Automatic intrusion detector threshold controlling systems and methods

ABSTRACT

A system for automatically controlling intrusion thresholds of intrusion detectors deployed in a premises, the system including intrusion detector output receiving functionally operative to receive at least one output from at least it first intrusion detector deployed in the premises, intrusion detector output comparison functionality operative to compare the at least one output from the at least a first intrusion detector with at least one of a multiplicity of premises intrusion detection patterns, and intrusion detector threshold controlling functionality operative, in respond to ascertaining that the at least one output from the at least a first intrusion detector matches at least one of the multiplicity of premises intrusion detection patterns, to automatically tune a threshold of at least a second intrusion detector deployed in the premises.

REFERENCE TO RELATED APPLICATIONS

This application is a Division of U.S. application Ser. No. 14/109,974,filed on Dec. 18, 2013, which claims the benefit under 35 U.S.C. §119(e)of U.S. Provisional Application No. 61/739,213 filed Dec. 19, 2012, bothof which are herein incorporated by reference in their entirety.

FIELD OF THE INVENTION

The present invention relates lo systems and methods for automaticallycontrolling intrusion thresholds of intrusion detectors typicallyemployed in intrusion detections systems.

BACKGROUND OH THIS INVENTION

Intrusion detectors employed as part of intrusion detection systemstypically have a sensitivity and an intrusion threshold associatedtherewith. Typically, a sensitivity of a detector defines a minimumintensity of a physical event which the detector is capable ofdetecting. An intrusion threshold of a detector is a configurable levelof intensity of a physical event which is considered as indicative of anintrusion. The present invention relates in novel systems and methodsfor automatically controlling intrusion detector thresholds.

SUMMARY OF THE INVENTION

The prevent invention seeks to provide systems and methods forautomatically controlling intrusion thresholds of intrusion detectorstypically employed in intrusion detections systems.

There is thus provided in accordance with a preferred embodiment of thepresent invention a system for automatically controlling intrusionthresholds of intrusion detectors deployed in a premises, the systemincluding intrusion detector output receiving functionality operative toreceive at least one output from at least a first intrusion detectordeployed in the premises, intrusion detector output comparisonfunctionality operative lo compare the at least one output from the atleast a first intrusion detector with at least one of a multiplicity ofpremises intrusion detection patterns, and intrusion detector thresholdcontrolling functionality operative, in response to ascertaining thatthe at least one output from the at least a first intrusion detectormatches at least one of the multiplicity of premises intrusion detectionpatterns, to automatically tune a threshold of at least a secondintrusion detector deployed in the premises.

Preferably, the at least one of the multiplicity of premises intrusiondetection patterns includes at least a pattern of at least one shockwave detected at each of at least two intrusion detectors.

Preferably, the premises is an automobile. Additionally oralternatively, the premises is a residence. Preferably, the intrusiondetectors include at least one motion detector. Additionally oralternatively, the intrusion detectors include at least one shockdetector. Additionally or alternatively, the intrusion detectors includeat least one environmental conditions detector.

Preferably, the intrusion detectors communicate with an intrusion alarmsystem. Preferably, the system for automatically controlling intrusionthresholds of intrusion detectors deployed in a premises is located inthe intrusion alarm system.

Preferably, automatically tuning the threshold of the at least a secondintrusion detector deployed in the premises includes lowering thethreshold. Additionally or alternatively, automatically tuning thethreshold of the at least a second intrusion detector deployed in thepremises includes raising the threshold.

There is also provided in accordance with another preferred embodimentof the present invention a system for automatically remotely controllingintrusion thresholds of intrusion detectors deployed in a plurality ofpremises, the system including central intrusion detector outputreceiving functionality operative to receive at least one output from atleast one intrusion detector deployed in a first of the plurality ofpremises, central intrusion detector output comparison functionalityoperative to compare the at least one output from the at least oneintrusion detector deployed in the first of the plurality of premiseswith a multiplicity of premises intrusion detection patterns, andcentral intrusion detector threshold remote controlling functionalityoperative, in response to ascertaining, by the central intrusiondetector threshold remote controlling functionality, that the at leastone output from the at least one intrusion detector deployed in thefirst of the plurality of premises matches at least one of themultiplicity of premises intrusion detection patterns, to automaticallyremotely tune a threshold of at least one intrusion detector deployed inat least a second of the plurality of premises.

Preferably, the central intrusion detector output receivingfunctionality is operative to receive the at least one output from theat least one intrusion detector deployed in the first of the pluralityof premises via a premises intrusion detector threshold controllingsubsystem deployed at the first of the plurality of premises.Additionally, the central intrusion detector threshold remotecontrolling functionality operative to automatically remotely tune thethreshold of the at least one intrusion detector deployed in the atleast a second of the plurality of premises via a premises intrusiondetector threshold controlling subsystem deployed at the second of theplurality of premises.

Preferably, the multiplicity of premises intrusion detection patternsincludes at least a pattern of at least one shock wave detected at eachof at least two premises.

Preferably, the plurality of premises includes at least one automobile.Additionally or alternatively, the plurality of premises includes atleast one residence. Preferably, the intrusion detectors include atleast one motion detector. Additionally or alternatively, the intrusiondetectors include at least one shock detector. Additionally oralternatively, the intrusion detectors include at least oneenvironmental conditions detector.

Preferably, automatically remotely tuning the threshold of the at leastone intrusion detector deployed in the at least a second of theplurality of premises includes lowering the threshold. Additionally oralternatively, automatically remotely tuning the threshold of the atleast one intrusion detector deployed in the at least a second of theplurality of premises includes raising the threshold.

There is further provided in accordance with yet another preferredembodiment of the present invention a system for automatically remotelycontrolling intrusion thresholds of intrusion detectors deployed in aplurality of premises, the system including environmental informationreceiving functionality operative to receive environmental informationpertaining to the environment of at least some of the plurality ofpremises, environmental information comparison functionality operativeto compare the environmental information received from the environmentalinformation receiving functionality with a multiplicity of environmentalpatterns, and central intrusion detector threshold remote controllingfunctionality operative, in response to ascertaining that theenvironmental information received from the environmental informationreceiving functionality matches at least one of the multiplicity ofenvironmental patterns, to automatically remotely tune a threshold of atleast one intrusion detector deployed in at least one of the some of theplurality of premises.

Preferably, the central intrusion detector output receivingfunctionality is operative to receive the at least one output from theat least one intrusion detector deployed in the first of the pluralityof premises via a premises intrusion detector threshold controllingsubsystem deployed at the first of the plurality of premises.Additionally, the central intrusion detector threshold remotecontrolling functionality operative to automatically remotely tune thethreshold of the at least one intrusion detector deployed in the atleast a second of the plurality of premises via a premises intrusiondetector threshold controlling subsystem deployed at the second of theplurality of premises.

Preferably, the environmental information and the environmental patternspertain to weather conditions at the at least some of the plurality ofpremises. Additionally or alternatively, the environmental informationpertains to recent intrusions detected at the at least some of theplurality of premises.

Preferably, the plurality of premises includes at least one automobile.Additionally or alternatively, the plurality of premises includes atleast one residence

Preferably, the intrusion detectors include at least one motiondetector. Additionally or alternatively, the intrusion detectors includeat least one shock detector. Additionally or alternatively, theintrusion detectors include at least one environmental conditionsdetector.

Preferably, automatically remotely tuning the threshold of the at leastone intrusion detector deployed in the at least a second of theplurality of premises includes lowering the threshold. Additionally oralternatively, automatically remotely tuning the threshold of the atleast one intrusion detector deployed in the at least a second of theplurality of premises includes raising the threshold.

There is yet further provided in accordance with still another preferredembodiment of the present invention a tunable intrusion shock detectorincluding at least one sensor having a tunable intrusion threshold, anddiscrete intrusion threshold tuning functionality having a plurality ofdiscrete precalibrated threshold levels operable for discrete tuning ofan intrusion threshold of the intrusion detector to one of the discreteprecalibrated threshold levels.

Preferably, the tunable intrusion shock detector also includes discreteintrusion threshold input functionality communicating with the discreteintrusion threshold tuning functionality, operable for manually tuningthe intrusion threshold of the intrusion detector to one of the discreteprecalibrated threshold levels. Preferably, the discrete intrusionthreshold tuning functionality includes an alpha-numeric displayoperative to display the intrusion threshold of the intrusion detector.Preferably, the discrete intrusion threshold input functionalityincludes et least one push button.

Preferably, the discrete tuning of the intrusion threshold of theintrusion detector includes tuning the intrusion threshold to a discretenumeric value. Preferably, the tunable intrusion shock detector alsoincludes a memory operative to store the discrete numeric value.

Preferably, the tunable intrusion shock detector also includes atransceiver operable for at least one of transmitting and receiving theintrusion threshold. Preferably, the transceiver is operable for atleast one of transmitting and receiving the intrusion threshold betweenthe tunable intrusion detector and at least one of a system forautomatically controlling intrusion thresholds of intrusion detectorsdeployed in a premises and a system for automatically remotelycontrolling intrusion thresholds of intrusion detectors deployed in aplurality of premises.

Preferably, the tunable intrusion shock detector also includes amicrophone for detection of at least one acoustic event which may beindicative of an intrusion.

Preferably, the tunable intrusion shock detector also includes shocksensing functionality operative to sense shock waves and to employ theintrusion threshold stored in the memory to ascertain whether acombination of the sensed shock wives and the at least one acousticevent received by the microphone is indicative of an intrusion.Preferably, upon ascertaining that the combination of the sensed shockwaves and the at least one acoustic event received by the microphone isindicative of an intrusion, the intrusion detector is operative totransmit an indication of the intrusion to an alarm system communicatingtherewith.

There is yet further provided in accordance with still another preferredembodiment of the present invention a method for automaticallycontrolling intrusion thresholds of intrusion defectors deployed in apromises, the method including receiving at least one output from atleast a first intrusion detector deployed in the premises, comparing theat least one output from the at least a first intrusion detector with atleast one of a multiplicity of premises intrusion detection patterns,and in response to ascertaining that the at least one output from the atleast a first intrusion detector matches at least one of themultiplicity of premises intrusion detection patterns, tuning athreshold of at least a second intrusion detector deployed in thepremises.

Preferably, the at least one of the multiplicity of premises intrusiondetection patterns includes at least a pattern of at least one shockwave detected at each of at least two intrusion detectors.

Preferably, the premises is an automobile. Additionally oralternatively, the premises is a residence.

Preferably, the intrusion detectors include at least one motiondetector. Additionally or alternatively, the intrusion detectors includeat least one shock detector. Additionally or alternatively, theintrusion detectors include at least one environmental conditionsdetector.

Preferably, the intrusion detectors communicate with an intrusion alarmsystem.

Preferably, automatically tuning the threshold of the at least a secondintrusion detector deployed in the premises includes lowering thethreshold. Additionally or alternatively, automatically tuning thethreshold of the at least a second intrusion detector deployed in thepremises includes raising the threshold.

There is also provided in accordance with another preferred embodimentof the present invention a method for automatically remotely controllingintrusion thresholds of intrusion detectors deployed in a plurality ofpremises, the method including receiving at least one output from atleast one intrusion detector deployed in a first of the plurality ofpremises, comparing the at least one output from the at least oneIntrusion detector deployed in the first of the plurality of premiseswith a multiplicity of premises intrusion detection patterns, and inresponse to ascertaining that the at least one output from the at leastone intrusion detector deployed in the first of the plurality ofpremises matches at least one of the multiplicity of premises intrusiondetection patterns, automatically remotely tuning a threshold of atleast one intrusion detector deployed in at least a second of theplurality of premises.

Preferably, the multiplicity of premises intrusion detection patternsincludes at least a pattern of at least one shock wave detected at eachof at least two premises.

Preferably the plurality of premises includes at least one automobile.Additionally or alternatively, the plurality of premises includes atleast one residence.

Preferably, the intrusion detectors include at least one motiondetector. Additionally or alternatively, the intrusion detectors includeat least one shock detector. Additionally or alternatively, theintrusion detectors include at least one environmental conditionsdetector.

Preferably, automatically remotely tuning the threshold of the at leastone intrusion detector deployed in the at least a second of theplurality of premises includes lowering the threshold. Additionally oralternatively, automatically remotely tuning the threshold of the atleast one intrusion detector deployed in the at least a second of theplurality of premises includes raising the threshold.

There is further provided in accordance with yet another preferredembodiment of the present invention a method for automatically remotelycontrolling intrusion thresholds of intrusion detectors deployed in aplurality of premises, the method including receiving environmentalinformation pertaining to the environment of at least some of theplurality of premises, comparing the environmental information receivedfrom the environmental information receiving functionality with amultiplicity of environmental patterns, and in response to ascertainingthat the environmental information received from the environmentalinformation receiving functionality matches at least one of themultiplicity of environmental patterns, automatically remotely tuning athreshold of at least one intrusion detector deployed in at least one ofthe some of the plurality of premises.

Preferably, the environmental information and the environmental patternspertain to weather conditions at the at least some of the plurality ofpremises. Additionally or alternatively, the environmental informationpertains to recent intrusions detected at the at least some of theplurality of premises.

Preferably, the plurality of premises includes at least one automobile.Additionally or alternatively, the plurality of premises includes atleast one residence.

Preferably, the intrusion detectors include at least one motiondetector. Additionally or alternatively, the intrusion detectors includeat least one shock detector. Additionally or alternatively, theintrusion detectors include at least one environmental conditionsdetector.

Preferably, automatically remotely tuning the threshold of the at leastone intrusion detector deployed in the at least a second of theplurality of premises includes lowering the threshold. Additionally oralternatively, automatically remotely tuning the threshold of the atleast one intrusion detector deployed in the at least a second of theplurality of premises includes raising the threshold.

There is further provided in accordance with yet another preferredembodiment of the present invention a method for tuning a tunableintrusion shock detector including generating at least one shock wave inproximity to the tunable intrusion shock detector, each of the at leastone shock wave having one of a plurality of discrete precalibratedthreshold level associated therewith, ascertaining which of the at oneleast shock wave is indicative of an intrusion and retrieving al leastone discrete intrusion-indicative precalibrated threshold levelassociated therewith, ascertaining which of the at one least shock waveis not indicative of an intrusion and retrieving at least one discretenon-intrusion indicative precalibrated threshold level associatedtherewith, and discretely tuning an intrusion threshold of the intrusiondetector to a discrete intrusion-indicative precalibrated thresholdlevel which is one of equal to and lower than the at least one discreteintrusion-indicative precalibrated threshold level and which is one ofequal to and higher than the at least one discrete non-intrusionindicative precalibrated threshold.

There is further provided in accordance with yet another preferredembodiment of the present invention a method for tuning a tunableintrusion shock detector including generating at least one shock wave inproximity to the tunable intrusion shock detector, each of the at leastone shock wave having one of a plurality of discrete precalibratedthreshold level associated therewith, ascertaining which of the at oneleast shock wave is indicative of an intrusion and retrieving at leastone discrete intrusion-indicative precalibrated threshold levelassociated therewith, and discretely tuning an intrusion threshold ofthe intrusion detector to the at least one discrete intrusion-indicativeprecalibrated threshold level.

There is further provided in accordance with yet another preferredembodiment of the present invention a method for tuning a tunableintrusion shock detector including generating at least one shock wave inproximity to the tunable intrusion shock detector, each of the at leastone shock wave having one of a plurality of discrete precalibratedthreshold level associated therewith, ascertaining which of the at oneleast shock wave is not indicative of an intrusion and retrieving atleast one discrete non-intrusion indicative precalibrated thresholdlevel associated therewith, and discretely tuning an intrusion thresholdof the intrusion detector to the at least one discrete non-intrusionindicative precalibrated threshold level.

BRIEF DESCRIPTION OP THE DRAWINGS

The present invention will be understood and appreciated more fully fromthe following detailed description taken in conjunction with thedrawings in which:

FIG. 1A is a simplified pictorial illustration of the operation of asystem for automatically controlling intrusion thresholds of intrusiondetectors deployed in a premises, constructed and operative inaccordance with a preferred embodiment of the present invention;

FIG. 1B is a simplified functional block diagram of the system of FIG.1A;

FIG. 1C is a simplified flowchart illustration of steps in the operationof the system of FIGS. 1A & 1B;

FIG. 2A is a simplified pictorial illustration of the operation of asystem for automatically remotely controlling intrusion thresholds ofintrusion detectors deployed in a plurality of premises, constructed andoperative in accordance with another preferred embodiment of the presentinvention;

FIGS. 2B and 2C are alternative simplified functional block diagrams ofthe system of FIG. 2A;

FIG. 2D is a simplified flowchart illustration of steps in the operationof the system of FIGS. 2A-2C:

FIG. 3A is a simplified pictorial illustration of the operation a systemfor automatically remotely controlling intrusion thresholds of intrusiondetectors deployed in a plurality of premises, constructed and operativein accordance with yet another preferred embodiment of the presentinvention;

FIG. 3B is a simplified functional block diagram of steps in theoperation of the system of FIG. 3A;

FIG. 3C is a simplified flowchart illustration of steps in the operationof the system of FIGS. 3A & 3B;

FIG. 4A is a simplified functional block diagram of an intrusiondetector of FIGS. 1A-3C, constructed arid operative in accordance with apreferred embodiment of the present invention; and

FIG. 4B is a simplified pictorial illustration of manual tuning of theintrusion detector of FIG. 4A.

DETAILED DESCRIPTION OF PREFERRED EMBODIMENTS

Reference is now made to FIG. 1A, which is a simplified pictorialillustration of the operation of a system for automatically controllingintrusion thresholds of intrusion detectors deployed in a premises,constructed and operative in accordance with a preferred embodiment ofthe present invention, to FIG. 1B, which is a simplified functionalblock diagram of the system of FIG. 1A, and to FIG. 1C, which is asimplified flowchart illustration of steps in the operation of thesystem of FIGS. 1A & 1B.

FIG. 1A is a pictorial illustration of the operation of the system inaccordance with a first embodiment of the present invention, and will bedescribed hereinbelow with reference to elements of the system asillustrated in FIG. 1B. The system of FIG. 1A preferably includes:

intrusion detector output receiving functionality operative to receiveoutput from at least a first intrusion detector deployed in thepremises;

intrusion detector output comparison functionality operative to comparethe output from the first intrusion detector with at least one of amultiplicity of premises intrusion detection patterns; and

intrusion detector threshold controlling functionality operative, mresponse to ascertaining that the output from the first intrusiondetector matches at least one of the multiplicity of premises intrusiondetection patterns, to automatically tune a threshold of at least asecond intrusion detector deployed in the premises.

As shown in particular in FIG. 1B, the automatic intrusion detectorthreshold control system 100 preferably Includes intrusion detectoroutput receiving functionality 102 operative to receive outputs from amultiplicity of intrusion detectors 104 deployed in a premises,intrusion detectors 104 may include, for example, motion detectors,shock detectors and environmental conditions detectors such as heatdetectors.

Intrusion detectors 104 preferably communicate with an alarm system 106deployed in the premises. It is appreciated that automatic intrusiondetector threshold control system 100 may be located within alarm system106 or vice versa.

System 100 also preferably includes intrusion detector output comparisonfunctionality 110 operative to compare the outputs received fromintrusion detectors 104 with premises intrusion detection patternspreferably stored in a premises intrusion detection patterns database112.

System 100 also preferably includes intrusion detector thresholdcontrolling functionality 114 operative, in response to ascertaining, byintrusion detector output comparison functionality 110, that the outputfrom at least a first of intrusion detectors 104 matches at least one ofthe premises intrusion detection patterns stored in premises intrusiondetection patterns database 112, to automatically tune an intrusionthreshold of at least a second of intrusion detectors 104.

It is appreciated that, in response to ascertaining, by intrusiondetector output comparison functionality 110, that the output from atleast a first of intrusion detectors 104 matches at least one of thepremises intrusion detection patterns stored in premises intrusiondetection patterns database 112, an operator of system 100 may manuallyemploy intrusion detector threshold controlling functionality 114 totune an intrusion threshold of at least a second of intrusion detectors104.

It is also appreciated that each of detectors 104 may also be manuallytuned by an operator, either when being initially installed orsubsequently thereto, as will be described hereinbelow with regard toFIGS. 4A & 4B.

Returning now to FIG. 1A, it is shown that shock detectors 120 and 122are deployed adjacent to respective windows 130 and 132 of a residence134, shock detectors 120 and 122 commnunicating with system 100 and withalarm system 106. It is appreciated that the intrusion thresholds ofshock detectors 120 and 122 Is tuned so to distinguish between eventsthat justify sounding an alarm, such as a shock wave generated by uthief tampering with respective windows 130 and 132, and of events whichdo not justify sounding an alarm, such as a weaker shock wave generatedby an animal or by weather conditions such as a thunderstorm.

As further shown in FIG. 1A, at a first time, such as at 02:00 AM, shockdetector 122 deployed adjacent window 132 detects a shock waveoriginating from the exterior of residence 134 and in proximity towindow 132, the shock wave having an intensity which is lower than theintrusion threshold of shock detector 122. As shown in stage 1 of FIG.1A, responsive to detecting the shock wave, shock detector 122 sends amessage to system 100 staling that a low-intensity shock wave has beendetected. It is appreciated that due to the intensity of the detectedshock wave being lower than the intrusion threshold of shock detector122, detector 122 does not notify alarm system 106 of the detected shockwave, and therefore alarm system 106 does not sound an alarm.

As yet further shown in FIG. 1A, at a second time, such as at 02:05 AM,shock detector 122 deployed adjacent window 132 detects a second shockwave originating from the exterior of residence 134 and in proximity towindow 132, the second shock wave also having an intensity which islower than the intrusion threshold of shock detector 122. It isappreciated that alternatively, the second shock wave may be detected bya shock detector deployed adjacent to a second window, such as by shockdetector 120 deployed adjacent window 130.

As shown in stage 2 of FIG. 1A, responsive to detecting the second shockwave, shock detector 122 sends a second message to system 100 statingthat a second low-intensity shock wave has been detected. It is againappreciated that due to the intensity of the detected shock wave beinglower than the intrusion threshold of shock detector 122, detector 122docs not notify alarm system 106 of the second detected shock wave, andtherefore alarm system 106 docs not sound an alarm.

Responsive to receiving the second message from detector 122 regardingthe detection of the second low-intensity shock wave, system 100ascertains that the detection of two consecutive shock waves within ashort period of time may potentially be indicative of an attemptedintrusion to the premises, despite both shock waves being of a lowintensity. Therefore, as further shown in stage 3 of FIG. 1A, as aprecautionary measure, system 100 automatically instructs both shockdetector 120 and shock detector 122 to lower the intrusion thresholdsthereof for a brief period of time, such as for thirty minutes. Loweringof the intrusion thresholds of detectors 120 and 122 ensures that if yeta third low-intensity shock wave is detected in proximity to either ofwindows 130 and 132, the corresponding one of detectors 120 and 122 willinstruct alarm system 106 to sound an alarm.

It is appreciated that the period of time for which system 100 instructsshock detectors 120 and 122 to lower the intrusion thresholds thereofmay be unlimited, and that system 100 may instruct shock detectors 120and 122 to revert intrusion thresholds thereof to an earlier, higher,setting thereof in the future, for example in response to a futureassessment of the probability of an intrusion occurring at residence134.

It is a particular feature of this embodiment of the present inventionthat responsive to detecting an intrusion detection pattern by detector122, system 100 is operative to tune the intrusion thresholds ofdetectors 120 and 122 to increase the security of residence 134 for apredetermined period of time. It is appreciated that the intrusiondetection patterns stored in premises intrusion detection patternsdatabase 112 may also include more complex patterns, such as patternswhich comprise sequences of outputs originating from a multiplicity ofdetectors.

FIG. 1C is a simplified flowchart illustrating the aforementioned stepsin the operation of automatic intrusion detector threshold controlsystem 100. As shown in FIG. 1C, a shock detector deployed adjacent to afirst window in a residence detects a first shock wave originating fromthe exterior of the residence and in proximity to the first window, theshock wave having an intensity which is lower than the intrusionthreshold of the first shock detector (150). Responsive to detecting thefirst shock wave, the shock detector sends a message to the automaticintrusion detector threshold control system slating that a low-intensityshock wave has been detected (152). It is appreciated that due to thelow intensity of the detected shock wave, the shock detector docs notnotify an alarm system deployed at the residence of the detected shockwave, and therefore the alarm system docs not sound an alarm.

Shortly thereafter, the shock detector detects a second shock waveoriginating from the exterior of the residence and in proximity to thefirst window, the second shock wave also having an intensity which islower than the intrusion threshold of the shock detector (160).Responsive to detecting the second shock wave, the shock detector sendsa second message to the system stating that a second low-intensity shockwave has been detected (162). It is again appreciated that due to thelow intensity of the second detected shock wave, the shock detector doesnot notify the alarm system deployed at the residence of the seconddetected shock wave, and therefore the alarm system does not sound analarm.

Responsive to receiving the second message from the shock detectorregarding the detection of the second low-intensity shock wave, thesystem ascertains that the detection of two consecutive shock waveswithin a short period of time may be indicative of an attemptedintrusion to the premises, despite both shock waves being of a lowintensity (170). Therefore, as a precautionary measure, the systemautomatically instructs all shock detectors deployed at the residence tolower the intrusion threshold thereof for a predetermined period of time(172). As described hereinabove, lowering of the intrusion thresholds ofthe shock detectors ensures that if yet a third low-intensity shock waveis detected by a shack detector adjacent to any windows of theresidence, the shock detector will instruct the alarm system to sound analarm.

Reference is now made to FIG. 2A, which is a simplified pictorialillustration of the operation of a system for automatically remotelycontrolling intrusion thresholds of intrusion detectors deployed in aplurality of premises, constructed and operative in accordance withanother preferred embodiment of the present invention, to FIGS. 2B & 2C,which are alternative simplified functional block diagrams of the systemof FIG. 2A, and to FIG. 2D, which is a simplified flowchart illustrationof steps in the operation of the system of FIGS. 2A-2C.

FIG. 2A is a pictorial illustration of the operation of the system inaccordance with a first embodiment of the present invention, and will bedescribed hereinbelow with reference to elements of the system asillustrated in FIG. 2B. The system of FIG. 2A preferably includes:

central intrusion detector output receiving functionality operative toreceive output from at least one intrusion detector deployed in a firstof the plurality of premises;

central intrusion detector output comparison functionality operative tocompare the output from the intrusion detector deployed in the firstpremises with a multiplicity of premises intrusion detection patterns;and

central intrusion detector threshold remote controlling functionalityoperative, in response to ascertaining that the output from theintrusion detector deployed in the first premises matches at least oneof the multiplicity of premises intrusion detection patterns, toautomatically remotely tune a threshold of at least one intrusiondetector deployed in at least a second of the plurality of premises.

System 200 preferably resides on a computer server connected to acomputer network, such as a WAN or the internet, and may be located atany suitable location on the network. System 200 may alternativelyreside in an internet cloud or in a social server network.

As shown in particular in FIG. 2B, the automatic intrusion detectorthreshold remote control system 200 preferably includes centralintrusion detector output receiving functionality 202 operative toreceive outputs from a plurality of premises intrusion detectorthreshold controlling subsystems 204 each deployed in a correspondingone of a multiplicity of premises 206. Each of premises intrusiondetector threshold controlling subsystems 204 is preferably operative tocommunicate with and to receive outputs from intrusion detectors 208deployed in the corresponding one of premises 206. Intrusion detectors208 may include, for example, motion detectors, shock detectors andenvironmental conditions detectors such as heat defectors.

Intrusion detectors 208 preferably communicate with a premises alarmsystem 209. It is appreciated that each of premises intrusion detectorthreshold controlling subsystems 204 may be located within acorresponding one of alarm systems 209 as shown in alternativefunctional block diagram 2C.

System 200 also preferably includes central intrusion detector outputcomparison functionality 210 operative to compare the outputs receivedfrom premises intrusion detector threshold controlling subsystems 204via receiving functionality 202 with premises intrusion detectionpatterns preferably stored in a premises intrusion detection patternsdatabase 212.

System 200 also preferably includes central intrusion detector thresholdremote controlling functionality 214 operative, in response toascertaining, by central intrusion detector output comparisonfunctionality 210, that the output from at least a first of premisesintrusion detector threshold controlling subsystems 204 matches at leastone of the premises intrusion detection patterns stored in premisesintrusion detection patterns database 212, to automatically instruct atleast a second of premises intrusion detector threshold controllingsubsystems 204 to tune a threshold of intrusion detectors 208communicating therewith.

It Is appreciated that, in response to ascertaining, by centralintrusion detector output comparison functionality 210, that the outputfrom at least a first of premises intrusion detector thresholdcontrolling subsystems 204 matches at least one of the premisesintrusion detection patterns stored in premises intrusion detectionpatterns database 212, an operator of system 200 may manually employcentral intrusion detector threshold remote controlling functionality214 or any of premises intrusion detector threshold controllingsubsystems 204 to tune a threshold of intrusion detectors 208communicating therewith.

It is also appreciated that each of detectors 208 may also be tunedmanually by an operator, either when being initially installed orsubsequently thereto, as will be described hereinbelow with regard toFIGS. 4A & 4B.

Returning now to FIG. 2A, it is shown that vehicle alarm systems 220,222 and 224 such as alarm system 209 of FIG. 2B, are preferablyinstalled in respective vehicles 230, 232 and 234. vehicles 230, 232 and234 being located in close proximity therebetween. Intrusion detectors240, 242 and 244 such as intrusion detectors 208 of FIG. 2B arepreferably installed in respective ones of vehicles 230, 232 and 234 andpreferably communicate with respective alarm systems 220, 222 and 224,notifying alarm systems 220, 222 and 224 of events which may indicate anintrusion into the vehicle. Such events may include the detection ofshock waves, tampering with or breakage of windows and windshields, andtampering with the ignition mechanism of the vehicle. It is appreciatedthat additional intrusion detectors may also be installed in vehicles230, 232 and 234.

Preferably, the intrusion thresholds of intrusion detectors 240, 242 and244 are tuned so to distinguish between events that justify sounding analarm, such as a shock wave generated by a thief tampering with awindshield of a corresponding one of vehicles 230, 232 and 234, and ofevents which do not justify sounding an alarm, such as a weaker shockwave generated by an animal climbing upon the vehicle.

Premises intrusion detector threshold controlling subsystems 250, 252and 254, such as premises intrusion detector threshold controllingsubsystem 204 of FIG. 2B, are preferably provided within correspondingvehicles 230, 232 and 234 and preferably communicate with respectiveintrusion detectors 240, 242 and 244. It is appreciated that intrusiondetector threshold controlling subsystems 250, 252 and 254 may beembedded within respective alarm systems 220, 222 and 224 and maycommunicate with respective intrusion detectors 240, 242 and 244 eitherdirectly or via respective alarm systems 220, 222 and 224. It isappreciated that communication between alarm systems 220, 222 and 224,respective intrusion detectors 240, 242 and 244 and respective intrusiondetector threshold controlling subsystems 250, 252 and 254 may be eitherwired or wireless.

Premises intrusion detector threshold controlling subsystems 250, 252and 254 preferably remotely communicate with automatic intrusiondetector threshold remote control system 200. It is appreciated thatsystem 200 may be located in a central security monitoring servicewhich, for example, monitors vehicles and residences which havesubscribed to the service and which communicates with alarm systems 220,222 and 224. It is also appreciated that communication between system200 and detector threshold controlling subsystems 250, 252 and 254 ispreferably wireless via, for example, cellular telephone infrastructure.

As further shown in FIG. 2A, at a first time, such as at 03:00 AM, shockdetector 240 installed in vehicle 230 detects a shock wave in proximityto a window of vehicle 230, the shock wave having an intensity which ishigher than the intrusion threshold of shock detector 240, thereforebeing indicative of an intrusion into vehicle 230. Responsive todetecting the shock wave, shock detector 240 preferably notifies alarmsystem 220 of the intrusion, and alarm system 220 preferably sounds analarm. Additionally, shock detector 240 preferably notifies detectorthreshold controlling subsystem 250 of the intrusion. It is appreciatedthat alternatively, alarm system 220 may notify detector thresholdcontrolling subsystem 250 of the intrusion.

Additionally, responsive to receiving notification of the intrusion,detector threshold controlling subsystem 250 preferably notifies system200 of the intrusion. It is appreciated that alternatively, alarm system220 may notify system 200 of the intrusion.

As yet further shown in FIG. 2A, at a second time, such as at 03:10 AM,shock detector 242 installed in vehicle 232 detects a shock wave inproximity to a window of vehicle 232, the shock wave having an intensitywhich is higher than the intrusion threshold of shock detector 242,therefore being indicative of an intrusion into vehicle 232. Responsiveto detecting the shock wave, shock detector 242 preferably notifiesalarm system 222 of the intrusion, and alarm system 222 preferablysounds an alarm. Additionally, shock detector 242 preferably notifiesdetector threshold controlling subsystem 252 of the intrusion. It isappreciated that alternatively, alarm system 222 may notify detectorthreshold controlling subsystem 252 of the intrusion.

Responsive to receiving notification of an intrusion of vehicle 232,system 200 ascertains that the detection of two consecutive intrusionsinto vehicles in the same vicinity within a short period of time may beindicative of a high probability of imminent additional intrusions intovehicles in the same vicinity. Therefore, as further shown in FIG. 2A,as a precautionary measure, system 200 automatically instructs detectorthreshold controlling subsystem 254 located in third vehicle 234 tolower the intrusion threshold of shock detector 244 communicatingtherewith for a brief period of time, such as for the remainder of thenight, in anticipation of an imminent intrusion into vehicle 234.Lowering of the intrusion threshold of shock detector 244 ensures thatany attempt at intrusion into vehicle 234 will be detected even if ashock wave generated by such an intrusion is of a low intensity.

It is appreciated that the period of time for which system 200 instructsshock detector 244 to lower the intrusion thresholds thereof may beunlimited, and that system 200 may instruct shock detector 244 to revertthe intrusion threshold thereof to an earlier setting thereof in thefuture, for example in response to a future assessment of theprobability of an intrusion occurring at vehicle 234.

It is a particular feature of this embodiment of the present inventionthat responsive to ascertaining, by system 200, that a pattern ofmultiple intrusions into premises in a particular vicinity is currentlytaking place, system 200 is operative to tune the intrusion thresholdsof detectors in additional premises, such as vehicle 234, to therebyincrease the security of vehicle 234 for a predetermined period of time.

FIG. 2D is a simplified flowchart illustrating the aforementioned stepsin the operation of automatic Intrusion detector threshold remotecontrol system 200. As shown in FIG. 2D, a shock detector Installed in afirst vehicle detects a shock wave in proximity to a window of thevehicle, the shock wave having an intensity which is higher than theintrusion threshold of the shock detector, therefore being indicative ofan intrusion into the vehicle (280). Responsive to detecting the shockwave, the shock detector preferably notifies a detector thresholdcontrolling subsystem associated therewith of the intrusion (282). It isappreciated that additionally or alternatively, the shock detector maynotify an alarm system associated therewith of the intrusion and thealarm system may notify the detector threshold controlling subsystem ofthe intrusion.

Responsive to receiving notification of the intrusion, the detectorthreshold controlling subsystem preferably notifies the remote controlsystem of the intrusion (284). It is appreciated that alternatively, thealarm system associated with the detector may notify the system of theintrusion.

Shortly thereafter, a second shock detector installed in a secondvehicle located in close vicinity to the first vehicle detects a secondshock wave in proximity to a window of the second vehicle, the secondshock wave also having an intensity which is higher than the intrusionthreshold of the second shock defector, therefore being indicative of anintrusion into the second vehicle (290). Responsive to detecting thesecond shock wave, the second shock detector preferably notifies asecond detector threshold controlling subsystem associated therewith ofthe intrusion (292). It Is again appreciated that additionally oralternatively, the second shock detector may notify a second alarmsystem associated therewith of the intrusion and the second alarm systemmay notify the detector threshold controlling subsystem of theintrusion.

Responsive to receiving notification of the intrusion, the seconddetector threshold controlling subsystem preferably notifies the remotecontrol system of the intrusion (294). It is appreciated thatalternatively, the second alarm system associated with the second shockdetector may notify the system of the intrusion.

Responsive to receiving notification of an intrusion of the secondvehicle, the remote control system ascertains that the detection of twoconsecutive intrusions into vehicles in the same vicinity within a shortperiod of time may be indicative of a high probability of imminentadditional intrusions into vehicles in the same vicinity occurring(296). Therefore, as a precautionary measure, the remote control systemautomatically instructs detector threshold controlling subsystemsinstalled in additional vehicles located in the vicinity of the firstand second vehicles to lower the intrusion threshold of shock detectorscommunicating therewith for a predetermined period of time, inanticipation of imminent intrusions into additional vehicles (298). Asdescribed hereinabove, lowering of the intrusion thresholds of shockdetectors in the additional vehicles ensures that any attempt atintrusion into the vehicles will be detected even if a shock wavegenerated by such an intrusion is of a low intensity.

Reference is now made to FIG. 3A, which is a simplified pictorialillustration of the operation of a system for automatically remotelycontrolling intrusion thresholds of intrusion detectors deployed in aplurality of premises, constructed and operative in accordance with yetanother preferred embodiment of the present invention, to FIG. 3B, whichis a simplified functional block diagram of the system of FIG. 3A, andto FIG. 3C, which is a simplified flowchart illustration of steps in theoperation of the system of FIGS. 3A & 3B.

FIG. 3A is a pictorial illustration of the operation of the system inaccordance with a first embodiment of the present invention, and will bedescribed hereinbelow with reference to elements of the system asillustrated in FIG. 3B. The system of FIG. 3A preferably includes:

environmental information receiving functionality operative to receiveenvironmental information pertaining to the environment of at least someof the plurality of premises:

environmental information comparison functionality operative to comparethe environmental information received from the environmentalinformation receiving functionality with a multiplicity of environmentalpatterns; and

central intrusion detector threshold remote controlling functionalityoperative, in response to ascertaining, by the environmental informationcomparison functionality, that the environmental information receivedfrom the environmental information receiving functionality matches atleast one of the multiplicity of environmental patterns, toautomatically remotely tune a threshold of at least one Intrusiondetector deployed in at least one of the some of the plurality ofpremises.

System 300 preferably resides on a computer server connected to acomputer network, such as a WAN or the internet, and may be located atany suitable location on the network. System 300 may alternativelyreside in an internet cloud or in a social server network.

As shown in particular in FIG. 3B, the automatic intrusion detectorthreshold remote control system 300 preferably includes environmentalinformation receiving functionality 302 operative to receiveenvironmental information pertaining to the environment of a pluralityof premises 304. It is appreciated that the environmental informationpertaining to the environment of premises 304 may include, for example,weather conditions in the environment of premises 304 or law enforcementalerts regarding the likelihood of intrusions in the area of premises304.

Intrusion detectors 306 are preferably deployed in each of premises 304and preferably communicate with a premises intrusion detector thresholdcontrolling subsystem 308 and with a premises alarm system 309.Intrusion detectors 306 may include, for example, motion detectors,shock detectors and environmental conditions detectors such as heatdetectors. It is appreciated that each of premises intrusion detectorthreshold controlling subsystems 308 may be located within acorresponding one of alarm systems 309.

System 300 also preferably includes environmental information comparisonfunctionality 310 operative to compare the environmental informationreceived from environmental information receiving functionality 302 witha multiplicity of environmental, patterns preferably stored in anenvironmental patterns database 312.

System 300 also preferably includes central intrusion detector thresholdremote controlling functionality 314 operative, in response toascertaining, by environmental information comparison functionality 310,that the environmental information received from environmentalinformation receiving functionality 302 matches at least one of themultiplicity of environmental patterns stored in environmental patternsdatabase 312, to automatically instruct at least one of premisesintrusion detector threshold controlling subsystems 308 to tune athreshold of intrusion detectors 306 communicating therewith.

It is appreciated that, in response to ascertaining, by environmentalinformation comparison functionality 310, that the environmentalinformation received from environmental information receivingfunctionality 302 matches at least one of the multiplicity ofenvironmental patterns stored in environmental patterns database 312, anoperator of system 300 may manually employ central intrusion detectorthreshold remote controlling functionality 314 or any of premisesintrusion detector threshold controlling subsystems 308 to tune athreshold of intrusion detectors 306 communicating therewith.

It is also appreciated that each of detectors 306 may also be tunedmanually by an operator, either when being initially installed orsubsequently thereto, as will be described hereinbelow with regard toFIGS. 4A & 4B.

Returning now to FIG. 3A, it is shown that premises alarm systems 320,322 and 324 such as alarm system 309 of FIG. 3B, are preferablyinstalled in respective premises 330, 332 and 334, premises 330, 332 and334 being located in close proximity therebetween. Intrusion detectors340, 342 and 344 such as intrusion detectors 306 of FIG. 3B arepreferably installed in respective ones of premises 330, 332 and 334 andpreferably communicate with respective alarm systems 320, 322 and 324,notifying alarm systems 320, 322 and 324 of events which may indicate anintrusion into the premises. Such events may include the detection ofshock waves, tampering with or breakage of windows, and tampering with alocking mechanism of the premises. It is appreciated that additionalintrusion detectors may also be installed at premises 330, 332 and 334.

Preferably, the intrusion thresholds of intrusion detectors 340, 342 and344 are tuned so to distinguish between events that justify sounding analarm, such as a shock wave generated by a thief tampering with a windowof a corresponding one of premises 330, 332 and 334, and of events whichdo not justify sounding an alarm, such as a weaker shock wave generatedby an animal climbing on the premises.

Premises intrusion detector threshold controlling subsystems 350, 352and 354, such as premises intrusion detector threshold controllingsubsystem 308 of FIG. 3B, are preferably provided within correspondingpremises 330, 332 and 334 and preferably communicate with respectiveintrusion detectors 340, 342 and 344. It is appreciated that intrusiondetector threshold controlling subsystems 350, 352 and 354 may beembedded within respective alarm systems 320, 322 and 324, and maycommunicate with respective intrusion detectors 340, 342 and 344 eitherdirectly or via respective alarm systems 320, 322 and 324. It isappreciated that communication between alarm systems 320, 322 and 324,respective intrusion detectors 340, 342 and 344 and respective intrusiondetector threshold controlling subsystems 350, 352 and 354 may be eitherwired or wireless.

Premises intrusion detector threshold controlling subsystems 350, 352and 354 preferably remotely communicate with automatic intrusiondetector threshold remote control system 300. It is appreciated thatsystem 300 may be located in a central security monitoring servicewhich, for example, monitors vehicles and residences which havesubscribed to the service and which communicates with alarm systems 320,322 and 324. It is also appreciated that communication between system300 and detector threshold controlling subsystems 350, 352 and 354 maybe wired or wireless via, for example, cellular telephone infrastructureor a municipal WiFi network.

System 300 is operative to receive information regarding weatherconditions tit the area of premises 330, 332 and 334, as via weathermonitoring systems communicating therewith or via weather informationservice providers. Responsive receiving the weather information, system300 is operative to ascertain that weather conditions in the area ofpremises 330, 332 and 334 may cause intrusion detectors 340, 342 and 344to falsely detect an intrusion at a corresponding one of premises 330,332 and 334. Such a false detection may be caused, for example, bythunder causing a shock wave to impact a window of a premises.

Responsive to ascertaining that weather conditions may cause intrusiondetectors to falsely defect an intrusion at a premises, system 300, as aprecautionary measure, automatically instructs detector thresholdcontrolling subsystems 350, 352 and 354 located in correspondingpremises 330, 332 and 334 to raise the intrusion threshold ofcorresponding intrusion detectors 340, 342 and 344 communicatingtherewith for a brief period of time, such as for the expected durationof the current weather conditions. Raising the intrusion thresholds ofintrusion detectors 340, 342 and 344 ensures that shock waves resultingfrom temporary weather conditions will not cause intrusion detectors340, 342 and 344 to falsely detect an intrusion to premises 330, 332 and334.

It is appreciated that the period of time for which system 300 instructsintrusion detectors 340, 342 and 344 to lower the intrusion thresholdsthereof may be unlimited, and that system 300 may instruct intrusiondetectors 340, 342 and 344 to revert the intrusion thresholds thereof toearlier settings thereof in the future, for example in response tochanging weather conditions in the vicinity of premises 330, 332 and334.

It is farther appreciated that responsive to receiving informationpertaining to calm weather conditions in the area of premises 330, 332and 334, system 300 is also operative to automatically instruct detectorthreshold controlling subsystems 350, 352 and 354 located incorresponding premises 330, 332 and 334 to lower the intrusion thresholdof corresponding intrusion detectors 340, 342 and 344 communicatingtherewith for an expected duration of the calm weather conditions.Lowering the intrusion thresholds of intrusion detectors 340, 342 and344 ensures that shock waves will not be misinterpreted as resultingfrom weather conditions and will therefore enable intrusion detectors340, 342 and 344 to more reliably detect intrusions to premises 330, 332and 334.

It is a particular feature of this embodiment of the present inventionthat responsive to ascertaining, by system 300, that a current weatherpattern in a particular vicinity may cause alarm systems in the vicinityto sound false alarms, system 300 is operative to tune the intrusionthresholds of detectors in premises in the vicinity, to thereby reducethe probability of sounding false alarms.

FIG. 3C is a simplified flowchart illustrating the aforementioned stepsin the operation of system 300. As shown in FIG. 3C, the systeminitially receives information regarding weather conditions in aparticular area (380), as via weather monitoring systems communicatingtherewith or via weather information service providers. Responsivereceiving the weather information, the system ascertains that weatherconditions in the area may cause intrusion detectors installed inpremises in the area to falsely detect intrusions at correspondingpremises (382). Such a false detection may be caused, for example, bythunder causing a shock wave to impact a window of a premises.

Responsive to ascertaining that weather conditions may cause intrusiondetectors to falsely detect an intrusion at a premises, the system, as aprecautionary measure, automatically instructs detector thresholdcontrolling subsystems installed in each of the premises andcommunicating with corresponding intrusion detectors installed in eachof the premises to raise the intrusion threshold of the intrusiondetectors communicating therewith for a brief period of time, such asfor the expected duration of the current weather conditions (384).Raising the intrusion thresholds of the intrusion detectors ensures thatshock waves resulting from temporary weather conditions will not causeintrusion detectors to falsely detect an intrusion to correspondingpremises.

Reference is now made to FIG. 4A, which is a simplified functional blockdiagram of a shock wave detector of FIGS. 1A-3C, constructed andoperative in accordance with a preferred embodiment of the presentinvention. The shock wave detector of FIG. 4A is preferably employed aspart of the systems of FIGS. 1A-3C, such as intrusion detectors 104, 208and 306.

As described hereinabove with reference to FIGS. 1A-3C, intrusionthresholds of intrusion detectors 104, 208 and 306 are operative to betuned so to distinguish between events that justify sounding an alarm,such as a shock wave generated by a thief tampering with a window of apremises and of events which do not justify sounding an alarm, such asshock waves generated by weather conditions. As further describedhereinabove, the intrusion threshold of the intrusion detectors may betuned either by local intrusion detector threshold controllingfunctionality such as intrusion detector threshold controllingfunctionality 114 of FIG. 1B, or by remote\central intrusion detectorthreshold remote controlling functionality such as premises intrusiondetector threshold controlling subsystems 204 communicating with centralintrusion defector threshold remote controlling functionality 214 ofFIG. 2B and premises intrusion detector threshold controlling subsystems308 communicating with central intrusion detector threshold remotecontrolling functionality 314 of FIG. 3B.

Additionally, as further described hereinabove with reference inparticular to FIGS. 1B, 2B and 3B, each of detectors 104, 208 and 306may also be tuned manually by an operator, either when being initiallyinstalled or subsequently thereto.

It is a particular feature of the present invention that the intrusionthresholds of the shock wave detector of FIGS. 4A and 4B is adjusted viaa discrete input device such as, for example, a push button, and ispreferably displayed on a discrete type display such as, for example, aseven segment display, an LCD dot matrix display element, a colored LEDdisplay element, or an array of LED elements forming a bar display.

It is further appreciated that discrete enumeration of levels of theintrusion threshold of the shock wave detector of FIGS. 4A and 4Benables tuning the intrusion threshold to a precise numeric valuerepresenting one of a plurality of discrete precalibrated thresholdlevels. For example, an operator of an intrusion detection systememploying the shock wave detector may wish to either manually orremotely adjust the intrusion threshold of the shock wave detector andto test the shock wave detector at the new threshold, while being ableto revert to the precise previous threshold in a case where the newthreshold proves to be unsuitable. It is further appreciated thatdiscrete tuning of the intrusion thresholds of shock wave detectors suchas detectors 104, 208 and 306 is operative to provide uniform tuning ofall shock wave detector employed in the systems of FIGS. 1A-3C.

As shown in FIG. 4A, a shock wave detector 400 comprises a transceiver402 and a discrete numeric display 404, embodied in the form of aseven-segment display (SSD). Numeric display 404 is preferably operableto display the intrusion threshold of shock wave detector 400. It isappreciated that shock wave detector 400 may be configured to operateover any predetermined discrete numerical range of shock thresholdlevels.

Shock wave detector 400 also preferably includes two discrete inputactuators 406, each preferably embodied in the form of a pushbutton.Actuators 406 are operable for manually setting the intrusion thresholdof shock wave defector 400 which is preferably stored in memory 408 ofshock wave detector 400.

It Is appreciated that the intrusion threshold of shock wave detector400 may also be automatically transmitted to shock wave detector 400,via transceiver 402, from remote control functionality such as ahousehold control panel of an intrusion detection system which employsshock wave detector 400, intrusion detector threshold controllingfunctionality 114 of FIG. 1B, premises intrusion detector thresholdcontrolling subsystems 204 of FIG. 2B and premises intrusion detectorthreshold controlling subsystems 308 of FIG. 3B.

Shock wave detector 400 also preferably includes a microphone 410 fordetection of acoustic events which may be indicative of an intrusion, inaddition to shock sensing functionality 412. Shock sensing functionality412 is preferably operative to sense shock waves and, additionally, toanalyze corresponding acoustic events received by microphone 410 and toemploy, inter alia, the intrusion threshold stored in memory 408, toascertain whether the combination of the sensed shock waves andcorresponding acoustic events are indicative of an intrusion. Uponascertaining that the acoustic events are indicative of an intrusion.Detector 400 is preferably operative to transmit an indication of theintrusion to an alarm system communicating therewith, such as alarmsystem 106 of FIG. 1B, 209 of FIG. 2B and 309 of FIG. 3B.

Detector 400 also preferably includes a LED display 414 lot displaying,for example, an indication of an intrusion. A power source such as abattery 416 is also preferably provided. Alternatively, detector 400 maybe connected to a wired power source.

Reference is now made to FIG. 4B, which is a simplified pictorialillustration of manual tuning of the intrusion detector of FIG. 4A. Asdescribed hereinabove with reference to FIG. 4A, intrusion detector 400of FIG. 4A preferably includes two discrete input actuators 406, eachpreferably embodied in the form of a pushbutton, which are operable formanually setting the intrusion threshold of intrusion detector 400.

As shown in step 1 of FIG. 4B, an operator wishing to tune the intrusionthreshold of detector 400 of a residence 420 initially generates arelatively weak shock wave emitted by a window 422 by hitting the windowwith a solid object, such as a hammer. The relatively weak shock wave isone which the operator deems as too weak to be indicative of anintrusion of window 422. The operator notes that the relatively weakshock wave was sensed by shock sensing functionality 412 of detector 400and was determined thereby to have an intensity of 22, as displayed ondisplay numeric display 404 of detector 400.

Thereafter, as shown in step 2 of FIG. 4B, the operator generates arelatively strong shock wave emitted by window 422 by hitting the windowwith a greater intensity relative to step 1. The relatively strong shockwave is one which the operator deems as to be strong enough to beindicative of an intrusion of window 422. The operator notes that thestring weak shock wave was sensed by shock sensing functionality 412 ofdetector 400 and was determined thereby to have an intensity of 26, asdisplayed on display numeric display 404 of detector 400.

Thereafter, as shown in step 3 of FIG. 4B, responsive to ascertainingthat a suitable intrusion threshold for window would be between athreshold which would deem the relatively strong shock wave of step 2 asbeing indicative of an intrusion of window 422 while deeming therelatively weak shock wave of step 1 as not being indicative of anintrusion of window 422, the operator employs actuators 406 of detector400 to set the intrusion threshold of detector 400 as 24.

It is appreciated that tuning of the intrusion threshold of detector 400in step 3 of FIG. 4B may also be performed automatically. For example,responsive to the operator generating a multiplicity of shock waves,each of the shock waves having a different intensity, detector 400 maycalculate an average intensity of the multiplicity of shock waves andtune the intrusion threshold of detector 400 to be the averageintensity. Alternative examples of automatic tuning of detector 400 mayinclude automatic tuning the intrusion threshold of detector 400 to be athreshold which is higher than the calculated average intensity by apredetermined number of levels, or a threshold which is an average ofthe three strongest shock waves generated by the operator.

It is also appreciated that once tuned, the intrusion threshold ofdetector 400 may be shared among all intrusion detectors deployed in theresidence. For example, detector 400 may transmit the intrusionthreshold thereof to an automatic intrusion detector threshold controlsystem such as automatic intrusion detector threshold control system 100of FIGS. 1A & 1B, premises intrusion detector threshold controllingsubsystem 204 of FIG. 2A & 2B, and premises intrusion detector thresholdcontrolling subsystem 308 of FIG. 3A & 3B. The control system maythereafter transmit the intrusion threshold to all intrusion detectorsof residence 420.

Alternatively, control system 100 may ascertain that the intrusionthreshold received from detector 400 is suitable to detect intrusions ofwindow 420, however for other, more vulnerable openings of residence420, a lower intrusion threshold is more appropriate. Similarly, controlsystem 100 may ascertain that tor other, less vulnerable openings ofresidence 420, a higher intrusion threshold is more appropriate.

It is yet further appreciated that intrusion thresholds of all or someof intrusion detectors deployed its residence 420 may be manually tunedby an operator employing a threshold control system such as automaticintrusion detector threshold control system 100 of FIGS. 1A & 1B,premises intrusion detector threshold controlling subsystem 204 of FIGS.2A & 2B, and premises intrusion detector threshold controlling subsystem308 of FIGS. 3A & 3B which communicates with all intrusion detectors ofresidence 420. Alternatively, intrusion thresholds of all or some ofintrusion detectors deployed in residence 420 may be automatically tunedby the threshold control system as described hereinabove.

Similarly, it is yet further appreciated that central intrusion detectorthreshold remote controlling functionality such as central intrusiondetector threshold remote controlling functionality 214 of automaticintrusion detector threshold remote control system 200 of FIGS. 2A & 2Band central intrusion detector threshold remote controllingfunctionality 314 of automatic intrusion detector threshold remotecontrol system 300 of FIGS. 3A & 3B may be employed to either manuallyor automatically tune intrusion thresholds of intrusion detectorsdeployed in premises communicating therewith.

It will be appreciated by persons skilled in the art that the presentinvention is not limited by what has been particularly shown anddescribed hereinabove. Rather the scope of the present inventionincludes both combinations and subcombinations of the various featuresdescribed hereinabove as well as modifications thereof which would occurto persons skilled in the art upon reading the foregoing description andwhich are not in the prior art.

1. A tunable intrusion shock detector comprising: at least one sensorhaving a tunable intrusion threshold; and discrete intrusion thresholdtuning functionality operable for at least one of local and remotediscrete tuning of an intrusion threshold of said intrusion detector toone of at least three discrete precalibrated threshold levels, each ofsaid at least three discrete precalibrated threshold levels beingrepresented by a discrete numeric value.
 2. A tunable intrusion shockdetector according to claim 1 and also comprising discrete intrusionthreshold input functionality communicating with said discrete intrusionthreshold tuning functionality, operable for manually tuning saidintrusion threshold of said intrusion detector to one of said discreteprecalibrated threshold levels.
 3. A tunable intrusion shock detectoraccording to claim 1 and wherein said discrete intrusion thresholdtuning functionality comprises an alpha-numeric display operative todisplay said discrete numeric value representing said precalibratedintrusion threshold of said intrusion detector.
 4. A tunable intrusionshock detector according to claim 2 and wherein said discrete intrusionthreshold input functionality comprises at least one push button.
 5. Atunable intrusion shock detector according to claim 1 and wherein eachof said local and remote discrete tuning of said intrusion threshold ofsaid intrusion detector comprises tuning said intrusion threshold tosaid discrete numeric value.
 6. A tunable intrusion shock detectoraccording to claim 5 and also comprising a memory operative to storesaid discrete numeric value.
 7. A tunable intrusion shock detectoraccording to claim 1 and also comprising a transceiver operable for atleast one of remotely transmitting and remotely receiving said intrusionthreshold.
 8. A tunable intrusion shock detector according to claim 7and wherein said transceiver is operable for at least one oftransmitting and receiving said intrusion threshold between said tunableintrusion detector and at least one of a system for automaticallycontrolling intrusion thresholds of intrusion detectors deployed in apremises and a system for automatically remotely controlling intrusionthresholds of intrusion detectors deployed in a plurality of premises.9. A tunable intrusion shock detector according to claim 1 and alsocomprising a microphone for detection of at least one acoustic eventwhich may be indicative of an intrusion.
 10. A tunable intrusion shockdetector according to claim 9 and also composing shock sensingfunctionality operative to sense shock waves and to employ saidintrusion threshold stored in said memory to ascertain whether acombination of said sensed shock waves and said at least one acousticevent received by said microphone is indicative of an intrusion.
 11. Atunable intrusion shock detector according to claim 10 and wherein uponascertaining Thai said combination of said sensed shock waves and saidat least one acoustic event received by said microphone is indicative ofan intrusion, said intrusion detector is operative to transmit anindication of said intrusion to an alarm system communicating therewith.