Security monitoring with programmable mapping

ABSTRACT

An integrated security arrangement is implemented in a variety of embodiments. In one such embodiment an integrated security arrangement includes a plurality of intrusion sensors that sense an intrusion in a target area, a motion sensor, and an image-capture device that is responsive to the motion sensor. When the image-capture device is enabled it captures images of the target area in response to movement in the target area as indicated by the motion sensor. The integrated security arrangement also includes a mapping database that contains data used to associate one or more of the plurality of intrusion sensors with the image-capture device. A user configures the mapping database to select at least one of the intrusion sensors for enabling the image-capture device. The integrated security arrangement further includes a control unit that enables the image-capture device in response to the selected intrusion sensor as configured in the mapping database.

RELATED PATENT DOCUMENTS

This patent document is a continuation under 35 U.S.C. §120 of U.S.patent application Ser. No. 12/293,996 filed on Jan. 26, 2009 (U.S. Pat.No. 9,189,934), which is the national stage filing under 35 U.S.C. §371of International Application No. PCT/US2007/004773 filed on Feb. 23,2007; which PCT/US2007/004773 is a continuation-in-part and claimspriority to common aspects of: U.S. patent application Ser. No.11/389,673 (U.S. Pat. No. 7,835,343), entitled “Spread SpectrumCommunications For Building-Security Systems,” filed on Mar. 24, 2006;U.S. patent application Ser. No. 11/388,764 (U.S. Pat. No. 7,463,145),entitled “Security Monitoring Arrangement And Method Using A CommonField Of View,” filed on Mar. 24, 2006, and which claims benefit of U.S.Provisional Application Ser. No. 60/719,369, filed on Sep. 22, 2015; andwhich PCT/US2007/004773 also claims benefit of U.S. ProvisionalApplication Ser. No. 60/785,570, entitled “Motion-Image MonitoringMethod and Device,” filed on Mar. 24, 2006. Priority is claimed forcommon subject matter, under 35 U.S.C. §120, to each of these underlyingpatent documents.

FIELD OF THE INVENTION

The present invention is directed to a security arrangement and methodfor monitoring the inside of a facility or residence.

BACKGROUND

Home, office and other building-security systems are often used forsafeguarding valuable possessions and for personal protection. Thesesystems are typically implemented using different monitoring devices,such as cameras, motion sensors, keypads or contact sensors. Manybuildings have multiple locations that are monitored for securitypurposes, requiring multiple monitoring devices in the differentlocations. For increased security and functionality, the monitoringdevices can be configured to communicate with one or more centralcontrol devices. The central control device can, among other things,perform monitoring or recording functions, determine whether thebuilding-security has been breached and whether to contact securitypersonnel.

One method of communicating between the monitoring devices and thecentral control device is by a physical connection, such as electricalor other wiring. Using wiring to establish communication between thesecurity devices can be troublesome for a number of reasons, such as thehigh cost of installation and maintenance. For example, exposed wiringis often unacceptable in a building, and thus, the installation of thesecurity system requires passing the wires through the walls of thebuilding. This type of installation can significantly increase the timerequired to complete a security system installation. Moreover, thetroubleshooting and repair of the security system can be difficultbecause there is limited access to the unexposed wiring. The cost of thewire is another factor, especially in large buildings requiring numerousmonitoring devices.

One potential solution is to use wireless monitoring devices to reduceor eliminate the need for physical connections between the devices,however, wireless security systems also have a set of problems, such asbattery life. Ideally, the security devices would be self-powered by,for example, a battery. Self-powered devices are more secure becausethey are not subject to failure upon loss of power to the building. Theyalso require less installation problems because they do not need to beconnected to a separate power source; however, self-powered devicesoften have reliability issues due to the finite life of their powersource. Increasing the useable time of a power source reduces the costfor replacement of the power source and increases the security of theentire system by having less potential downtime of the system or itscomponents. Several recent developments have increased the potentialpower requirements of wireless security devices.

For example, the use of wireless communications in home, office andother buildings has been steadily increasing, creating additional issueswith wireless security systems. One such issue is the increasedpotential for corrupted data due to interference between differentwireless communications devices. This issue may also be present when anunauthorized person attempts to disrupt the security system by “jamming”the wireless communications using a wireless interference device.Techniques exist for reducing unwanted interference, however, theimplementation of some of the techniques result in increased powerrequirements. Two such techniques, both of which can result in increasedpower requirements, include increasing the power of the transmission orvarying the frequency of the transmission.

Another problem with power requirements arises from the desire to haveincreased monitoring capabilities with smaller devices. As securitysystems become more advanced, the power requirements of the monitoringdevices are often increased. For instance, monitoring devices thatcontain digital cameras require enough power to run the camera, to storethe digital picture in memory and to transmit the digital picture to thecontrol device. The increased functionality of the monitoring devices,along with the desire to have smaller, less noticeable devices with lessroom for batteries or other power sources, has impacted the reliabilityof the monitoring devices.

Implementing a wireless building-security system can be furthercomplicated by industry or government regulations. One such set ofregulations is imposed by the Federal Communications Commission (FCC).The current regulations cover numerous aspects of wirelesscommunications systems including, but not limited to, a range ofrestricted frequencies, a minimum number of different hoppingfrequencies within the allowable frequencies, the maximum output powerof a transmitter and a requirement related to equal use of the hoppingfrequencies.

Attempts have been made to implement wireless security systems using avariety of methods. One such method is taught by European PatentApplication Publication No. EP 1 363 260 filed on May 6, 2003, entitled“Procédé communication radiofréquence entre plusieurs dispositifs etsystème de surveillance mettant en œuvre un tel procédé,” which is fullyincorporated herein by reference. Yet, these methods still leave roomfor improvement.

In order to protect residents, employees, personal property, and thelike, security monitoring systems are used to monitor a variety offacilities and to sense the presence of unwanted intruders. Many suchsecurity systems are connected to a central control unit and monitoredby an operator who can alert the appropriate emergency services in theevent of an unwanted intruder. Typically, a home monitoring securitysystem includes a combination of sensing devices and alarm devices andsome also include cameras. To achieve the maximum monitoring coverage,these devices are distributed throughout the interior of the facility.

Security systems that employ cameras are advantageous in that they areable to record activity associated with a suspected breach of thefacility and also can be used by a monitoring station to prevent falsealarms. In some instances, however, the cameras record the regularactivities of the facilities' residents and/or employees. The camerasalso record activities that are falsely perceived to be securitybreaches such as pet behaviors and authorized users that have beenaccidentally locked out.

In specific situations, such as those having the potential to violatethe privacy of authorized residents and/or employees of the facility,such comprehensive recordation by the security cameras may beundesirable. Since unwanted intruders could breach the security of afacility while the inhabitants are present, it is necessary for thesecurity monitoring system to be functioning at all times. However,having cameras constantly being triggered to record the inhabitants'daily living and working routines is a dramatic invasion of theinhabitants' privacy, and is burdensome with respect to false triggers.Further, the monitoring and recording of guests' activities can be justas invasive.

Moreover, the installation and configuration of the various cameras anddevices often requires complex and time-consuming installationprocedures.

The above-discussed issues have presented challenges to developing ahome and/or facility security monitoring system that provides maximumcoverage while minimizing one or more of the above-identified issues.

SUMMARY

The present invention is directed to the above and related types ofintegrated security systems. These and other aspects of the presentinvention are exemplified in a number of illustrated implementations andapplications, some of which are shown in the figures and characterizedin the claims section that follows.

In one embodiment of the present invention, an integrated securityarrangement includes a plurality of intrusion sensors that sense anintrusion in a target area, a motion sensor, and an image-capture devicethat is responsive to the motion sensor. When the image-capture deviceis enabled it captures images of the target area in response to movementin the target area as indicated by the motion sensor. The integratedsecurity arrangement also includes a mapping database that contains dataused to associate one or more of the plurality of intrusion sensors withthe image-capture device. A user configures the mapping database toselect at least one of the plurality of intrusion sensors for enablingthe image-capture device. The integrated security arrangement furtherincludes a control unit that enables the image-capture device inresponse to the selected intrusion sensor as configured in the mappingdatabase.

In another embodiment of the present invention, an integrated securityarrangement is implemented. The arrangement has a plurality of intrusionsensors to sense an intrusion and a motion sensor to sense motion in atarget area. An image-capture device captures images of the target areain response to the motion sensor and at least one selected one of theintrusion sensors. A control arrangement uses a mapping database thatcontains data used to associate one or more of the plurality ofintrusion sensors with the image-capture device. The control arrangementpermits a user to configure the mapping database to select said at leastone of the plurality of intrusion sensors to which the image-capturedevice is responsive.

In another embodiment of the present invention, an integrated securityarrangement is implemented. The arrangement has an intrusion sensor tosense an intrusion and a plurality of motion sensors to sense motion inrespective target areas. A selected at least one of a plurality ofimage-capture devices, each associated with respective ones of theplurality of motion sensors, captures images of the respective targetarea in response to the respective motion sensor and the intrusionsensor. A control arrangement includes a mapping database that containsdata used to associate the intrusion sensor with the selectedimage-capture device. The control arrangement permits a user toconfigure the mapping database to select said at least one of aplurality of image-capture devices that which is responsive to theintrusion sensor.

In another embodiment of the present invention, an integrated securityarrangement includes an intrusion sensor to detect an intrusion, aplurality of motion sensors, and a plurality of image-capture devices.Each of the image-capture devices is responsive to a respective one ofthe motion sensors and when the image-capture devices are enabled theycapture images of respective target areas in response to movement in therespective target areas as indicated by the respective motion sensors.The integrated security arrangement also includes a mapping databasethat contains data used to associate one or more of the plurality ofimage-capture devices with the intrusion sensor. The mapping database isconfigurable by a user. The integrated security arrangement furtherincludes a control unit that enables one or more of the plurality ofimage-capture devices in response to the intrusion sensor detecting anintrusion. The control unit determines whether to enable one or more ofthe image-capture devices based upon data in the mapping database.

Commensurate with another embodiment of the present invention, anintegrated security arrangement is implemented with a mapping databasefor mapping sensors/detectors other than intrusions sensors to variousimage-devices. The detection of an event by a sensor triggers thecorrespondingly mapped image-device to capture images of a target area.

The above summary of the present invention is not intended to describeeach illustrated embodiment or every implementation of the presentinvention. The figures and detailed description that follow moreparticularly exemplify these embodiments.

BRIEF DESCRIPTION OF THE DRAWINGS

The invention may be more completely understood in consideration of thedetailed description of various embodiments of the invention inconnection with the accompanying drawings, in which:

FIG. 1 depicts a building-security system according to an exampleembodiment of the present invention;

FIG. 1A illustrates an example embodiment of an integrated securitysystem, according to the present invention;

FIG. 2 shows a block diagram of a security system for mapping aplurality of sensors to a camera, according to an example embodiment ofthe present invention;

FIG. 3 shows a block diagram of a security system for mapping aplurality of cameras to a sensor, according to an example embodiment ofthe present invention;

FIG. 4 shows an example mapping or lookup table, according to an exampleembodiment of the present invention;

FIG. 5 shows a flow diagram for logic for implementing a process toenable security cameras in response to mapped sensors, according to anexample embodiment of the present invention;

FIG. 6 shows a flow diagram for logic used to enable cameras for asecurity system, according to an example embodiment of the presentinvention;

FIG. 7 shows a block diagram of an interface for implementing differinglevels of access to a security system, according to an exampleembodiment of the present invention;

FIG. 8 shows a block diagram of another interface for implementingdiffering levels of access to a security system, according to an exampleembodiment of the present invention; and

FIG. 9 shows a block diagram of another interface that providesadministrative monitoring of configuration settings for a securitysystem, according to an example embodiment of the present invention.

While the invention is amenable to various modifications and alternativeforms, specifics thereof have been shown by way of example in thedrawings and will be described in detail. It should be understood,however, that the intention is not necessarily to limit the invention tothe particular embodiments described. On the contrary, the intention isto cover all modifications, equivalents, and alternatives falling withinthe spirit and scope of the invention as defined by the appended claims.

DETAILED DESCRIPTION

The present invention is believed to be applicable to a variety ofdifferent approaches and arrangements for providing security services.The invention has been found to be particularly advantageous foraddressing security monitoring needs in a residence or private-officeenvironment.

According to an example embodiment, a security system utilizes camerasto detect and identify intruders. The system includes an integratedcamera/motion detector that is responsive to intrusion sensors and othertypes of sensors/alarms (e.g., a smoke detector, a carbon monoxidedetector, a gas detector, or a panic button). For simplicity, thefollowing discussion focuses on the integrated camera/motion detectorbeing responsive to intrusion detection; however, the discussion isequally applicable to the integrated camera/motion detector beingresponsive to other types of sensors and alarms as well. The camera'ssmart-behavior results in reduced power consumption and mitigatesprivacy concerns on various levels. A system user sets up zones with atleast one intrusion sensor (e.g., door/window contacts, glass-breakdetectors, hyper frequency radar detector, or an infrared barrier) foreach zone around the perimeter of a facility and sets up correspondingcamera/motion detectors in the interior of the facility. The intrusionsensors are activated (armed) by a system user, using, e.g., a keypad ona security panel, a remote control keyfob, a phone call using DTMF, apersonal computer or a remote server. This allows for a completeactivation of the system when the system user leaves the facility aswell as a partial perimeter activation of the facility when the systemuser (or other authorized person) is present. Thus, when the user ispresent the camera remains “off” unless appropriately triggered by themotion detector. However, the motion detector also remains “off” unlessit is armed by a corresponding intrusion sensor. Therefore, camerasrecord images inside the facility when both an intrusion sensor has beentripped and a motion detector has detected motion. In oneimplementation, the system user enters a code (e.g., using a keypad on asecurity panel) to identify the desired mode of system operation. Inanother implementation, the system user enters a system access code andthen selects that desired mode of operation from a display.

Another example embodiment is directed to an integrated securityarrangement. The arrangement includes an intrusion sensor to sense anintrusion at a target area of a facility, a second sensor to sensemovement, an image-capture device, and a base unit. The image-capturedevice captures images in response to an intrusion indication from theintrusion sensor and in response to a movement indication from thesecond sensor. The base unit integrates a direction of view of thesecond sensor and of the image-capture device, thereby directing thesecond sensor to sense in the target area in which the images arecaptured by the image-capture device.

FIG. 1 depicts a building-security system according to an exampleembodiment of the present invention. FIG. 1 includes building 100,control panel 102, and peripheral devices 104-110. The security systemis implemented in such a manner so as to reduce the power consumption ofone or more of the control panel and peripheral devices as related tothe wireless communications between the devices. When implementing thewireless communications, the devices use multiple frequencies (channels)as well as communication intervals. The devices are able to reduce thepower consumption by utilizing information regarding a specificfrequency from the multiple frequencies used and the communicationinterval. For example, if the transmitting devices modify theirtransmissions based upon the information, a receiving device may reducethe power consumption by decreasing the time the receiving device islistening for a transmission from another device. By reducing the powerconsumption, the system lends itself to implementing bi-directionalcommunications between the devices, which typically require more powerconsumption than unidirectional communications.

The jagged lines and ellipses found between control panel 102 and theperipheral devices represent wireless communications between the controlpanel and the peripheral devices. The wireless communications may beimplemented using suitable frequencies. For instance, wirelesscommunications frequencies in industrial, scientific and medical (ISM)radio bands (900 Mhz, 2.4 Ghz and 5.8 Ghz) have been found to besuitable for security systems; however, alternate frequencies may beimplemented in accordance with the particulars of the system or itsintended implementation.

The various elements of the peripheral devices and the control panel areimplemented using one or more of electric circuit arrangements,processors, memory elements, software code, programmable logic devices,input/output interfaces or combinations thereof.

Building 100 represents a facility for which the building-securitysystem is implemented. Common implementations of building 100 include,but are not limited to, residential homes, retail stores, officebuildings, government buildings, museums and other facilities.Typically, the security system will monitor several locations withinbuilding 100. Accordingly, FIG. 1 depicts various peripheral devicesthroughout the building.

Peripheral communications devices 104-110 may take the form of a varietyof different devices, a few of which are depicted in FIG. 1. Forinstance, device 104 depicts a window sensor that may, among otherthings, detect when the window has been opened or otherwise compromised;device 106 depicts a camera for video capture; device 108 depicts analarm; and device 110 depicts a mobile peripheral, such as a key fob forinterfacing with the control panel or another peripheral. Other examplesensors include but are not limited to fire alarms, carbon dioxidesensors and panic buttons. These peripheral devices communicate withcontrol panel 102 using wireless communications.

Block 112 depicts several elements that may be implemented in theperipheral devices, including a transceiver block, a message protocolblock, a synchronization block and a transmit (Tx) anticipation block.Various embodiments of the present invention use one or more of theseblocks. In one such embodiment, a peripheral device wirelessly transmitsa signal using the transceiver block. The peripheral device usesinformation regarding a transmission period and the listening channel ofthe control panel in the transmission process.

In one embodiment, the peripheral devices transmit building-securityinformation to the control panel. For instance, device 106 mighttransmit video images or device-status information to the control panel,while device 104 might transmit information relating to the window'ssensor.

FIG. 1 depicts control panel 102 as including a transceiver block, amessage protocol block, a synchronization block and a transmit (Tx)anticipation block. Various embodiments of the present invention use oneor more of these blocks. In one such embodiment, the transceiver blockis used for receiving signals from one of the peripheral devices as afunction of the communication intervals and the frequency the controlpanel uses to listen for transmissions. The listening frequency is oneof several potential frequencies available for communication between theperipheral devices and the control panel. For instance, the system mayuse a number of contiguous frequency slots (channels) within a suitablefrequency band. One example of such a use includes 25 or more channelswithin the ISM frequency band from 902-928 MHz. Numerous othercombinations of channels and frequency bands are possible using thepresent invention.

Typically, the control panel and peripherals are implemented using asimilar set of elements as depicted by blocks 102 and 112; however,various components may be implemented differently. For instance, thesynchronization block can be implemented differently in the controlpanel versus the peripheral devices where the control panel providessynchronization information to each of the peripherals and theperipherals must use the synchronization information to maintainsynchronization using a local clock. In such an instance, theperipherals would compare the synchronization information with the localclock in order to compensate for any difference between the peripherals'time frames and the control panel's time frame. The synchronizationinformation can take the form of a time index, such as a counter value,a current time of day or any other time based data which the peripheralcan use as a reference for synchronization. In another example, the timeindex can be a reference within each message transmitted. Using such asystem the peripheral device can compare when the message was receivedto when the message was expected. The peripheral device may also beconfigured to adjust the local clock using a compensation for a timingerror. For instance, if the peripheral clock appears to be runningslower than the control panel, the peripheral can compensate byincreasing the clock frequency or using a counter to compensate for thedifferences between clocks.

The control panel and the peripheral blocks are depicted as having atransceiver; however, the system may be implemented using variations ofreceivers and transmitters. In some instances, a peripheral may beimplemented with only a transmitter. In other instances, a peripheralmay be implemented with only a receiver. Other implementations allow forone or more of the control panels and peripherals to have both atransmitter and receiver (transceiver). Thus, transceiver is used hereinto describe a receiver, transmitter or both a receiver and transmitter.

One embodiment of the present invention reduces the power of one of thedevices as a function of the listening channel and a communicationsperiod. The system decreases the length of time that a receiver isactive by using the communications period and listening channel toreduce the window of time necessary to receive the start of atransmission. When the receiver is not active, various methods of powerreduction are employed, such as removing power from the receivingdevices or reducing or stopping selected functions (e.g., amplificationor processing).

Another embodiment synchronizes the various peripheral devices with thecontrol panel. The synchronization can further reduce the active time ofthe transmitter because, for example, the transmitter may limit thetransmission times relative to the times for which the receiver isactive. Such a reduction can be accomplished because, for example, inmany systems the transmission time cannot be shorter than the Rxactivation period of the receiver without knowledge of when the Rxactivation occurs; however, synchronization can reduce the transmissiontimes to less than the Rx activation period of the receiver.

In a specific example, the control panel sends periodic synchronizationmessages to the peripheral devices. A peripheral device that determinesit has lost synchronization with the control panel can increase theactive time of the receiver to compensate for the loss insynchronization. In the event that the peripheral device is no longerreceiving synchronization messages, the device can increase the activereceive time to ensure that a transmission from the control panel willbe received. The peripheral device can increase the activation timebased upon an expected accuracy of the local tracking (e.g., localclock) of the control panel time-base. For instance, where the expectedaccuracy of the local tracking is relatively high, the peripheral deviceincreases the activation time only upon the loss of severalsynchronization messages.

Some devices, such as a keyfob or other handheld device (110), areportable and are often removed from the wireless communication range ofthe rest of the system or may cease to receive or transmit informationin response to a period of inactivity. Thus, the portable devices oftenlose synchronization during the time they are unable to communicate withthe control panel. Accordingly, such portable devices frequentlyincrease the activation time to compensate for the lack ofsynchronization between the portable devices and the control panel. Thefrequent increase in activation time often leads to a high rate of powerconsumption. To compensate, portable devices can be implemented to shutdown transmission monitoring efforts until an external action occurs,such as a button being pressed.

In one embodiment of the present invention, the messages sent by thecontrol panel are received by multiple peripheral devicessimultaneously. Where the message is not intended for all theperipherals, the message can include information that indicates forwhich peripheral the message is intended. The message can also beassociated with a channel that the control panel uses for an acknowledgemessage from the peripheral.

FIG. 1A illustrates an example embodiment of an integrated securitysystem, according to the present invention. A base unit 35 is located inthe interior of a facility and integrates a motion sensor 20, a camera25 (e.g., CCD camera), a data processor 30, and a communicationinterface 15. In one implementation the motion sensor is a passiveinfrared (PIR) sensor, which detects infrared energy in a target areaand, in connection with a processor 30, recognizes changes in infraredenergy (e.g., temperature changes) to detect motion. Depending on thesize of the facility, multiple base units are located throughout thefacility's interior, with a control panel 45 acting as a conventionalcommunication hub for the facility. The control panel 45 interfaces withthe base unit 35 via communications interface 15. In the event that anintrusion signal 10 is received by the control panel 45 from anintrusion sensor, the control panel arms motion sensor 20 allowing themotion sensor to activate the camera 25 when movement is detected. Thecontrol panel 45 can also directly activate the camera 25 (e.g., withoutregard to motion sensor 20). In one implementation, the base unit 35 canreceive the intrusion sensor input 10 via communications interface 15.The sensor input 10 can therefore inform either the base unit 35 or thecontrol panel 45 to arm the motion sensor 20 and/or activate the camera25. When unarmed, the motion sensor 20 will not be able to activatecamera 25 but may still detect motion. The motion sensor 20 can detectmotion in its field of view, and once the motion sensor is armed, themotion sensor is able to activate the camera 25. The motion sensor 20and the camera 25 are positioned such that both devices have overlappingfields of detection. Thus, images of the source of the detected motionare recorded by the camera without requiring any intervening adjustmentor alignment. The recorded images are processed by a data processor 30,which can be integrated with the motion sensor 20 and the camera 25 in abase unit 35 as shown, or may be located remotely and electricallycoupled to the base unit 35.

It will be appreciated that the data processor 30 can be implemented,for example, in the form of a high-speed processor such as a DSP(including an ALU) and/or a more general-purpose processor that may beoptionally programmed for video data (de)compression. Thus, variousembodiments may include a variety of combinations of processingoperations with one or more aspects of the processing operationsperformed at one or more local or remote processors. For example, bothvideo data storage and compression may be performed in the base unit 35by the data processor 30. When the processor is located remotely, thedata storage may still occur in base unit 35, but compression of thevideo data could be implemented in the remote processor. Anotherembodiment may involve data storage in the base unit 35 without anycompression of the video data. Moreover, each of the above operationsmay be performed in combination with a central processor 55, as furtherdiscussed below.

In example implementations the base unit 35 is a battery-operated,wireless device having both motion sensing and image-capturecapabilities. For further information on such a device, reference may bemade to filed provisional application Ser. No. 60/785,570 filed on Mar.24, 2006, entitled “Motion-Image Monitoring Method and Device” (AttorneyDocket No. RSIA.009P1), which is fully incorporated herein by reference.In certain implementations, data processor 30 is configured to preservebattery life by communicating in accordance with appropriatepower-saving protocols. For example implementations related tocommunicative coupling and data transfer among the above-discusseddevices in accordance with appropriate protocols, reference may be madeto U.S. application Ser. No. 11/389,673 filed on Mar. 24, 2006, entitled“Spread Spectrum Communications for Building-Security” (Attorney DocketNo. RSIA.010PA) and European Patent Application Publication No. EP 1 363260 filed on May 6, 2003, entitled “Procédé communication radiofréquenceentre plusieurs dispositifs et système de surveillance mettant en œuvreun tel procédé,” which are herein fully incorporated by reference. Thepower-saving approaches also provide for limited activation of theabove-discussed camera such that the privacy of the inhabitants of aresidence or facility is largely maintained.

The recorded images are transmitted over a bi-directional sensorcommunication path 40 to a control panel 45. In one implementation, thesensor communication path 40 is wireless and can be employed, e.g., asdescribed in the above two incorporated patent documents. Thetransmitted images may be encrypted by the data processor 30 beforebeing transmitted to the control panel 45. The control panel 45 includesa local storage area for the recorded images 50, the central processingunit 55, and a transceiver 60. The control panel 45 is located withinthe same facility as the base unit 35. The central processor 55 receivesimages from each of the base units located within the facility. Similarto the above discussion, the central processor 55 may perform a varietyof processing operations alone or in combination with data processor 30.The images may optionally be stored in data storage 50 for furtherreview or processing. The control panel 45 includes a battery backuppower source 65 in the event of a loss of power, e.g., a naturaldisaster or an intruder disables power to the facility. The transceiver60 further transmits signals including system status reports or recordedimages via a telephone channel 70 or cable channel 75 to outsidemonitoring facilities. The telephone channel 70 and cable channel 75 arenot limited to PSTN or broadband channels; they may be part of aGSM/CDMA network. Outside monitoring facilities may include a privatesecurity company or a local law enforcement station.

In another example embodiment, when an intrusion sensor senses anintruder breaching the facility (e.g., door/window contact is tripped),the intrusion signal 10 is transmitted directly to the control panel 45.The control panel 45 arms one or more base units 35 in the same zone aswhere the intrusion signal (via sensor 10) originated. For example, inresponse to a widow contact being tripped in a room the control panel 45can arm the sensor 20 of base unit 35 in that room, as well as thesensors of the base units located in adjacent rooms and/or the hallwayoutside the room. In this manner the system can track intruders as theymove throughout the facility. The base unit(s) 35 respond as discussedabove. In this system architecture, the control panel 45 is the masterand the sensors and control devices (e.g., keypads, keyfobs) are slavedevices. The radio link in this architecture is a star topology with thecontrol panel 45 at the center of the network. The branches include baseunits 35 and external links, e.g., telephone channel 70 and broadbandchannel 75.

Other aspects of the present invention are applicable to a securitysystem where a second sensor and image-capture device are not physicallyintegrated inside the same housing. In one such example, an embodimentis arranged with an intrusion sensor to sense an intrusion at a targetarea of a facility, a second sensor to sense movement, and animage-capture device. The second sensor bears a special relationship(e.g., located sufficiently near and aligned) with the image-capturedevice to form a common field of view, such that the fields of view forboth devices overlap without the devices being located inside a commonhousing. The image-capture device captures images in response to anintrusion indication from the intrusion sensor and in response to amovement indication from the second sensor.

In more specific embodiments, the various arrangements permit for thedevices to be situated in different ways to provide the common field ofview. For example, horizontal movement, vertical movement, or horizontaland vertical movement can be provided for each of the motion sensor andthe image-capture device, with their movements mirrored to maintain theintegrated field of view. More particularly, such mirrored movement canbe provided by using a ratchet-like mechanism with devices to provideincrement adjustments in the horizontal and/or vertical directions; theskilled artisan would appreciate that such adjustment can be implementedusing servo-control motors or be manually implemented using conventionalposition-stabilizers that permit step-wise/incremental rotation.

In a related embodiment, horizontal movement, vertical movement, orhorizontal and vertical movement can be provided for either or both themotion sensor and the image-capture device by way of conventionalelectronically-implemented pan/tilt/zoom operation(s), with theirmovements coordinated to maintain the integrated field of view. Forimage-capture, such pan/tilt/zoom operation is commonly used in digitalvideo-recording devices. The motion detector may also be manipulated toalter the field of view.

In more specific embodiments, the various arrangements can beimplemented with a spatial relationship between the motion sensor andthe image-capture device by using a common backplate to which each ofthe motion sensor and the image-capture devices are mounted and/or atemplate for aligning the motion sensor and the image-capture device formounting on a wall, where contoured portions of the respective backs ofthe motion sensor and the image-capture device may provide an offset forbiasing the direction of view.

In other specific embodiments, the various arrangements permit for suchabove-described devices to be situated such that their movement ispre-set before they are used or dynamically controlled while in use withautomated or semi-automated coordination provided by the controlcircuitry and/or personnel at a remote-site center. Such coordinatedmovement, while maintaining a common field of view, benefits a varietyof monitoring and/or security applications.

According to one example embodiment of the present invention, anintrusion sensor, such as a window or door contact, located at aperimeter of a facility detects whether the contact subject, window ordoor, has been breached. If, for example, a window has been opened, thewindow contact (intrusion sensor) sends a signal to a correspondingintegrated motion sensor/camera located at the interior of the facility.Upon receipt of the intrusion signal, the motion sensor is armed and theintegrated camera is set to a “ready” mode without initiating recording.The motion detector remains armed and when motion is detected, theintegrated motion sensor/camera is again triggered. Once motion isdetected, the camera turns “on” and captures images of the source of themotion. The video images are sent to a central control panel for furtherevaluation. Further evaluation may include determining (manually orautomatically using, e.g., machine visions) whether the source of themotion is human, an animal such as a pet, or another moving object. Ifthe source is determined to be human, further evaluation may revealwhether any identifying images were captured, whether the human is anintruder or an inhabitant of the facility, and face recognition may beused to identify a previously unknown person intruding on the facility.

In another example embodiment, the home entry intrusion sensor (e.g.,front door contact) corresponds to a delayed-response motion sensor suchthat the transmission of the motion indication is delayed to accommodatea security system control keypad located near the entrance. In anotherzone located nearby, such as a kitchen, the motion indication is notdelayed when motion is detected. The system recognizes that motionsensed in the nearby room (e.g., person setting grocery bags down in thekitchen) following a delayed sensing of motion in the entry zone islikely an authorized user and an alarm will not sound for apredetermined length of time. If the system is not deactivated or resetbefore the predetermined length of time expires, the alarm will sound.The number of nearby zones configured with such a relationship with thedelayed motion indication in the entry zone should be limited to ensurethat an actual intruder is not provided enough time to traverse thepremises without being detected.

In a further example embodiment, the security system is equipped tocapture an image of the person arming or disarming the system (e.g., byentering a code on a security system control keypad) to determine if theperson is an authorized user. In one instance, the captured image can besent to a remote monitoring station for verification or stored forfuture reference. In another instance, the security system can beprogrammed with images of the authorized users and the system uses facerecognition to compare the captured image of the person attempting toarm/disarm the system with the images of the authorized users todetermine whether the person is an authorized user. If the person'simage matches that of an authorized user, then the person is allowed toarm/disarm the system. In one implementation, the security systemcontrol keypad is equipped with a camera to capture an image of theperson entering a code. In another implementation, a base unit 35 ispositioned such that the base unit's camera 25 can capture an image ofthe person entering a code on the security system control keypad. Inresponse to a code being entered, the security system control keypadactivates the camera 25 to capture an image of the person entering thecode.

In an additional example embodiment, the security system is equippedwith a self diagnostic mode that is used to determine if the system isfunctioning properly. The system sends test signals representingintrusion detections by various sensors to the base stations 45 todetermine that the appropriate sensors 20 are armed and/or theappropriate cameras 25 are activated. The system can also enable each ofthe cameras 25 to capture an image to check that the cameras areworking. The results of the diagnostic tests can be displayed for thesystem user, saved for future review or provided to a remote monitoringstation.

FIG. 2 shows a block diagram of a security system for mapping aplurality of sensors to a camera, according to an example embodiment ofthe present invention. Control block 206 interfaces with sensors 204(i.e., sensor(1) to sensor(N)) and camera 202. Control block 206receives input from sensors 204 regarding the status of the sensor. Forinstance, a particular sensor may send a message to control block 206 inresponse to a window or door being opened. Control block 206 can thenmake a determination as to whether camera 202 should be activated. Inone implementation, control block 206 has a mapping or lookup table thatlinks one or more of the sensors to camera 202. In this fashion theresponse of control block 206 to one or more of sensors 204 can belimited to sensors that correspond to the room or field of view coveredby camera 202. In some instances, control block 206 can receive imagesfrom camera 202 and also forward the images to a monitoring station,using a telephone or network interface. Moreover, in some instances,camera 202 is able to pan, tilt, zoom or otherwise change the field ofview to correspond to the particular sensor that was triggered.

According to an example embodiment of the present invention, sensors 204and camera 202 announce their presence to control block 206 during aninitialization stage. A user of the system can select from these deviceswhen determining what sensors camera 202 should be configured to respondto. In one instance a graphical user interface can be used to allow forease of configuration. In another instance, a graphical display of thelocation of the sensors 204 and camera 202 can be used to allow a userto easily select and configure the system. Such configuration can belimited to implementation during installation of the security system, orcan be implemented throughout the use of the security system. Forinstance, given that sensors 204 can optionally be wireless, it ispossible that the sensors may be moved from time to time. This may benecessary where the function of a room changes or where the structureundergoes changes. Moreover, sensors can be added or replaced at laterdates.

In certain instances, camera 202 can operate in different modes that mayor may not be responsive to sensors 204. For example, one mode maydisable camera 202 completely, while another mode may enable camera 202.One such mode would include control block 206 enabling cameras 202 inresponse to one or more selected sensors 204. In one embodiment of thepresent invention, different modes may have different sensors mapped tocamera 202. For instance, one mode may have a door sensor mapped tocamera 202, while another mode may have both a door sensor and a motionsensor mapped to camera 202 (e.g., for when there should be noauthorized occupant in the area). The system can be programmed such thata different code is used to identify each of these modes of operation.The system user enters one of the codes (e.g., on a security systemcontrol keypad) to select the desired mode of operation. In oneimplementation, the system user enters a security access code and thenselects from one of the programmed modes of system operation that areidentified on a display screen (e.g., by selecting a corresponding iconon a touch screen or by entering a number identifying one of the modes).In another implementation, the system user enters a code for each modeof operation. This can be useful for allowing different levels ofaccess/mode settings for different users. For instance, a child, friendor relative could be given only certain codes. This is particularlyuseful for controlling access to configuration settings or preventingaccess during restricted time periods, such as late at night.

In a particular instance, one of the codes may correspond to a sequenceof image captures from various cameras. Thus, a user of the system caninitiate a sequence of camera shots to view different areas of thefacility. This can be particularly useful for assuring a user that thereare no intruders or for monitoring the status of an occupant (e.g., asmall child or otherwise vulnerable person) and the house in general(e.g., to check for fire or damage due to natural disasters).

In connection with the embodiments discussed herein as examples of thepresent invention, the camera can be enabled in various ways. Generally,enabling of the camera includes enabling the camera arrangementsdiscussed in connection with FIGS. 1-3. Accordingly, when a sensormapped to a camera arrangement detects a potential intruder, the motiondetector of the camera arrangement is enabled. If the motion detectorsenses motion, the camera can then be enabled to capture pictures ofpotential intruders. In an alternative mode, the camera can also beconfigured to immediately capture pictures (e.g., regardless of themotion detector) in response to the detection of a potential intruder.This can be particularly useful for sensors that do not necessarilycorrespond to an intruder (e.g., fire alarm) and for high security modesthat do not implement a delay or second level of motion detection. Insuch a mode, the camera would capture images independent of motiondetection by the motion sensor. Another mode or setting could be used todistinguish between video capture (e.g., consecutive shots over a periodof time capable of showing motion, such as those stored in an MPEG file)and still image capture (e.g., one or more individual images that can bestored using file formats such as JPEG) by the camera. Accordingly, inresponse to a sensor and a selected mode, the system can be configuredto 1) capture images after detecting motion in the field of view, 2)immediately capture video, and 3) immediately capture a still image.These and other configuration options can be implemented using thevarious mapping features discussed herein.

FIG. 3 shows a block diagram of a security system for mapping aplurality of cameras to a sensor, according to an example embodiment ofthe present invention. As discussed above, sensor 302 and cameras 304(i.e., camera(1) to camera(N)) communicate with control block 306. Inresponse to input from sensor 302, one or more of cameras 304 can beenabled. As discussed in connection with FIG. 2 and elsewhere herein,the control block 306 can implement the desired correspondence betweencameras 304 to sensor 302 using mapping database or lookup table. Thiscan be advantageous where the cameras provide different angles of viewand/or different fields of view. For instance, in response to windowsensor, several cameras can be enabled, allowing for security monitoringstations to view the entire room, and also to have a better chance ofidentifying a potential intruder.

In one embodiment of the present invention, multiple cameras can beselectively linked to multiple sensors. For instance, all cameras andsensors within a room can be linked together. Accordingly, the mappingof both FIG. 2 and FIG. 3 can be used in conjunction with each other.

FIG. 4 shows an example mapping or lookup table, according to an exampleembodiment of the present invention. The data contained in the mappingtable can be stored in a suitable memory device, such as flash,random-access-memories, hard drives and the like. In some applicationsit can be advantageous to use nonvolatile memory for guarding againstproblems due to power loss.

Column 402 contains camera-1 to camera-N. It should be noted that FIG. 4and the relevant discussion make reference to camera-1 to camera-N. Asdiscussed herein, such cameras may include an integrated motiondetector, and thus, identification information as to whether the cameradevice includes such an integrated motion detector may also be stored inthe mapping or lookup table. Column 404 contains sensors that areconfigured to enable the camera arrangement in the corresponding row.For instance, sensors A, B and C would enable camera 1, while sensors X,Y and Z would enable camera 2. In this manner a user of the systemprovides information as to the desired associations between sensors andcameras resulting in a corresponding change in the data in the mappingtable. For example, a graphical user interface can be presented to auser through a software application running on a processor. In oneinstance, the processor is a general purpose computer, such as apersonal computer or personal digital assistant, that can interface withthe control device of the security system using, for example auniversal-serial-bus (USB), Ethernet or similar interface. In anotherinstance, the processor is part of the control device.

Column 406 contains additional information regarding relationshipsbetween sensors and cameras. In one instance, column 406 representssensors that enable the corresponding camera when the security system isin a particular mode (i.e., a different mode than column 404 would beassociated with). This is useful to distinguish between situations wherethe occupants are awake from when they are sleeping, windows that areopened from the inside from windows that are opened from the outside,situations where the occupants are on vacation from when they are not,and the like. In another instance, column 406 represents sensors thatneed to be triggered prior to sensors in column 404 activating a camerain column 402. Thus, the sensors can be linked to each other, therebyrequiring a succession of sensors to be triggered prior to activation ofa mapped camera. In yet another instance, column 406 represents sensorsthat are only enabled after a certain delay. This can be particularlyuseful for enabling sensors that are in the likely path of an intruder.For instance, the camera in a bedroom may be enabled after a windowsensor in the bedroom is triggered. After a delay sufficient to allow anintruder to traverse the room, a sensor from column 406 andcorresponding to an adjoining room can be enabled.

Column 408 represents additional data used to supplement the mappingfunctions. In one instance, column 408 may contain information relatingto cameras that are only enabled after a certain delay. This can beparticularly useful for enabling cameras that are in the likely path ofan intruder. For instance, the camera in a bedroom may be enabled aftera window sensor in the bedroom is triggered. After a given delay (e.g.,sufficient to allow an intruder to traverse the room) a camera in anadjoining room can be enabled. In another instance, column 408 maycontain data that contains delay values for enabling the cameras orsensor of column 404 and 406. In yet another instance, the data incolumn 408 can be used to denote one or more security modes for whichthe sensors and cameras stored in the respective mapping table columnsare enabled or disabled.

According to another embodiment of the present invention, a combinationof sensor events and the details of the sensor events can be selected tofurther define enabling events for various cameras. In addition torequiring a sensor to be triggered, combinational events can be used todetermine details, such as whether a series of sensor events represent aperson leaving or entering an area. More specifically, the order ofsensor events and the absence of certain sensor events can be used todetermine the direction a person is traveling, the number of peoplepresent and other security factors. Using information relative to thesequences of events, the system can be configured to avoid unnecessaryvideo capture of normal occurrences, such as the exit of an authorizedperson from a secured area, while still capturing abnormal occurrences,such as the entrance of a person to the secured area.

Additional data storage elements of the mapping table (e.g., similar tocolumns 406 and 408) are possible and only limited by practicalconsiderations, such as complexity and storage space.

FIG. 5 shows a flow diagram for logic for implementing a process toenable security cameras in response to mapped sensors, according to anexample embodiment of the present invention. Block 502 represents adecision as to whether a sensor has been triggered. The process waits atblock 502 for a sensor to be triggered. If a sensor is triggered, theprocess proceeds to block 504. Block 504 determines whether the sensoris mapped to a camera. If no camera is mapped to the sensor, the processreturns to block 502 and waits for another sensor to be triggered. If acamera is mapped to the sensor, the process proceeds to block 506.

Block 506 represents potential enable logic. In the simplest case, theenable logic depicted by block 506 need not be implemented. In such acase, the process proceeds directly to block 508. In other instances,various determinations, delays and other functions can be carried out atblock 506. In a particular embodiment of the present invention,information stored in a mapping table is used to implement the enablinglogic. As discussed herein, such information may represent differentlogic for different modes, delays before enabling and the like. In someinstances, the logic may determine that no camera should be enabled andthe process proceeds to block 510. One such instance is where thesecurity system is in a mode for which the linked camera is not to beenabled. In another instance, the logic may enable other sensors priorto enabling the camera. After determining that the camera should beenabled the process proceeds to block 508 to enable the camera.

The process next checks for additional cameras that are linked to thetriggered sensor as shown by block 510. If no additional camera isfound, the process returns to block 502. If an additional camera isfound, the process proceeds to block 512. Block 512 is a logic blocksimilar to block 506, where the process can branch to blocks 510 or 514.Block 514 enables the corresponding camera and returns to block 510 todetermine if additional cameras are mapped to the triggered sensor. Inthis manner, a series of cameras can be enabled in response to one ormore triggered sensors. This is particularly useful for enabling camerasalong a likely path of an intruder.

The various components of such a process can be implemented using one ormore general purpose processors configured with appropriate software,one or more custom processors, programmable logic devices,analog/digital circuits, integrated circuit devices and combinationsthereof.

FIG. 6 shows a flow diagram for logic used to enable cameras for asecurity system, according to an example embodiment of the presentinvention. In a particular embodiment this logic can be implemented inplace of enable logic blocks 506 and 512 (e.g., as a function call in asoftware routine). The process begins at block 602 where it proceeds toblock 604. Block 604 can implement a delay before enabling any cameras.If no delay is required, the delay step can be skipped. In one instance,the delay can be a fixed delay for each camera. In another instance, thedelay can be a function of data stored in the mapping table along withother variables, such as the current mode of the security system. Afterthe delay, if any, is implemented, the process proceeds to block 606. Atblock 606, a determination is made as to whether the sensor isconfigured to enable the camera relative to the current security mode.This can be accomplished, for example, by a comparison of the data inthe mapping table with the current security mode. If it is determinedthat the camera should not be enabled in response to the sensor, theprocess exits as shown by block 614. Otherwise the process proceeds toblock 608.

At block 608 a determination is made as to whether additional sensorsare linked (e.g., required to be triggered) relative to thecorresponding camera. This is useful for configuring the camera to onlybe triggered in response to more than one sensor. If it is determinedthat no additional sensors are linked, the process proceeds to block 612where the corresponding camera is enabled. The process then exits asshown by block 614.

If at least one additional sensor is linked, the process proceeds toblock 610. At block 610 a determination is made as to whether the linkedsensor is triggered. If the linked sensor is not triggered, the processcan wait at block 610 until the linked sensor is triggered. In someinstances, it is desirable to reset or exit from this state even if thelinked sensor is not triggered. This can be accomplished using variousmethods. Using one such method, a timer can precipitate the exit fromstate 610. Using another such method, the process exits from state 610in response to an external event, such as the resetting of the triggeredsensor(s). If the linked sensor is triggered, the process returns toblock 608 to check for other linked sensors.

FIG. 7 shows a block diagram of an interface for implementing differinglevels of access to a security system, according to an exampleembodiment of the present invention. FIG. 7 depicts a security interface704 that provides two control/access levels 706 and 712 for differentusers of the system. The different control levels can be particularlyuseful for simplifying the control aspects available to an end user 702,while allowing additional functionality to be configured by a qualifiedinstaller 710. The control levels can also be particularly useful forreducing the risk of an end user 702 improperly configuring the securitysystem, by limiting the control of certain aspects of the system. Thus,the security system can be configured such that a minimum level ofsecurity is maintained, regardless of the end user 702 configurationchanges.

Security interface 704 is accessed using a number of differentmechanisms. A non-exhaustive list of acceptable interfaces includes ageneral purpose computer connected through Ethernet, USB or the like,key pads, touch screens, voice response systems and keyfobs. Securityinterface 704 provides a different level of access depending upon theuser. In one instance, the user credentials can be determined by ausername and/or password, electronic identification cards, wirelesstransmitters, biometric identifications or the like. Once the usercredentials are determined, the user is granted an appropriate level ofcontrol over the system as shown by blocks 708 and 714. The number ofdifferent levels of control and user can vary depending upon theparticular application. For example, a first level (e.g., full access)may exist for an installer of the system; a second level (e.g., limitedaccess) may exist for home owners and a third level (e.g., mode changeonly) may exist for children of the home owners.

FIG. 8 shows a block diagram of an interface for implementing differinglevels of access to a security system, according to an exampleembodiment of the present invention. FIG. 8 depicts a security system808 that allows end user 802 access using end user interface 804 andqualified installer 814 access using qualified installer interface 812.By providing multiple interfaces to the system with different levels ofcontrol, the security system 808 can be further protected. For instance,subset of control features 806 could be provided through a touch screenor local computer. Such interfaces may be subject to potential securityrisks (e.g., hacking into the computer remotely or gaining access to thetouch screen prior to when the system is not armed) that may compromisethe security system. By limiting the control available through the enduser interface, the overall security can be improved. A higher level ofcontrol (e.g., installer control features 810) can be provided using amore secure interface method. For example, the interface might onlyaccept a security card that is controlled by the installer, or it mayonly accept instructions from a known server or input port. Accordingly,the security system is not entirely compromised simply by compromisingthe end user interface 804. This can also be particularly useful forlimiting the complexity by essentially hiding certain configurationoptions from the end user.

FIG. 9 shows a block diagram of another interface that providesadministrative monitoring of configuration settings for a securitysystem, according to an example embodiment of the present invention.FIG. 9 depicts an end user interface 904 that allows end user 902 toaccess control logic 916. End user interface 904 sends data to and fromend user 902 using network 906. End user is able to configure controllogic 916 and monitor the status of sensors 912 and cameras 914 throughsuch data transfers. Offsite administrator 908 provides monitoringfunctions for all or a subset of end user transactions. For instance,offsite administrator 908 can monitor configuration settings for controllogic 916 to verify that the system is not compromised due to user erroror an unauthorized person. In some instances, the monitoring can belimited to critical functions, such as disabling sensors 912 and cameras914. In other instances, the monitoring can encompass all transactions.This monitoring can be accomplished using an automated process thatfollows a rule set designed to identify potential issues. The monitoringcan also be accomplished using (alone or in combination with automatedprocesses) human operators that watch for potential problems.

While certain aspects of the present invention have been described withreference to several particular example embodiments, those skilled inthe art will recognize that many changes may be made thereto. Forexample, aspects of the underlying patent documents include, e.g.,aspects that provide integration on fields of view, and implementationdetails of the integrated image-capture and motion-sensing devices. Suchchanges do not necessarily depart from the spirit and scope of thepresent invention. Aspects of the invention are set forth in thefollowing claims.

What is claimed is:
 1. An integrated security arrangement, comprising: aplurality of intrusion sensors, and a motion sensor configured andarranged with a field of view to sense motion in a target area, each ofthe sensors including circuitry; a camera device physically integratedwith the motion sensor to capture images of the target area in responseto the motion sensor and in response to a control signal; acommunication device, including circuitry and configured to send dataindicative of detected motion and to communicate with at least one ofthe intrusion sensors; a housing configured to contain the motionsensor, the camera device and the communication device; and a controlarrangement including a memory circuit with a mapping database thatcontains data that associates one or more of the plurality of intrusionsensors with the camera device, the control arrangement configured andarranged to permit a user to configure the mapping database in aconfiguration to select said at least one of the plurality of intrusionsensors to which the camera device is responsive, and to operate in onemode which overrides responsiveness of the motion sensor and causes thecamera device to capture images of the target area in response to asecurity code received at the control arrangement and in another modewhich overrides the configuration, in response to another of theplurality of intrusion sensors being tripped.
 2. The integrated securityarrangement of claim 1, wherein the intrusion sensor is one of a windowcontact and a glass-break detector.
 3. The integrated securityarrangement of claim 1, further including a base unit that physicallyintegrates the camera device with the motion sensor.
 4. The integratedsecurity arrangement of claim 1, wherein the control arrangement isconfigurable to cause the camera device to capture images of the targetarea in response to a signal from a sensor, the signal representing adetectable situation, and wherein the signal is directly provided to thecamera device.
 5. The integrated security arrangement of claim 1,wherein the communication device is configured to transmit signals to aremotely-located central controller, and the housing is configured tocontain the communication device, the control arrangement, the motionsensor, and the camera device.
 6. The integrated security arrangement ofclaim 1, wherein multiple sensors are linked in the mapping database,thereby requiring more than one sensor to be tripped prior to the cameradevice capturing pictures.
 7. The integrated security arrangement ofclaim 1, wherein the camera device is used to differentiate betweenimages of a human and another moving object.
 8. The arrangement of claim1, where the control arrangement is configurable to override the cameradevice to cause the camera device to capture images of the target areain response to a sensor signal.
 9. The integrated security arrangementof claim 1, wherein the camera device includes and is integrated withthe motion sensor, and further including a user interface that receivesdata for configuring the mapping database.
 10. The integrated securityarrangement of claim 1, wherein the camera device includes and isintegrated with the motion sensor, and further including a userinterface that receives data for configuring the mapping database, andwherein configuring the mapping database is limited based upon a controllevel associated with a user that is configuring the mapping database.11. The integrated security arrangement of claim 10, wherein configuringthe mapping database is limited based upon a different control level fora different user.
 12. The integrated security arrangement of claim 1,wherein, responsive to data stored in the mapping database, a secondcamera device capture images in response to a first camera devicecapturing images.
 13. The integrated security arrangement of claim 1,further including a user interface and an installation interface thateach receive input for configuring the mapping database, wherein theuser interface has a first level of access to the mapping database andthe installation interface has a second level of access to the mappingdatabase, wherein said first level of access is a subset of said secondlevel of access.
 14. The integrated security arrangement of claim 1,wherein, in a first mode, the camera device captures one or more stillimages and, in a second mode, the camera device captures video images.15. The integrated security arrangement of claim 1, further including auser interface that receives data for configuring the mapping database,and wherein the mapping database stores data identifying the cameradevice and each of the plurality of intrusion sensors.
 16. Theintegrated security arrangement of claim 15, wherein the user interfaceis configured to receive data for configuring the mapping database, andwherein the user interface is one of a personal computer runningsoftware configured to interface with the control arrangement through acommunication link, a keypad and a remote server.
 17. The integratedsecurity arrangement of claim 1, wherein the control arrangement isconfigurable to cause the camera device and another camera device tocapture images consecutively in an order that is defined by theconfiguration of the mapping database.