DETAILED ACTION
The present application, filed on or after March 16, 2013, is being examined under the first inventor to file provisions of the AIA .
A request for continued examination under 37 CFR 1.114, including the fee set forth in 37 CFR 1.17(e), was filed in this application after final rejection. Since this application is eligible for continued examination under 37 CFR 1.114, and the fee set forth in 37 CFR 1.17(e) has been timely paid, the finality of the previous Office action has been withdrawn pursuant to 37 CFR 1.114. Applicant’s submission filed on 12/04/2025 has been entered.
Response to Arguments
Applicant's arguments with respect to the rejections of claims 1 and 3-31 under AIA 35 U.S.C. 103 have been considered but are moot in view of new grounds of rejection.
Response to Amendment
Claim Rejections - 35 USC § 112
The following is a quotation of the first paragraph of 35 U.S.C. 112(a):
(a) IN GENERAL.—The specification shall contain a written description of the invention, and of the manner and process of making and using it, in such full, clear, concise, and exact terms as to enable any person skilled in the art to which it pertains, or with which it is most nearly connected, to make and use the same, and shall set forth the best mode contemplated by the inventor or joint inventor of carrying out the invention.
5. Claims 1 and 3-21 are rejected under 35 U.S.C. 112(a) as failing to comply with the written description requirement. The claims contain subject matter which was not described in the specification in such a way as to reasonably convey to one skilled in the relevant art that the inventor or a joint inventor, at the time the application was filed, had possession of the claimed invention.
Claims 1, 6, 11, and 20 each recites “wherein, before detection of the detected event, the video surveillance system is configured to receive customization of the predetermined manner by the user of the video surveillance system, wherein the customization of the predetermined manner is configured to set a time period related to occurrence of the event based on an event type".
Paragraphs 0022, 0023, and 0032 of the original specification (PG Publication 2025/0225862) disclose (i) Users may customize the predetermined device to actuate in a predetermined manner in response to detection of predetermined situations, (ii) Users may customize the size of the event corresponding to the type of event. The users are also able to investigate the incident using the appropriate video footage after the incident, and (iii) Users may customize the notification destination and size of the detected entire events in the look-up table. However, none of the claimed feature “wherein, before detection of the detected event, the video surveillance system is configured to receive customization of the predetermined manner by the user of the video surveillance system, wherein the customization of the predetermined manner is configured to set a time period related to occurrence of the event based on an event type” is found in the original specification and drawings.
Therefore, the claimed feature “wherein, before detection of the detected event, the video surveillance system is configured to receive customization of the predetermined manner by the user of the video surveillance system, wherein the customization of the predetermined manner is configured to set a time period related to occurrence of the event based on an event type” as recited in claims 1, 6, 11, and 20 and their respective dependent claims do not have support in the original specification and the drawings.
Claim Rejections - 35 USC § 103
6. The text of those sections of Title 35, U.S. Code not included in this section can be found in a prior Office action.
7. Claims 1, 3-4, 6-9, 11-15, 17, 19-25, 27, and 29-31 are rejected under AIA 35 U.S.C. 103 as being unpatentable over Monroe (US Patent 6,970,183) in view of Wilson et al. (US Publication 2013/0297748), and further in view of Finkel et al. (US Publication 2017/0116434) and Tampke (US Publication 2010/0033318).
Regarding claim 1, Monroe discloses a video surveillance system comprising:
at least one memory storing instructions; a surveillance image sensor; a sensor generating sensor data; and at least one processor coupled to the at least one memory (Monroe, col. 22, lines 5-11, fig’s 1-6, surveillance system with processor, instruction storing memory, and sensors), the at least one processor configured to execute the instructions to:
detect an event in a predetermined surveillance area based on the sensor data generated by the sensor (Monroe, col. 5, lines 37-39, a system that can collect, process and transmit essential information for surveying and monitoring a selected zone or area; col. 7, lines 50-56, detecting event based on sensor data);
receive a plurality of images corresponding to the detected event captured by the surveillance image sensor (Monroe, col. 7, lines 50-56, receiving audio, video, image data, and/or sensor data continuously, periodically as programmed, upon activation of panic button, or upon event detection such as by motion detection, or detection by an independent system that is in communication with the surveillance system);
determine a type of the detected event (Monroe, col. 18, lines 50-61, detecting type of event);
generate an alarm notification, wherein the alarm notification identifies the detected event and the type of the detected event; transmit the alarm notification to a predetermined destination based on information provided by a user of the video surveillance system (Monroe, col. 28, lines 23-25, detection of an event would trigger a specified unique "alarm" for that condition to be transmitted back to other elements of the system; the special unique alarm implies that different types of events call for different types of alarms; col. 18, lines 55-61, when an event occurs, a notification can be sent to the roving officer while on rounds with the type of event, the location and supplied with other multimedia data such as images and/or maps and/or audio);
control to actuate a predetermined device in a predetermined manner based on the detected event (Monroe, col. 28, lines 23-25, detection of an event would trigger a specified unique "alarm" for that condition to be transmitted back to other elements of the system; col. 28, lines 52-64, the camera system shown has full 360 degree field of view capability which may be controlled manually by remote control signals, and may be programmed to pan the area on a time sequence, may track a moving object by sensing its presence, or manually. The object may be automatically followed utilizing the control features of the camera as described above. The camera may also be manually controlled to follow the action from a remote station. For example, the zoom feature may be used to take a close up of the subject. A wide angle or the tilt feature may be used to view the environment to determine surrounding activity such as the presence of a second person in the room. The range finder 566 permits the tracking system to locate objects in a precise manner and then provide control signals to permit accurate surveillance and monitoring of same, such as positioning of sensor elements or zooming the camera by controlling/actuating motorized zoom lens 558 as shown in fig. 38).
Monroe does not explicitly disclose:
wherein the alarm notification is transmitted to the predetermined destination when the event is determined to have occurred;
obtain information indicating the predetermined manner in which a predetermined device is to be actuated, wherein, before detection of the detected event, the video surveillance system is configured to receive customization of the predetermined manner by the user of the video surveillance system, wherein the customization of the predetermined manner is configured to set a time period related to occurrence of the event based on an event type
Wilson discloses wherein the alarm notification is transmitted to the predetermined destination when the event is determined to have occurred (Wilson, para. 0098, in addition to passing alarm messages to designated destinations, the message management facility 100 is capable of: dynamically adjusting alarm priorities in response to messages identifying sensed events and operation mode (e.g., standby, startup, run, etc.) transitions; invoking a command (performed either locally or on another node coupled to the application network 104) in response to a particular received alarm message).
It would have been obvious to one of ordinary skill in the art before the effective filing date of the claimed invention to incorporate Wilson’s features into the system of Monroe for providing an effective event warning system by presetting alarm notification receiving destinations.
Monroe-Wilson does not explicitly disclose:
obtain information indicating the predetermined manner in which a predetermined device is to be actuated, wherein, before detection of the detected event, the video surveillance system is configured to receive customization of the predetermined manner by the user of the video surveillance system, wherein the customization of the predetermined manner is configured to set a time period related to occurrence of the event based on an event type.
Finkel discloses obtain information indicating the predetermined manner in which a predetermined device is to be actuated, wherein, before detection of the detected event, the video surveillance system is configured to receive customization of the predetermined manner by the user of the video surveillance system (Finkel, para. 0047, the control center CCC utilizes data over time to detect and calculate trends and future events in the clustered events. In this regard, personnel in the control center CCC may be alerted before such events occur when a specified level of probability is reached. Also, as discussed in more detail below, the control center CCC displays (e.g. LCD display) alerts (in addition to normal activity) which reflect events or incidents that are being monitored. The alerts may be used by personnel to contact emergency personnel or provide field intervention, and may by automatically supplied by the control center CCC if authorized personnel do not respond to such alerts within a given time period or after reoccurring alerts; para. 0061, using the predictive and prescriptive module, based on past events contained in historical data of measurements and events, patterns may be generated and used from the historical data to assist in predicting future events or incidents before the sensors and data collectors begin to register data. Using this predictive data, the control center CCC and personnel operating the control center CCC could be alerted to predicted “hot areas” for theft identified by the system using data in the system, such as time of day, day of week, month or specific dates, weather conditions, previous event sequences, and the like. For example, based on a predicted “hot area”, UAV devices could be deployed to capture images and display video, i.e., predetermined devices to be operated for capturing and displaying images, and intervention teams could be stationed nearby so that the event may be prevented. Additionally, the data management system may instruct the control center CCC to automatically display data from the “probable” areas where events are likely to occur “predetermined device to display data”, so that personnel may inspect the data and video from those areas to detect anomalies and activities in advance of any occurrence).
It would have been obvious to one of ordinary skill in the art before the effective filing date of the claimed invention to incorporate Finkel’s features into the system of Monroe-Wilson for effectively setting up action plan in preparation for specific event that may occur during monitoring operation.
Monroe-Wilson-Finkel does not explicitly disclose but Tampke discloses wherein the customization of the predetermined manner is configured to set a time period related to occurrence of the event based on an event type (Tampke, claim 20, the sensor measures a second value of the particular operating parameter after a predetermined time period has elapsed from a time the alarm event was detected, and wherein: the event detection module is further configured to compare the threshold data to the second value to detect the event; the report module is further configured to generate a third notification comprising a second alarm message when the second value is greater than the maximum value or is less than the minimum value; and the data modem is further configured to transmit the third notification comprising the second value to the telecommunication device via the second communication network using the second communication protocol).
It would have been obvious to one of ordinary skill in the art before the effective filing date of the claimed invention to incorporate Tampke’s features into the system of Monroe-Wilson-Finkel for providing an effective event notification system while avoiding potential false alarms.
Regarding claim 3, Monroe-Wilson-Finkel-Tampke discloses the video surveillance system according to claim 1, wherein the at least one processor is configured to execute the instructions to: determine a location of the detected event (Monroe, col. 28, lines 8-12, position information).
Regarding claim 4, Monroe-Wilson-Finkel-Tampke discloses the video surveillance system according to claim 1, wherein the sensor data is based on sound detected by a microphone and the type of the detected event is determined based on the sound (Monroe, col. 19, lines 45-46, audio sensor with microphone).
Claims 6-9 are rejected for the same reasons set forth in claims 1-4.
Regarding claim 11, Monroe discloses a security control system comprising: at least one memory storing instructions; and at least one processor coupled to the at least one memory (Monroe, col. 22, lines 5-11, fig’s 1-6, surveillance system with processor, instruction storing memory, and sensors), the at least one processor configured to execute the instructions to:
detect that a predetermined event customized by a user of the security control system occurred in a surveillance area by using sensor data; identify a type of the predetermined detected event (Monroe, col. 5, lines 37-39, a system that can collect, process and transmit essential information for surveying and monitoring a selected zone or area; col. 7, lines 50-56, detecting event indicated by the surveillance system based on sensor data; col. 18, lines 50-61, detecting/identifying event type; it is noted that presetting event types by a user of a surveillance system is well known in the art, see Choi et al, US Publication 2009/0086041, para’s 0024 and 0032, sensing an object or situation of a user’s interest; the type information indicates one of pre-stored event types, such as an event of a fire, an event of an intrusion, etc.);
send an alarm to a destination based on association of the identified type of the predetermined detected event and alarm settings, wherein the security control system is further configured to receive customization of the alarm settings by the user of the security control (Monroe, col. 28, lines 23-25, detection of an event would trigger a specified unique "alarm" for that condition to be transmitted back to other elements of the system; the special unique alarm implies that different types of events call for different types of alarms, and that information regarding respective unique alarm for each type of event can be obtained, i.e., customization; col. 18, lines 55-61, when an event occurs, a notification can be sent to the roving officer while on rounds “alarm setting indicates notification be sent to roving officer” with the type of event, the location and supplied with other multimedia data such as images and/or maps and/or audio; it is implicit that the system or its user designates the roving officer to receive the alarm notification; it is noted that configuring the system to receive customization of the alarm settings by the user of the security control system is well-known in the art as is evidenced by Finkel et al. cited below, US Publication 2017/0116434, para. 0050, monitoring alerts is performed, creating alerts and decisions are provided based on the clustered events generated from the data managements system; para. 0053, verify whether alerts are accurate for the type of event (e.g. whether an explosion occurs, material is stolen), and drones can be mobilized and sent to a specific region related to the alerts to verify and can provide visualization to enhance the value of the analysis of the clustered events).
Monroe does not explicitly disclose but Finkel discloses:
obtain information indicating a predetermined manner in which at least one predetermined device is to be actuated, wherein the security control system is configured to receive customization of the predetermined manner by the user of the security control system before the detected event is detected (Finkel, para. 0047, the control center CCC utilizes data over time to detect and calculate trends and future events in the clustered events. In this regard, personnel in the control center CCC may be alerted before such events occur when a specified level of probability is reached. Also, as discussed in more detail below, the control center CCC displays (e.g. LCD display) alerts (in addition to normal activity) which reflect events or incidents that are being monitored. The alerts may be used by personnel to contact emergency personnel or provide field intervention, and may by automatically supplied by the control center CCC if authorized personnel do not respond to such alerts within a given time period or after reoccurring alerts; para. 0061, using the predictive and prescriptive module, based on past events contained in historical data of measurements and events, patterns may be generated and used from the historical data to assist in predicting future events or incidents before the sensors and data collectors begin to register data. Using this predictive data, the control center CCC and personnel operating the control center CCC could be alerted to predicted “hot areas” for theft identified by the system using data in the system, such as time of day, day of week, month or specific dates, weather conditions, previous event sequences, and the like. For example, based on a predicted “hot area”, UAV devices could be deployed to capture images and display video, i.e., predetermined devices to be operated for capturing and displaying images, and intervention teams could be stationed nearby so that the event may be prevented. Additionally, the data management system may instruct the control center CCC to automatically display data from the “probable” areas where events are likely to occur “predetermined device to display data”, so that personnel may inspect the data and video from those areas to detect anomalies and activities in advance of any occurrence);
actuate the at least one predetermined device in the predetermined manner based on the identified type of the predetermined detected event in the surveillance area (Finkel, para. 0060, the event probability is sent to the control center CCC along with a recommendation “alert”, such as “Theft possible in Pipeline Section 452, send intervention team to Sector D.” The control center CCC may respond in any number of ways, including, but not limited to, the following: request additional data display for the indicated area in which the event (incident) has occurred; direct drones (UAVs) to the affected area for surveillance or capturing information or for visualization, i.e., actuate device in a predetermined manner based on the event type, dispatch intervention teams or humans (such as police, fireman,…) to the area to check out the event or what happens in the field; or order an evacuation of personnel in the field depending on what happens, for example explosion on site during petrol extraction).
It would have been obvious to one of ordinary skill in the art before the effective filing date of the claimed invention to incorporate Finkel’s features into the system of Monroe for effectively transmitting alarm notification and setting up action plan in response to specific event that may occur or has occurred.
Regarding claim 12, Monroe-Wilson-Finkel-Tampke discloses the security control system according to claim 11, wherein the at least one processor is configured to execute the instructions to: monitor for the predetermined events in the surveillance area set by the user (Monroe, col. 5, lines 37-39, a system that can collect, process and transmit essential information for surveying and monitoring a selected zone or area; col. 18, lines 50-61, detecting type of event).
Regarding claim 13, Monroe-Wilson-Finkel-Tampke discloses the security control system according to claim 11, wherein the at least one processor is configured to execute the instructions to: determine a detection time of the predetermined detected event (Monroe, col. 5, lines 57-62, identifying the time and location of the event for permitting an appropriate response, col. 7, lines 1-2, time stamping events).
Regarding claim 14, Monroe-Wilson-Finkel-Tampke discloses the security control system according to claim 11, wherein the at least one processor is configured to execute the instructions to: determine a location of the predetermined detected event (Monroe, col. 28, lines 8-12, position information).
Regarding claim 15, Monroe-Wilson-Finkel-Tampke discloses the security control system according to claim 11, wherein the sensor data is based on sound detected by a microphone and the type of the predetermined detected event is determined based on the sound (Monroe, col. 19, lines 45-46, audio sensor with microphone).
Regarding claim 17, Monroe-Wilson-Finkel-Tampke discloses the security control system according to claim 11, wherein the at least one processor is configured to execute the instructions to: send a notification message to the user as security alert as a response to the predetermined detected event in the surveillance area (Monroe, col. 28, lines 23-25, detection of an event would trigger a specified unique "alarm" for that condition to be transmitted back to other elements of the system; the special unique alarm implies that different types of events call for different types of alarms; col. 18, lines 55-61, when an event occurs, the roving officer can be notified while on rounds with the type of event, the location and supplied with other multimedia data such as images and/or maps and/or audio; as this feature is known in the art, see also Leblond, US Publication 2011/0013018, para. 0013, the detection capabilities may be used to detect events or occurrences as desired. The response capabilities may then be used to provide a variety of responses to the event. The responses may be based on characteristics of the event. For example, the response may depend on the type of event, the location of the event, or both; para. 0146, As will be described, responses may be a variety of actions taken by the surveillance system as the result of a detected event. A response may be made such as one or more alarms, warnings, or notifications like those described above; para. 0093, a viewing node 500 may also display or emit various alarms or warnings).
Regarding claim 19, Monroe-Wilson-Finkel-Tampke discloses the security control system according to claim 11, wherein the predetermined device comprises at least one of a surveillance camera, a display device, a light switch controller, and an audio device (Finkel, para. 0061, a camera on a UAV, a display device).
The motivation to combine the references and obviousness arguments are the same as claim 11.
Regarding claim 20, Monroe-Wilson-Finkel-Tampke discloses the security control system according to claim 11, wherein the type of the predetermined detected event is determined to be fire or theft based on the sensor data (Monroe, col. 8, lines 9-11, a fire event).
Claims 21-25, 27 and 29-30 are rejected the same reasons set forth in claim 11-15 and 17 and 19-20.
Regarding claim 31, Monroe-Wilson-Finkel-Tampke discloses the security control system according to claim 11, wherein the alarm settings are defined by type of the predetermined detected event (Finkel, para. 0053, creating alerts and providing decisions based on the clustered events generated from the data managements system).
The motivation to combine the references and obviousness arguments are the same as claim 11.
8. Claims 5, 10, 16 and 26 are rejected under AIA 35 U.S.C. 103 as being unpatentable over Monroe-Wilson-Finkel-Tampke, as applied to claims 4, 9, 15 and 25 above, in view of Poder (US Publication 2003/0185419).
Regarding claim 5, Monroe-Wilson-Finkel-Tampke discloses the video surveillance system according to claim 4.
Monroe-Wilson-Finkel-Tampke does not explicitly disclose but Poder discloses wherein the type of the detected event is determined to be breaking of glass and the breaking of the glass is detected based on the sound (Poder, para. 0030, a glass break sensor 330 that is configured to detect the sound associated with a window or other glass object breaking at the premises).
It would have been obvious to one of ordinary skill in the art before the effective filing date of the claimed invention to incorporate Poder’s features into the system of Monroe-Wilson-Finkel-Tampke for enhancing surveillance operation by detecting a wide variety of events.
Claims 10, 16, and 26 are rejected for the same reasons set forth in claim 5.
9. Claims 18 and 28 are rejected under AIA 35 U.S.C. 103 as being unpatentable over Monroe-Wilson-Finkel-Tampke, as applied to claims 11 and 21 above, in view of Sumitomo (US Publication 2003/0185419)
Regarding claim 18, Monroe-Wilson-Finkel-Tampke discloses the security control system according to claim 11.
Monroe-Wilson-Finkel-Tampke does not explicitly disclose but Sumitomo discloses wherein the at least one processor is configured to execute the instructions to: modify a field of view of a surveillance camera (Sumitomo, para’s 0065-0081, fig’s 8b-8d, a surveillance system detects the presence of an intruder in a surveillance area utilizing an infrared sensor; fig. 40, col. 27, lines 25-39, setting imaging range based on location of infrared sensor based on the location and position of the detected intruder, control the range of the camera system by at least switching/actuating the camera between enlargement mode and wide angle mode “modifying field of view”).
It would have been obvious to one of ordinary skill in the art before the effective filing date of the claimed invention to incorporate Sumitomo’s features into the system of Monroe-Wilson-Finkel-Tampke for enhancing surveillance operation by capturing more accurate pictures of the event condition.
Claim 28 is rejected for the same reasons set forth in claim 18.
10. Claims 1, 3-4, 6-9, 11-15, 17, 19-25, 27, and 29-31 are rejected under AIA 35 U.S.C. 103 as being unpatentable over Choi et al. (US Publication 2009/0086041) in view of Finkel et al. (US Publication 2017/0116434).
Regarding claim 1, Choi discloses a video surveillance system comprising:
at least one memory storing instructions; a surveillance image sensor; a sensor generating sensor data; and at least one processor coupled to the at least one memory (Choi, fig. 4, para’s 0045-0047, camera driving unit in connection with store unit and controller issues an operation instruction or a photographing instruction to the camera device 400 so that the camera device 400 can capture a current situation at a current position of the tilt motor and the pan motor of the camera), the at least one processor configured to execute the instructions to:
detect an event in a predetermined surveillance area based on the sensor data generated by the sensor (Choi, para’s 0012-0013, a system for sensing whether an event occurs or not in a corresponding area and transmitting position information on the corresponding area and type information on the event; para. 0031, one or more sensor nodes connected with one another through wireless links senses a position of an object and checks whether an event occurs or not and then detects an event and obtains event type information; para. 0032, the type information indicates one of pre-stored event types, such as an event of a fire, an event of an intrusion, etc.);
receive a plurality of images corresponding to the detected event captured by the surveillance image sensor (Choi, para’s 0012-0013 and 0024, receiving event images that are captured and transmitted from the cameras);
determine a type of the detected event (Choi, para. 0031, one or more sensor nodes connected with one another through wireless links senses a position of an object and checks whether an event occurs or not and then detects an event; the sensor node obtains information relating to the position and type of the event).
Choi does not explicitly disclose:
generate an alarm notification, wherein the alarm notification identifies the detected event and the type of the detected event;
transmit the alarm notification to a predetermined destination based on information provided by a user of the video surveillance system;
obtain information indicating the predetermined manner in which a predetermined device is to be actuated, wherein the video surveillance system is configured to receive customization of the predetermined manner by the user of the video surveillance system before the detected event is detected;
control to actuate the predetermined device in the predetermined manner based on the detected event;
Finkel discloses:
generate an alarm notification, wherein the alarm notification identifies the detected event and the type of the detected event; transmit the alarm notification to a predetermined destination based on information provided by a user of the video surveillance system (Finkel, para. 0060, the event probability is sent to the control center CCC along with a recommendation “alert”, such as “Theft possible in Pipeline Section 452, send intervention team to Sector D.” The control center CCC may respond in any number of ways, including, but not limited to, the following: request additional data display for the indicated area in which the event (incident) has occurred; direct drones (UAVs) to the affected area for surveillance or capturing information or for visualization; dispatch intervention teams or humans (such as police, fireman . . . ) to the area to check out the event or what happens in the field; or order an evacuation of personnel in the field depending on what happens, for example explosion on site during petrol extraction; it is noted that generating an alarm notification that identifies the detected event and the type of the detected event, and transmitting the alarm notification to a predetermined destination based on information provided by a user is well known in the art, see Poder et al., US Publication 2014/0266699, para’s 0056-0060, determining the type of alarm triggered implies that different types of alarms call for different types of responses. The computing device loads a response file selected based on the type of alarm triggered. After loading device computing device polls registered mobile devices to obtain information and forward the appropriate response to the proper device in the appropriate location; para. 0006, based on the mobile device location for the user, the alarm verification call(s) should be placed to the user's mobile phone instead of their home phone; para’s 0042-0050, transmitting event information to user according to user profile information; and Leblond, US Publication 2011/0013018, para. 0013, the detection capabilities may be used to detect events or occurrences as desired. The response capabilities may then be used to provide a variety of responses to the event. The responses may be based on characteristics of the event. For example, the response may depend on the type of event, the location of the event, or both; para. 0146, As will be described, responses may be a variety of actions taken by the surveillance system as the result of a detected event. A response may be made such as one or more alarms, warnings, or notifications like those described above; para. 0093, a viewing node 500 may also display or emit various alarms or warnings).
obtain information indicating the predetermined manner in which a predetermined device is to be actuated, wherein the video surveillance system is configured to receive customization of the predetermined manner by the user of the video surveillance system before the detected event is detected (Finkel, para. 0047, the control center CCC utilizes data over time to detect and calculate trends and future events in the clustered events. In this regard, personnel in the control center CCC may be alerted before such events occur when a specified level of probability is reached. Also, as discussed in more detail below, the control center CCC displays (e.g. LCD display) alerts (in addition to normal activity) which reflect events or incidents that are being monitored. The alerts may be used by personnel to contact emergency personnel or provide field intervention, and may by automatically supplied by the control center CCC if authorized personnel do not respond to such alerts within a given time period or after reoccurring alerts; para. 0061, using the predictive and prescriptive module, based on past events contained in historical data of measurements and events, patterns may be generated and used from the historical data to assist in predicting future events or incidents before the sensors and data collectors begin to register data. Using this predictive data, the control center CCC and personnel operating the control center CCC could be alerted to predicted “hot areas” for theft identified by the system using data in the system, such as time of day, day of week, month or specific dates, weather conditions, previous event sequences, and the like. For example, based on a predicted “hot area”, UAV devices could be deployed to capture images and display video, i.e., predetermined devices to be operated for capturing and displaying images, and intervention teams could be stationed nearby so that the event may be prevented. Additionally, the data management system may instruct the control center CCC to automatically display data from the “probable” areas where events are likely to occur “predetermined device to display data”, so that personnel may inspect the data and video from those areas to detect anomalies and activities in advance of any occurrence).
control to actuate the predetermined device in the predetermined manner based on the detected event (Finkel, para. 0060, the event probability is sent to the control center CCC along with a recommendation “alert”, such as “Theft possible in Pipeline Section 452, send intervention team to Sector D.” The control center CCC may respond in any number of ways, including, but not limited to, the following: request additional data display for the indicated area in which the event (incident) has occurred; direct drones (UAVs) to the affected area for surveillance or capturing information or for visualization; dispatch intervention teams or humans (such as police, fireman . . . ) to the area to check out the event or what happens in the field; or order an evacuation of personnel in the field depending on what happens, for example explosion on site during petrol extraction); and
It would have been obvious to one of ordinary skill in the art before the effective filing date of the claimed invention to incorporate Finkel’s features into the system of Choi for effectively transmitting alarm notification and setting up action plan in response to specific event that may occur or has occurred.
Regarding claim 3, Choi-Finkel discloses the video surveillance system according to claim 1, wherein the at least one processor is configured to execute the instructions to: determine a location of the detected event (Choi, para. 0033, position information).
Regarding claim 4, Choi-Finkel discloses the video surveillance system according to claim 1, wherein the sensor data is based on sound detected by a microphone and the type of the detected event is determined based on the sound (Choi, para. 0006, sound sensor includes microphone).
Claim 6-9 are rejected for the same reasons set forth in claims 1-4.
Regarding claim 11, Choi discloses the security control system comprising: at least one memory storing instructions; and at least one processor coupled to the at least one memory, the at least one processor configured to execute the instructions to:
detect that a predetermined event customized by a user of the security control system occurred in a surveillance area by using sensor data; identify a type of the predetermined detected event (Choi, para. 0031, a monitoring system comprising cameras and one or more sensor nodes connected with one another for sensing a position of an object and checking whether an event occurs or not, and then detecting an event and obtains event type information; para. 0032, the type information indicates one of pre-stored event types, such as an event of a fire, an event of an intrusion, etc.; pre-stored event types can obviously be set by a user).
Choi does not explicitly disclose but Finkel discloses:
obtain information indicating a predetermined manner in which at least one predetermined device is to be actuated, wherein the security control system is configured to receive customization of the predetermined manner by the user of the security control system before the detected event is detected (Finkel, para. 0047, the control center CCC utilizes data over time to detect and calculate trends and future events in the clustered events. In this regard, personnel in the control center CCC may be alerted before such events occur when a specified level of probability is reached. Also, as discussed in more detail below, the control center CCC displays (e.g. LCD display) alerts (in addition to normal activity) which reflect events or incidents that are being monitored. The alerts may be used by personnel to contact emergency personnel or provide field intervention, and may by automatically supplied by the control center CCC if authorized personnel do not respond to such alerts within a given time period or after reoccurring alerts; para. 0061, using the predictive and prescriptive module, based on past events contained in historical data of measurements and events, patterns may be generated and used from the historical data to assist in predicting future events or incidents before the sensors and data collectors begin to register data. Using this predictive data, the control center CCC and personnel operating the control center CCC could be alerted to predicted “hot areas” for theft identified by the system using data in the system, such as time of day, day of week, month or specific dates, weather conditions, previous event sequences, and the like. For example, based on a predicted “hot area”, UAV devices could be deployed to capture images and display video, i.e., predetermined devices to be operated for capturing and displaying images, and intervention teams could be stationed nearby so that the event may be prevented. Additionally, the data management system may instruct the control center CCC to automatically display data from the “probable” areas where events are likely to occur “predetermined device to display data”, so that personnel may inspect the data and video from those areas to detect anomalies and activities in advance of any occurrence);
actuate the at least one predetermined device in the predetermined manner based on the identified type of the predetermined detected event in the surveillance area (Finkel, para. 0060, the event probability is sent to the control center CCC along with a recommendation “alert”, such as “Theft possible in Pipeline Section 452, send intervention team to Sector D.” The control center CCC may respond in any number of ways, including, but not limited to, the following: request additional data display for the indicated area in which the event (incident) has occurred; direct drones (UAVs) to the affected area for surveillance or capturing information or for visualization; dispatch intervention teams or humans (such as police, fireman,…) to the area to check out the event or what happens in the field; or order an evacuation of personnel in the field depending on what happens, for example explosion on site during petrol extraction).
send an alarm to a destination based on association of the identified type of the predetermined detected event and alarm settings, wherein the security control system is further configured to receive customization of the alarm settings by the user of the security control (Finkel, para. 0060, the event probability is sent to the control center CCC along with a recommendation “alert”, such as “Theft possible in Pipeline Section 452, send intervention team to Sector D.” The control center CCC may respond in any number of ways, including, but not limited to, the following: request additional data display for the indicated area in which the event (incident) has occurred; direct drones (UAVs) to the affected area for surveillance or capturing information or for visualization; dispatch intervention teams or humans (such as police, fireman . . . ) to the area to check out the event or what happens in the field; or order an evacuation of personnel in the field depending on what happens, for example explosion on site during petrol extraction; it is also noted that generating an alarm notification that identifies the detected event and the type of the detected event, and transmitting the alarm notification to a predetermined destination based on information provided by a user is well known in the art, see Poder et al., US Publication 2014/0266699, para’s 0056-0060, determining the type of alarm triggered implies that different types of alarms call for different types of responses. The computing device loads a response file selected based on the type of alarm triggered. After loading device computing device polls registered mobile devices to obtain information and forward the appropriate response to the proper device in the appropriate location; para. 0006, based on the mobile device location for the user, the alarm verification call(s) should be placed to the user's mobile phone instead of their home phone; para’s 0042-0050, transmitting event information to user according to user profile information; and Leblond, US Publication 2011/0013018, para. 0013, the detection capabilities may be used to detect events or occurrences as desired. The response capabilities may then be used to provide a variety of responses to the event. The responses may be based on characteristics of the event. For example, the response may depend on the type of event, the location of the event, or both; para. 0146, As will be described, responses may be a variety of actions taken by the surveillance system as the result of a detected event. A response may be made such as one or more alarms, warnings, or notifications like those described above; para. 0093, a viewing node 500 may also display or emit various alarms or warnings).
It would have been obvious to one of ordinary skill in the art before the effective filing date of the claimed invention to incorporate Finkel’s features into the system of Choi for effectively transmitting alarm notification and setting up action plan in response to specific event that may occur or has occurred.
Regarding claim 12, Choi-Finkel discloses the security control system according to claim 11, wherein the at least one processor is configured to execute the instructions to: monitor for the predetermined events in the surveillance area set by the user (Choi, para. 0021, monitoring events in an area; Finkel, para’s 0060-0061, monitoring events in an area).
The motivation to combine the references and obviousness arguments are the same as claim 11.
Regarding claim 13, Choi-Finkel discloses the security control system according to claim 11, wherein the at least one processor is configured to execute the instructions to: determine a detection time of the predetermined detected event (Finkel, para. 0061, time of day, day of week when the event occurs; it is note that determining time when an event is detected is well known in the art, see Monroe, US Patent 6,970,183, cited above, col. 5, lines 57-62).
The motivation to combine the references and obviousness arguments are the same as claim 11.
Regarding claim 14, Choi-Finkel discloses the security control system according to claim 11, wherein the at least one processor is configured to execute the instructions to: determine a location of the predetermined detected event (Choi, para. 0033, position information).
Regarding claim 15, Choi-Finkel discloses the security control system according to claim 11, wherein the sensor data is based on sound detected by a microphone and the type of the predetermined detected event is determined based on the sound (Choi, para. 0006, sound sensor includes microphone).
Regarding claim 17, Choi-Finkel discloses the security control system according to claim 11, wherein the at least one processor is configured to execute the instructions to: send a notification message to the user as security alert as a response to the predetermined detected event in the surveillance area (Finkel, para. 0060, the event probability is sent to the control center CCC along with a recommendation “alert”, such as “Theft possible in Pipeline Section 452, send intervention team to Sector D.” The control center CCC may respond in any number of ways, including, but not limited to, the following: request additional data display for the indicated area in which the event (incident) has occurred; direct drones (UAVs) to the affected area for surveillance or capturing information or for visualization; dispatch intervention teams or humans (such as police, fireman . . . ) to the area to check out the event or what happens in the field; or order an evacuation of personnel in the field depending on what happens, for example explosion on site during petrol extraction; it is also noted that generating an alarm notification that identifies the detected event and the type of the detected event, and transmitting the alarm notification to a predetermined destination based on information provided by a user is well known in the art, see Poder et al., US Publication 2014/0266699, para’s 0056-0060, determining the type of alarm triggered implies that different types of alarms call for different types of responses. The computing device loads a response file selected based on the type of alarm triggered. After loading device computing device polls registered mobile devices to obtain information and forward the appropriate response to the proper device in the appropriate location; para. 0006, based on the mobile device location for the user, the alarm verification call(s) should be placed to the user's mobile phone instead of their home phone; para’s 0042-0050, transmitting event information to user according to user profile information; and Leblond, US Publication 2011/0013018, para. 0013, the detection capabilities may be used to detect events or occurrences as desired. The response capabilities may then be used to provide a variety of responses to the event. The responses may be based on characteristics of the event. For example, the response may depend on the type of event, the location of the event, or both; para. 0146, As will be described, responses may be a variety of actions taken by the surveillance system as the result of a detected event. A response may be made such as one or more alarms, warnings, or notifications like those described above; para. 0093, a viewing node 500 may also display or emit various alarms or warnings).).
The motivation to combine the references and obviousness arguments are the same as claim 11.
Regarding claim 19, Choi-Finkel discloses the security control system according to claim 11, wherein the predetermined device comprises at least one of a surveillance camera, a display device, a light switch controller, and an audio device (Finkel, para. 0061, a camera on a UAV, a display device).
The motivation to combine the references and obviousness arguments are the same as claim 11.
Regarding claim 20, Choi-Finkel discloses the security control system according to claim 11, wherein the type of the predetermined detected event is determined to be fire or theft based on the sensor data (Choi, para. 0032, a fire event).
Claims 21-25, 17, and 29-30 are rejected the same reasons set forth in claim 11-15, 17, and 19-20.
Regarding claim 31, Choi-Finkel discloses the security control system according to claim 11, wherein the alarm settings are defined by type of the predetermined detected event (Finkel, para. 0053, creating alerts and providing decisions based on the clustered events generated from the data managements system).
The motivation to combine the references and obviousness arguments are the same as claim 11.
11. Claims 5, 10, 16 and 26 are rejected under AIA 35 U.S.C. 103 as being unpatentable over Choi-Finkel, as applied to claims 4, 9, 15 and 25 above, in view of Poder et al. (US Publication 2014/0266699).
Regarding claim 5, Choi-Finkel discloses the video surveillance system according to claim 4.
Choi-Finkel does not explicitly disclose but Poder discloses wherein the type of the detected event is determined to be breaking of glass and the breaking of the glass is detected based on the sound (Poder, para. 0030, a glass break sensor 330 that is configured to detect the sound associated with a window or other glass object breaking at the premises).
It would have been obvious to one of ordinary skill in the art before the effective filing date of the claimed invention to incorporate Poder’s features into the system of Choi-Finkel for enhancing surveillance operation by detecting a wide variety of events.
Claim 10 is rejected for the same reasons set forth in claim 5.
Regarding claim 16, Choi-Finkel discloses the security control system according to claim 15.
Choi-Finkel does not explicitly disclose but Poder discloses wherein the type of the predetermined detected event is determined to be breaking of glass and the breaking of the glass is detected based on the sound (Poder, para. 0030, a glass break sensor 330 that is configured to detect the sound associated with a window or other glass object breaking at the premises).
It would have been obvious to one of ordinary skill in the art before the effective filing date of the claimed invention to incorporate Poder’s features into the system of Choi-Finkel for effectively detecting specific event types using sound sensor.
Claim 26 is rejected for the same reasons set forth in claim 16.
12. Claims 18 and 28 are rejected under AIA 35 U.S.C. 103 as being unpatentable over Choi-Finkel, as applied to claims 11 and 21 above, in view of Sumitomo (US Publication 2003/0185419)
Regarding claim 18, Choi-Finkel discloses the security control system according to claim 11.
Choi-Finkel does not explicitly disclose but Sumitomo discloses wherein the at least one processor is configured to execute the instructions to: modify a field of view of a surveillance camera (Sumitomo, para’s 0065-0081, fig’s 8b-8d, a surveillance system detects the presence of an intruder in a surveillance area utilizing an infrared sensor; fig. 40, col. 27, lines 25-39, setting imaging range based on location of infrared sensor based on the location and position of the detected intruder, control the range of the camera system by at least switching/actuating the camera between enlargement mode and wide angle mode “modifying field of view”).
It would have been obvious to one of ordinary skill in the art before the effective filing date of the claimed invention to incorporate Sumitomo’s features into the system of Choi-Finkel for enhancing surveillance operation by capturing more accurate pictures of the event condition.
Claim 28 is rejected for the same reasons set forth in claim 18.
Conclusion
13. Any inquiry concerning this communication or earlier communications from the examiner should be directed to LOI H TRAN whose telephone number is (571)270-5645. The examiner can normally be reached 8:00AM-5:00PM PST FIRST FRIDAY OF BIWEEK OFF.
Examiner interviews are available via telephone, in-person, and video conferencing using a USPTO supplied web-based collaboration tool. To schedule an interview, applicant is encouraged to use the USPTO Automated Interview Request (AIR) at http://www.uspto.gov/interviewpractice.
If attempts to reach the examiner by telephone are unsuccessful, the examiner’s supervisor, THAI TRAN can be reached at 571-272-7382. The fax phone number for the organization where this application or proceeding is assigned is 571-273-8300.
Information regarding the status of published or unpublished applications may be obtained from Patent Center. Unpublished application information in Patent Center is available to registered users. To file and manage patent submissions in Patent Center, visit: https://patentcenter.uspto.gov. Visit https://www.uspto.gov/patents/apply/patent-center for more information about Patent Center and https://www.uspto.gov/patents/docx for information about filing in DOCX format. For additional questions, contact the Electronic Business Center (EBC) at 866-217-9197 (toll-free). If you would like assistance from a USPTO Customer Service Representative, call 800-786-9199 (IN USA OR CANADA) or 571-272-1000.
/LOI H TRAN/Primary Examiner, Art Unit 2484