CROSS-REFERENCE TO RELATED APPLICATIONS/INCORPORATION BY REFERENCE Not applicable.
FIELD OF THE INVENTION Certain embodiments of the invention relate to security systems. More specifically, certain embodiments of the invention relate to a method and system for configurable security and surveillance systems.
BACKGROUND OF THE INVENTION Security and surveillance operations may require security management systems that are capable of providing either a single security function or, in some instances, a wide range of integrated security functions. Most security management systems, however, are designed to operate as autonomous systems that provide a single security function such as intrusion detection, access control, or audio and/or video surveillance and recording, for example. These security management systems may not generally support the addition of other security functions and/or the addition of other features to an existing security function without a substantial investment in hardware and/or software. As a result, multiple security management systems are generally utilized when a particular application requires multiple security functions. In this regard, any integration that may be necessary to efficiently and/or effectively operate multiple security management systems is typically left to an installer, an integrator, and/or the customer to carry out.
One of the needs driving security management systems capable of supporting a wide range of integrated security functions and/or features are security operations for large enterprises or entities. These large entities may have many different security requirements extending over multiple locations. A centrally monitored integrated security management system may allow administrators or controllers at a central control center to efficiently oversee the many security activities that are supported at the remote facilities.
The limited ability of most security management systems to add security functions, to add features to existing security functions, and/or to easily integrate with other security management systems generally results in an inefficient use of available resources. For example, multiple security management systems that have not been efficiently integrated may have multiple data entry points and/or duplicate databases. Moreover, limited integration capability may also create inefficient use of personnel by duplicating data entry tasks, requiring manual data exchange between systems, and implementing multiple training requirements for the various systems being utilized. Moreover, even when integration between multiple security management systems has been effectively implemented, continued compatibility may be lost when hardware and/or software on various portions of at least one of the multiple security management systems is upgraded.
A common security function that is generally provided in security management systems is video surveillance. Video surveillance operations may require, in some instances, to be provided with additional features or may require compatibility with other security functions. Most video surveillance operations are provided by stand-alone closed circuit television (CCTV) systems that are commonly found in, for example, office buildings, external structures, schools, railway stations, and even on city streets. An effectively integrated security management systems may require that a CCTV system be compatible with other security functions such as access control methods augmented with biometrics, security tracking systems, and/or access tracking systems, for example. However, most CCTV systems are not easily upgradable nor are they easily integrated with other security functionality. As a result, integrated security management systems comprising video surveillance operations are not readily available. Moreover, the ability of these integrated security management systems to evolve and provide further security functions and/or additional features are generally limited or may be accomplished only with a substantial investment in hardware and/or software.
Further limitations and disadvantages of conventional and traditional approaches will become apparent to one of skill in the art, through comparison of such systems with some aspects of the present invention as set forth in the remainder of the present application with reference to the drawings.
BRIEF SUMMARY OF THE INVENTION A system and/or method for configurable security and surveillance systems, substantially as shown in and/or described in connection with at least one of the drawings, as set forth more completely in the claims.
Various advantages, aspects and novel features of the present invention, as well as details of an illustrated embodiment thereof, will be more fully understood from the following description and drawings.
BRIEF DESCRIPTION OF SEVERAL VIEWS OF THE DRAWINGSFIG. 1A illustrates an exemplary analog security and surveillance system, in connection with an embodiment of the invention.
FIG. 1B illustrates an exemplary Internet protocol (IP)-based security and surveillance system, in connection with an embodiment of the invention.
FIG. 2A illustrates an exemplary configurable security and surveillance system with programmable sensor agents, in accordance with an embodiment of the invention.
FIG. 2B illustrates an exemplary configurable security and surveillance system with programmable sensor agents and a programmable content analysis agent, in accordance with an embodiment of the invention.
FIG. 2C illustrates an exemplary configurable security and surveillance system with programmable sensor agents, programmable content analysis agent, and an access controller, in accordance with an embodiment of the invention.
FIG. 3 illustrates an exemplary network comprising a configurable security and surveillance system and an e-commerce vendor, in accordance with an embodiment of the invention.
FIG. 4A is a block diagram of an exemplary programmable sensor agent, in accordance with an embodiment of the invention.
FIG. 4B is a block diagram of an exemplary programmable sensor agent adapted to generate descriptors, in accordance with an embodiment of the invention.
FIG. 4C is a flow diagram illustrating exemplary steps for configuring a programmable sensor agent, in accordance with an embodiment of the invention.
FIG. 5A is a block diagram of an exemplary programmable content analysis agent, in accordance with an embodiment of the invention.
FIG. 5B is a flow diagram illustrating exemplary steps for configuring a programmable content analysis agent, in accordance with an embodiment of the invention.
FIG. 6A illustrates an exemplary network comprising a residential configurable security and surveillance system, in accordance with an embodiment of the invention.
FIG. 6B illustrates an exemplary network comprising a commercial configurable security and surveillance system, in accordance with an embodiment of the invention.
DETAILED DESCRIPTION OF THE INVENTION Certain embodiments of the invention may be found in a method and system for a configurable security and surveillance system. In accordance with an embodiment of the invention, a configurable security and surveillance system may comprise at least one programmable sensor agent and/or at least one programmable content analysis agent. A plurality of processing features may be offered by the configurable security and surveillance system by programming configurable hardware devices in the programmable sensor agents and/or the programmable content analysis agents via a system manager. Device programming files may be utilized to program the configurable hardware devices. The device programming files may be encrypted, and decryption keys may be requested to enable the programming of different processing features into the programmable sensor agents and/or the programmable content analysis agents. The device programming files and/or the decryption keys may be received via a network transfer and/or via a machine-readable media from an e-commerce vendor.
FIG. 1A illustrates an exemplary analog security and surveillance system, in connection with an embodiment of the invention. Referring toFIG. 1, there is shown an analog security andsurveillance system100 that comprises at least oneanalog camera102, acamera control unit104, amultiplexer106, asystem manager110, and a videocassette recorder (VCR)108. Theanalog camera102 may comprise suitable logic, circuitry, code, and/or hardware that may be adapted to capture video information from a particular location. Theanalog camera102 may receive control signals from thecamera control unit104 that may be utilized to control various operations, for example, zoom, tilt, and/or pan. Theanalog camera102 may generate at least one video signal that corresponds to the video information captured by theanalog camera102. In some instances, theanalog camera102 may provide front end processing of the video information before generating the video signal. Theanalog camera102 may transfer at least a portion of the generated video signal to themultiplexer106. The video signals may be transferred to themultiplexer106 via coaxial cables, for example.
Thesystem manager110 may comprise suitable logic, circuitry, code, and/or hardware that may be adapted to allow a user to control the operation of ananalog camera102, to control the recording of at least a portion of the video signals generated by ananalog camera102, and to display at least a portion of the video information in the video signals generated by ananalog camera102. In this regard, thesystem manager110 may be utilized to control at least a portion of the operation of thecamera control unit104, themultiplexer106, and/or theVCR108. Thecamera control unit104 may comprise suitable logic, circuitry, code, and/or hardware that may be adapted to receive control information from thesystem manager110 via themultiplexer104 and to generate control signals from the received control information. The generated control signals may be transferred to at least oneanalog camera102 to control its operation.
Themultiplexer106 may comprise suitable logic, circuitry, code, and/or hardware that may be adapted to select a mode of operation. For example, during a recording mode, themultiplexer106 may receive video information from at least oneanalog camera102 and may transfer that video information to theVCR108. During a playback mode, for example, themultiplexer108 may retrieve stored video information from theVCR108 and may transfer the video information to a display portion of thesystem manager110. The display portion of thesystem manager110 may display the video information from at least oneanalog camera102 at the same time. During a control mode, for example, thesystem manager110 may transfer control information to thecamera control unit104 via themultiplexer106. During a display mode, for example, the video information received from at least oneanalog camera102 may be displayed directly to the display portion of thesystem manager110. In some instances, themultiplexer106 may be adapted to have more than one mode of operation active at the same time. For example, the recording mode and display mode may be utilized at the same time to record and display video information onto theVCR108 and the display portion of thesystem manager110 respectively.
FIG. 1B illustrates an exemplary Internet protocol (IP)-based security and surveillance system, in connection with an embodiment of the invention. Referring toFIG. 1B, there is shown an IP-based security and surveillance system120 that comprises at least oneanalog camera102 as described inFIG. 1A, anIP network112, avideo server122, at least one IP-baseddigital camera124, arouter126, a transfer control protocol/Internet protocol (TCP/IP)network128, asystem manager130, and adata storage device132. Theanalog camera102 may be as described inFIG. 1A. TheIP network112 may be a communication network that may be implemented as a local area network (LAN), a wide area network (WAN), a campus area network (CAN), a metropolitan area network (MAN), and/or a home area network (HAN), for example. TheIP network112 may be a wireline and/or a wireless network and components coupled to theIP network112 may be coupled via a wireline and/or a wireless connection.
Thevideo server122 may comprise suitable logic, circuitry, code and/or hardware that may be adapted to receive video information from at least oneanalog camera102 and to transfer control information to at least oneanalog camera102. Thevideo server122 may be communicatively coupled to theIP network112 via a wireline and/or a wireless connection. Thevideo server122 may also be adapted to compress the video information received from ananalog camera102 and transfer the compressed video information to thesystem manager130 and/or thedata storage device132, for example. Thevideo server122 may correspond to a specified network address in theIP network112.
The IP-baseddigital camera124 may comprise suitable logic, circuitry, code, and/or hardware that may be adapted to capture video information and transfer video information to theIP network112. The IP-baseddigital camera124 may be adapted to receive control information via theIP network112. The IP-baseddigital camera124 may comprise an image sensor, an image processor, and a compression engine. The image sensor may be, for example, a complementary metal-oxide-semiconductor (CMOS) image sensor or a charge-coupled device (CCD) image sensor and may be adapted to capture video information. The image processor may be, for example, a digital signal processor (DSP) or a dedicated application specific integrated circuit (ASIC) and may be adapted to perform front-end processing of the video information captured by the image sensor. The compression engine may comprise suitable logic, circuitry, and/or code that may be adapted to encode the processed video information before transfer to theIP network112. The control information received by the IP-baseddigital camera124 may be utilized to control, for example, zoom, tilt, and/or pan operations. Each IP-baseddigital camera124 may correspond to a specified network address in theIP network112.
Therouter126 may comprise suitable logic, circuitry, code, and/or hardware that may be adapted to communicatively couple theIP network112 with the TCP/IP network128. Therouter126 may transfer at least a portion of the video information captured by at least oneanalog camera102 and/or at least one IP-baseddigital camera124 and a portion of the control information generated by thesystem manager130 to a device, component, and/or element communicatively coupled to the TCP/IP network128. Therouter126 may correspond to a specified network address in theIP network112. The TCP/IP network128 shown inFIG. 1B may correspond to, for example, the Internet.
Thedata storage device132 may comprise suitable logic, circuitry, and/or code that may be adapted to store at least a portion of the video information captured by at least oneanalog camera102 and/or at least one IP-baseddigital camera124. In some instances, thedata storage device132 may be part of a network attached storage (NAS) and/or a storage area network (SAN), for example. Thedata storage device132 may correspond to a specified network address in theIP network112.
Thesystem manager130 may comprise suitable logic, circuitry, and/or code that may be adapted to control the operation of at least oneanalog camera102 and/or at least one IP-baseddigital camera124. In this regard, thesystem manager130 may generate control information that may be transferred to at least oneanalog camera102 and/or at least one IP-baseddigital camera124 via theIP network112. Thesystem manager130 may also display at least a portion of the compressed video information captured by ananalog camera102 and/or an IP-baseddigital camera124. Moreover, thesystem manager130 may receive information stored in thedata storage device132 and may process and/or display the received information. Thesystem manager130 may correspond to a specified network address in theIP network112.
FIG. 2A illustrates an exemplary configurable security and surveillance system with programmable sensor agents, in accordance with an embodiment of the invention. Referring toFIG. 2A, there is shown a configurable security andsurveillance system200 that comprises a firstprogrammable sensor agent202, a secondprogrammable sensor agent204, a thirdprogrammable sensor agent206, asystem manager208, adata storage device210, and anetwork212. Thenetwork212 may comprise suitable hardware that may be adapted to communicatively couple a plurality of components, devices, and/or elements. In this regard, the components, devices, and/or elements coupled to thenetwork212 may correspond to specified network address and/or network locations in thenetwork212. Thenetwork212 may be, for example, a TCP/IP network, but need not be so limited. In some instances, portions of thenetwork212 may be implemented as wireless connections while other portions may be implemented as wireline connections. Moreover, components communicatively coupled to thenetwork212 may be coupled via wireline or wireless connections, for example.
The firstprogrammable sensor agent202, the secondprogrammable sensor agent204, and the thirdprogrammable sensor agent206 may comprise suitable logic, circuitry, code, and/or hardware that may be adapted to detect a physical event, generate at least one signal that corresponds to the physical event detected, and transfer the generated signal to thedata storage device210 and/or thesystem manager208 via thenetwork212. Three different types of programmable sensor agents are shown inFIG. 2A as examples to indicate that a plurality of programmable sensor agent types may be utilized to detect different physical events. As a result, the types and the number of programmable sensor agents may depend on the security functions that need to be integrated in the configurable security andsurveillance system200. For example, a programmable sensor agent may correspond to a surveillance camera, a thermal sensor, or a biological/chemical sensor. In the example illustrated inFIG. 2A, each of theprogrammable sensor agents202,204, and206 may correspond to a specified network address in thenetwork212.
A programmable sensor agent may be adapted to receive control information from thesystem manager208 via thenetwork212. Moreover, a programmable sensor agent may be adapted to be programmed or configured by thesystem manager208. In this regard, the programming or configuration may be performed to add and/or remove features that correspond to a security function or functions performed by a programmable sensor agent. The programming or configuration may be performed dynamically, that is, while the configurable security andsurveillance system200 is in operation. In other instances, the programming or configuration may be performed during installation or during maintenance periods when at least a portion of the configurable security andsurveillance system200 is not in operation.
Thedata storage device210 may comprise suitable logic, circuitry, and/or code that may be adapted to store at least a portion of the signals generated by the programmable sensor agents. In some instances, thedata storage device210 may be part of a network attached storage (NAS) and/or a storage area network (SAN), for example. Thedata storage device210 may correspond to a specified network address in thenetwork212. In some instances, more than onedata storage device210 may be utilized in the configurable security andsurveillance system200.
Thesystem manager208 may comprise suitable logic, circuitry, and/or code that may be adapted to control the operation of at least one of the programmable sensor agents in the configurable security andsurveillance system200. In this regard, thesystem manager208 may generate control information that may be transferred to the programmable sensor agents via thenetwork212. Thesystem manager208 may also be adapted to display at least a portion of the information in the signals generated by the programmable sensor agents. Moreover, thesystem manager208 may receive information stored in thedata storage device210 and may process and/or display the information received from thedata storage device210. Thesystem manager210 may correspond to a specified network address in thenetwork212.
Thesystem manager208 may also be adapted to program or configure security features into the programmable sensor agents in the configurable security andsurveillance system200. In this regard, the system manager may receive device programming files that may be utilized to program or configure a portion of the programmable sensor agents in order to provide new, additional, and/or upgraded security features. The device programming files may be transferred to the corresponding programmable sensor agents via thenetwork212. In some instances, the device programming files received by thesystem manager208 may be encrypted or protected. When the device programming files are encrypted, thesystem manager208 may receive at least one decryption key or password that may be utilized to decrypt the encrypted device programming files or to gain access to the device programming files. In this regard, encryption and protection may be substantially similar restrictions on the device programming files that they may be referred to interchangeably. When the device programming files have been decrypted, thesystem manager208 may transfer the device programming files to the corresponding programmable sensor agents via thenetwork212.
Thesystem manager208 may also be adapted to execute code or software that may be adapted to perform control, management, and/or maintenance operations that may be utilized in the operation and/or the configuration of the configurable security andsurveillance system200.
FIG. 2B illustrates an exemplary configurable security and surveillance system with programmable sensor agents and a programmable content analysis agent, in accordance with an embodiment of the invention. Referring toFIG. 2B, there is shown a configurable security andsurveillance system220 that differs from the configurable security andsurveillance system200 inFIG. 2A in that a programmablecontent analysis agent214 is shown communicatively coupled to thenetwork212.
The programmablecontent analysis agent214 may comprise suitable logic, circuitry, and/or code that may be adapted to perform sensor analysis operations and/or security analysis operations. For example, sensor analysis operations may comprise, but need not be limited to, processing sensor information, classifying sensor information, and/or generating control information that may be transferred to other programmable sensor agents in the configurable security andsurveillance system220. Security analysis operations may comprise, but need not be limited to, identifying security anomalies, managing emergency situations, providing access control, and/or triggering alarms, for example. The results of sensor analysis operations may be utilized to generate and/or add information to a comprehensive knowledge base that may be utilized by, for example, the security analysis operations. In this regard, the programmablecontent analysis agent214 may store at least a portion of the results generated by the sensor analysis operations. Storage of the results generated by the sensor analysis operations may be local on the programmablecontent analysis agent214 and/or on thedata storage device210. The programmablecontent analysis agent214 may correspond to a specified network address in thenetwork212. In some instances, more than one programmablecontent analysis agent214 may be utilized by the configurable security andsurveillance system220.
The programmablecontent analysis agent214 may also be adapted to receive control information from thesystem manager208 via thenetwork212. Moreover, the programmablecontent analysis agent214 may be adapted to be programmed or configured by thesystem manager208. In this regard, the programming or configuration may be performed to add, remove, and/or upgrade features that correspond to the sensor analysis operations and/or security analysis operations performed by the programmablecontent analysis agent214. The programming or configuration may be performed dynamically, that is, while the configurable security andsurveillance system220 is in operation. In other instances, the programming or configuration may be performed during installation or during maintenance periods when at least a portion of the configurable security andsurveillance system220 is not in operation.
FIG. 2C illustrates an exemplary configurable security and surveillance system with programmable sensor agents, programmable content analysis agent, and an access controller, in accordance with an embodiment of the invention. Referring toFIG. 2C, there is shown a configurable security andsurveillance system230 that differs from the configurable security andsurveillance system220 inFIG. 2B in that anaccess controller216 is shown communicatively coupled to thenetwork212.
Theaccess controller216 may comprise suitable logic, circuitry, and/or code that may be adapted to provide access to specified locations based on a verified security clearance. For example, upon keycard and/or biometric information verification, a user may enter a specified location or site in a building or campus covered by the configurable security andsurveillance system230. Access to that area by the user may be further detected by, for example, video surveillance functions provided by at least one programmable sensor agent located in the specified location or site. The programmable sensor agents may transfer information regarding the user to the programmablecontent analysis agent214. The programmablecontent analysis agent214 may process the user information and may add the results to other information that may have been generated on that user and that may be currently stored information in the programmablecontent analysis agent214 and/or in thedata storage device210. A user may be represented by a label in the configurable security andsurveillance system230 and the user label may correspond to a data structure comprising information related that user.
In another example, security and/or emergency personnel may be searching or attempting to locate a specified user. In this regard, the security and/or emergency personnel may query the configurable security andsurveillance system230 by label to locate the specified user. Data available on the data structure that corresponds to the user label may be utilized to accurately determine of the user's location. When additional data is required, the configurable security andsurveillance system230 may send control information to at least a portion of the programmable sensor agents and/or theaccess controller216 to obtain additional data that may be utilized to locate the specified user.
Theaccess controller216 may provide an additional security function to the other security functions, for example, video surveillance, performed by the configurable security andsurveillance systems230. This additional security function may be controlled, at least in part, by thesystem manager208. Moreover, the programmablecontent analysis agent214 may be utilized to integrate at least a portion of the access control functions and other security functions.
FIG. 3 illustrates an exemplary network comprising a configurable security and surveillance system and an e-commerce vendor, in accordance with an embodiment of the invention. Referring toFIG. 3, there is shown the configurable security andsurveillance system230 as described inFIG. 2C, a security and surveillance features vendor (SSFV)300, a first machine-readable media302, a second machine-readable media304, afirst router306, asecond router308, and the TCP/IP network128 as described inFIG. 1B.
Thefirst router306 may comprise suitable logic, circuitry, code, and/or hardware that may be adapted to communicatively couple thenetwork212 in the configurable security andsurveillance system230 to the TCP/IP network128. Thesecond router308 may comprise suitable logic, circuitry, code, and/or hardware that may be adapted to communicatively couple theSSFV300 to the TCP/IP network128.
The first machine-readable media302 and the second machine-readable media304 are examples of media that may be utilized to provide the configurable security andsurveillance system230 with device programming files, decryption keys, and/or operating software or code that may be utilized by thesystem manager208, the programmablecontent analysis agent214, thedata storage device210, and/or theaccess controller216. While the first machine-readable media302 as shown corresponds to at least one diskette and the second machine-readable media304 as shown corresponds to at least one optical disk, other machine-readable media may also be utilized in this regard.
TheSSFV300 may be an e-commerce vendor that provides a plurality of features that may be programmed into a programmable agent in the configurable security andsurveillance system230. A programmable agent may refer to a programmable sensor agent such as those represented by theprogrammable sensor agents202,204, and206 and/or a programmablecontent analysis agent214. TheSSFV300 may be adapted to receive requests for device programming files and/or decryption keys that may be utilized to configure or program at least one of the programmable agents. Decryption keys may be requested from theSSFV300 when at least a portion of the device programming files is encrypted. TheSSFV300 may transfer any requested programming files and/or decryption keys to thesystem manager208 via the TCP/IP network128 and thenetwork212. In some instances, theSSFV300 may transfer any requested programming files and/or decryption keys to thesystem manager208 via at least one machine-readable media.
FIG. 4A is a block diagram of an exemplary programmable sensor agent, in accordance with an embodiment of the invention. Referring toFIG. 4A, there is shown aprogrammable sensor agent400 that comprises asensor402, a first digital reconfigurable processor (DRP)404, asecond DRP406, and amemory block408. Thesensor402 may comprise suitable logic, circuitry, code, and/or hardware that may be adapted to detect physical events. For example, for security functions that require video surveillance, thesensor402 may be a solid-state image sensor that may be implemented utilizing CMOS or CCD technology. Thesensor402 may be adapted to generate at least one signal that corresponds to the detected physical events. Thesensor402 may be also adapted to receive control information and/or to transfer generated signals that correspond to the detected physical events to thefirst DRP404.
Thefirst DRP404 and thesecond DRP406 may comprise suitable logic, circuitry, and/or code that may be adapted to provide digital processing. Thefirst DRP404 and thesecond DRP406 may be referred to a configurable devices that may adapted to be configured or programmed in order to provide at least one feature for at least one security function. Thefirst DRP404 or thesecond DRP406 may be a digital signal processor (DSP), a central processing unit (CPU), a field programmable gate array (FPGA), or a complex programmable logic device (CPLD), for example.
Theprogrammable sensor agent400 may receive at least one device programming file to program or configure at least a portion of thefirst DRP404 and/or at least a portion of thesecond DRP406. The device programming files may be code, embedded code, firmware, and/or compiled hardware description language (HDL) code in accordance with the type of configurable device. For example, when utilizing a DSP and/or a CPU as configurable devices, at least a portion of the embedded code that is executed on the configurable device may be configured to provide new, additional, and/or upgraded features. In another example, when utilizing an FPGA and/or a CPLD as configurable devices, at least a portion of the logic in the configurable device may be configured or programmed to provide new, additional, and/or upgraded features. In some instances, an FPGA and/or a CPLD configurable device may be utilized as a processing engine that may be able to support an embedded operating system (OS), such as Linux, for example. In such instances, the logic and/or the embedded code that is executed on the FPGA and/or the CPLD configurable device may be configured or programmed to provide new, additional, and/or upgraded features.
Thememory block408 may comprise suitable logic, circuitry, and/or code that may be adapted to store information generated from thefirst DRP404 and/or thesecond DRP406. Thememory block408 may also be adapted to transfer stored information to thefirst DRP404 and/or thesecond DRP406. Thememory block408 may comprise at least one memory device. In some instances, the device programming files may be stored in thememory block408 and may be transferred to thefirst DRP404 and/or thesecond DRP406 from thememory block408.
As shown inFIG. 4A, theprogrammable sensor agent400 may be adapted for video surveillance functions. For example, thesensor402 may capture video information and may provide front-end processing of the captured sensor information. When thesensor402 is a color image sensor, for example, the front-end operations performed by thesensor402 may comprise automatic gain control (AGC), color balancing, and/or white balancing. Thefirst DRP404 may receive the front-end processed video information from thesensor402, and may perform additional image processing features such as image interpolation, image correction, dynamic range enhancement, and/or noise filtering, for example. Thefirst DRP404 may also be adapted to generate a processed sensor output from the sensor information.
Thesecond DRP406 may receive at least a portion of the processed sensor information and may be adapted to provide image analysis and/or failure management for theprogrammable sensor agent400. For example, in case of a system failure, thesecond DRP404 may activate a backup power source to theprogrammable sensor agent400. Moreover, thesecond DRP406 may also be adapted to provide maintenance features that may be operated at specified times. For example, thesecond DRP406 may be configured or programmed to detect dirt on a lens on the image sensor by analyzing at least a portion of the processed video information generated by thefirst DRP404. When the lens is dirty, for example, a signal or message may be sent to thesystem manager208 so that further action may be taken.
FIG. 4B is a block diagram of an exemplary programmable sensor agent adapted to generate descriptors, in accordance with an embodiment of the invention. Referring toFIG. 4B, there is shown aprogrammable sensor agent414 that differs from theprogrammable sensor agent400 inFIG. 4A in that athird DRP410 is communicatively coupled to thefirst DRP404. Thethird DRP410 may be a configurable device substantially as described for thefirst DRP404 and thesecond DRP406. Thethird DRP410 may be utilized to generate data content descriptors from the processed sensor output generated by thefirst DRP404.
As shown, thethird DRP410 may be adapted for video surveillance functions by further processing the processed sensor output generated by thefirst DRP404. In this regard, thethird DRP410 may be adapted to generate video content descriptors. The video content descriptors may be, for example, motion and/or color descriptors. Motion descriptors may result as a byproduct of other video or image processing operations such a video compression, for example. A plurality of descriptors may be generated in accordance with the level of integration desired among security functions.
FIG. 4C is a flow diagram illustrating exemplary steps for configuring a programmable sensor agent, in accordance with an embodiment of the invention. Referring toFIG. 4C, afterstart step422, instep424, features may be selected that may be programmed into at least one configurable device in at least one programmable sensor agent in a configurable security and surveillance system. Instep426, an e-commerce feature vendor may provide device programming files for the selected features. The device programming files may be transfer to the configurable security and surveillance system via a network connection and/or via machine-readable media. Instep428, decryption keys may be requested and obtained from the e-commerce feature vendor for device programming files that are encrypted. The decryption keys may be provided to the configurable security and surveillance system via a network connection and/or via machine-readable media.
Instep430, the encrypted device programming files may be decrypted by utilizing the decryption keys received instep428. Instep432, the device programming files may be transferred to the programmable sensor agents to program the configurable devices. Instep434, the programming of the configurable devices in the programmable sensor agents may be verified. Instep436, a user and/or installer of the configurable security and surveillance system may determine whether new, additional, and/or upgraded features may be necessary in at least one programmable sensor agent. When a user may find new, additional, and/or upgraded features necessary, theflow chart420 may proceed to step424 where new, additional, and/or upgraded features may be selected. When a user may not require new, additional, and/or upgraded features, theflow chart420 may proceed to endstep438.
FIG. 5A is a block diagram of an exemplary programmable content analysis agent, in accordance with an embodiment of the invention. Referring toFIG. 5A, there is shown a programmablecontent analysis agent500 that comprises afirst DRP502, asecond DRP504, athird DRP506, afourth DRP508, and amemory block510. In some instances, more or fewer digital reconfigurable processors may be utilized.
Thefirst DRP502, thesecond DRP504, thethird DRP506, and thefourth DRP508 may comprise suitable logic, circuitry, and/or code that may be adapted to provide digital processing and may be referred to a configurable devices that may adapted to be configured or programmed in order to provide at least one feature for at least one security function. Thefirst DRP502, thesecond DRP504, thethird DRP506, and thefourth DRP508 may be a digital signal processor (DSP), a central processing unit (CPU), a field programmable gate array (FPGA), or a complex programmable logic device (CPLD), for example.
The programmablecontent analysis agent500 may receive at least one device programming file to program or configure at least a portion of thefirst DRP502, thesecond DRP504, thethird DRP506, and/or thefourth DRP508. The configurable devices may be programmed or configured via a programming file bus, for example. The device programming files may be code, embedded code, firmware, and/or compiled hardware description language (HDL) code in accordance with the type of configurable device. For example, when utilizing a DSP and/or a CPU as configurable devices, at least a portion of the embedded code that is executed on the configurable device may be configured to provide new, additional, and/or upgraded features. In another example, when utilizing an FPGA and/or a CPLD as configurable devices, at least a portion of the logic in the configurable device may be configured or programmed to provide new, additional, and/or upgraded features. In some instances, an FPGA and/or a CPLD configurable device may be utilized as a processing engine that may be able to support an embedded operating system (OS), such as Linux, for example. In such instances, the logic and/or the embedded code that is executed on the FPGA and/or the CPLD configurable device may be configured or programmed to provide new, additional, and/or upgraded features.
Thememory block510 may comprise suitable logic, circuitry, and/or code that may be adapted to store information generated from thefirst DRP502, thesecond DRP504, thethird DRP506, and/or thefourth DRP508. Thememory block510 may also be adapted to transfer stored information to thefirst DRP502, thesecond DRP504, thethird DRP506, and/or thefourth DRP508. Thememory block510 may comprise at least one memory device. In some instances, the device programming files may be stored in thememory block510 and may be transferred to thefirst DRP502, thesecond DRP504, thethird DRP506, and thefourth DRP508 from thememory block408. Communication between the configurable devices and thememory block510 may be performed via a memory bus, for example.
As shown inFIG. 5A, theprogrammable sensor agent500 may be adapted to perform sensor analysis operations and/or security analysis operations. The sensor analysis operations may correspond to video surveillance functions, for example. In this regard, a portion of thefirst DRP502, thesecond DRP504, thethird DRP506, and/or thefourth DRP508 may be utilized for video surveillance features and a remaining portion may be utilized for security analysis operations. For example, video surveillance features may comprise motion detection, generation of shape descriptors, object tracking, and/or object surveillance. Security analysis operations may comprise security event classification, generating control information to be transferred to programmable sensor agents, and/or system failure detection, for example.
In this regard, thefirst DRP502, thesecond DRP504, thethird DRP506, and/or thefourth DRP508 may be utilized to further process information or content generated by the programmable sensor agents. Thefirst DRP502, thesecond DRP504, thethird DRP506, and/or thefourth DRP508 may communicate with the programmable sensor agents in a configurable security and surveillance system via a data bus, for example.
FIG. 5B is a flow diagram illustrating exemplary steps for configuring a programmable content analysis agent, in accordance with an embodiment of the invention. Referring toFIG. 5B, afterstart step522, instep524, features may be selected that may be programmed into at least one configurable device in at least one programmable content analysis agent in a configurable security and surveillance system. Instep526, an e-commerce feature vendor may provide device programming files for the selected features. The device programming files may be transfer to the configurable security and surveillance system via a network connection and/or via machine-readable media. Instep528, decryption keys may be requested and obtained from the e-commerce feature vendor for device programming files that are encrypted. The decryption keys may be provided to the configurable security and surveillance system via a network connection and/or via machine-readable media.
Instep530, the encrypted device programming files may be decrypted by utilizing the decryption keys received instep528. Instep532, the device programming files may be transferred to the programmable content analysis agents to program the configurable devices. Instep534, the programming of the configurable devices in the programmable content analysis agents may be verified. Instep536, a user and/or installer of the configurable security and surveillance system may determine whether new, additional, and/or upgraded features may be necessary in at least one programmable content analysis agent. When a user may find new, additional, and/or upgraded features necessary, theflow chart520 may proceed to step524 where new, additional, and/or upgraded features may be selected. When a user may not require new, additional, and/or upgraded features, theflow chart520 may proceed to endstep538.
FIG. 6A illustrates an exemplary network comprising a residential configurable security and surveillance system, in accordance with an embodiment of the invention. Referring toFIG. 6A, there is shown anetwork600 that comprises a residential configurable security andsurveillance system602 substantially as described inFIGS. 2A-2C, amobile phone604, awireless center626, a personal digital assistant (PDA)606, aschool608, asatellite link610, anemergency agency612, apolice center614, ahome616, at least onecore router618, at least onegate router620, acommercial entity624, a security and surveillance features vendor (SSFV)300 as described inFIG. 3, and a TCP/IP network128 as described inFIG. 1B. The residential configurable security andsurveillance system602 may be adapted to provide security functions for a home and/or small commercial entities.
In operation, theSSFV300 may provide device programming files and/or decryption keys to configure the configurable security andsurveillance system602 via the TCP/IP network128 and the network of at least onegate router620 and at least onecore router618. The features provided by the device programming files may support access to the configurable security andsurveillance system602 via themobile phone604 and/or thePDA606 to a user. The user may utilize themobile phone604 and/or thePDA606 as an interface to control at least a portion of the operations and/o display at least a portion of the contents generated by the configurable security andsurveillance system602. In this regard, the user may utilize the network of at least onegate router620 and at least onecore router618 to communicatively couple thewireless center626 and the configurable security andsurveillance system602.
The configurable security andsurveillance system602 may be adapted to generate appropriate emergency signals and/or alarms to, for example, theschool608, thesatellite link610, theemergency agency612, thepolice center614, thecommercial entity624, and/or at least onehome616 in accordance with the features configured into the residential configurable security andsurveillance system602. For example, security breaches may be reported to any of these locations in accordance to the features supported by the residential configurable security andsurveillance system602. The types of security breaches and/or the locations to which the appropriate emergency signals are sent may depend on the security features received from theSSFV300.
FIG. 6B illustrates an exemplary network comprising a commercial configurable security and surveillance system, in accordance with an embodiment of the invention. Referring toFIG. 6B, there is shown anetwork630 that differs from thenetwork600 inFIG. 6A in that a commercial configurable security andsurveillance system622 is utilized. The commercial configurable security andsurveillance system602 may be adapted to provide security functions for a large commercial entities and/or governmental entities. In this regard, the commercial configurable security andsurveillance system622 may be adapted to support a large number and wide range of programmable sensor agents and programmable content analysis agents. Moreover, new, additional, and/or upgraded features may be provided periodically and/or routinely by theSSFV300 as a result of a commercial agreement.
The approach described herein may result in more effectively and/or efficiently integrated security and surveillance systems. The use of configurable devices in the programmable sensor agents and the programmable content analysis agents provides significant flexibility in the system architecture and may also increase the length of operation of a security and surveillance system before significant investments are required. In this regard, a user may determine the security functions and features necessary to their security operations while maintaining the ability to add and/or modify their security operations without having to replace significant portions of their existing hardware and/or software.
Accordingly, the present invention may be realized in hardware, software, or a combination of hardware and software. The present invention may be realized in a centralized fashion in at least one computer system, or in a distributed fashion where different elements are spread across several interconnected computer systems. Any kind of computer system or other apparatus adapted for carrying out the methods described herein is suited. A typical combination of hardware and software may be a general-purpose computer system with a computer program that, when being loaded and executed, controls the computer system such that it carries out the methods described herein.
The present invention may also be embedded in a computer program product, which comprises all the features enabling the implementation of the methods described herein, and which when loaded in a computer system is able to carry out these methods. Computer program in the present context means any expression, in any language, code or notation, of a set of instructions intended to cause a system having an information processing capability to perform a particular function either directly or after either or both of the following: a) conversion to another language, code or notation; b) reproduction in a different material form.
While the present invention has been described with reference to certain embodiments, it will be understood by those skilled in the art that various changes may be made and equivalents may be substituted without departing from the scope of the present invention. In addition, many modifications may be made to adapt a particular situation or material to the teachings of the present invention without departing from its scope. Therefore, it is intended that the present invention not be limited to the particular embodiment disclosed, but that the present invention will include all embodiments falling within the scope of the appended claims.