WO2025171321A1 - Système de sécurité à mesures de dissuasion - Google Patents
Système de sécurité à mesures de dissuasionInfo
- Publication number
- WO2025171321A1 WO2025171321A1 PCT/US2025/015098 US2025015098W WO2025171321A1 WO 2025171321 A1 WO2025171321 A1 WO 2025171321A1 US 2025015098 W US2025015098 W US 2025015098W WO 2025171321 A1 WO2025171321 A1 WO 2025171321A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- security device
- form factor
- security
- deterrent
- camera
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06V—IMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
- G06V20/00—Scenes; Scene-specific elements
- G06V20/50—Context or environment of the image
- G06V20/52—Surveillance or monitoring of activities, e.g. for recognising suspicious objects
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06V—IMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
- G06V10/00—Arrangements for image or video recognition or understanding
- G06V10/70—Arrangements for image or video recognition or understanding using pattern recognition or machine learning
- G06V10/82—Arrangements for image or video recognition or understanding using pattern recognition or machine learning using neural networks
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06V—IMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
- G06V40/00—Recognition of biometric, human-related or animal-related patterns in image or video data
- G06V40/10—Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
- G06V40/16—Human faces, e.g. facial parts, sketches or expressions
- G06V40/172—Classification, e.g. identification
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B15/00—Identifying, scaring or incapacitating burglars, thieves or intruders, e.g. by explosives
- G08B15/02—Identifying, scaring or incapacitating burglars, thieves or intruders, e.g. by explosives with smoke, gas, or coloured or odorous powder or liquid
-
- G—PHYSICS
- G01—MEASURING; TESTING
- G01S—RADIO DIRECTION-FINDING; RADIO NAVIGATION; DETERMINING DISTANCE OR VELOCITY BY USE OF RADIO WAVES; LOCATING OR PRESENCE-DETECTING BY USE OF THE REFLECTION OR RERADIATION OF RADIO WAVES; ANALOGOUS ARRANGEMENTS USING OTHER WAVES
- G01S17/00—Systems using the reflection or reradiation of electromagnetic waves other than radio waves, e.g. lidar systems
- G01S17/02—Systems using the reflection of electromagnetic waves other than radio waves
- G01S17/04—Systems determining the presence of a target
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B13/00—Burglar, theft or intruder alarms
- G08B13/18—Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength
- G08B13/189—Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems
- G08B13/194—Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems
- G08B13/196—Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
- G08B13/19617—Surveillance camera constructional details
- G08B13/19619—Details of casing
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B15/00—Identifying, scaring or incapacitating burglars, thieves or intruders, e.g. by explosives
- G08B15/001—Concealed systems, e.g. disguised alarm systems to make covert systems
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B5/00—Visible signalling systems, e.g. personal calling systems, remote indication of seats occupied
- G08B5/22—Visible signalling systems, e.g. personal calling systems, remote indication of seats occupied using electric transmission; using electromagnetic transmission
- G08B5/36—Visible signalling systems, e.g. personal calling systems, remote indication of seats occupied using electric transmission; using electromagnetic transmission using visible light sources
- G08B5/38—Visible signalling systems, e.g. personal calling systems, remote indication of seats occupied using electric transmission; using electromagnetic transmission using visible light sources using flashing light
Definitions
- the present disclosure is generally directed to a security system and is more particularly, but not exclusively, directed to a security system with active deterrent measures.
- the system When the system is armed and one or more sensors detect one of the above activities, the system is generally operable to trigger an audible and/or visual alarm, and, if the system is actively monitored, will alert local authorities as to the intrusion.
- security systems have been developed that also include interior and exterior cameras, including video doorbells, to provide a user with the ability to actively monitor approaching visitors, and record intruders or other bad actors while also triggering alarms through an associated mobile application on a user’s device.
- the present disclosure is generally directed to security devices, systems, and methods with active deterrent measures.
- the security system may include a camera for live and recorded monitoring of an environment as well as visual and audible alarms that can be automatically or manually activated in order to provide an initial deterrence against crime.
- the system also includes an audio device for communicating with a visitor or apparent intruder in the environment, such as to issue a verbal warning.
- the system includes at least one active deterrent measure, which is preferably a non-lethal deterrent measure including but not limited to, mace, instant glue, dyes, location chip tags, taser flechettes (or coiled charges), rock salt shotgun blasts, non- lethal ammunition such as bean bags, and other options.
- active deterrent measure preferably a non-lethal deterrent measure including but not limited to, mace, instant glue, dyes, location chip tags, taser flechettes (or coiled charges), rock salt shotgun blasts, non- lethal ammunition such as bean bags, and other options.
- the system may optionally include lethal deterrents.
- the system automatically targets and deploys the one or more active deterrent measures based on machine vision targeting (or some other automatic object recognition software) in some aspects.
- the system deploys the deterrent measures upon manual input or activation of the functionality by a user on a connected device, such as through a mobile application on a smart phone.
- the system then applies the active deterrent measure to deter the criminal activity, such as applying mace and location tracking chips to the apparent intruder and in a simultaneous or subsequent step, deploying the coiled charges to cause neuromuscular incapacitation.
- the system may include or be associated with additional layers of redundancy.
- the system can be connected with wires to a power source while also including multi-day battery back-up power and a further cellular backup.
- the system can include more than one deterrent measure per unit or more than one of each type of deterrent per unit in order to provide further deterrence opportunities if initial attempts are unsuccessful or there is more than one intruder.
- the system may also be associated with a deployable security device, such as a drone or robot with similar active deterrent functionality, that continues mobile and ongoing deterrence if the initial deterrence by the system is ineffective.
- the concepts of the disclosure therefore advantageously provide active deterrence against crime and are particularly beneficial at reducing and/or preventing theft and intrusion into a protected area.
- the technology described herein goes further than just video recording and/or other static alarms to actively prevent crime and/or stop crime to safeguard property and lives.
- the technology includes layers of redundancy in a tamper-proof form factor. Such systems, devices, and methods are effective to deter crime, while reducing burden on law enforcement and health care systems.
- Figure 1 is an isometric view of an implementation of a security system in a closed position according to the present disclosure.
- Figure 2 is a cross-sectional view of the security system of Figure 1 along line A- A in Figure 1.
- Figure 3 is an array of views of the security system of Figure 1 in an open position.
- Figure 4 and Figure 5 are isometric views of a further implementation of a security system according to the present disclosure.
- Figures 6-8 are isometric views of a further implementation of a security system according to the present disclosure.
- Figure 9A and Figure 9B are views of a further implementation of a security system according to the present disclosure.
- Figure 10A and Figure 10B are views of a further implementation of a security system according to the present disclosure.
- Figure 11 is a schematic view of integration of multiple security units or subsystems in an implementation of a security system according to the present disclosure.
- Figure 12 is a schematic view of integration of a deployable security device with an implementation of a security system according to the present disclosure.
- Figure 13 is a block diagram of a controller suitable for executing an embodiment of a security system that performs at least some techniques described in the present disclosure, as well as various devices and/or computing systems connected thereto.
- the concepts of the present disclosure are generally directed to security systems, devices, and methods with active deterrent measures that go beyond typical video recording and alarms to actively deter crime and intrusions.
- the technology contemplated herein is a smart system that allows for remote monitoring and action-based deterrence measures via smartphone and an associated downloadable mobile application and/or software as a service product that will stop or delay criminal activity with the swipe of a finger.
- the system can be customized with multiple non-lethal deterrence measures that will instantly affect and reduce and/or eliminate criminal activity.
- the system can be used in conjunction with drone and robotic units to provide further layers of security and deterrent measures to provide additional benefits.
- Figure 1 is an isometric view of a security system 100 in a closed position.
- the security system 100 described herein can take a variety of forms or form factors.
- the system 100 is illustrated in Figure 1 in a form factor that may resemble a mail box and be utilized at an entry point of a personal residence, many other form factors are considered herein including, but not limited to, other mail box shapes and designs, first aid kits, fire extinguisher housings, parts or aspects of entry ways such as trim or molding, lockboxes, door headers, interior and/or exterior art work or signs and/or other interior and/or exterior design elements, and other like devices.
- the security system 100 resemble or be integrated into a common internal or external feature, such as a design feature, of an environment for aesthetic purposes but also to disguise the security system 100 and reduce the likelihood of tampering and/or intentional avoidance by a criminal, but the present disclosure is not limited to any particular form factor for the security system 100.
- the system 100 may optionally include or exclude indicia or other design factors, such as a house number or room number, on an exterior surface thereof for identification of the location.
- the security system 100 may include a camera 102 with a lens exposed on an exterior surface of the system 100 in order to enable live recording of an environment and in some aspects, automatic and/or active targeting for deterrent measures, as further described herein.
- the system 100 may also include at least one deterrent port 104 to enable the system 100 to emit one or more active deterrents of the type described herein.
- the deterrent ports 104 are preferably on an exterior of the device and may in some aspects be static ports, meaning that the system 100 deploys the active deterrent through the ports 104 without moving or otherwise opening and/or closing the ports 104, thus making the ports 104 passageways or openings that may optionally be uncovered or covered by a screen or filter.
- ports 104 may be active ports and include a cover or actuator for opening and/or deploying the ports 104 and the deterrent either automatically or upon input from a user.
- Figure 1 illustrates two deterrent ports 104 on only one exterior side of the system 100 that is the same side as the camera 102 in some aspects, the location and number of ports 104 is generally customizable and can be selected.
- the system 100 may include more or less than two ports 104 on any of the exterior faces of the system 100.
- the system 100 may further include a grate 106 on any selected number of sides of the form factor that allows for an audible alarm to transmit sound to an environment around the system 100.
- system 100 may include further grates and/or openings to enable transmission of additional types of alarms as well, including strobes and/or grates and/or openings to allow light to be emitted to illuminate an environment around the system 100 and/or a target.
- the system 100 may further include an audio device (i.e., an audio receiver and/or transmitter and/or transceiver such as a speaker and/or microphone) embedded or integrated within the camera 102 and/or provided as a separate component of the system 100.
- the audio device allows a user to receive audio from the environment around the system 100 and also speak into a microphone on a connected device which is then output by the speaker into the environment around the system 100 to enable communication between a user, who may be remote from the system 100, and an approaching visitor or possible intruder.
- the system 100 is deployable between the closed position shown in Figure 1 and an open or deployed position described further with reference to Figure 3.
- the open or deployed position can assist with deploying certain deterrent measures or change and/or increase a range or area of application of deterrent measures, as further described herein.
- the open position is an optional configuration and in some aspects, the system 100 is implemented only in the closed position shown in Figure 1 (and Figure 2) while still enabling all of the deterrent measures, features, aspects, and benefits and advantages described herein in the open and/or closed positions.
- Figure 2 is a cross-sectional view of the system 100 along line A-A in Figure 1 to provide additional detail regarding the features and aspects of the system 100.
- the system 100 may optionally include, in various configurations, the camera 102, a strobe alarm 108, one or more deterrent measures such as pepper spray 110A and ink spray 110B, a keypad 112 and battery 112, an alarm 114, and a coiled charge 116.
- Each of these aspects may be in electronic communication, such as by wires and/or wirelessly with a controller 118, as indicated by dashed lines 120.
- the battery is integrated with the key pad 112 or is a separate component in the form factor that is associated with the controller 118 for selectively providing power to the aspects described above and others in the system 100.
- the strobe alarm 108 is operable to emit light, such as through a port or opening in the form factor of the system 100, preferably in a flashing or strobe pattern of selected frequency as an additional visual alarm and deterrent.
- the camera 102 is generally operable to enable live video monitoring and recording in a field of view of the camera 102 (i.e., the environment surrounding the system 100).
- the controller 118 may enable communication and/or transmission of a live or recorded video stream from the camera 102 to an external device 122, which may be a user’s smart phone, tablet, or computer, or to a network of interconnected devices, such as to a server or some other remote computing device for transmission to the user’s device and/or law enforcement devices, among others.
- the camera 102 may be static and have a fixed field of view or may have pan and tilt functionality as well as digital and/or optical zoom to increase and/or change the field of view of the camera 102 and provide additional functionality to the user.
- the camera 102 may execute movements or other features, such as changes in pan or tilt and/or zoom automatically via controller 118, or through manual inputs by a user through a connected device, such as a user’s smart phone or other device and associated software application.
- the controller 118 may store instructions in memory of the controller 118 that are executed by one or more processors of the controller 118 to enable target acquisition functionality with the camera 102.
- the controller 118 may store computer vision and/or machine learning and/or artificial intelligence code and algorithms, that when executed by the one or more processors in conjunction with the camera 102, enable the camera 102 to identify a target, such as preferably a human being, to enable automatic targeted application of the deterrent measures described herein.
- the target acquisition and direction of application of the deterrent measures are controlled and selected by the user manually, such as through a connected device and associated software application, as further described herein.
- the system 100 may include actuators or other drive assemblies for changing a position of the ports 104 and/or the position and orientation of the deterrent measures 110A, 110B to assist with aiming the deterrent measures toward the intended target.
- the system further includes the one or more active deterrent measures such as pepper spray 110A and/or ink spray HOB.
- the deterrent measures include non-lethal deterrents, including but not limited to, mace or pepper spray, instant glue, dyes, location chip tags, taser flechettes (or coiled charge 116), rock salt shotgun blasts, non-lethal ammunition such as bean bags, butane canisters that enable torch jet or flame throwing capability, stringer flechettes that output air propelled spines, tear gas and other noxious gases, and other options.
- the deterrents may include lethal deterrents, including but not limited to guns and lethal ammunition.
- one or more of the deterrent measures are provided as cartridges that are removable and replaceable within the system 100.
- the system 100 may house one, two, three, four, five, six, seven, eight, nine, ten, or more cartridges with each cartridge including at least one active deterrent measure and at least one or more charges of each deterrent measure.
- a pepper spray cartridge may include sufficient pepper spray for more than one use, such as at least two, three, four, five or more applications or uses before replacement is needed. Such an arrangement helps create redundancy in the system 100 while also enabling deterrent measures against more than one target and minimizing the need for ongoing maintenance.
- the deterrents 110A, HOB can be activated by an actuator associated with the deterrents 110A, HOB and the controller 118 either automatically or by manual input from a user.
- the deterrents 110A, 110B are operable to be applied to an environment through the ports 104 ( Figure 1), such as a targeted location within a range of the system 100 or more broadly to the entire surrounding environment of the system 100.
- the keypad 112 may be operable to activate and/or deactivate the system 100 and may include buttons and/or switches or physical actuators for this purpose.
- the keypad 112 may also be implemented as a touch screen with touch sensitive controls for receiving and transmitting information input by a touch of a user.
- the alarm 114 is an audible alarm that may be activated automatically or selectively by a user to emit sound, such as through grates 106 in the form factor.
- the coiled charge 116 may be a conducted energy device that includes two barbed darts intended to puncture the skin and remain attached to the target and may travel at a speed of 55 m/s (120 mph; 200 km/h).
- the darts are connected to the system 100 by insulated copper wire and deliver a modulated electric current, such as from the battery and/or controller 118, designed to disrupt voluntary control of muscles, causing neuromuscular incapacitation.
- the darts and/or wires are propelled by a propellent upon activation.
- the darts and wires may be provided in a reloadable and/or replaceable cartridge that can be loaded into the system 100.
- the coiled charge 116 is sold and manufactured by Axon®.
- the controller 118 may include memory, such as RAM, ROM, and/or flash memory and one more processors for executing instructions stored in the memory to implement the functionality described herein.
- the controller 118 may also include receivers, transmitters, and/or transceivers to enable wireless communication across selected communication protocols, as well as a power interface manager associated with the external power source and/or battery for selectively providing power to the aspects of the system 100.
- the controller 118 is a secure embedded microcontroller with hardware encryption engines, machine vision and associated processing onboard, and motor control peripherals.
- One non-limiting example of an implementation of the controller 118 may be in an ST33-series or similar platform from STMicroelectronics®.
- the controller 118 further includes multiple data pathways for various features and redundancy.
- the controller 118 may include hardware and software for Bluetooth® connectivity for setup and configuration of the system 100 via one or more external devices 122.
- the controller 118 may also include multi-band WiFi (2.4 & 5Ghz), as well as cellular backup and associated hardware and software to implement such functionality.
- the controller 118 may also have compatibility with lower-power WAN solutions (LoRAWan) and/or proprietary neighborhood-area networks (Amazon Sidewalk). Higher-bandwidth connectivity will be the real-time video backbone, and lower-bandwidth networks will allow for still images, lower-power security monitoring notification, and provisioning.
- Computing hardware, such as controller 118 is provided on-board to pre-process video and analyze activity and motion in real time.
- the controller 118 may provide for both live video feed of IP network to a mobile device/desktop, as well as recording of a video feed and storage on a user’s device or other external device, such as a cloud-based storage system.
- the controller 118 is preferably a secure real-time operating system (RTOS) with software updates performed over-the-air (OTA) via mobile app or computing device and/or associated network of interconnected devices as needed.
- RTOS real-time operating system
- OTA over-the-air
- the controller 118 and associated user interface may also display an amount or availability of remaining deterrents, which helps to verify that the system 100 has sufficient supplies and is ready for use or if a restock of supplies is needed.
- the system 100 preferably utilizes main power to function, such as from a hardline or wired connection to a power source.
- the system 100 further includes the battery for redundancy, which may be an embedded and preferably rechargeable and/or replaceable backup power system.
- the battery will provide a minimum of two days of backup power from the battery before a recharge or replacement is needed.
- Such a battery may be a rechargeable lithium-ion battery, as well as standard size replaceable and/or rechargeable batteries, such as D-cell primary batteries.
- a larger rechargeable battery is utilized to provide full functionality using battery-only power (i.e., without a wired connection to main power) and active monitoring of the battery level by the controller 118 and alerts provided to the user when a recharge is needed.
- the system 100 is in communication, via controller 118, with a deployable security device, and preferably a mobile and un-manned security device such as a drone or robot, either directly or through a hub or other network of interconnected devices.
- the additional security device may be stored in an environment (i.e., in a space inside a building or on a roof of a building) and selectively deployable after an intrusion to provide an additional layer of security and active deterrent measures without involvement or reliance on law enforcement, as further described herein.
- a deployable security device or system of deployable devices
- a drone or system of drones developed by Brine® is a drone or system of drones developed by Brine®.
- the deployable security device may carry any of the deterrent measures described herein for the system 100 and can be automatically or selectively activated to deploy a further redundant layer of deterrent measures after an intrusion if the system 100 is not effective at preventing the intrusion.
- the system 100 includes a deterrent measure that applies location identification chips to a target that stick to the target.
- the deployable security device may have a camera with machine vision and/or other related technologies to identify targets based on the chips applied by the system 100 and apply the further deterrent measures to only the acquired target to prevent application of deterrents to victims and other by-standers.
- the deployable security device may also include a spotlight and the machine vision system may assist with tracking and identifying the target with the spotlight on the deployable security device.
- FIG. 1 The internal aspects of the system 100 described with reference to Figure 2 can be accessed by a removable cover or other removable portion of the form factor shown in Figure 1.
- one or more of the panels shown in Figure 1 may be removably coupled (i.e., by hinges and a fastener, slide to lock, twist to lock, fasteners or other like devices and methods for removable coupling) to the other panels to allow for selective access to the interior of the form factor to enable interaction with the key pad 112 and recharge and/or replacement of the deterrent measures, as well for general maintenance and service.
- the removable portion of the form factor is secured by a lock and key, magnetic lock, electronic lock (i.e., lock that is activated by input on a keypad or touch pad on the device or through a code provided by a user’s device) or other like locking devices, systems, and methods to prevent tampering with the device.
- the form factor may generally be provided in a material that is resistant to impacts or damage, including but not limited to, steel and other metals, carbon fiber, high strength polymers and plastics, and others, to prevent removal or tampering with the device by physical force.
- the form factor would utilize a self-powered digital NFC lock/unlock mechanism in addition to a custom fastener screw design to ensure that the internals of the device are only user/owner accessible, and the system 100 and/or form factor will be weatherproofed to IP-67 (i.e., dust and water over extended duration).
- IP-67 i.e., dust and water over extended duration.
- the system 100 is operable to automatically or selectively deploy one or more active deterrent measures against crime or intrusion, and may be supported by redundant security measures through automated and deployable devices for further security.
- the system 100 can be useful to deter criminals in a scenario such as a user being away from home and apparent intruders with crow bars approach an entry point, such as a door.
- the system 100 allows for capturing video of the apparent intruders and an opportunity for the user to speak to the apparent intruders, such as to provide a “stop” or “do not enter” command or other warning.
- the user first provides a back away and stand down indication to the approaching individuals to sufficiently verbally warn them against entry. This interaction is recorded by the camera 102 to provide evidence of the warning.
- the user may also activate backup measures through a connected deployable device, which targets the intruders based on the applied chips and applies further deterrent measures while also continuing the recording.
- the system 100 may be associated with activate monitoring and send an alert to authorities that the “OFFENSE” mode has been activated to deploy an immediate police response while the perpetrators are engaged with the deterrent measures.
- the location chips and dye may assist law enforcement with locating perpetrators after the incident.
- Figure 3 is an array of views of the system 100 in an open position.
- the system 100 may include deployable housings 124 that contain ports, openings, or other like devices for additional functionality.
- the system 100 may include a lower deployable housing 124 associated with the coiled charge 116 to assist with deploying the coiled charge automatically and/or based on a command and/or input from a user.
- the system 100 may also include a deployable upper housing 124 that contains the strobe lights for the visual alarm, or additional ports or openings for application of the deterrent measures 110A, HOB.
- the deployable upper housing 124 may also contain different lights than strobe lights, such as a spotlight.
- the system 100 may also include control circuitry and actuators for identifying and tracking an intruder with the spotlight.
- the deployable upper housing 124 may include ports that extend or widen a range of application of the deterrent measures 110A, HOB relative to the ports 104.
- the system 100 may enable targeted application of the deterrent measures 110A, 110B via the ports 104 as well as application of the deterrents 110A, 110B to an entire environment around the system 100.
- Many other configurations are possible, including deployable housings 124 on other sides or parts of the system 100 as well as deployable housings 124 associated with any of the other aspects or functionality described herein.
- Figure 4 and Figure 5 are isometric views of a further implementation of a security system 200 in a different form factor from security system 100.
- Figure 4 and Figure 5 are provided to illustrate a non-limiting example of an implementation of the system 200 in a form factor that is advantageous for an interior of a building, such as a door in a school building.
- the system 200 may generally be the same as the system 100, except as otherwise described.
- the system 200 includes a camera 202, lights 204, deterrent measures 206, and coiled charges 208, as well as adjustable mounting brackets 210.
- the deterrent measures 206 and coiled charges 208 may include at least two independent sets of measures 206 and charges 208, such as one located on each side of the system 200, to allow for measures to be applied to any area around the entry point (i.e., to prevent an apparent intruder from avoiding measures 206 and/or charges 208 by entering one side of the door) and/or to deter multiple apparent intruders. Further, the location of the aspects of the system 200 may be different and may be designed to be applied generally vertically downward from the form factor to protect entry through the door below the form factor instead of horizontally outward from the form factor as with system 100.
- Figures 6-8 are isometric views of a further implementation of a security system 300 that may be similar to the other systems described herein, but in a different form factor.
- the arms 308 may be spaced from each other or otherwise configured to directly engage outer surfaces of the ATM 302 and facilitate installation with various fasteners, bolts, and the like inserted through the arms 308 and received by the ATM 302.
- the form factor 306 may also be coupled to the ATM 302 with a single central or offset (relative to a center of the ATM 302) mounting rod, support, and other like structures.
- the system 300 is installed on the ATM 302 with a field of view of the sensors, deterrents, and other aspects of the system 300 facing outwards toward a location where a user accesses the ATM 302 in order to protect the ATM 302 from theft, vandalism, and other crimes.
- a housing or form factor for the ATM 302 is retrofit, adapted, or configured, to house the system 300 internally so that the system 300 is an integrated aspect of the ATM 302 in a singular construction.
- the system 300 may be hidden within the ATM 302 so that a potential intruder or burglar is not aware of the active deterrent capabilities of the system 300 and/or the ATM 302.
- the ATM 302 may therefore include ports, doors, openings, and other like devices that enable or selectively enable the system 300 to operate in the manner described herein to deploy active deterrent measures against theft.
- the system 300 may also be mounted on or otherwise incorporated into infrastructure, such as part of a building 310 or a support, awning, and/or cover 312 for a drive-through ATM 302.
- the system 300 is located in proximity to the ATM 302 or, said differently, the system 300 is installed in a location relative to the ATM 302 such that the ATM 302 is within the range of the system 300.
- the arms 308 may also be rotatably coupled to the form factor 306 such as through bolts, fasteners, brackets, and the like to enable rotation of the form factor 306 into a position where an access point to the ATM 302 is within the field of view and range of the system 300.
- the rotatable coupling may include a rotation configuration where the fasteners are loosened or actuators on the arms are activated to enable rotation before the fasteners and/or actuators are locked to lock and prevent rotation in the final installed configuration.
- Limiting and/or preventing rotation in the final installed configuration is helpful to prevent bad actors from rotating the form factor 306 so that is no longer facing an access location for the ATM 302, thus rendering the system 300 ineffective.
- Figure 9A and Figure 9B are views of a further implementation of a security system 400.
- System 400 may be similar to the other systems described above, except as otherwise noted. Thus, repetitive description is omitted.
- the system 400 includes a camera 402 and infrared sensors 404 to assist with identifying and tracking a target.
- the infrared sensors 404 may enable tracking of targets in dark conditions or when visible light is insufficient for use of the camera 402.
- the camera 402 may also be equipped with integrated infrared sensors for the same purpose.
- the system 400 may include one or more lasers 406 to assist with target identification and deterrence. Upon detection of a target and/or threat and/or activation of the system 400, the system 400 may activate the lasers 406 and activate mechanical actuators associated with the lasers 406 to point the same toward the target as a warning to the target that they have been identified and that the system 400 is about to deploy additional deterrence measures of the type described herein if they continue with their activity. Activation of the lasers 406 may be performed in conjunction with the audible warnings to the target discussed herein.
- Figure 9B provides more detail of the cartridges 408 that store and supply the deterrent measures to the system 400.
- the cartridges 408 are received in the housing and/or form factor for the system 400 in fluid communication with ports 410 that deploy the deterrent measures upon activation of the system 400 and/or receipt of a deploy or activation signal from the system 400.
- the cartridges 408 may be fluidly and mechanically coupled to the system 400 with an interface 412 that will be described in more detail with reference to Figures 10A and 10B.
- the interface 412 When inserted into the housing, the interface 412 may be removably coupled to a hub in the system 400 and fluidly coupled to the ports 410 or in fluid communication with the ports 410 as represented by dashed lines 414 for conveying the deterrents along a fluid path through the system 400 from the replaceable cartridges to the ports 410.
- the cartridges 408 may be received in the housing in a length or longest direction of the housing in some implementations.
- FIG 10A and Figure 10B are views of a further implementation of a security system 500 according to the present disclosure that provide another example of a form factor for the system.
- the system 500 may also include cartridges 502 received and aligned in a height or thickness direction of the housing with interfaces 504 of the cartridges 502 leading directly into ports 506 for deployment of the deterrents without first passing the deterrents through a flow path through the housing.
- Such an arrangement assists with replacement of the cartridges 502 and may avoid the risk of a blocked fluid line between the cartridges 502 and the ports 506 that would impact the deployment of the deterrents.
- the interface 504 includes a tapered and/or pointed tip 508 and a collar 510.
- Figure 11 is a schematic view of integration of multiple security units or subsystems in an implementation of a security system 600 according to the present disclosure. Specifically, Figure 11 illustrates a system-level deployment of several security subsystems or units of the type described herein using a floor plan of a bank as an example.
- an overall system 600 may include multiple individual security subsystems or units 602 that have the features described herein for systems 100, 200, 300, 400, 500.
- the units 602 may be in communication with each other through a wired and/or wireless connection. Where the communication between units 602 is wireless, such communication can be enabled by any known communication protocol and the associated hardware on each unit, including without limitation Wi-Fi®, Bluetooth®, and other options explained herein or otherwise available.
- Each of the units 602 may also be in communication with a centralized controller and/or monitoring system 604 that may be located onsite of the system 600 and/or offsite for additional redundancy.
- a remote monitoring system may be in communication with the units 602 for real time monitoring 24 hours a day and 7 days a week. Such monitoring may be accomplished through one or more remote computing devices and/or services.
- the units 602 may generally be placed or installed in any selected location in a building or space and may also be associated with one or more back-up power sources, as described herein.
- the system 600 provides units 602 equipped with back-up power where each unit 602 is bulletproof, fireproof, waterproof, and may have the ability to heat and/or de-ice itself in the event of extreme weather.
- the units 602 cooperate to define an overall system 600 that is a non-lethal defense system that provides a physical barrier to entry.
- the range of the system 600 and/or the number of units 602 can be customized to meet needs and demands of different applications.
- Figure 12 is a schematic view of integration of a deployable security device with an implementation of a security system 700 according to the present disclosure.
- the system 700 includes a deployable security device (not shown due to scale), such as a drone or robot
- the system 700 may also include functionality for defining one or more monitoring perimeters and/or elevations 702 for the deployment of the security device(s).
- the perimeters 702 may be defined with a mobile device associated with the system 700, such as through drawing a perimeter on a map on a user’s mobile device, and/or the perimeters 702 may be defined through an on-site or off-site controller associated with the system 700.
- system 700 may be adapted to deploy the security devices during initial installation and set up to map the surrounding area and allow for a user to then select areas for monitoring and possible deployment. Still further, the system 700 may allow a user to set a given distance or radius from the system 700 for monitoring and/or deployment (i.e., 25 feet, 50 feet, 100 feet, 1/4 mile, 1/2 mile, 1 mile or more). In a further implementation, the system 700 may deploy the deployable security device without a set perimeter or maximum range and the deployable security device will track and follow a target and deploy deterrents as needed. Thus, the system 700 may cooperate and/or deploy deployable security devices that are geofenced and equipped with the countermeasures described herein to deter and supplement response to criminal activity.
- the systems described herein may also have hardware onboard or be associated with external hardware that carries instructions for executing artificial intelligence algorithms to assist with building an intelligence profile through ongoing monitoring.
- the intelligence profile assists, at least in part, with identifying threats with higher accuracy and speed than human capability.
- the systems may also query external systems to ensure awareness of, and/or use of, advanced or developing tactics used in modem crime detection and prevention.
- Such artificial intelligence capabilities may include at least on-board artificial intelligence in the individual systems and/or units, perimeter and/or external artificial intelligence, and use of artificial intelligence by the deployable security devices described herein.
- Figure 13 is an embodiment of an electronic system or controller 800 of the systems described herein represented in block diagram or schematic form.
- the controller 800 is suitable for executing or otherwise performing at least some embodiments or techniques described herein with respect to the disclosed systems.
- the physical or hardware aspects of the controller 800 may be located internal to or are carried by the individual units or subsystems, such as systems 100, 200, 300, 400, 500 disclosed herein.
- the controller 800 corresponds to the “CPU & Battery Pack” shown in Figure 10B.
- the controller 800 may also be implemented as a central computing and control system for a broader system that is in electronic communication with additional controllers or hardware onboard individual subsystems (i.e., hardware associated with each individual unit disclosed with reference to systems 100, 200, 300, 400, 500), such as the centralized controller and/or monitoring system 604 in Figure 11.
- the controller 800 includes a processor 802, for example a microprocessor, digital signal processor, programmable gate array (PGA) or application specific integrated circuit (ASIC).
- the controller 800 includes one or more non-transitory storage mediums, for example read only memory (ROM) 804, random access memory (RAM) 806, Flash memory 808, or other physical computer- or processor-readable storage media in communication with the processor 802.
- the non-transitory storage mediums may store instructions and/or data used by the processor 802 and the controller 800 generally, for example an operating system (OS) and/or applications.
- OS operating system
- the instructions as executed by the processor 802 may execute logic to perform the functionality of the various implementations or techniques of the devices and systems described herein, including, but not limited to: identifying threats via a camera or other sensors and machine vision and/or artificial intelligence algorithms; activating one or more alarms (audible or visual); activating an actuator to deploy one or more deterrent measures at the same time or in sequential steps in a direction towards a target in response to a signal and/or input received from a user, wherein the direction may be a fixed or predefined set direction or in some aspects, is a targeted direction corresponding to a position of the target from the machine vision and/or artificial intelligence algorithms; communicating with remote devices in communication with the security subsystem to record video and/or deploy further deterrent measures (drones); and other actions and techniques described herein.
- the controller 800 may include or be associated with or more signaling devices or status indicators such as alarm 810 and lights 812.
- the lights 812 may include at least one lighting element or may include a plurality of light emitting diodes or LEDs arranged in an array ranging from single rows and columns to multiple rows and columns.
- the light array 812 includes LEDs arranged as strobe lights at least on a bottom surface of the housing (i.e., facing downward toward a target when installed) and on at least one, and preferably both side end faces of the housing (i.e., facing left and right when installed) to provide a warning to others in the area and/or indicate activation of the system to possible targets at a side of the system as shown in Figure 9A.
- each individual lighting element of the light array 812 may be position- and hue- addressable, such as to control the color and state of each element independently of or in conjunction with the other elements of the light array 812.
- the alarm 810 may be a speaker or buzzer configured to emit sound, including without limitation a pre-recorded and stored warning or alert as well as the voice of the user through an interconnected and remote device, among other aspects described herein.
- the controller 800 may also include or be associated with a camera 814 and infrared sensors 816.
- the one or more non-transitory storage mediums record instructions, that when executed by the processor 802, activate the camera 814 and cause it to capture and store data associated with the environment. This data may then be transmitted to a remote device for playback as a video feed through the communications subsystem, as described further below.
- the one or more non-transitory storage mediums may also store machine vision and/or artificial intelligence algorithms that assist with image recognition or threat detection. For example, the algorithms may be trained to detect targets based on identification of a weapon held by the target, whether exposed on the target or concealed.
- the algorithms may be trained on a data set corresponding to law enforcement facial recognition targets such that the algorithm will identify targets that are currently wanted for other crimes or are persons of interest in an investigation.
- the algorithms may also be trained to detect persons wearing masks or any other face covering to conceal a target’s face as a possible threat, among other possibilities.
- the sensitivity of the algorithm and the types of threats detected may be in some cases be customizable by the user, such as disabling identification of targets with face coverings in winter to avoid false alarms in cold climates, or to identify only threats in conjunction with law enforcement unless the system is otherwise activated by a user.
- the infrared sensors 816 may assist the camera 814 with target identification and video capture in low light settings, including when a possible target cuts the power to a building to avoid identification.
- the controller 800 may also include or be associated with lasers 818 and actuators for deployment of the deterrent measures 820 which have the function described herein.
- the lasers 818 may be activated to assist with target identification and/or as an initial deterrent measure.
- the actuators 820 are activated to deploy the deterrents in the direction of the target.
- the actuators 820 may be “fixed” actuators in the sense that their primary function is to deploy the deterrents in a fixed or set direction, or the actuators 820 may be “movable” actuators that deploy the deterrent but also include or are associated with a drive assembly for changing a position of the deterrent in advance of deployment, thus changing a direction of deployment.
- the actuators 820 may also be associated with adjustable nozzles for the deterrents and operable to adjust the nozzles to change the direction of deployment based on the identified target.
- the controller 800 may include a user interface 822 to allow a user to operate or otherwise provide input to the systems described herein, such as regarding the operational state or condition of the disclosed systems. Additionally, the user interface 822 may include a number of user actuatable controls accessible from the housing of the systems.
- the user interface 822 may include a number of switches or keys operable to turn the systems ON and OFF and/or to set various operating parameters of the systems, such as threat identification sensitivity, operation and control of a start-up or test mode, obtain information regarding the remaining capacity and/or overall functionality of the deterrent measures, and operation and control of security functionality or any other functionality described herein independently of or in conjunction with an external device, such as a personal computing device.
- switches or keys operable to turn the systems ON and OFF and/or to set various operating parameters of the systems, such as threat identification sensitivity, operation and control of a start-up or test mode, obtain information regarding the remaining capacity and/or overall functionality of the deterrent measures, and operation and control of security functionality or any other functionality described herein independently of or in conjunction with an external device, such as a personal computing device.
- the user interface 822 may include a display, for instance a touch panel display.
- the touch panel display e.g., LCD, LED, or OLED, among others, with touch sensitive overlay
- the touch panel display may present a graphical user interface, with various user selectable icons, menus, check boxes, dialog boxes, and other components and elements selectable by the end user to set operational states or conditions of the systems.
- the user interface 822 may also include one or more auditory transducers, for example one or more speakers and/or microphones. Such may allow audible alert notifications or signals to be provided to a user as a result of manual interaction with the user interface 822. Such may additionally, or alternatively, allow a user to provide audible commands or instructions.
- the user interface 822 may include additional components and/or different components than those illustrated or described, and/or may omit some components.
- the switches and keys or the user interface 822 may, for example, include toggle switches, a keypad or keyboard, rocker switches or other physical actuators of the type described herein.
- the switches and keys or the user interface 822 may, for example, allow an end user to turn ON the system, start or end a test or start-up mode, communicably couple or decouple to remote accessories and programs, access, transmit, or process data, activate or deactivate sensors and deterrents, and other actions.
- the user interface 822 may allow user input and control of any functionality described herein for the disclosed systems.
- the controller 800 includes a communications sub-system 824 that may include one or more communications modules or components which facilitate communications with various components of one or more external devices, such as a personal computing device, mobile device, server, central controller or a network of interconnected devices, among others.
- the communications sub-system 824 may provide wireless or wired communications to the one or more external devices and may include wireless receivers, wireless transmitters and/or wireless transceivers to provide wireless signal paths to the various remote components or systems of the one or more paired devices.
- the controller 800 further includes a power interface manager 826 that manages supply of power from a power source 828 to the various components of the controller 800 and the disclosed systems.
- the power interface manager 826 is coupled to the processor 802 and the power source 828. Alternatively, in some implementations, the power interface manager 826 can be integrated in the processor 802.
- the power source 828 may include an external power supply, and/or a rechargeable or replaceable battery power supply, among others, and may include multiple layers of redundancy as described herein.
- the power interface manager 826 may include power converters, rectifiers, buses, gates, circuitry, etc. in some embodiments. In particular, the power interface manager 826 can control, limit, and/or restrict the supply of power from the power source 828 based on the various operational states of the systems, as described in more detail herein.
- API application program interface
- such an API may provide a programmatic interface to control one or more operational characteristics of the disclosed systems, including, but not limited to, one or more functions of the user interface 822, processing and/or storing and/or transmitting the data received from one or more integrated or associated devices, and for other functionality described herein.
- Such control may be invoked by one of the other programs or other remote device or system.
- components or modules of the controller 800 and other devices within the disclosed systems are implemented using standard programming techniques.
- the logic to perform the functionality of the various embodiments or techniques described herein may be implemented as a “native” executable running on the controller 800, e.g., microprocessor 802, along with one or more static or dynamic libraries.
- various functions of the controller 800 may be implemented as instructions processed by a virtual machine that executes as one or more programs whose instructions are stored on ROM 804 and/or RAM 806.
- a range of programming languages known in the art may be employed for implementing such example embodiments, including representative implementations of various programming language paradigms, including but not limited to, object-oriented (e.g., Java, C++, C#, Visual Basic.NET, Smalltalk, and the like), functional (e.g., ML, Lisp, Scheme, and the like), procedural (e.g., C, Pascal, Ada, Modula, and the like), scripting (e.g., Perl, Ruby, Python, JavaScript, VBScript, and the like), or declarative (e.g., SQL, Prolog, and the like).
- object-oriented e.g., Java, C++, C#, Visual Basic.NET, Smalltalk, and the like
- functional e.g., ML, Lisp, Scheme, and the like
- procedural e.g., C, Pascal, Ada, Modula, and the like
- scripting e.g., Perl, Ruby, Python, JavaScript, VBScript, and
- instructions stored in a memory configure, when executed, one or more processors of the controller 800, such as microprocessor 802, to perform the functions of the controller 800.
- the instructions cause the microprocessor 802 or some other processor, such as an I/O controller/processor, to process and act on information received from one or more sensors or other external devices to provide the functionality and techniques described herein.
- the embodiments or implementations described above may also use well-known or other synchronous or asynchronous client-server computing techniques.
- the various components may be implemented using more monolithic programming techniques as well, for example, as an executable running on a single microprocessor, or alternatively decomposed using a variety of structuring techniques known in the art, including but not limited to, multiprogramming, multithreading, client-server, or peer-to-peer (e.g., Bluetooth®, NFC or RFID wireless technology, mesh networks, etc., providing a communication channel between the disclosed systems and devices running on one or more computer systems each having one or more central processing units (CPUs) or other processors.
- Some embodiments may execute concurrently and asynchronously, and communicate using message passing techniques.
- other functions could be implemented and/or performed by each component/module, and in different orders, and by different components/modules, yet still achieve the functions of the controller 800.
- programming interfaces to the data stored on and functionality provided by the controller 322 can be available by standard mechanisms such as through C, C++, C#, and Java APIs; libraries for accessing files, databases, or other data repositories; scripting languages; or Web servers, FTP servers, or other types of servers providing access to stored data.
- the data stored and utilized by the controller 800 and overall disclosed systems may be implemented as one or more database systems, file systems, or any other technique for storing such information, or any combination of the above, including implementations using distributed computing techniques.
- controller 800 and components or other devices within the disclosed systems may be implemented or provided in other manners, such as at least partially in firmware and/or hardware, including, but not limited to, one or more application-specific integrated circuits (“ASICs”), standard integrated circuits, controllers (e.g., by executing appropriate instructions, and including microcontrollers and/or embedded controllers), field-programmable gate arrays (“FPGAs”), complex programmable logic devices (“CPLDs”), and the like.
- ASICs application-specific integrated circuits
- controllers e.g., by executing appropriate instructions, and including microcontrollers and/or embedded controllers
- FPGAs field-programmable gate arrays
- CPLDs complex programmable logic devices
- system components and/or data structures may also be stored as contents (e.g., as executable or other machine-readable software instructions or structured data) on a computer-readable medium (e.g., as a hard disk; a memory; a computer network, cellular wireless network or other data transmission medium; or a portable media article to be read by an appropriate drive or via an appropriate connection, such as a DVD or flash memory device) so as to enable or configure the computer-readable medium and/or one or more associated computing systems or devices to execute or otherwise use, or provide the contents to perform, at least some of the described techniques.
- a computer-readable medium e.g., as a hard disk; a memory; a computer network, cellular wireless network or other data transmission medium; or a portable media article to be read by an appropriate drive or via an appropriate connection, such as a DVD or flash memory device
- the controller 800 may also be communicatively coupled with one or more external devices and/or networks 830.
- the external devices and/or networks 830 may include any of those described above, in addition to other security systems whether the same or different as those described herein, a central control system, a remote monitoring system, law enforcement systems including without limitation crime reporting systems and dispatch systems, a drone deployment and control system, and/or any other device for enabling the techniques described herein.
- the one or more external devices and/or networks 830 may include further sensors for accomplishing the functionality described herein, such as sensors for monitoring a remaining volume or amount of a deterrent measure (i.e., how much pepper spray remains in a cartridge, among others) and providing alerts to a user based on the same automatically or in response to a user request or input, and others.
- sensors for monitoring a remaining volume or amount of a deterrent measure i.e., how much pepper spray remains in a cartridge, among others
- the systems described herein can be customized and designed with selected features based on various factors, such as sensitivity of the location to be protected, state and federal laws, user preference, application location or environment, and others.
- exterior and interior example use cases have been described, many other applications are anticipated, including near any point of entry (i.e., windows, doors, etc.) in a given space or building, whether interior or exterior, as well on cargo vans, security transports or vans (i.e., for transporting money or other valuable items), delivery vehicles such as vans and/or trucks, personal and government owned buildings, storage units, banks and/or personal vaults and safes, personal vehicles such as cars and/or trucks, and any other location where deterrent against crime is desirable.
- the disclosure also contemplates related methods of deterring crime, such as by using any of the structures, systems, or devices described herein, alone or in any combination.
- a security device includes: a form factor; a camera disposed in the form factor; at least one alarm disposed in the form factor; and at least one active deterrent measure disposed in the form factor.
- the form factor is one of: a mail box, a first aid kit, a fire extinguisher housing, door or window trim, a lockbox, door headers, interior or exterior art, interior or exterior signs, or an interior or exterior design element.
- the at least one non-lethal deterrent measure is at least one of: mace, instant glue, dye, location chip tags, a coiled charge, rock salt shotgun blasts, and non-lethal ammunition.
- the security device further includes a controller including a memory and at least one processor, wherein the controller is configured to store instructions in the memory that, when executed by the at least one processor, cause the security device to: identify a target in a video stream; and activate the least one active deterrent measure in a direction toward the identified target.
- the security device further includes a controller including a memory and at least one processor, wherein the controller is configured to store instructions in the memory that, when executed by the at least one processor, cause the camera to: adjust a field of view of the camera in response to a user command, including moving the camera toward a target identified by the user; activate actuators to adjust a position or orientation of the at least one deterrent measure based on the adjusted field of view of the camera; and deploy the at least one deterrent measure toward the target based on the adjusted position or orientation of the at least one deterrent measure.
- the form factor is tamperproof and weatherproof to IP-67.
- the form factor is electrically coupleable to a power source with a wire, the security device further including a back-up battery and further cellular backup.
- the mobile deterrent measures are one or more unmanned security devices
- the controller is further configured to store instructions in the memory that, when executed by the at least one processor, cause the security device to: instruct the one or more unmanned security devices to follow an identified target and optionally deploy additional deterrent measures or tracking measures.
- a security device includes: a form factor; a recording device disposed in the form factor; and at least one active deterrent measure in a replaceable or refillable cartridge received in the form factor.
- the recording device is a camera disposed in a bottom surface of the form factor.
- the security device further includes one or more infrared sensors associated with the recording device for assisting with capturing data in low light conditions.
- the replaceable or refillable cartridge has an outlet in fluid communication with a corresponding port in the form factor for deployment of the at least one active deterrent measure.
- the at least one active deterrent measure is pepper spray or ink dye, or both.
- the security device further includes a light array for issuing a visual alarm or a speaker for issuing an audible alarm, or both.
- the form factor is an elongated rectangular shape with a width that is greater than a sum of a height and a depth of the form factor.
- the security device further includes a deployment subsystem configured to deploy one or more unmanned security devices in response to a detection of a threat by the recording device or in response to an input from a user.
- the security device further includes a controller including a memory and at least one processor, wherein the controller is configured to store instructions in the memory that, when executed by the at least one processor, cause the security device to: identify a target in a video stream received from the recording device; and activate the least one active deterrent measure in a direction toward the identified target.
- the controller is further configured to store instructions in the memory that, when executed by the at least one processor, cause the security device to: utilize machine vision or artificial intelligence algorithms to assist with identification of the target in the video stream based on at least one of: a mask worn by the target, an object carried by the target, and facial recognition.
- the security device is one of a plurality of security devices in an interconnected network.
- a security device includes: a form factor having a deployment surface; and an array of active deterrence measures positioned on the deployment surface of the form factor, wherein the array of active deterrence measures includes at least one of pepper spray and ink dye and further includes at least one of a light array and a speaker.
- the deployment surface of the form factor is a front surface of the form factor.
- the deployment surface of the form factor is a bottom surface of the form factor.
- the array of active deterrence measures includes the light array, the security device further including a camera positioned on the deployment surface of the form factor, wherein the light array includes two strobe light arrays positioned on opposite sides of the camera.
- the array of active deterrence measures further includes the speaker positioned on a different side of the camera from the two strobe light arrays.
- light array further includes an additional strobe light array on at least one surface of the form factor other than the deployment surface.
- array of active deterrence measures includes the at least one of the pepper spray and ink dye housed in a removable or replaceable cartridge having an outlet in fluid communication with a port in the deployment surface of the form factor.
- the port is positioned on a remaining side of the camera from the two strobe light arrays and the speaker.
- the security device further includes a camera positioned on the deployment surface of the form factor and a controller including a memory and at least one processor, wherein the controller is configured to store instructions in the memory that, when executed by the at least one processor, cause the security device to: identify a target in a video stream received from the camera; and activate the least one of the pepper spray and the ink dye in a direction toward the identified target.
- the security device further includes one or more infrared sensors associated with the recording device for assisting with capturing data in low light conditions.
- the technology includes layers of redundancy for the operation of the systems, devices, and methods herein (i.e., wired power, back-up battery power, and further cellular back-up) in a tamper-proof form factor as well as redundancy in the deterrent measures (i.e., more than one deterrent per unit and/or association with deployable deterrent measures as a second or subsequent layer(s) of deterrence).
- deterrent measures i.e., more than one deterrent per unit and/or association with deployable deterrent measures as a second or subsequent layer(s) of deterrence.
- Such systems, devices, and methods are effective to deter crime, while reducing burden on law enforcement and health care systems.
- There may also be more than one back-up battery power source including inside or mounted on the system as well as remote from the system and connected to the system with wires.
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Physics & Mathematics (AREA)
- Multimedia (AREA)
- Evolutionary Computation (AREA)
- Health & Medical Sciences (AREA)
- General Health & Medical Sciences (AREA)
- Computer Vision & Pattern Recognition (AREA)
- Software Systems (AREA)
- Medical Informatics (AREA)
- Databases & Information Systems (AREA)
- Computing Systems (AREA)
- Artificial Intelligence (AREA)
- Oral & Maxillofacial Surgery (AREA)
- Human Computer Interaction (AREA)
- Burglar Alarm Systems (AREA)
Abstract
La présente invention concerne un dispositif de sécurité comprenant un appareil de prise de vues, une lumière stroboscopique, un haut-parleur pour émettre une alarme sonore, et des mesures de dissuasion active. Les mesures de dissuasion active peuvent comprendre, entre autres, des moyens de dissuasion non létaux. Quand un intrus apparent s'approche du dispositif, un utilisateur peut émettre un avertissement verbal et activer la lumière stroboscopique et le haut-parleur pour fournir une dissuasion initiale tout en capturant une vidéo. Si l'intrus apparent continue avec l'intention d'entrer, le système peut déployer, soit automatiquement, soit sur la base d'une entrée à distance de l'utilisateur, les mesures de dissuasion active, telles que l'aérosol au poivre, la pulvérisation d'encre et/ou les charges enroulées pour empêcher activement le crime d'être commis tout en les capturant également sur la vidéo. Si la dissuasion initiale est infructueuse, le système peut être associé à des dispositifs de sécurité déployables qui fournissent une dissuasion redondante tout en continuant à enregistrer et à fournir une preuve vidéo.
Applications Claiming Priority (2)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| US202463551629P | 2024-02-09 | 2024-02-09 | |
| US63/551,629 | 2024-02-09 |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| WO2025171321A1 true WO2025171321A1 (fr) | 2025-08-14 |
Family
ID=96700648
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| PCT/US2025/015098 Pending WO2025171321A1 (fr) | 2024-02-09 | 2025-02-07 | Système de sécurité à mesures de dissuasion |
Country Status (1)
| Country | Link |
|---|---|
| WO (1) | WO2025171321A1 (fr) |
Citations (4)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20100128123A1 (en) * | 2008-11-21 | 2010-05-27 | Bosch Security Systems, Inc. | Security system including less than lethal deterrent |
| US20140336263A1 (en) * | 2013-05-07 | 2014-11-13 | Grizzly Mountain Enterprises Llc | Animal deterrent system and methods thereof |
| US20190295207A1 (en) * | 2018-03-20 | 2019-09-26 | Michael Joseph Day | Security system |
| US20230417919A1 (en) * | 2020-08-18 | 2023-12-28 | IntelliShot Holdings, Inc. | Automated Threat Detection and Deterrence Apparatus |
-
2025
- 2025-02-07 WO PCT/US2025/015098 patent/WO2025171321A1/fr active Pending
Patent Citations (4)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20100128123A1 (en) * | 2008-11-21 | 2010-05-27 | Bosch Security Systems, Inc. | Security system including less than lethal deterrent |
| US20140336263A1 (en) * | 2013-05-07 | 2014-11-13 | Grizzly Mountain Enterprises Llc | Animal deterrent system and methods thereof |
| US20190295207A1 (en) * | 2018-03-20 | 2019-09-26 | Michael Joseph Day | Security system |
| US20230417919A1 (en) * | 2020-08-18 | 2023-12-28 | IntelliShot Holdings, Inc. | Automated Threat Detection and Deterrence Apparatus |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| US11645904B2 (en) | Drone-augmented emergency response services | |
| EP3693935B1 (fr) | Procédé et système de protection de véhicule | |
| CA2950603C (fr) | Dispositif de surete et securite autonome sur une plateforme inhabitee commande et controle par un telephone cellulaire | |
| US20240111305A1 (en) | Unmanned aerial vehicle event response system and method | |
| US20230409054A1 (en) | Unmanned aerial vehicle event response system and method | |
| US9098954B1 (en) | Portable self-contained totally integrated electronic security and control system | |
| US20250029468A1 (en) | Vehicle-carried hazardous chemical safety monitoring system | |
| US10157537B1 (en) | Remotely controlled access security system | |
| US12073701B2 (en) | Public safety smart belt | |
| US20210070441A1 (en) | Autonomous Virtual Wall | |
| US10757379B2 (en) | Public safety smart belt | |
| KR100829179B1 (ko) | 다목적 초기 진압용 무인 경비 시스템 및 그 제어방법 | |
| US20200265694A1 (en) | System for implementing an aerial security network | |
| US11900778B1 (en) | System for improving safety in schools | |
| WO2025171321A1 (fr) | Système de sécurité à mesures de dissuasion | |
| WO2018167349A2 (fr) | Système autonome de sécurité privé permettant la fourniture de services passifs et actifs et trouvant une utilité dans la lutte contre la violence sexiste | |
| RU2326444C2 (ru) | Устройство защиты объекта | |
| US12340669B2 (en) | Security system with ferromagnetic sensing | |
| RU2726942C1 (ru) | Интегрированный комплекс физической защиты периметров и территорий объектов | |
| Fagbohun et al. | Security devices application studies in crime prevention and policing in Nigeria | |
| US20240371249A1 (en) | Public Safety Smart Belt | |
| Aska et al. | Design of Smart Security system for ATM | |
| JP7760210B1 (ja) | デジタル侵入検知システム | |
| Raman et al. | IoT based Anti Theft Controlling and Security System for ATM Machine | |
| RU2708509C1 (ru) | Малообслуживаемая система физической защиты объектов |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| 121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 25752881 Country of ref document: EP Kind code of ref document: A1 |