Security system

a security system and security technology, applied in the field of premises security systems and methods, can solve problems such as difficult installation, inability to adapt to changing security needs, and inability to easily scale up or down

Inactive Publication Date: 2012-03-29
STUECKER BARRY
View PDF0 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Although existing security systems are adequate, they are expensive, difficult to install, often require the services of specialized offsite security monitoring stations, and are not easily scalable or adaptable to meet changing security needs.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security system
  • Security system
  • Security system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0015]Turning now to the drawings, in which like reference characters indicate corresponding elements throughout the several views, attention is first directed to FIG. 1 in which there is seen a partially schematic perspective view of a security system 10 incorporated with a building 11 for providing security in a vicinity 12 of building 11. In FIG. 1, building 11 is a man-made structure used or intended for supporting or sheltering any use or continuous occupancy, and is constructed of conventional and readily available building materials and techniques. For orientation and reference purposes, building has opposed front and rear ends 15 and 16 and opposed sides 17 and 18 formed by upstanding walls, and a roof 19 forming the top covering of building 11, the purpose of which is primarily to shed water from building 11 and to shelter the interior of building 11. According to conventional practice, building 11 is fashioned with electrical wiring for conducting alternating current elect...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

A security system includes an alternating electric current powered motion sensor assembly, and a direct electric powered security module incorporating a storage device. A digital camera includes a digital camera mechanism associated with the security module, and a digital camera lens associated with the motion sensor assembly. Wiring coupled between the motion sensor assembly and the security module provides alternating current to the motion sensor assembly and the security module. A transformer converts the alternating current from the wiring to direct current electric and supplies the direct current to the security module. The digital camera mechanism is responsive to activation of the motion sensor assembly detecting motion in a vicinity of the motion sensor assembly activating the camera lens to make digital imagery of an area in the vicinity, receiving the digital imagery made by the camera lens over the wiring, and storing the digital imagery in the storage device.

Description

TECHNICAL FIELD[0001]The present invention relates to premises security systems and methods.BACKGROUND ART[0002]Security is the condition of being protected against danger or loss. In the general sense, security is a concept similar to safety. The nuance between the two is an added emphasis on being protected from dangers that originate from outside. Individuals or actions that encroach upon the condition of protection are responsible for the breach of security.[0003]There is an immense literature on the analysis and categorization of security. Part of the reason for this is that, in most security systems, the “weakest link in the chain” is the most important. The situation is asymmetric since the defender must cover all points of attack while the attacker can simply identify a single weak point upon which to concentrate their efforts.[0004]Premises security describes measures that prevent or deter attackers or intruders from accessing a home or business. Due to the importance peopl...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(United States)
IPC IPC(8): H04N7/18
CPCF21V23/0442F21V33/0076G08B13/19626G08B25/06G08B13/19673G08B13/19684G08B13/19658
Inventor STUECKER, BARRY
Owner STUECKER BARRY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products