as the area surrounding a home, may include one or moredetection devices 104 installed around the outside walls of thephysically secured building 130 and/or about the perimeter of theprivate security area 102. One or more detection devices 104 may behoused within the same housing. Detection devices 104 may include, butnot be limited to, any of the following devices capable of monitoringmovement, or assisting with, monitoring or detecting activity in a givenarea: security cameras, lights, motion sensors, beam sensors, doorsensors, and/or other motion detectors, including but not limited to apassive infrared (PIR) detectors.

Two detection devices 104 may monitor the same area from differenthorizontally and/or vertically space separated perspectives. Thesedetection zones 107 may be determined by the complete or partialoverlapping of fields of view or space separated detection planesascertained during the installation process or as a function of thephysical construction of the housing containing multiple detectiondevices 104. When each detection zone 107 is monitored by at least twodetection devices 104, the chances of false intruder 115 detection aregreatly reduced. In this manner, detection devices 104 may be installedto form multiple detection zones 107 (first, second, third . . .detection zones) within a private security area 102, which may be aroundthe outside of a secured building 130. The number of detection zones 107in a given area may depend upon the size and shape of the privatesecurity area 102 being monitored.

The detection devices 104 may communicate with each other and/or themaster device 120 using a self-forming and propagating datacommunications network 401 (See FIG. 4). This communications network 401could be formed, for example, using a proprietary packet data radiotransmission system. The detection devices 104 may be professionallyinstalled or installed as a “Do-It-Yourself” system. The privatesecurity system 101 may be wired, wireless or both and powered throughthe grid or independently powered by battery or renewable energy, suchas solar energy, or both.

A private security system 101 may also include or share a master device120, which can be located within the physically secured building 130, anadjacent building, or elsewhere within the community and powered fromthe grid. The master device 120 may contain its own battery backup toovercome short-term power outages. The master device 120 may also use aself-forming and propagating data communications network 401 tocommunicate with the detection devices 104. The master device 120 couldpass/act as a gateway to disperse information via the Internet 124 tothe shared supervisory server 122 for determination. The master device120 may also dynamically take on some of the duties that would otherwisebe performed by the shared supervisory server 122 for such reasons asloss of Internet connectivity or diversification of the workload andduties within the normal operation of the community security system 100.The master device 120 may also provide community connectivity to theInternet 124 using the cellphone network such as 3G/4G or other knownphysical Internet gateways etc., as illustrated in FIG. 1.

The master device 120 may communicate with a shared supervisory server122 via the Internet 124 to exchange information, detection status andother functions etc. The master device 120 and/or the shared supervisoryserver 122 may communicate with a user's mobile device 111.Application(s) 313 residing on the personal mobile devices 111 mayprovide a user interface to the community security system 100.

In the case of the private security system 101 family group members aregenerally mobile, so their physical GPS co-ordinates may also bemonitored by their personal mobile devices 111. As the mobile device 111knows its proximity to the private security area 102 it can notify theshared supervisory server 122 of events such as leaving the privatesecurity area 102 or arriving at the private security area 102 to assistwith arming/disarming determinations. Application 313 on the mobiledevices 111 can also perform the task of filtering notifications fromthe shared supervisory server 122 based on real-time GPS co-ordinates ofthe user and or user status such as administrator, home group membershipetc. The shared supervisory server 122 may interrogate the personalmobile device 111 to determine the whereabouts of each member's personalmobile device 111. The shared supervisory server 122 could intelligentlyselect which of any group members of a community or private securitysystem will be contacted based on their physical location at the time ofan intruder 115 detection. Either or both the shared supervisory server122 or the master device 120 could also use the GPS co-ordinates offamily members in the group for a variety of purposes, including armingand disarming of the system and intelligent learning of behaviorpatterns that could enhance or impact the performance of the privatesecurity system 101.

The private security system 101 could intelligently self-determine timesof arming and disarming based on the comings and goings at the property,e.g., children arriving home from school. When a member's mobile device111 GPS co-ordinates enters the vicinity of the private security area102, the security at the front of the house may be disarmed for a setperiod. In this example, after the child enters the house, the privatesecurity system 101 could rearm and optionally notify the parent throughtheir personal mobile device application 313 that the child is home.This determination or functionality could also be made by the sharedsupervisory server 122.

Turning now to FIG. 3, FIG. 3 depicts a diagram of one example of animplementation of a private security system 101 of the present inventionin a private security area 102. As illustrated, the private securitysystem 101 may include a number of different detection devices 104,including, but not being limited to, any of the following devicescapable of monitoring movement, or assisting with, monitoring ordetecting activity in a given area: security cameras, lights, motionsensors, beam sensors, door sensors, and/or other motion detectors,including, but not limited to, a passive infrared (PIR) detectors. Thoseskilled in the art will recognize that any number of different detectiondevices, used alone or in combination, may be used in connection withthe present system 100. As one or more detection devices 104 may behoused within the same housing, detection devices 104 may operate in astand-alone manner to monitor a detection zone 107. However, it isenvisaged that two detection devices 104 would monitor the samedetection zone 107 from different horizontally and/or vertically spaceseparated perspectives. These detection zones 107 may be determined bythe overlapping of fields of view or space separated detection planesascertained during the installation process. As noted above, when eachdetection zone 107 is monitored by at least two detection devices 104,the chances of false intruder 115 detection are reduced.

The private security system 101 also includes a zone timer 314 and zonecounter 308 in communication with sensory alert relays 312 used totrigger sensory alerts 309 and 310, such as lights or sirens. Asexplained further below, the zone timer 314, zone counter 308 are usedto determine when to trigger the sensory alerts 309 and 310 via thesensory alert relay 312. The private security system 101 includes amaster device 120 for communication with the detection devices 104.

As illustrated in FIG. 4, which is an example block diagram of themaster device 120, the master device 120 may include a self-forming andpropagating data communications network 401, a task manager orcontroller 403, permanent, dynamic and non-volatile memory 404, 405, 406and 407, as well as display panel 407, message gateway 408 and LANand/or WiFi connectivity 410. In this example, the detection devices 104can communicate with each other and/or the master device 120 using theself-forming and propagating data communications network 401 to monitor,detect or help detect intruder 115 movement in the private security area102.

Turning back to FIG. 3, the master device 120 may communicate withmultiple types of detection devices 104 using the self-forming andpropagating data communications network 401 and pass/act as a gateway todisperse this collected data to the shared supervisory server 122 viathe Internet 124. The detection devices 104 could be detecting but theshared supervisory server 122 makes a determination as to whether or notthese detections should be ignored, such as when the private securitysystem 101 is in a disarmed state. Arming/Disarming of the privatesecurity system 101 may be accomplished via a user's/members personalmobile device application 313 either manually or by proximity using GPSco-ordinate references.

The shared supervisory server 122 may configure the community securitysystem 100, aid in the monitoring of detection zones 107 andgenerate/receive notification from personal mobile device applications313 that may be accessed via the Internet 124. The LAN 409/Wi-Fi router410 may connect the private security system 101 with the Internet 124,while providing wireless internet capabilities to the private securityarea 102 and/or the community security system 100. Community CCTVcameras 128 may provide analog or digital video and this video may beformatted or reformatted into a common format for storage as videohistory 325. Movement control 318 and live camera views 329 may also beprovided in connection with the CCTV cameras 128.

Detection devices 104, lights 310, and sirens 309 may be located outsideof the building and cover the private security area 102. When anintruder 115 is detected in the private security area 102, the sensoryalert relay 312 may be instructed to activate or otherwise turn on alight 310, siren 309, and/or other means of sensory alert to announce tothe intruder that they have been detected in the private security area102 prior to breaching the physically secured building 130 and/or othertype of restricted zone. As such, the intruders' window of opportunityhas already expired. Knowing this, the intruder 115 is more likely toleave the private area external to the physically secured building 130and/or other type of restricted zone without perpetrating a criminal actminimizing the risk of financial loss/damage or a personal injuryoccurring due to a violent act.

In one example, during operation, a detection device 104 may detect anintruder 115 in the private security area 102 and signals the masterdevice 120 using the self-forming and propagating data communicationsnetwork 401 that there has been a detection. The master device 120passes/acts as a gateway to disperse this information on to the sharedsupervisory server 122 via the Internet 124 for processing. If a seconddetection device 104 is triggered within the private security area 102at the same time and location (which can be determined by the detectiondevices 104 geo-coordinate tagging), the shared supervisory server 122determines the existence of a detection zone 107. A zone timer 314 isactivated and a count of one is added to the zone count 308. The sensoryalert relay 312 is then activated, turning on a strobe light 109. If acommunity CCTV camera 128 has been installed at a nearby location,determined by the camera's 128 own GPS co-ordinate, the sharedsupervisory server 122 engages the camera's 128 movement controls 318 toposition the camera 128 by calculating a vector direction and distancefor that CCTV camera 128 to best observe the triggered detection zone107. This instruction is sent via the Internet 124 and LAN 409/Wi-Firouter 410 so that the community CCTV camera 128 is positioned to bestview the scene. The community CCTV camera 128 outputs live camera views329 and saves video history for later review 325.

If there are no further triggers of an overlapping detection zone 107within a given period, the zone timer 314 then resets and takes one awayfrom the zone counter 308. The CCTV camera 128 is directed by the sharedsupervisory server 122 via the Internet 124 and LAN 309/Wi-Fi router 310to return to its normal home position.

If a second detection zone 107 is determined before the zone timer 314is reset, then the response is escalated. If available, the communityCCTV camera 128 continues to monitor the scene outputting live cameraviews 329 and recording video history 325. The zone count 308 now equalstwo so the sensory alert relay 312 triggers all lights 110 and sirens109 to activate within the bounds of the private security area 102. Theshared supervisory server 122 determines that an intruder 115 has beenconfirmed and notification is sent to the closest responder and thesystem administrator through their personal mobile device application313. The closest responder is determined by checking the GPS coordinatesof each responder's personal mobile devices 111 or the individualpersonal mobile device application 113 determining whether thisresponder is close enough to respond. Responders may also be notifiedvia email, text messaging, telephone, to provide a few, but notexhaustive, examples.

In the above example, those skilled in the art will recognize that themaster device 120 may also dynamically take on some of the duties thatwould otherwise be performed by the shared supervisory server 122 forsuch reasons as loss of Internet connectivity or diversification of theworkload and duties within the normal operation of the communitysecurity system 100. Throughout the applications, operations describedas performed by the supervisory server 122 should not be so limited andmay be performed by the master device 120.

Turning again to FIG. 4, the primary function of the master device 120could be considered as a bi-directional data gateway between theself-forming and propagating data network 401 and the shared supervisoryserver 122. The master device 120 may include permanent memory 404 whichis ROM or re-programmable and contains the firmware for the masterdevice 120 functions, dynamic memory 405 such as RAM to store datavalues and instructions for use by and during the execution of thefirmware and non-volatile rewriteable memory such as HDD or SSD 406 tohold information such as the customer record database, alarm status etc.

The master device 120 has the ability to facilitate detection device 104communications between each other and the master device 120 using theself-forming and propagating data communications network 401. Thecommunication route between each of the detection devices 104 and themaster device 120 is dynamic. All detection devices 104 find a dataroute back to a master device 120. If the closest master device 120 isunavailable for any reason, such as a loss of power or failure, then thedetection devices 104 will continue to pass messages via theself-forming and propagating data communications network 401 betweeneach other until the route to another master device 120 is determined.This self-forming and propagating data communications network 401 uses anon-specific routing protocol which could be formed, for example, usinga proprietary packet data radio transmission system.

The master device 120 includes a message gateway 408, which facilitatesthe passing of communications internally within the master device 120.The message gateway 408 may also pass/receive messages from thedetection devices 104, lights 310 sirens 309 and/or other sensory alertmeans via the self-forming and propagating data communications network401. The message gateway 408 may also pass messages externally via LAN409 and/or Wi-Fi 410 over the Internet 124 to the shared supervisoryserver 122 (FIGS. 1 and 3) and/or individual users through theirpersonal mobile devices 111 (FIGS. 1 and 3). The LAN 409 and/or Wi-Fi410 modules may physically reside within or be external to the masterdevice 120.

The master device 120 includes a task manager or controller 403, whichmay be responsible for the internal management of the master device 120.The task manager 403 may co-ordinate tasks such as the syncing ofcustomer records with the shared supervisory server 122, managingfirmware updates, and collecting alarm status if the shared supervisoryserver 122 is off-line due to for example, power or internet loss. Thecollected alarm records may be forwarded on to the shared supervisoryserver 122 once communication is re-established. A display panel 407such as a touch display may be used with the master device 120 toprovide a user interface to setup and configure the master device 120,the private security system 101 and or the community security system100.

As noted above, the master device 120 may dynamically take on some ofthe duties that would otherwise be performed by the shared supervisoryserver 122 for such reasons as loss of internet connectivity ordiversification of the workload and duties within the normal operationof the community security system 100.

FIG. 5 is one example of a customer record that may be stored in thesystem database (not shown) of shared supervisory server 122. Thecustomer record 502 may have text fields 504 for identification of sitename, GPS location, address, group/community memberships, system status,configuration/setup parameters, application registrations, current siteinternet protocol (IP) address, event logs, action logs,communication/chat history, and user access security. The customerrecord 502 may also keep track of changes to the database record in arecord change history filed 506. Additional or few fields may be usedand are typically dependent upon implementation. The database may beimplemented as a flat file, liked lists or other data structure, or arelational database such as SQL. The database record may be located atthe shared supervisory server 122.

The private security system 101 may be designed to use very low powerconsumption (replaceable battery and/or solar or other renewable batterycharging solutions) and be wirelessly installed as a ‘Do-It-Yourself’security system using the two stage fixing system with the personalmobile device application 313 for installation guidance. The two stagefixing system would comprise an instant adhesive as a primary fixer suchas double sided tape for positioning/locating detectors to a wall orfence making it possible for the secondary fixing system such as adurable liquid adhesive, screws, nails etc. to cure or be installed.

In operation, once an intruder 115 has been detected within a detectionzone 107 the first detection device 104 could use its associated sensoryalert means 309, 310 to act as a deterrent. When movement is detected ina second detection zone 107, the detection device 104 could send a datasignal, using the self-forming and propagating data communicationsnetwork 201, to all other detection devices 104 within the privatesecurity system 101 to operate their associated sensory alert means,including but not limited to, turning on strobe lights 110 or sirens109, thus acting as an increased deterrent to the intruder.

The master device 120 has the ability to facilitate detection devices104 to communicate with each other using the self-forming andpropagating data communications network 401. This network uses anon-specific routing protocol, which could dynamically use one or moredetection devices 104 to pass on a data signal to/from a specificdetection device 104 back to the master device 120. The master device120 also provides an internet 124 gateway for communication with theshared supervisory server 122 and individual users through theirpersonal mobile device application 313 and/or other personaltechnologies 111.

The shared supervisory server 122 is located at a secure location awayfrom the location of any private security system 101. The sharedsupervisory server 122 uses a communications means such as the internet124 to provide communications with many individual private securitysystems 101. It could provide a web site or personal mobile deviceapplication 313 interface for the family group administrator to accessinformation and status and control of their single system 101 via normalinternet technologies.

The shared supervisory server 122 provides automated account managementservices for the family group administrators and community groups, andthe linking/securing of the owner's/authorized person's mobile device111 or other personal technologies to the owner's private securitysystem 101 and community groups. The shared supervisory server 122provides a secure portal for access to a community CCTV network.

The shared supervisory server 122 manages the database 500 whichincludes customer records 502 containing information 504 such as but notlimited to: (i) site name; (ii) site geo-coordinate location; (iii)geo-coordinate location of all detection devices/masterdevices/community CCTV cameras etc.; (iv) address; (v) family group;(vi) group members current geo-coordinate locations; (vii)group/community memberships; (viii) system status; (ix) physicalhardware configuration/setup; (x) application registrations; (xi)current site IP address; (xii) event log; (xiii) action log; (xiv)communications/chat history; (xv) panic logging, tracking, recording(xi) user access security/IP address and a record change history 506.

Several separate private security systems 101 installed for severalindividual owners could be considered as a group or community for thepurpose of inter-system management, information/data exchange,notification and control by the owners/members within such a community.System membership to one group is not exclusive. One system can be amember of several groups concurrently, including but not limited toproperty boundary neighbors, local street, housing estate, church group,sports group, watch groups, employee groups.

Installing a private security system 101 in each home along a street orestate housing block would be considered a community security system 100providing a curtain of security throughout the street or estate. Eachhome has an absolute geo co-ordinate location and each detection device104 has an absolute geo co-ordinate location. The shared supervisoryserver 122 can intelligently determine when human detection from onedetection device 104 at one private security area 102 needs to be sharedwith that of another private security area 102 (based on proximity).This has the effect of expanding a private security area's 102 securitycurtain beyond its private security area 102 boundary. Each communitymember is only installing a small part of the overall community securitysystem 100.

At the time of a human detection, the off-site shared supervisory server122 can intelligently select which of the group members will becontacted based on their physical location monitored by their personalmobile device application 313. The personal mobile device application313 can also perform the task of filtering notifications from the sharedsupervisory server 122 based on real-time GPS co-ordinates of the userand or user status such as administrator, home group membership etc. Atthe time of a human detection, the shared supervisory server 122 mayinterrogate the personal mobile device application 313 to determine thewhereabouts of each member's personal mobile devices 111. The sharedsupervisory server 122 could intelligently select which of the groupmembers will be contacted based on their physical location at the timeof an intruder 115 detection and or priority listing at the time of thehuman movement detection, e.g., family members, neighbors, othercommunity group members, gate house, mobile security etc. for response.

FIG. 6 is a drawing 600 of private security areas 102 of FIGS. 1 and 2and other private security areas 602-610 outside of structures aredepicted. Each of the private areas 102 and 602-610 may have a privatesecurity system 101 that all communicate with a shared supervisoryserver 122 through a master device 120. When the private security system101 detects an intruder 115 in the private security area 102 external tothe physically secured building 130 and/or other type of restricted zoneand notifies the owner/authorized person, an additional notification maybe sent to other members in a group or community (such as home owners,family members or occupants of 602-610 of FIG. 6) that identifies theprevious location and movements of the intruder 115. The notificationmay be as, but not limited to: text messages, sound prompts, voicemessages, graphical descriptions and/or photos sent a user's personalmobile device 111, which may be accessible directly or via a personalmobile device application 313 interface on the users' mobile device 111.

Information provided may include, but not be limited to, identificationof the property, time of intruders' movements, warnings, response andactions of other authorized users, communications/chat betweenauthorized users. The notification to other groups or communities may bedirected via the shared supervisory server 122.

By way of example, private security system 101 detects an intruder 115in private security area 102 and notifies the owner/authorized user ofthe intruder 115. The private security system 101 may also notify theadjacent private security area 602 of an intruder 115 being detected viathe shared supervisory server 122 internet 124 and/or self-forming andpropagating data communications network 401. The private security system101 associated with private area 602 may then go on a heightened statusand actively attempt to detect an intruder 115. If a calculateddirectional heading a relative distance of the intruder 115 isascertainable by the shared supervisory server 122, then more directednotices to other private security systems 101 and their home owners mayoccur.

The shared supervisory server 122 contains the customer record 502related to each member and all installed hardware such as; detectiondevices 104 CCTV cameras 128 etc. within the community security system100. The shared supervisory server 122 may use alarm events and otherreal-time event information such as; arming and disarming to conductstatistical analysis to create status reports for the purpose of furtherimproving the overall community security. This information may be madeavailable through the social media forum available to the communitymembers. The shared supervisory server also facilitates access to theCCTV cameras 128, which creates the community CCTV system. Thus, eventdata, captured CCTV video history 325, live camera views 329 anddetected intruder 115 information may be shared among multiple privatesecurity systems 101.

A website interface could integrate several third party services andtechnologies, including, but not limited to: a world mapping service tolocate the owners property/restricted zone, obtain the geo-coordinateslocation of the property/restricted zone, facilitate site analysis andsystem design and estimation and quotation tool, goods sales/orderingand payment system, and create the customer record details on a sharedsupervisory server 122 to accept communications from the owner's newsystem, use the geo-coordinates location and social media sites such asbut not limited to, Facebook and Twitter, to cross reference friendlists to analyze and recommend possible community groups to be joined,and have automated account management services for the owners andcommunity groups, and the linking/securing of the owner's/authorizedperson's mobile devices 111 to the owner's system and community groups.

Although the main invention relates to human detection, it is envisionedthat each private security area 102 owner within a community couldinstall a self-powered/mains powered, wired/wireless CCTV camera 128.This camera 128 could include a recording means for gathering videohistory 325, a movement control means 318 (pan, tilt, zoom) and a remotereview means to allow community group members to access the videohistory 325 and/or live camera views 329 of not just their own camerabut other cameras within the community group. Each individuals/groupscost outlay is reduced but each group member has access to the largercommunity security system 100 network that is created. This CCTV cameranetwork could be linked together through the LAN 409, Wi-Fi 410, and/orInternet 124 using the cellphone network such as 3G/4G or other internetgateways etc. The community CCTV camera network may be installed by abody corporate, home owners association, county, city, municipality,neighborhood, or individual members each installing one or more cameras128 etc. for the benefit of all community members.

When installed, a physical geo-coordinate reference is associated witheach camera 128 and is used to determine camera 128 selection by themembers. This could be a map display of camera 128 locations or assistthe member by recommending appropriate camera 128 selections for theircurrent requirement. Footage from the camera 128 could be used by thegatehouse, security patrol, police authority etc. to aid in theidentification/apprehension of an intruder 115.

Access to the CCTV camera video history 325 of live camera view 329,could be securely managed by the shared supervisory server 122 through apersonal mobile device application 313, secure website, etc. The CCTVsystem is not used to do human 115 detection and as such, does not forma detection zone 107. It is purely used to provide live vision 329 andrecorded video history 325 of general activity and/or automateddetection events throughout the community.

As home owners are already members of community groups, it is envisagedthat social media sharing of general information relating to individualsecurity and community security could be contributed to and shared withother members of the community group. This information could consist ofwritten texts, chat, photos, video, other media content etc. for thepurpose of discussing, detailing, reducing and ultimately preventingcriminal activity within the community.

Alarm status metrics etc. from community group member's private securitysystems 101 could be gathered individually or grouped for statisticalanalysis, presentation and review by the community group members. Thiscould be presented as a simplistic level of probability of criminalactivity. While this information is a valuable tool for this communitygroup, it is also of value for law enforcement, aiding in the preventionof criminal activities within this community and adjacent communities.

It is intended that this social media service would be an integratedpart of the website, personal mobile device application 313 and anyrelated system application. The social media content related tocommunity groups (as a system can be a member of more than one) ispresented through the social media login page interface on the personalmobile device application 313. Each home owner's social media page wouldbe locked to the unique identification number of the individual systemand formatted based on its community group memberships, using chosensettings and preferences to filter the viewable content. The socialmedia content uses privacy settings to allow group members to choosewhat is/is not publically viewable, preserving the group members'privacy.

B. Purchasing, Installing & Setting Up the System

While the system may be professionally installed, the system may also beacquired in a “Do-It-Yourself” environment over the Internet, via astore kiosk, or other means for collecting data and helping the usermake remote purchasing decisions. Remote access software can helppotential customers build their own security system based upon thedesired private security area 101 that the user desires to monitor.

For example, a website or application hosting design software may beaccessible by potential customers for purchasing a security system. Theapplication may describe the product, product pricing, installation,operation and maintenance of the system. The software may integratesatellite mapping technology such as Google® Maps, etc to allow thesystem to access satellite imagery of the area that user desires toprotect via a security system. The potential customer can then enterhis/her street address to access the imagery and be presented with asatellite view of his/her home.

Based upon the satellite imagery and other information provided by thepotential customer, the software is able to recommend systemrequirements such as: number of detection devices 104, type of detectiondevices 104, and placement of detection devices 104 around private areaexternal to the physically secured building 130 and/or other type ofrestricted zone. The software may also show how the placement of thedevices 104 provides overlapping monitored areas and how detection zones107 are formed. The customer can then modify the recommended coverage asdesired.

The software can ask the user to create the perimeter 105 and thencalculate the area that is required to be monitored. Based upon the sizeof the area and the shape of any structures located within the area, thesystem can determine where detection devices 104 should be placed toprovided optimal monitoring of the defined area within the perimeter105. As noted above, it is desired to have two separate detectiondevices 104 monitor all areas. The size of the area and type ofdetection devices 104 selected, will dictate recommended coverage andplacement of the detection devices 104 on the structures and within theperimeter 105. The customer may be given the opportunity to modify anysoftware recommendations based upon price, coverage, etc.

Once the customer has modified his/her detection device 104 placement,the software can reanalyze this new configuration of the detectiondevices 104, giving further recommendations as necessary for systemviability. The software can model the curtain of security around theprivate area external to the physically secured building 130 and/orother type of restricted zone. The software can then provide the userwith a quote, and facilitate the purchasing of the system online throughthe use of a standard e-commerce purchasing platform.

Upon purchase, the purchaser can create a customer account that isautomatically saved on the associated shared supervisory server 122creating a customer record 502 that contains information 504 such as:name, unique identification number, community membership, geo-coordinatelocations based on the Google® map. The product is then delivered to thepurchaser, where it may be installed as per geo-coordinate instructionsshipped with the product or available through the shared supervisoryserver 122 or personal mobile device application 313 in communicationwith the server 122.

FIG. 7a depicts a flow diagram 700 showing one example of an automatedmethod for determining how to set-up a private security system 101 in aprivate security area 102 as described above. In the described example,the process is automated via an application or website. In step 702, theproperty is first identified by input, for example, the propertyaddress. At step 704, a satellite image map is used to display a planview of the property. The perimeter for the secured area is then definedby the user at step 706. At step 708, the software then determines,based upon the satellite image, property boundaries and structures onthe premises, the recommended detection zones 107. The software thendetermines the recommended type and location of the detection devices104 on the property for optimal coverage (i.e., two detection devices104 monitor each detection zone 107). Once the software provides theuser with a recommended layout for the security system, the user is thenable to review, modify and finalize the system configuration, at step710, which once finalized is saved, associated with an installationidentification number and a customer record, which is supplied to theassociated governing supervisory server 122.

FIG. 7b depicts a flow diagram 720 showing one example of an automatedmethod for determining how to install a private security system 101 in aprivate security area 102. In one example, for installation, thecustomer receives a unique identification number (or installationnumber) and information to download a setup application 313 to theirpersonal mobile device 111, at step 722. Once installed, the application313 may ask for the unique identification number assigned to thecustomer order. At step 724, the application 313 is then able to accessthe customer's account through the shared supervisory server 122 andguides the customer through installation, including but not limited tounpacking, equipment installation, communication initiation, etc.

To assist with installation, at step 726, the application 313 may showthe satellite map view created during the ordering process detailing theplacement of the detection devices 104. This view may be provided forthe installation of each detection device 104.

When installing each device 104, at step 728, the customer may hold thefirst detection device 104 in the position highlighted on the personalmobile device application 313. The detection device 104 can useenvironmental sensors to determine that its horizontal orientation iscorrect. The personal mobile device application 313 then announces thatit is time for the customer to attach the detection device 104 using itstwo stage fixing system. Once installed, the application 313 may providefor the customer to highlight the installed detection device 104 onhis/her personal mobile device application 313 and confirms its actualgeo-coordinate location whilst standing next to this detection device104. This step may be repeated with the installation of each device 104.By requiring this, the application 313, at step 730, can confirm theinstallation of all detection devices 104 with the supervisory server122 and record their installation location.

The application 313 may also provide for the registration andinitialization of the all the detection devices 104 with the networksystem via the master 120 or shared supervisory server 122 andinitializes system communication with all components to establishcommunication paths. Security keys may be used to lock communication ofthe new system together and may instruct the customer to verify thesystem using a physical walkthrough process of all monitored areas/zones107 with, for example, onscreen personal mobile device application 313validation.

During the setup phase, community group memberships may be selected. Thepersonal mobile device application 313 interrogates the sharedsupervisory server 122 to determine or restrict groups using thegeo-coordinates location, fee structure and/or social media sites suchas but not limited to, Facebook and Twitter, to cross-reference friendlists. The arming/disarming regime may also be selected. Certain selectpre-set features may also be modified during the set-up phase, asnecessary or desired. Modifiable features may include, but not belimited to, the following: (i) engagement of audible or visual sensoryalerts; (ii) notification priority for first and/or second movementdetections (i.e., who receives the alert and who responds) and (iii)local requirement/restriction compliance features.

Groups may be formed, managed and notified based upon family members,mobile devices 111 associated with members of the household. Individualsadded to a group may be provided with downloads of applications 313 fortheir personal mobile devices 111 to become group members and receivenotifications. New members may be provided with a unique identificationnumber to become members to a group. Membership can be formed andmanaged by an administrator, which permits group access and establishesmembers.

Groups can also be established based upon geography, which may be acommunity group or a sub-set of a community group created either by apredetermined radius around a customer's private security area 102and/or other type of restricted zone or directly abutting neighbors.Groups could be formed based upon residences of communities, streets,official response group (gatehouse, community security, police etc.) orother defined groups, such as social groups, work colleagues and/orwatch groups, to name a few.

C. System Arming/Disarming

Each private security system 101 can be manually armed and/or disarmedupon entry or exit using the personal mobile device application 313.Additionally, the private security system 101 may automatically arm ordisarm itself based upon the learnt activities of group members. Forexample, when all of the members of a family group (personal mobiledevice 111 GPS geo-coordinates) leave the private area external to thephysically secured building 130 and/or other type of restricted zone,the system could notify the administrator or last family group member toleave and recommend arming, if there is no response from theadministrator or family group member then the private security system101 could automatically arm itself. When a family group member (personalmobile device 111 GPS co-ordinates) returns, the private security system101 could automatically disarm or recommend disarming.

Each personal mobile device application 313 within the family group mayprompt its owner based on learned arming behavior. Should there be noresponse, then the system will automatically arm itself. Detectiondevice 104 events may also assist in this process. If a family groupmember's personal mobile device 111 were in the private security area102 external to the physically secured building 130 and/or other type ofrestricted zone, then the system would not automatically arm itself. Thehome group administrator has the ability to temporarily exclude a familygroup member's personal mobile device 111 in the event of this device111 being misplaced or left at home. Other normal use information,including, but not limited to, environmental data and detection activitydata can also be gathered to assist in the automatic management andcontrol of the security system 101.

The security system 101 could learn the vulnerable periods and patternsof arming and disarming to automatically predict and manage theprotection of the physically secured building 130 and/or other type ofrestricted zone. By regularly being armed and/or disarmed over anextended period of normal use, including but not limited to, a day,month or year, the system would be able to intelligently determine thevulnerable periods and patterns of arming and disarming. This would aidin the private security system 101 automatically predicting and managingthe protection of the physically secured building 130 and/or other typeof restricted zone by offering suggested arming and disarming times tothe administrator and/or other family group member or applying suchcalculated suggestions automatically.

The security system 101 can learn disarming/rearming patterns fromevents, such as children arriving home from school or in the evening,when all family members have arrived home, the private security system101 can rearm itself to protect the family during the hours of darkness.

D. System Management

The initial customer may be designated the system administrator. Shouldother family members download the personal mobile device application 313and input the unique identification number of the family group, theadministrator must authorize the joining of the group. If these newmembers of the group desire to become administrators, then the initialadministrator is contacted and they must authorize this administratorprivilege.

The system administrator may be given the ability to perform thefollowing functions, among others: (i) change the membership within agroup; (ii) change the notification order if human movement is detected(on holidays etc.); (iii) introduce a delay period when the system isarmed; (iv) receive notification of low power/faulty detection devices104; (v) control fee payment reminders (depending on the community feestructure); (vi) obtain history/statistic reports (human movementdetected, system arming, system response); (vii) control automaticreporting/reordering of faulty equipment and delivery information ofreplacement equipment due to the shared supervisory server 122 accountinformation/payment information and (viii) manage the group member forumand general information exchange e.g. watch out for suspicious blacksedan in area.

E. Normal Usage

When the private security system 101 is disarmed, humans may move aroundthe outside (perimeter) of the physically secured building 130 and/orother restricted zone without engaging any sensory alerts. However, inthe disarmed state, the detection devices 104 may still communicateperiodically with the master device/shared supervisory server 120/122,providing status reports to maintain system integrity. Should the systemintegrity be compromised (e.g., tampering, low power level etc.), theadministrator/administrators may be notified.

When the private security system 101 is armed, which can be armedmanually (through the personal mobile device application 313) orautomatically (personal mobile device 111 GPS co-ordinates moving awayor self-learning), a delay period may be applied to allow for a vehicleand/or person to vacate. Once the private security system 101 is in thearmed state, the detection devices 104 monitor the restricted area forhuman movement providing a curtain of security around the perimeter ofthe property.

Disarming the private security system 101 can be done manually, via apersonal mobile device application 313, or automatically by knowing whena family group member has arrived (personal mobile device 111 GPSco-ordinates) or through learnt movement patterns.

As a private security system 101 can be armed while family group membersare inside the physically secured building 130 and/or other type ofrestricted zone, the private security system 101 may disarm when otherfamily group members arrive home (personal mobile device 111 GPSco-ordinates). This can occur automatically for a pre-determined timeallowing the arriving family member access to the physically securedbuilding 130 and/or other type of restricted zone before automaticallyreturning to the previously armed state.

F. System Breach

FIG. 8 is a flow diagram outlining one example response of the system ofthe present invention when an intruder approaches. FIG. 8 illustrates avery basic example of one response from a private security system 101that detects intruders in private security areas 102 and notifies users.

The intruder detection starts when the private security system 101 isinitialized by being set to a ready state 802. This status is generallymanaged by the shared supervisory server 122 but could be duplicatedwith the master device 120 to provide autonomous operation. Onceinitialized, the detection device(s) 104 is/are in a ready state and thesensory alerts 309, 310 are placed in a standby state. If movement isdetected in step 804, the private security system 101 enters aheightened state of operation in step 808, otherwise a check is made ifa notification from another system, via the shared supervisory server122 (in the current implementation) has been received in step 806. If nonotification has been received in step 806, monitoring continues at step804.

If the intruder detection system has entered a heightened state ofdetection in step 808, which may also be triggered by detection offurther movement, an analysis of the detection data 810 is made at thesupervisory server 122 or the master device 120 in step 812, additionaldetections may occur in step 804. Otherwise, multiple detections haveoccurred in step 812 and an intruder has been detected. A notice to theowner/authorized user is generated by the shared supervisory server 122in step 814 and a notice to the other groups/communities is generated instep 816 by the shared supervisory server 122. The notices are sent instep 818 and monitoring continues. A watchdog timer is set when thefirst detection occurs in step 812 and reset with each additionaldetection occurrence. When the watchdog timer expires, the previousdetection states are reset.

In summary, if the intruder approaches the property from the front,movement may be detected within a first detection zone. Visual sensoryalert means (e.g. blue strobe light) may be activated as an initialdeterrent, announcing to the intruder that they have been detected priorto entering the physically secured building 130 and/or other type ofrestricted zone. Alerting users may be reserved until the securitysystem 101 detects continued movement around the physically securedbuilding and/or other type of restricted zone to obtain covert accessin, for example, a second detection zone.

The alert means may be escalated to an audible sensory alert means (e.g.siren, voice announcement etc.) and a visual sensory alert means (e.g.blue strobe light) located on one or all detection devices. The systemadministrator may be alerted of all actions. Communication of activitymay be provided through personal mobile device applications 313.

Group members may also be notified through personal mobile deviceapplication 313 when certain activities occur that require broadernotification. A satellite view of the private security area 102 may beprovided on the user's personal mobile device 111, through the systemapplication, to allow physical monitoring or to illustrate certainactivity and the detected location of the activity in the privatesecurity area 102. The application 313, in communication with the sharedsupervisory server 122, can identify the closest user for response to anintrusion investigation based upon current GPS geo-coordinate locationmonitored by the application 313 on personal mobile devices 111 of groupmembers. The first or closest responder can report findings back to theother users also through the mobile application 313. All functionsavailable via a mobile application 313 may also be made available to auser through via a website, with login account information.

If a breach is detected and an intruder 115 moves to an adjacentproperty or adjacent private security area 102, the detection on thesecond property can be immediately escalated. The community system 100will be aware of the intruder detection and the absolute geo-coordinatesof the detector 104 registering the movement so that bounding propertieswill be alerted in advance of movement detection that such detectionshould be immediately escalated. The system 100 can track therelationship between detections across the community system 100 intoother private security areas 102 extending the curtain of security.

In a community system 100, as they are part of the official responsegroup, a designated security authority such as a guardhouse can bepresented with a satellite map/overview of the area covered by thecurtain of security. When detection devices within this curtained areadetermine human movement 115, it can be plotted on a satellitemap/street map/overview allowing the security authority to plot theintruder's 115 path through the curtained area. This allows the securityauthority to determine the whereabouts of the intruder 115 and possiblepath. This valuable information can be passed on to security patrols orrelevant authorities such as police to aid in the apprehension of theintruder 115.

Response can be based upon members of the private security system 101 orbased upon a community response group. Response groups may includinggroups categorized as follows: families, household members, geographiclocation, street group, official response group (gatehouse, communitysecurity, authorities, watch groups, work groups and/or social groups).

Community response may be based on a prioritized list or the geographiclocation (personal mobile device GPS co-ordinates). Any responder canuse their personal mobile device application 313 to call a relevantauthority such as the police if necessary. In a community or groupresponse setting, the various system administrators/responders are keptappraised of all actions. Communication, including person-to-personcommunication with other group members, may be provided through a mobileapplication 313.

In FIG. 9, a flow diagram 900 of detection information being requestedfrom other private security systems 101 via the master device 120 isdepicted in accordance with an example implementation of the invention.FIG. 9 illustrates a very basic example of a system implementation thatdetects intruders in private security areas 102 and that not onlynotifies users but also communicates with other private security systems101 in a community environment.

In FIG. 9, at step 902, the master device 120 of a security system 101requests event and detection data from the shared supervisory server122. The shared server 122, at step 904 identifies other relevantsecurity systems 101. At step 906, the shared server 122 thencommunicates with other security systems 101 to gather information orretrieve stored information on the shared server 122 about the relevantsecurity systems 101. Once the shared server 122 receives or retrievesrelevant data 908, it is then able to communicate the information backto the security system 910. Information may be automatically pushed orretrieved upon request. Everything can be facilitated and managed via ashared server 122 or each security system 101 may interface with theshared server 122 via a master device 120.

G. Panic Feature

The present system may also allow group members of a private 101 orcommunity system 100 that find themselves feeling unsafe or injuredwhilst inside a physically secured building 130, private security area102 or in the bounds of the community or another community to activate apanic feature from their personal mobile device application 313. Thepanic feature, depending upon the situation, may activate all of thesensory alerts 309, 310 in a monitored or restricted area 102, alongwith those of adjacent properties, immediately escalating the deterrentif an intruder 115 is present.

Depending on the response set-up, either/all of the geographic group,street group, official response group, etc. members may be notified ofthe panic situations initialized by members so that they are able toinvestigate and determine the correct response. Responders to a panicactivation, may be selected dynamically at the time of the panicactivation using such criteria as relative location of individualresponders, even if the responders are not part of the same group orcommunity as the person in panic.

As noted, this panic feature may also be activated in a community system100 environment when a user is away from their private security area orrestricted zone 102, for example, while walking, jogging etc. At thetime of generating a panic, the user does not have to be a member of thecommunity in which they find themselves. If the user feels threatened,is being followed, approached or in fear of abduction etc., thecommunity group member could activate the personal mobile deviceapplication 113 panic feature.

Panic can be activated through a non-direct user action such as shakingthe mobile device 111. As such, this panic feature could be engaged byshaking the personal mobile device 111 several times. The application313 could be activated by the user before leaving his or her privatesecurity area 102 or the application could be designed to run in thebackground at all times so that the user would not be required to turnthe screen on or push a button to start the application 313, alldepending upon programming and mobile device 111 operating systemrestrictions and/or controls. As noted above, notification can beperformed by dynamic selection, which would not require the user toprovide email addresses, text messages etc. The decisions &notifications may be automatically determined by the supervisory server122.

As the community group member is away from their own physically securedbuilding 130 and/or private security area 102, but in close proximity ofthose of other community group members, and/or other community groupsthe personal mobile device application 313 panic feature may cause thesensory alerts 309, 310 at surrounding physically secured buildings 130and/or private security areas 102 to be activated even if these systemsare not in an armed state. This provides an immediate deterrent to thealleged perpetrator. Localised deterrent may also include audiogenerated from a user's phone 111, in addition to surrounding sensoryalerts 309, 310.

The nearby community group members along with any relevant family group,geographic group, street group or official response group etc. membersmay be sent immediate notification through their personal mobile deviceapplication 313 informing them which community group member is indistress and their location allowing any nearby community group memberto respond. Optionally, which group members are informed of theseoccurrences may be managed through the personal mobile device 111 GPSco-ordinates so that only those nearby are notified. The real-time GPSlocation of the user in panic may be presented in map form to theresponders.

By notifying those closest to the user, assistance to the user in panicmay be provided immediately by the local responders. Users are notrequired to wait for a predefined list of emergency contacts to respond.Further, the application 313 can allow responders to a panic situationto communicate with each other through the application 313 to coordinatethe required response or call emergency services and police if required.

The distressed community group member's personal mobile device 111 GPSco-ordinates are constantly monitored until the panic has been manuallycancelled on their personal mobile device application 313. Additionally,the microphone/camera of their personal mobile device 111 could beactivated and the gathered audio/video information could be recordedlocally or sent to the shared supervisory server 122 for storage and/orlater retrieval for evidence purposes. Thus, on panic being activatedthe camera picture & microphone audio and real-time GPS tracking willall be gathered & transported to an offsite server 122 for recording.Playback of the recorded video/audio/GPS tracking from the offsiteserver 122 can be made available for later review (Police, FBI,authorised users, etc.).

While the primary purpose of the panic feature is personal safety withina community, those skilled in the art will recognize the application ofthis panic feature outside of one's own community. The benefits withinthe one's community or within similarly situated communities areundeniable.

FIG. 10 depicts a flow diagram 1000 of one example of an implementationof a panic feature for use in connection with a community user's mobiledevice. As illustrated in FIG. 10, the panic function on the personalmobile device application 313 of a group user is activated by non-directuser action registered by mobile device 111, such as shaking phone atstep 1002. Once the panic function is activated, a notification is sentto the shared supervisory server 122 and the shared supervisory server122 then determines the location of the mobile phone 111 of the groupuser that activated panic function, at step 1004. Once the location ofthe user is determined, at step 1006, the shared supervisory server 122locates the nearest private security system 101 and nearest groupmembers to the user. The shared supervisory server 122 then triggerssensory alerts on nearest private security system & notifies nearestgroup members and/or local authorities of the user's location and panicsituation, at step 1008. Simultaneously, with activation of the panicfunction, the mobile device application 131 also activates the audio andvideo recording features on the mobile device 111 and, optionally,triggers sensor alerts on the mobile device 111, at step 1010.

Examples of the invention are discussed herein with reference to FIGS.1-10; however, those skilled in the art will readily appreciate that thedetailed description given herein with respect to these figures is forexplanatory purposes as the invention extends beyond these limitedembodiments. For example, it should be appreciated that those skilled inthe art will, in light of the teachings of the present invention,recognize a multiplicity of alternate and suitable approaches, dependingupon the needs of the particular application, to implement thefunctionality of any given detail described herein, beyond theparticular implementation choices in the following embodiments describedand shown. That is, there are numerous modifications and variations ofthe invention that are too numerous to be listed but that all fit withinthe scope of the invention. Also, singular words should be read asplural and vice versa and masculine as feminine and vice versa, whereappropriate, and alternative embodiments do not necessarily imply thatthe two are mutually exclusive.

It is to be further understood that the present invention is not limitedto the particular methodology, compounds, materials, manufacturingtechniques, uses, and applications, described herein, as these may vary.It is also to be understood that the terminology used herein is used forthe purpose of describing particular embodiments only, and is notintended to limit the scope of the present invention. It must be notedthat as used herein and in the appended claims, the singular forms “a,”“an,” and “the” include the plural reference unless the context clearlydictates otherwise. Thus, for example, a reference to “an element” is areference to one or more elements and includes equivalents thereof knownto those skilled in the art. Similarly, for another example, a referenceto “a step” or “a means” is a reference to one or more steps or meansand may include sub-steps and subservient means. All conjunctions usedare to be understood in the most inclusive sense possible. Thus, theword “or” should be understood as having the definition of a logical“or” rather than that of a logical “exclusive or” unless the contextclearly necessitates otherwise. Structures described herein are to beunderstood also to refer to functional equivalents of such structures.Language that may be construed to express approximation should be sounderstood unless the context clearly dictates otherwise.

Unless defined otherwise, all technical and scientific terms used hereinhave the same meanings as commonly understood by one of ordinary skillin the art to which this invention belongs. Preferred methods,techniques, devices, and materials are described, although any methods,techniques, devices, or materials similar or equivalent to thosedescribed herein may be used in the practice or testing of the presentinvention. Structures described herein are to be understood also torefer to functional equivalents of such structures. The presentinvention will now be described in detail with reference to embodimentsthereof as illustrated in the accompanying drawings.

From reading the present disclosure, other variations and modificationswill be apparent to persons skilled in the art. Such variations andmodifications may involve equivalent and other features which arealready known in the art, and which may be used instead of or inaddition to features already described herein.

Although claims have been formulated in this application to particularcombinations of features, it should be understood that the scope of thedisclosure of the present invention also includes any novel feature orany novel combination of features disclosed herein either explicitly orimplicitly or any generalization thereof, whether or not it relates tothe same invention as presently claimed in any claim and whether or notit mitigates any or all of the same technical problems as does thepresent invention.

Features that are described in the context of separate embodiments mayalso be provided in combination in a single embodiment. Conversely,various features which are, for brevity, described in the context of asingle embodiment, may also be provided separately or in any suitablesub-combination. The applicants hereby give notice that new claims maybe formulated to such features and/or combinations of such featuresduring the prosecution of the present Application or of any furtherapplication derived there from.

References to an “example,” “implementation” or “embodiment” mayindicate that the invention so described may include a particularfeature, structure, or characteristic, but not every example,implementation or embodiment necessarily includes the particularfeature, structure, or characteristic. Further, repeated use of thephrases “in one example,” “in one implementation,” or “in oneembodiment,” do not necessarily refer to the same example,implementation or embodiment, although they may.

As is well known to those skilled in the art many careful considerationsand compromises typically must be made when designing for the optimalmanufacture of a commercial implementation any system, and inparticular, the embodiments of the present invention. A commercialimplementation in accordance with the spirit and teachings of thepresent invention may be configured according to the needs of theparticular application, whereby any aspect(s), feature(s), function(s),result(s), component(s), approach(es), or step(s) of the teachingsrelated to any described embodiment of the present invention may besuitably omitted, included, adapted, mixed and matched, or improvedand/or optimized by those skilled in the art, using their average skillsand known techniques, to achieve the desired implementation thataddresses the needs of the particular application.

A “computer” may refer to one or more apparatus and/or one or moresystems that are capable of accepting a structured input, processing thestructured input according to prescribed rules, and producing results ofthe processing as output. Examples of a computer may include: acomputer; a stationary and/or portable computer; a computer having asingle processor, multiple processors, or multi-core processors, whichmay operate in parallel and/or not in parallel; a general purposecomputer; a supercomputer; a mainframe; a super mini-computer; amini-computer; a workstation; a micro-computer; a server; a client; aninteractive television; a web appliance; a telecommunications devicewith internet access; a hybrid combination of a computer and aninteractive television; a portable computer; a tablet personal computer(PC); a personal digital assistant (PDA); a portable telephone;application-specific hardware to emulate a computer and/or software,such as, for example, a digital signal processor (DSP), afield-programmable gate array (FPGA), an application specific integratedcircuit (ASIC), an application specific instruction-set processor(ASIP), a chip, chips, a system on a chip, or a chip set; a dataacquisition device; an optical computer; a quantum computer; abiological computer; and generally, an apparatus that may accept data,process data according to one or more stored software programs, generateresults, and typically include input, output, storage, arithmetic,logic, and control units.

“Software” may refer to prescribed rules to operate a computer. Examplesof software may include: code segments in one or more computer-readablelanguages; graphical and or/textual instructions; applets; pre-compiledcode; interpreted code; compiled code; and computer programs.

A “computer system” may refer to a system having one or more computers,where each computer may include computer-readable medium embodyingsoftware to operate the computer or one or more of its components.Examples of a computer system may include: a distributed computer systemfor processing information via computer systems linked by a network; twoor more computer systems connected together via a network fortransmitting and/or receiving information between the computer systems;a computer system including two or more processors within a singlecomputer; and one or more apparatuses and/or one or more systems thatmay accept data, may process data in accordance with one or more storedsoftware programs, may generate results, and typically may includeinput, output, storage, arithmetic, logic, and control units.

A “network” may refer to a number of computers and associated devicesthat may be connected by communication facilities. A network may involvepermanent connections such as cables or temporary connections such asthose made through telephone or other communication links. A network mayfurther include hard-wired connections (e.g., coaxial cable, twistedpair, optical fiber, waveguides, etc.) and/or wireless connections(e.g., radio frequency waveforms, free-space optical waveforms, acousticwaveforms, etc.). Examples of a network may include: an internet, suchas the Internet; an intranet; a local area network (LAN); a wide areanetwork (WAN); and a combination of networks, such as an internet and anintranet.

Exemplary networks may operate with any of a number of protocols, suchas Internet protocol (IP), asynchronous transfer mode (ATM), and/orsynchronous optical network (SONET), user datagram protocol (UDP), IEEE802.x, etc.

Embodiments of the present invention may include apparatuses forperforming the operations disclosed herein. An apparatus may bespecially constructed for the desired purposes, or it may comprise ageneral-purpose device selectively activated or reconfigured by aprogram stored in the device.

Embodiments of the invention may also be implemented in one or acombination of hardware, firmware, and software. They may be implementedas instructions stored on a machine-readable medium, which may be readand executed by a computing platform to perform the operations describedherein.

In the following description and claims, the terms “computer programmedium” and “computer readable medium” may be used to generally refer tomedia such as, but not limited to, removable storage drives, a hard diskinstalled in hard disk drive, and the like. These computer programproducts may provide software to a computer system. Embodiments of theinvention may be directed to such computer program products.

An algorithm is generally considered to be a self-consistent sequence ofacts or operations leading to a desired result. These include physicalmanipulations of physical quantities. Usually, though not necessarily,these quantities take the form of electrical or magnetic signals capableof being stored, transferred, combined, compared, and otherwisemanipulated. It has proven convenient at times, principally for reasonsof common usage, to refer to these signals as bits, values, elements,symbols, characters, terms, numbers or the like. It should beunderstood, however, that all of these and similar terms are to beassociated with the appropriate physical quantities and are merelyconvenient labels applied to these quantities.

Unless specifically stated otherwise, and as may be apparent from thefollowing description and claims, it should be appreciated thatthroughout the specification descriptions utilizing terms such as“processing,” “computing,” “calculating,” “determining,” or the like,refer to the action and/or processes of a computer or computing system,or similar electronic computing device, that manipulate and/or transformdata represented as physical, such as electronic, quantities within thecomputing system's registers and/or memories into other data similarlyrepresented as physical quantities within the computing system'smemories, registers or other such information storage, transmission ordisplay devices. In a similar manner, the term “processor” or“controller” may refer to any device or portion of a device thatprocesses electronic data from registers and/or memory to transform thatelectronic data into other electronic data that may be stored inregisters and/or memory. A “computing platform” may comprise one or moreprocessors.

It will be understood, and is appreciated by persons skilled in the art,that one or more processes, sub-processes, or process steps described inconnection with FIGS. 7, 8, 9 and 10 may be performed by hardware and/orsoftware (machine readable instructions). If a server is described(master device may be implemented as a server), the term “server” maymean a combination of hardware and software operating together as adedicated server or it may mean software executed on a server toimplement the approach previously described. If the process is performedby software, the software may reside in software memory (not shown) in asuitable electronic processing component or system such as one or moreof the functional components or modules schematically depicted in thefigures.

The software in software memory may include an ordered listing ofexecutable instructions for implementing logical functions (that is,“logic” that may be implemented either in digital form such as digitalcircuitry or source code or in analog form such as analog circuitry oran analog source such an analog electrical, sound or video signal), andmay selectively be embodied in any computer-readable medium for use byor in connection with an instruction execution system, apparatus, ordevice, such as a computer-based system, processor-containing system, orother system that may selectively fetch the instructions from theinstruction execution system, apparatus, or device and execute theinstructions. In the context of this disclosure, a “computer-readablemedium” is any tangible means that may contain or store the program foruse by or in connection with the instruction execution system,apparatus, or device. The tangible computer-readable medium mayselectively be, for example, but is not limited to, an electronic,magnetic, optical, electromagnetic, infrared, or semiconductor system,apparatus or device. More specific examples, but nonetheless anon-exhaustive list, of tangible computer-readable media would includethe following: a portable computer diskette (magnetic), a random accessmemory (RAM) (electronic), a read-only memory (ROM) (electronic), anerasable programmable read-only memory (EPROM or Flash memory)(electronic) and a portable compact disc read-only memory (CDROM)(optical). Note that the computer-readable medium may even be paper(punch cards or punch tape) or another suitable medium upon which theinstructions may be electronically captured, then compiled, interpretedor otherwise processed in a suitable manner if necessary, and stored ina computer memory.

The foregoing detailed description of one or more embodiments of theintruder detection method and system has been presented herein by way ofexample only and not limitation. It will be recognized that there areadvantages to certain individual features and functions described hereinthat may be obtained without incorporating other features and functionsdescribed herein. Moreover, it will be recognized that variousalternatives, modifications, variations, or improvements of theabove-disclosed embodiments and other features and functions, oralternatives thereof, may be desirably combined into many otherdifferent embodiments, systems or applications. Presently unforeseen orunanticipated alternatives, modifications, variations, or improvementstherein may be subsequently made by those skilled in the art which arealso intended to be encompassed by the appended claims. Therefore, thespirit and scope of any appended claims should not be limited to thedescription of the embodiments contained herein.

1. A security system for monitoring a private security area having groupmembers permitted to be in the security area without restriction, thesecurity system comprising: at least two detection devices for detectinghuman movement in a first detection zone; the at least two detectiondevices being in network communication with each other; and at least oneof the at least two detection devices being in network communicationwith at least one personal mobile device of a group member to alert thegroup member of the personal mobile device of movement detected by oneof the at least two detection devices.
 2. The security system of claim1, where the private security area has a second detection zone where thesecond detection zone has at least two detection devices for detectinghuman movement in the second detection zone and where at least one ofthe at least two detection devices in the second detection zone is innetwork communication with at least one of the at least two detectiondevices in the first detection zone.
 3. The security system of claim 2,where the group member is not alerted of the movement detection untilthe movement is detected by detection devices located in both the firstand second detection zones.
 4. The security system of claim 1 where thesecurity system is capable of being disarmed by the geo-location of oneor more group members' mobile devices being within the private securityarea.
 5. The security system of claim 1 where the security system iscapable of being armed by the geo-location of one or more group members'mobile devices being outside the private security area.
 6. The securitysystem of claim 1 further including a server, where the at least twodetection devices and at least one mobile device is in networkcommunication with the server.
 7. The security system of claim 6 furtherincluding sensory alerts in network communication with the server, wherethe sensory alerts may be triggered upon activation of a panic functionon the at least one mobile device.
 8. The security system of claim 6where the detection devices have geo-location tags and where the serverstores the associated geo-location tag of each of the at least twodetection devices to register the location of any movement detected byeither of the at least two detection devices.
 9. The security system ofclaim 1 further including a camera in network communication with theserver where the server is able to control the movement of the camera inresponse to movement detected by one of the at least two detectiondevices.
 10. A security system for monitoring a predetermined detectionzone having certain members permitted to be in the zoned area withoutrestriction, the security system comprising: at least two detectiondevices for detecting human movement, the at least two detection devicesbeing in network communication with each other; a server being innetwork communication with at least one of the at least two detectiondevices and with at least one personal mobile device of a member; atleast one of the at least two detection devices generating an alertnotification when unauthorized human movement is detected andcommunicating the alert notification to the server; and the servercommunicating any received alert notifications from the at least twodetection devices to the at least one personal mobile device of a memberto alert the member of the personal mobile device of movement detectedby any one of the at least two detection devices.
 11. The securitysystem of claim 10, where the predetermined zone is a first monitoredzone within a private security area having more than one monitored zonesand where the more than one monitored zones also includes a secondmonitored zone having at least two detection devices for detecting humanmovement in the second monitored zone and where the at least one of theat least two detection devices in the first predetermined zone andsecond predetermined zones are able to share detecting information witheach other via the server.
 12. The security system of claim 10 furtherincluding a camera in network communication with the server and wherethe server is able to control the camera in response to alertnotifications received from the at least one of the at least twodetection devices generating an alert notifications.
 13. The securitysystem of claim 10 where the at least two detection devices haveassociated geo-coordinates and where the server stores thegeo-coordinates of the at least two detection devices.
 14. The securitysystem of claim 13 further including a camera in network communicationwith the server, where the camera has associated geo-coordinates storedon the server and where the server controls the camera view in responseto alert notifications received from the at least one of the at leasttwo detection devices generating an alert notification based upon thegeo-coordinate of the camera relative to the geo-coordinates of theleast one of the at least two detection devices generating an alertnotification.
 15. The security system of claim 10 where the mobiledevices of the members are in network communication with the server andwhere the security system includes sensory alerts that may be activatedby the mobile devices in response to the activation of a panic responseon the mobile devices.
 16. A community security system for monitoringintruders having at least two private security areas each monitored byindividual security systems and a server in network communication witheach individual security system, where the server facilitates theexchange of information between the security systems about intruderssuch that a user of one security system can be alerted of intrudersdetected on another security system.
 17. The community security systemof claim 16 where the users of the individual security systems of theprivate security areas interface with the server via an applicationaccessible via the user mobile device, whereby the user is able toreceive notifications of intruder activities occurring in the communitysystem via the user's mobile device.
 18. The community security systemof claim 16 where the servers provides information to at least one ofthe two private security areas about security breaches occurring inother areas upon request from the at least one of the two privatesecurity areas.