Alarm method and device

ABSTRACT

The invention relates to a method for selectively informing at least one person in the case of an alarm condition of an object, comprising of producing successive images of the object with at least one camera, comparing successive images, establishing at least one communication connection with the person in the case an image differs to a predetermined extent from a previous image, and sending an alarm report to the person over this communication connection.

BACKGROUND OF THE INVENTION

1. Field of the Invention

The invention relates to a method for selectively informing at least oneperson in the case of an alarm condition of an object.

2. Description of the Prior Art

In a known method an emergency centre is alerted in case of an alarmcondition. An employee of the emergency centre who is apprised of thealarm condition will in turn alert a person designated for this purposeor the police. It is subsequently expected of the designated person orthe police that they will go and investigate in order to establishwhether there is an actual alarm condition or whether there has been afalse alarm.

It is found in practice that false alarm occurs frequently, which hasthe result that the designated person or the police are increasinglyless inclined to take action in the case they are alerted.

Known from European patent application 0 805 426 is a surveillancesystem and method. The system consists of at least one camera, theimages of which are compared to the previous image. When there is adifference between the reference image and the camera image, the imageprocessing module selects that changed portion of the total image andsubsequently sends that portion via a communication means to at leastone remotely situated observer. On the basis of the image material sentto him this person can take action. The alarm can be switched offremotely, or the police can be alerted. In this manner a person, forinstance the owner of the object for surveillance, making use of presentcommunication means, functions as intermediate link and the police areonly alerted at a later stage. This surveillance system however allowsone method of alarm via a limited communication means. The receiving ofan alarm report is not guaranteed either, nor is a check made by thesurveillance system whether the report has been received or read. Inaddition, different people cannot receive specific alarm reports. Asfinal drawback can be mentioned that the person to be alerted can bedisturbed with an alarm report at any time of the day/week.

SUMMARY OF THE INVENTION

The invention now has for its object to provide a method of the typespecified in the preamble wherein a person can be alerted with a certainflexibility and the chance of false alarm is minimized.

In the case of an alarm condition one or more communication connectionscan be made over which different alarm reports can be sent depending onthe possibilities of the communication connection. There may becommunication connections with one and the same person, although it isalso possible to alert a plurality of persons simultaneously about thealarm condition by means of the communication connection.

The content of the alarm report can be designed in different ways. Thealarm report can be a prerecorded sound report, as well as a soundreport composed by a computer and completed with current information,such as the point in time and/or the location of the alarm condition.The alarm report may also be text-only, as well as fixed text or aflexible computer report. A report can also comprise an image of theobject where an alarm condition has been determined. In addition, thealarm report can comprise sound fragments from the area surrounding theobject where the alarm condition has been determined. The alarm reportmay further also comprise a warning that an image or sound fragment hasalready been sent via a different communication means.

A suitable communication connection is chosen subject to the alarmreport to be sent. A text message can thus be sent via SMS, WAP or thelike as well as via e-mail. Visual material can be sent via Internet ore-mail to a suitable portable or fixed telephone. Sound fragments canlikewise be sent via Internet as well as to telephones and the like.

In addition, a silent or loud alarm can be generated in the case of analarm condition.

False alarms are usually the result of incorrectly adjusted sensors,such as infrared sensors. By causing the alarm warning to depend on acamera image, the chance of an incorrect report is considerably reduced.

The relevant person can examine the image recorded by the camera anddetermine himself whether there is indeed any question of an alarmcondition, for instance in the case an unauthorized person is visible onthe image, or whether there is indeed a false alarm. It will hereby bepossible with certainty to prevent any unnecessary action on the part ofthe relevant person or persons. Lying within the scope of the inventionis the possibility of alerting a number of people simultaneously. Thesecontact persons can favourably be family members and acquaintances.Social control is therefore as it were automated with the methodaccording to the invention. The direct contact and the direct controlwhich is characteristic of social control is now also realized here inthat the physical distance of the contact persons from the object hasbecome unimportant.

Different connections are hereby used to inform the relevant person orpersons as quickly as possible, so that in the case of an actual alarmcondition he can respond very rapidly.

Via the voice connection, which can for instance be effected by a simpletelephone connection, the person is alerted that an alarm condition hasoccurred, whereupon he can take action to examine the image sent via aseparate image connection or for instance streamline video. The alertedperson or persons gain a better insight into the situation at thelocation of the object under surveillance.

The images produced by the camera can be processed simply in a computerusing per se known software and transmission of the images can also takeplace using per se known software.

If it is indeed found that a correct alarm condition has occurred,particularly because the differing image shows an unauthorized person,it is possible to determine afterwards who the unauthorized person is,and the image can optionally form an indication or evidence of theunauthorized conduct of the unauthorized person.

In the case of an alarm condition of an object, an alarm action plan isformulated which provides an overview of the alarm reports which must besent as a consequence of the alarm condition. The alarm report cancomprise any of the above described types.

The alarm action plan can further comprise a list of persons who must bealerted in the case of an alarm condition. Different reports can be sentto different persons. Different communication connections can be chosenvia which a connection can be established with the person who must bealerted. The chosen connection will depend on the alarm report to besent.

A further preferred embodiment relates to an alarm action plan whichdesignates a time sequence in the communication connections to be made.In this manner it is possible to first seek contact with a first person,followed by a second, and so on. The same person can also be alertedsuccessively via different communication connections. An alarm actionplan with time planning also provides the possibility of alertingdifferent person first at different times of the day. In this way themethod of the alarm action plan becomes very flexible and user-friendlyand enables the sending of a specific report via a dependentcommunication connection to a specific person at a separate point intime.

Another embodiment enables the contacted person to respond to the alarmcondition via the communication connection. When the alarm report comesin on a GSM device, the reply OK can be given by pressing keys 6 and 5.These numbers represent the letters O and K on the GSM device. It islikewise possible to respond with the computer when the communicationconnection comprises an e-mail alarm report. Acceptance of the report bythe addressee with OK or the like means that the report is transferredto this person. This person will inspect the alarm condition. The alarmaction plan will not be completed.

According to a further development it is possible to operate theinvention via the established communication connection. It is thuspossible to switch off the activated alarm. Other components of theinvention can also be controlled via this communication connection.

It is preferably made possible to have the response and operation takeplace making use of a voice connection. The invention will response to arecorded command in suitable manner via the communication connection.

The invention can also recognize recorded texts and check them forauthenticity. The operation of the invention is thus prevented fromfalling into the hands of a person who is not allowed to do this.

In addition, it is possible to verify the receipt of different alarmreports for receiving and/or reading thereof by the recipient. When thesent alarm report is an e-mail, this can take place in known manner.

The invention also relates to and provides a device for performing amethod according to the invention. It has been found that false alarmsare often also the result of incorrect operation of the alarm system.Operating errors are precluded to a very considerable extent by makinguse of voice recognition and voice control.

The invention further comprises means for processing and storing data ofthe alarm action schedule. When the alarm action schedule is set intooperation in the case of an alarm condition, the data from the scheduleis processed and contact is made by the invention via a communicationnetwork with the inputted list of the alarm action schedule.

Finally, a remotely situated second computer can be connected to acommunication connection, a server on which the user can make settingscorresponding with his preferred settings, and which can take over thesurveillance functions of the first computer in the case this firstcomputer breaks down. This could occur during a burglary followed bysabotage. The preferred settings comprise for instance the alarm actionplan or the alarm report for changing. Organization of this server cantake place in known manner. If the communication connection of thedevice allows, third parties can also retrieve the image from thecameras. This option can be adjusted by the user in desired manner.

The invention likewise relates to and provides software for causing acomputer to function as a device according to the invention.

BRIEF DESCRIPTION OF THE DRAWINGS

The invention will be further elucidated in the following descriptionwith reference to the annexed figure.

FIG. 1 shows a surveillance device according to the method.

FIG. 2 shows the same surveillance device in interaction with differentcommunication means.

FIG. 3 shows a block diagram with different steps in the case of analarm condition.

FIG. 1 shows schematically a device with which the method according tothe invention can be applied.

DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENTS

Shown are a number of, in this case two, cameras 1,2, which arepreferably digital cameras and in further preference CCD-cameras. Suchcameras are commercially available in many embodiments, particularly inembodiments which can be connected via standard interfaces to acomputer, in particular a PC.

In addition to a number of cameras, a number of microphones 15, 16 arealso arranged in this preferred embodiment. These microphones 15, 16 canbe integrated in cameras 1, 2, but can also be separate.

The device further comprises a computer or PC 3. Incorporated in thiscomputer 3 is a processing module 4 which can be deemed as assembled onthe one hand from an interface for the electric coupling to cameras 1and 2 and microphones 15, 16, and on the other from software which canprocess the image signals from these cameras 1 and 2 and sound signalsfrom microphones 15, 16.

The image processing software is embodied such that successive imagesfrom each of the cameras 1 and 2 are compared.

Cameras 1 and 2 are directed at the objects for surveillance ormonitoring, such as for instance doors or windows of a building, anentrance gate, a part of the premises and the like.

Processing module 4 is adapted such that after an adjusting periodsuccessive images from each of the cameras 1 and 2 are compared to eachother. Using an image adjusting module 5 the acceptable degree ofdifference between two successive images can be set. As soon as thisadjusted value of the two successive images from one or more of thecameras is exceeded, a message module 6 is activated.

Adjusting module 5 for processing module 4 can further contain optionsfor showing images from each of the cameras on a monitor and options forstoring images, for instance at an adjustable interval. The software canalso comprise options for playback of recorded images.

When it is determined by the image processing module 4 that one or moreimages from the cameras differ from the previous one, a message module 6is activated as noted above. One or more of the differing images aresimultaneously stored in a section of memory 9.

Message module 6 is connected to a communication member, such as forinstance a modem 7. Via this communication member a connection can bebrought about to a communication network, which can for instance be atelephone network 10.

Computer 3 can be connected to server 17 via communication network 10.Server 17 is adapted such that it can take over functions of computer 3in the case that computer 3 breaks down, for instance due to sabotage.Server 17 is in direct contact with cameras 1 and 2 and/or microphones15 and 16 via communication network 10. Server 17 comprises memory meanswhich can take over and execute the settings for computer 3. The servercan also be adjusted by the user to execute only some of the functions.In the case of an alarm situation the image material is sent to server17 and then distributed by this server 17 in accordance with the setalarm schedule.

A list or database of contact persons, to whom messages can be sent asthe case arises, can be stored in memory 9 of computer 3. The list formsthe alarm action schedule. In this schedule further information can forinstance be included concerning the times at which the relevant personsmay not be disturbed, so that no messages will be sent to these personsduring these relevant periods. In this schedule can of course also beincluded the necessary information as to the manner in which themessages must be communicated to the relevant contact persons.

An adjusting module 8 is coupled to image module 6. Using this adjustingmodule 8 the image module 6 is adjusted such that a determinedcommunication connection can be effected in the case that a situation ofdiffering successive images is recognized by image processing module 4.This connection can for instance be with a mobile telephone 11, a fixedtelephone 12, a PC 13 or a fax 14. Using the adjusting module 8 arecorded message can be selected which is sent to the relevant telephoneapparatus 11 or 12 via the communication connection to be established.The image stored in memory 9 can simultaneously be sent to animage-processing device such as a PC 13 or fax 14. The alarm report sentto telephone 11 or 12 contains for instance a message that an image hasbeen sent via an image-transmitting connection to for instance the PC 13or fax 14.

PC 13 can be programmed and equipped to reproduce the sent images in asuitable manner. The present possibilities comprise for instance e-mail,streamline video, Internet and the like.

As well as a recorded message, an SMS-message can for instance also besent to a mobile telephone 11.

The person or persons called using telephone 11 or 12 can then view thesent image on PC 13 or fax 14 and determine whether there is indeed analarm condition, i.e. whether the condition recognizable from the imageis for instance undesirable.

If for instance an unauthorized person makes his way onto a premises,the first image from a camera directed at these premises on which theperson can be seen will differ from the previous image. The differingimage is stored in memory 9 and message module 6 is activated by imageprocessing module 4 so as to send a recorded message to mobile phone 11or fixed telephone 12 via communication member 7. The image stored inmemory 9 is simultaneously sent to PC 13 or fax 14. The message sent totelephones 11 or 12 contains a warning to the person answering thetelephone to refer to the PC 13 or fax 14. After analysing the image,the person can then take appropriate action, such as for instancealerting the police or the like. When the person does not accept orreceive the alarm report, the following person in the alarm actionschedule will be alerted.

Sending of the image can take place using software which comprisesstandard PC software. An image can for instance be sent to a PC 13 withexisting e-mail software or, using similar software, to fax 14.

In addition to an alarm in the case of an undesired situation, forinstance the presence of an unauthorized person, the method and devicecan also be used for more general surveillance. Using the method anddevice according to the invention an entrance check for instance canthus be performed in a building or premises where no persons arepresent. As soon as someone appears at the entrance, and is “seen” by acamera disposed there, a report will be transmitted to a remotelocation. The person who receives the report can then view the imagewhich has also been sent and determine whether the person who hasappeared at the entrance may obtain access to the premises or building.The entrance can then be released with remote control.

Although in the annexed figure there are shown only two cameras andmicrophones in each case and only one example of the communicationequipment 11–14, it will be apparent that the number ofcameras/microphones is relatively unlimited and that furthermore thenumber of communication units to which messages are sent is alsorelatively unlimited.

FIG. 2 shows a second preferred embodiment wherein the emphasis isplaced on the interaction which is possible with computer 3. In thispreferred embodiment the computer 3 comprises at least processing module4, memory means 9 and modem 7. Adjusting modules 5 and 8, as well asmessage module 6 can likewise be arranged and function in the abovespecified manner. With cameras 1 and 2 and microphones 15 and 16 analarm condition can be determined in an object, which condition can beprocessed by processing module 4. On the basis of the information inmemory means 9, image processing module 4 will make contact via modem 7with a computer 19 and a mobile telephone 11 or the like by means of acommunication means network 10. Computer 19 and mobile telephone 11 havethe option of responding to the call of computer 3 by inputting data onthe keyboard and sending it back to processing module 4 viacommunication means 10 and modem 7. The alarm condition can thus bedisabled remotely.

In the case of an alarm condition, image processing module 4 can makecontact via communications network 10 with server 17 which undertakesexecution of the alarm action plan and makes contact via thecommunications network with the different preferred communication meansas inputted in the alarm action schedule. Server 17 can receive theimages or sound transmitted once-only from computer 3, but can also havea direct connection to the cameras 1 and 2 and microphones 15 and 16.

There is also the possibility of computer 3 or server 17 checkingwhether a sent e-mail has been received and read. The e-mail is sent toa mail account at a server 18 connected to for instance Internet. It ispossible to have server 18 send back reports, e-mails relating to thestatus of a message, such as received and/or read. When a message is notreceived or read, computer 3 or server 17 can continue with follow-upaction. The subsequent step from the alarm action schedule can thus forinstance be executed.

FIG. 3 indicates the most important steps which can take place in thecase of an alarm condition. The first step is formed by an observationmeans, for instance a camera or a microphone 20. This means observes thesituation in an object for surveillance. Whatever is observed iscompared to a reference observation 21, for instance a standardbackground sound. Comparison 21 of these two observations can, in thecase of a difference, result in an alarm condition 22. Alarm condition22 activates the alarm action plan which is stored in 23. The steps ofthe alarm action schedule will be gone through, wherein contact isestablished with possible contact persons according to the input list.In the case of an alarm condition the completion of the list will onlystop when a contact person responds to an alarm report, for instance bysending back an acceptance message, for instance the letters 0 and K.This can take place in known manner. When a contact person is preparedto accept the alarm condition for inspection, he can bring aboutacceptance 26 in a determined manner. Three options are shown innon-limitative manner, i.e. voice recognition and control 27, a code/OKresponse 28 or a password verification 29. The contact person then takessteps whereby he can check 30 the alarm condition. Check 30 can resultin two possible actions, the alarm condition is a false alarm 33 or thepolice 32/security service 32 must be alerted. Using a step-by-step plan31 provided by the invention the checking person can take steps whichenable the police to better deal with the alarm condition. Thisstep-by-step plan 31 can be drawn up in consultation with the police andstored in the memory means of the invention.

1. A method for selectively informing at least one person of an alarmcondition of an object, comprising determining an alarm condition,providing at least two types of communication connections and at leasttwo alarm report contents suited for different communicationconnections, establishing at least one communication connection in thecase of the alarm condition, sending an alarm report over thecommunication connection, and selecting the content of the alarm reportthat is sent depending on the type of communication connection, whereinat least one report can be stored in an alarm action schedule whichcontains an overview of actions to be taken as a consequence of adetermined alarm condition.
 2. The method as claimed in claim 1, furthercomprising producing successive images of the object with at least onecamera, comparing successive images and sending the alarm report in thecase an image differs to the predetermined extend from a previous image.3. The method as claimed in claim 1, wherein at least one differingimage is sent to the person via a communication connection.
 4. Themethod as claimed in claim 1, wherein the alarm report is sent via avoice connection and the image via an image transmission connection. 5.The method as claimed in claim 4, wherein sound from the areasurrounding the object is sent via the voice connection.
 6. The methodas claimed in claim 1, wherein the alarm report comprises a message thatan image has been transmitted via the image transmission connection. 7.The method as claimed in claim 1, wherein the images are produced andprocessed in digital form.
 8. The method as claimed in claim 1, whereinthe image transmission connection is chosen from an electronic mail anda telefax connection.
 9. The method as claimed in claim 1, wherein atleast one of the differing images is stored in combination with the timeat which it was produced.
 10. The method as claimed in claim 1, whereinat least one person can be designated as contact person in the alarmaction schedule.
 11. The method as claimed in claim 1, wherein at leastone communication connection is designated in the alarm action schedule.12. The method as claimed in claim 1, wherein at least one time settingcan be adjusted for an action in accordance with the alarm actionschedule.
 13. The method as claimed in claim 1, wherein acceptance bythe person alerted in a case of an alarm condition results indiscontinuing the completion of the alarm action schedule.
 14. Themethod as claimed in claim 1, wherein the person can operate theinvention via a communication connection.
 15. The method as claimed inclaim 14, wherein the operation takes place by means of a voiceconnection.
 16. The method as claimed in claim 1, wherein the identityof a responding person is verified by means of voice recognition. 17.The method as claimed in claim 1, wherein in the case of a sent alarmreport verification takes place as to whether the report has beenreceived and/or read by the person.
 18. A device for selectivelyinforming at least one person of an alarm condition of an object,comprising a computer which is provided with input and output members towhich at least one electronic camera and a communications network areconnected and on which software is installed which can comparesuccessive images produced by the camera with each other and, in thecase an image differs to a predetermined extent from a previous image,establishes via the communications network a communication connectionwith at least one predetermined addressee and sends an alarm report viathis communication connection, wherein the computer comprises means forcommunication with a server adapted with means which can take overpreferred settings and which can take over the surveillance function inthe case the computer ceases to function.
 19. The device as claimed inclaim 18, wherein the computer sends at least one differing image to atleast one predetermined addressee via an established communicationconnection.
 20. The device as claimed in claim 18, wherein at least onemicrophone is connected to the input members and wherein the computertransmits the sound picked up by the microphone via an establishedcommunication connection.
 21. The device as claimed in claim 18, whereinthe computer comprises voice recognition computer and the operation ofthe device is performed under voice control.
 22. The device as claimedin claim 18, wherein the computer comprises memory means for composingan alarm action schedule and making it accessible to the communicationsnetwork.
 23. A device for selectively informing at least one person ofan alarm condition of an object, comprising a computer which is providedwith input and output members to which at least one input means and acommunications network are connected and on which software is installedthat determines an alarm condition based on information provided by theat least one input means, establishes via the communications network atleast one communication connection in the case of the alarm condition,sends an alarm report via the communication connection, and selects thecontent of the alarm report that is sent depending on the type ofcommunication connection, wherein at least one report can be stored inan alarm action schedule which contains an overview of actions to betaken as a consequence of a determined alarm condition.