Collar Mounted Intruder Detection Security System

Hord; Margaret A. ;   et al.

Patent Application Summary

U.S. patent application number 15/346221 was filed with the patent office on 2018-05-10 for collar mounted intruder detection security system. The applicant listed for this patent is Benjamin F. Hord, Margaret A. Hord. Invention is credited to Benjamin F. Hord, Margaret A. Hord.

Application Number20180125038 15/346221
Document ID /
Family ID62065068
Filed Date2018-05-10

United States Patent Application 20180125038
Kind Code A1
Hord; Margaret A. ;   et al. May 10, 2018

Collar Mounted Intruder Detection Security System

Abstract

A security system configured to be attached about the neck of a dog, includes a collar having opposed ends, each end having a fastener such that the belt is configured to be selectively coupled about the dog's neck. A monitoring assembly is mounted to the collar, the monitoring assembly including a microphone and a processor in data communication with the microphone. A transmitter is operatively connected to the processor. A response assembly is displaced from the monitoring assembly that includes a speaker in data communication with the processor, the processor configured to selectively actuate the speaker when the processor determines that the microphone has detected a predetermined sound, such as the bark of an intruding dog. The displaced speaker may then emit the sound of a menacing guard dog until the sound of an intruding dog is no longer detected.


Inventors: Hord; Margaret A.; (Oakland, MD) ; Hord; Benjamin F.; (Columbia, MO)
Applicant:
Name City State Country Type

Hord; Margaret A.
Hord; Benjamin F.

Oakland
Columbia

MD
MO

US
US
Family ID: 62065068
Appl. No.: 15/346221
Filed: November 8, 2016

Current U.S. Class: 1/1
Current CPC Class: G08B 13/1672 20130101; H04R 1/028 20130101; H04R 3/00 20130101; H04R 2400/00 20130101; G08B 15/00 20130101; A01K 27/009 20130101; G10L 17/26 20130101; H04R 2410/00 20130101
International Class: A01K 27/00 20060101 A01K027/00; H04R 1/02 20060101 H04R001/02; G10L 17/26 20060101 G10L017/26; G08B 13/16 20060101 G08B013/16

Claims



1. A security system for detecting an intruder proximate a dog in an outdoor environment, comprising: a collar having opposed ends, each end having a fastener such that said belt is configured to be selectively coupled about the dog's neck; a monitoring assembly mounted to said collar, comprising: a microphone; a processor in data communication with said microphone; and a response assembly displaced from said monitoring assembly that includes a speaker in data communication with said processor, said processor configured to selectively actuate said speaker; wherein said processor is configured to actuate said speaker when said microphone detects a predetermined sound; a transmitter in data communication with said processor and configured to transmit actuation and data signals; programming that, when executed by said processor, causes said processor to actuate said transmitter to transmit respective actuation and data signals; and a receiver in data communication with said speaker and configured to receive said actuation and data signals from said transmitter, said receiver configured to cause said speaker to emit sound according to said received signals a timer in data communication with said processor; programming that, when executed by said processor, causes said processor to: determine if said microphone no longer detects said predetermined sound after having previously detected said predetermined sound; if no predetermined sound is detected, actuate said timer to cycle a predetermined time; upon expiration of said timer cycle, actuate said transmitter to transmit a stop signal; wherein said receiver is configured to deactivate said speaker upon receiving said stop signal.

2. The security system as in claim 1, wherein said monitoring assembly includes: a non-volatile memory in data communication with said processor that is configured to store programming and sound data; a battery in data communication with said processor and said memory; a casing mounted to said collar that defines an interior area, said processor, said memory, said microphone, and said battery being situated in said interior area.

3. (canceled)

4. (canceled)

5. The security system as in claim 1, wherein said data signals include sound data indicative of a guard dog.

6. (canceled)

7. The security system as in claim 1, wherein said memory includes a plurality of data signals associated with sounds to be selectively emitted by said speaker.

8. A security system for detecting an intruder proximate a dog in an outdoor environment, comprising: a collar having opposed ends, each end having a fastener such that said belt is configured to be selectively coupled about the dog's neck; a monitoring assembly mounted to said collar, comprising: a microphone; a processor in data communication with said microphone; a non-volatile memory in data communication with said processor that is configured to store programming and sound data; a battery in data communication with said processor and said memory; a response assembly displaced from said monitoring assembly that includes a speaker in data communication with said processor, said processor configured to selectively actuate said speaker; and programming that, when executed by said processor, causes said processor to determine whether sound detected by said microphone is indicative of a dog barking and, if so, to actuate said speaker; a transmitter in data communication with said processor and configured to transmit actuation and data signals; programming that, when executed by said processor, causes said processor to actuate said transmitter to transmit respective actuation and data signals; and a receiver in data communication with said speaker and configured to receive said actuation and data signals from said transmitter, said receiver configured to cause said speaker to emit sound according to said received signals a timer in data communication with said processor; programming that, when executed by said processor, causes said processor to: determine if said microphone no longer detects said predetermined sound after having previously detected said predetermined sound; if no predetermined sound is detected, then actuate said timer to cycle a predetermined time; upon expiration of said timer cycle, actuate said transmitter to transmit a stop signal; wherein said receiver is configured to deactivate said speaker upon receiving said stop signal.

9. (canceled)

10. (canceled)

11. The security system as in claim 8, wherein said memory includes a plurality of data signals associated with sounds to be selectively emitted by said speaker.

12. (canceled)

13. (canceled)
Description



BACKGROUND OF THE INVENTION

[0001] This invention relates generally to intruder detection systems and, more particularly, to an intruder detection system having a monitoring assembly mounted to a dog collar about a pet's neck configured to detect sounds indicative of an intruder and having a response system situated remote from the monitoring assembly for emitting sounds intended to intimidate and scare away an intruder.

[0002] Intruder detection devices are well known in the art, such as basic motion sensors that, when triggered, cause lights to illuminate a predetermined area. For instance, one or more motion detectors may be mounted proximate a house, garage, or commercial business and configured to energize one or more spot lights if movement within a predetermined area is detected. However, when the intruder is a rodent, dog, or non-human intruder, lights alone are ineffective to intimidate or scare away the intruder.

[0003] Similarly, a residence at which a pet dog is present in an outdoor environment might not be able to intimidate and scare away an intruder either. For instance, if an unrestrained dog wanders onto the property, a small dog's yips and squeaky barks are unlikely to scare away the more menacing animal or a human intruder. By contrast, a more menacing sounding guard dog would be more effective at urging the intruder to leave quickly and not return.

[0004] Therefore, it would be desirable to have an intruder detection system mounted to a domestic animal's neck collar which, when an intruder is detected, activates a remotely positioned speaker to emit menacing "guard dog" barking so as to scare away the intruder.

SUMMARY OF THE INVENTION

[0005] A security system for detecting an intruder proximate a dog in an outdoor environment according to the present invention and configured to be attached about the neck of a dog includes a collar having opposed ends, each end having a fastener such that the belt is configured to be selectively coupled about the dog's neck. A monitoring assembly is mounted to the collar, the monitoring assembly including a microphone and a processor in data communication with the microphone. A transmitter is operatively connected to the processor. A response assembly is displaced from the monitoring assembly that includes a speaker in data communication with the processor, the processor configured to selectively actuate the speaker when the processor determines that the microphone has detected a predetermined sound, such as the bark of an intruding dog. The displaced speaker may then emit the sound of a menacing guard dog until the sound of an intruding dog is no longer detected.

[0006] Therefore, a general object of this invention is to provide an intruder detection system mounted to a domestic animal's neck collar which detects sounds via a microphone that are indicative of an intruder.

[0007] Another object of this invention is to provide an intruder detection system, as aforesaid, that activates a remotely positioned speaker to emit menacing "guard dog" barking so as to scare away the intruder.

[0008] A further object of this invention is to provide an intruder detection system, as aforesaid, that deactivates the remote speaker once the monitoring assembly no longer detects the presence of an intruder.

[0009] Other objects and advantages of the present invention will become apparent from the following description taken in connection with the accompanying drawings, wherein is set forth by way of illustration and example, embodiments of this invention.

BRIEF DESCRIPTION OF THE DRAWINGS

[0010] FIG. 1 is a perspective view of a monitoring assembly of a collar mounted security system according to a preferred embodiment of the present invention;

[0011] FIG. 2 is an exploded view of the monitoring assembly as in FIG. 1;

[0012] FIG. 3a is an isolated front view of a casing removed from the monitoring assembly as in FIG. 1;

[0013] FIG. 3b is a sectional view taken along line 3b-3b of FIG. 3a;

[0014] FIG. 4a is another isolated front view of a casing removed from the monitoring assembly as in FIG. 1;

[0015] FIG. 4b is a sectional view taken along line 4b-4b of FIG. 4a;

[0016] FIG. 5 is a perspective view of a response assembly of the collar mounted security system according to the present invention; and

[0017] FIG. 6 is a block diagram of the electronic components of the security system according to the present invention.

DESCRIPTION OF THE PREFERRED EMBODIMENT

[0018] A security system for detecting an intruder proximate a dog will now be described in detail with reference to FIGS. 1 to 6 of the accompanying drawings. The security system 10 includes a collar 20, a monitoring assembly 30 coupled to the collar 20, and a response assembly 50 displaced and remote from the monitoring assembly 30.

[0019] The collar 20 of the security system 10 includes an elongate and generally rectangular configuration having opposed ends 22, 24. Fasteners mounted at respective ends of the collar 20 are configured to be selectively fastened together, such as about the neck of a pet--preferably of a dog in the present instance. The body of the dog collar 20 may include length adjustment elements, such as a pin and holes combination, clips, clasps, hook and loop fasteners, snaps, buckles, or other fastener combinations.

[0020] The monitoring assembly 30 may include a casing 32 coupled to the collar 20, such as to the front or neck-side of the collar 20, the casing 32 having a single continuous wall or multiple walls that define an interior area. The monitoring assembly 30 may include a microphone 34 positioned in the interior area and in operative communication with a front side thereof. In other words, the casing 32 may include one or more apertures that enhance the microphone's performance in receiving ambient sound (FIG. 1).

[0021] Further, the monitoring assembly 30 may include a processor 36 or equivalent circuitry positioned in the interior area of the casing 32. A non-volatile memory 38 may also be positioned in the casing and in data communication with the processor 36, the memory 38 being electronically configured to include programming and data structures. Data stored in memory 38 may include sound data indicative of the sound of a viscous guard dog as well as other sounds to be emitted by a speaker 52 as will be discussed further later. In addition, the response assembly 50 may include a battery 40 electrically connected to the electronic components in the casing 32.

[0022] In use, the microphone 34 is configured to receive a sound and deliver the received sound digitally to the processor 36. The processor 36, under program control, is configured to determine if the microphone 34 has received (i.e. detected) a predetermined sound judged to be indicative of the presence of an intruder. For instance, the processor 36 is configured to determine if a received sound is indicative of a dark barking, a person talking, etc.

[0023] The response assembly 50 is a module remote or displaced from the collar 20 and monitoring assembly 30. For instance, the response assembly may include a housing mounted on an exterior wall of a residence, positioned in a yard or patio, or otherwise positioned where its speaker 52 is most effectively heard by an intruder. Accordingly, the response assembly 50 includes at least a speaker 52 and a receiver 54 in electrical and data communication with the speaker 52. Preferably, the speaker 52 is a high performance and sizeable construction so as to produce a high quality and realistic sounding emission. In an embodiment, the response assembly 50 may include its own processor, memory, transmitter, and battery (not shown) or equivalent circuitry for controlling the speaker 52.

[0024] The monitoring assembly 30 of the security system 10 may include a transmitter 42 in data communication with the processor 36 and is configured to transmit actuation and data signals into the ambient air. Under program control, the processor 36, when appropriate, causes the transmitter 42 to send a signal actuating the speaker 52 to emit predetermined sounds, e.g. barking sounds of a guard dog. More particularly, the processor 36 is configured to cause the transmitter 42 to transmit sound data in signals, the sound data having been stored in memory 38. The receiver 54 of the response assembly 50 is configured to receive the sound data signals and to communicate them to the speaker 52 for emission thereby.

[0025] The security system 10 is configured to stop the speaker 52 from emitting a dog barking sound once the microphone 34 is no longer receiving or detecting the predetermined sound identifiable as a potential intruder (whether dog or person). Specifically, the processor 36, under program control, continuously monitors the microphone 34 and, when the predetermined sound is no longer detected, causes the transmitter 42 to send a "stop signal" which, when received by the receiver, deactivates the speaker 52.

[0026] In another aspect, the sound data being emitted by the speaker 52 is permitted to continue for a predetermined amount of time after the threat or presence of an intruder has ceased. More particularly, the monitoring assembly 30 may include a timer 44, such as in the form of a circuit, in data communication with the processor 36. There is programming that, first, causes the processor 36 to determine if the microphone 34 is no longer receiving the predetermined sound. If so, the timer 44 is energized to count or cycle for a predetermined amount of time. In other words, a delay is initiated. Once the time has expired, programming causes the processor 36 to initiate the stop signal to deactivate the speaker 52 as described above.

[0027] In use, the security system 10 is able to detect the proximate presence of an intruder, such as a dog. Specifically, the microphone 34 of the monitoring assembly 30 is configured to detect ambient sound and, in cooperation with the processor 36 is able to detect a predetermined sound. Once detected, the monitoring assembly 30 (via the processor 36 and transmitter 42) signals the response assembly 50 and speaker 52 to emit predetermined sounds, namely that of a menacing dog likely to intimidate or scare away the intruder. The speaker 52 is deactivated once the microphone 34 no longer detects the predetermined sound.

[0028] It is understood that while certain forms of this invention have been illustrated and described, it is not limited thereto except insofar as such limitations are included in the following claims and allowable functional equivalents thereof.

* * * * *


uspto.report is an independent third-party trademark research tool that is not affiliated, endorsed, or sponsored by the United States Patent and Trademark Office (USPTO) or any other governmental organization. The information provided by uspto.report is based on publicly available data at the time of writing and is intended for informational purposes only.

While we strive to provide accurate and up-to-date information, we do not guarantee the accuracy, completeness, reliability, or suitability of the information displayed on this site. The use of this site is at your own risk. Any reliance you place on such information is therefore strictly at your own risk.

All official trademark data, including owner information, should be verified by visiting the official USPTO website at www.uspto.gov. This site is not intended to replace professional legal advice and should not be used as a substitute for consulting with a legal professional who is knowledgeable about trademark law.

© 2024 USPTO.report | Privacy Policy | Resources | RSS Feed of Trademarks | Trademark Filings Twitter Feed