Browse Prior Art Database

Method for Security Monitoring of Undesirable Behavior

IP.com Disclosure Number: IPCOM000114226D
Original Publication Date: 1994-Nov-01
Included in the Prior Art Database: 2005-Mar-28
Document File: 2 page(s) / 98K

Publishing Venue

IBM

Related People

Bolle, RM: AUTHOR [+2]

Abstract

Data on the XY location of people in an area (e.g., prison, school, mall) is used in conjunction with video cameras and displays in order to provide security personnel with a better means of monitoring crowds. A display shows the XY locations of all people overlaid on a floorplan. The security person clicks on any person to be monitored. Images of the best view of each such monitored person are routed to specific monitors and Video Cassette Recorders (VCRs). As each monitored person passes from the coverage of one camera to another, the system automatically switches coverage. Many more people are thus monitored effectively by a smaller number of security people.

This text was extracted from an ASCII text file.
This is the abbreviated version, containing approximately 52% of the total text.

Method for Security Monitoring of Undesirable Behavior

      Data on the XY location of people in an area (e.g., prison,
school, mall) is used in conjunction with video cameras and displays
in order to provide security personnel with a better means of
monitoring crowds.  A display shows the XY locations of all people
overlaid on a floorplan.  The security person clicks on any person to
be monitored.  Images of the best view of each such monitored person
are routed to specific monitors and Video Cassette Recorders (VCRs).
As each monitored person passes from the coverage of one camera to
another, the system automatically switches coverage.  Many more
people are thus monitored effectively by a smaller number of security
people.

      Undesirable behavior is a problem in many defined areas, e.g.,
prisons, schools, stadiums, malls, stores.  One standard
countermeasure is the use of security people (e.g., store detectives)
who monitor suspicious individuals ("risks"), either directly or
through closed circuit video systems.  This invention proposes a new
method whereby each security person could monitor several people at
once.

      Through the use of an electronic transponder attached to an
individual, it is possible to monitor the XY location of that
individual within an established area.  Such techniques are already
commonplace in connection with GPS Global Positioning Systems, which
use satellites to monitor multiple transponders to a precision of
about 3 feet anywhere on the earth's surface.  The straightforward
cost reduction of such techniques is occurring, so that XY tracking
of individuals will be inexpensive in the near term, provided that
the individuals are willing to wear transponders.

      In certain settings (e.g., prisons and schools), people who are
suspected of having the intention to engage in undesirable behavior
can be COMPELLED to were such transponders.  In other settings (e.g.,
stadiums, malls, and stores), people will not be willing to wear such
transponders.  However, alternative XY tracking methods may be
invented in the future that will be applicable to these environments.
Among technologies that in the next 5 years might provide a solution
to passive tracking are: gates, arrays of sensors in the floor,
arrays of sensors in the ceiling, video cameras in the ceiling or
walls combined with machine vision, electronic identification tags on
the people or on their shopping carts or baskets, etc., as well as
various combinations of these.

      The current invention does NOT propose t...