`
`(12) United States Patent
`Bennett, III et al.
`
`(10) Patent N0.:
`(45) Date of Patent:
`
`US 8,705,701 B2
`*Apr. 22, 2014
`
`(54)
`
`(75)
`
`SECURITY SYSTEM WITH CALL
`MANAGEMENT FUNCTIONALITY
`
`Inventors: Raymond Walden Bennett, III,
`Naperville, IL (US); John Roland
`Beardsley, Rolling Meadows, IL (US)
`
`(73)
`
`Assignee: AT&T Intellectual Property I, L.P.,
`Atlanta, GA (US)
`
`(*)
`
`Notice:
`
`Subject to any disclaimer, the term of this
`patent is extended or adjusted under 35
`U.S.C. 154(b) by 72 days.
`This patent is subject to a terminal dis
`claimer.
`
`(21)
`
`(22)
`
`(65)
`
`(63)
`
`Appl. No.: 13/307,527
`
`Filed:
`
`Nov. 30, 2011
`
`Prior Publication Data
`
`US 2012/0069972 A1
`
`Mar. 22, 2012
`
`Related US. Application Data
`
`Continuation of application No. 11/605,675, ?led on
`Nov. 29, 2006, now Pat. No. 8,107,594, which is a
`continuation of application No. 10/017,989, ?led on
`Dec. 6, 2001, now Pat. No. 7,167,543, which is a
`continuation of application No. 09/366,359, ?led on
`Aug. 3, 1999, now Pat. No. 6,370,233.
`
`(51)
`
`(52)
`
`(58)
`
`(2006.01)
`
`Int. Cl.
`H01R 33/96
`US. Cl.
`USPC ................................ .. 379/37; 379/42; 379/38
`Field of Classi?cation Search
`USPC ................................. .. 379/37, 38, 42, 211.02
`See application ?le for complete search history.
`
`(56)
`
`References Cited
`
`U.S. PATENT DOCUMENTS
`
`2/1974 Kilby
`3,793,487 A
`8/1978 Churchill
`4,107,466 A
`3/1985 Kessler
`4,503,288 A
`3/1986 Borg et 31.
`4,578,540 A
`9/1986 Smith
`4,612,419 A
`5/1987 Honda et :11.
`4,665,544 A
`8/1989 Schneider et 31.
`4,856,072 A
`7/1991 Phillips
`5,031,205 A
`2/1992 Launey et a1.
`5,086,385 A
`5,166,972 A ll/l992 Smith
`5,274,698 A 12/1993 Jang
`5,315,636 A
`5/1994 Patel
`5,363,425 A * ll/l994 Mufti et a1. ............ .. 379/201.06
`5,402,469 A
`3/1995 Hopper et a1.
`5,440,620 A
`8/1995 Slusky
`5,479,496 A 12/1995 Endo et :11.
`5,596,633 A
`l/l997 Meier et a1.
`(Continued)
`
`FOREIGN PATENT DOCUMENTS
`
`4/1987
`362073846 A
`JP
`04334158 A ll/l992
`JP
`08116355 A
`5/1996
`JP
`10098521 A
`4/1998
`JP
`Primary Examiner * Alexander Jamal
`(74) Attorney, Agent, or Firm * Toler Law Group, PC
`(57)
`ABSTRACT
`A security system with call management functionality
`includes a security controller having at least one ?rst interface
`to at least one user identi?cation device and a second interface
`to a call management controller. The security controller also
`includes logic to determine a security status of a userbased on
`identi?cation information received from the at least one user
`identi?cation device and to communicate the security status
`of the user to the call management controller. The call man
`agement controller enables, disables, or modi?es a commu
`nication service based on the security status of the user.
`
`20 Claims, 1 Drawing Sheet
`
`PAGE 1
`
`SECURUS EXHIBIT 1008
`
`
`
`US 8,705,701 B2
`Page 2
`
`(56)
`
`References Cited
`
`US. PATENT DOCUMENTS
`
`4/1997 Humphries et 31‘
`5,621,662 A
`5,682,142 A 10/1997 Loosmore et 31.
`5,689,235 A 11/1997 Sugimoto et al‘
`5,712,911 A
`1/1998 Her
`5,724,411 A
`3/1998 Eisdorfer et 31.
`5,802,157 A
`9/1998 Clarke et a1.
`5,901,211 A
`5/1999 Dean et a1.
`5,995,597 A 11/1999 WOIIZ et al~
`6,002,427 A 12/1999 Kipust
`6,005,870 A 12/1999 Leung et a1.
`
`6,161,128 A 12/2000 Smyk
`6,263,064 B1
`7/2001 O’Neal et al.
`6,345,047 B1
`2/2002 Regnier
`6,356,752 B1
`3/2002 Grif?th
`6,370,233 B1
`4/2002 Bennett, III et a1.
`6,370,235 B1
`4/2002 Helnér
`6,418,216 B1
`7/2002 Harnson et a1.
`6,490,444 B1
`12/2002 Bossemeyer, Jr. et a1.
`6,549,612 B2
`4/2003 Gifford et 31.
`7,167,543 B2
`1/2007 Bennett, III et a1.
`2002/0121969 A1 *
`9/2002 Joao ......................... .. 340/425.5
`2007/0274461 A1 11/2007 Bennett, III et a1.
`
`* cited by examiner
`
`PAGE 2
`
`
`
`US. Patent
`
`Apr. 22, 2014
`
`US 8,705,701 B2
`
`[6
`
`V0309
`
`/
`24
`
`security
`002mm:
`/
`/
`I4
`
`T bone / 135, m
`
`I
`1'30
`
`can Manager
`COGMBI'
`1
`116
`
`Sec“!
`
`Vcice
`
`/
`124
`
`[/4
`
`Theliegbone / 2%
`
`27%,
`
`PAGE 3
`
`
`
`US 8,705,701 B2
`
`1
`SECURITY SYSTEM WITH CALL
`MANAGEMENT FUNCTIONALITY
`
`CLAIM OF PRIORITY
`
`The present application claims priority from and is a con
`tinuation of US. patent application Ser. No. 1 1/ 605,675, ?led
`on Nov. 29, 2006 and entitled “Security System With Call
`Management Functionality,” which is a continuation of US.
`patent application Ser. No. 10/017,989 ?led on Dec. 6, 2001,
`now US. Pat. No. 7,167,543, which is a continuation ofU.S.
`patent application Ser. No. 09/366,359 ?led onAug. 3, 1999,
`now US. Pat. No. 6,370,233, the contents of which are
`expressly incorporated herein by reference in their entirety.
`
`FIELD OF THE DISCLOSURE
`
`The present disclosure relates generally to security systems
`and more particularly to a security system with call manage
`ment functionality.
`
`20
`
`BACKGROUND
`
`Because of increased security concerns many homeowners
`have a home security system. Many of these home security
`systems can be con?gured so that each resident is assigned a
`unique passcode. In operation, these individual passcodes can
`be used to change security system status or make ad hoc
`changes to system parameters. For example, security system
`status is commonly changed from “standby” to “arm” when
`the occupants are away. Similarly, system parameters are
`commonly changed to, for example, permit the security sys
`tem to be in “night mode” even though there are open win
`dows.
`Security systems receive passcodes a number of different
`ways. Typically, a security system receives passcodes and
`system commands through a keypad. Recently, however, it
`has been suggested that security systems receive passcodes
`and system commands a variety of ways. For example, a user
`could be identi?ed automatically by carrying a transponder,
`or by using a magnetically coded house key, or by using voice
`recognition.
`Besides home security systems, many homeowners sub
`scribe to a variety of call management services. These ser
`vices range from call waiting and caller ID, to voice mail and
`restricted 900 number access. These services are not typically
`related to any individual’ s presence in the home. A number of
`additional services could be provided to a homeowner if these
`call management services were integrated with a home secu
`rity system.
`
`25
`
`30
`
`35
`
`40
`
`45
`
`50
`
`BRIEF DESCRIPTION OF THE DRAWINGS
`
`FIG. 1 is a block diagram of a house having a security
`system with call management functionality according to the
`present disclosure.
`
`55
`
`DETAILED DESCRIPTION
`
`The present disclosure is generally directed to a security
`system with call management functionality. In a particular
`embodiment, the security system includes a security control
`ler having at least one ?rst interface to at least one user
`identi?cation device and a second interface to a call manage
`ment controller. The security controller also includes logic to
`determine a security status of a user based on identi?cation
`information received from the at least one user identi?cation
`
`60
`
`65
`
`2
`device and to communicate the security status of the user to
`the call management controller, where the call management
`controller enables, disables, or modi?es a communication
`service based on the security status of the user.
`In another particular embodiment, the disclosure is
`directed to a call management controller having an interface
`to a security controller and logic to receive a security status of
`a user from the security controller and to enable, disable, or
`modify a telephone service based on the security status of the
`user.
`Referring to FIG. 1, a block diagram of a house 10 having
`a security system 12 with call management functionality
`according to the present disclosure is illustrated. Security
`system 12 is located in house 10 and includes two major
`components comprising a security controller 14 and a call
`management controller 16.
`Security controller 14 is located in house 10 and is coupled
`to a plurality of sensors 18 to provide security system func
`tions. The security controller 14 and sensors 18 are conven
`tional. For example, sensors 18 are located in various posi
`tions in house 10 and include window and door position
`sensors and motion detectors to detect unauthorized entry
`into house 10. Security controller 14 is also coupled to several
`devices that are used for user identi?cation and system com
`mands. Additionally, security controller 14 is conventionally
`also tied to a phone line to contact 91 1 or a monitoring center.
`Each user of security system 12 has a unique ID or passcode.
`Call management controller 16 is located in house 10 and
`is coupled to at least one handset 26 and a telephone network
`28, which provides at least one phone line 30. Call manage
`ment controller 16 is also coupled to security controller 14.
`By using information from security controller 14, call man
`agement controller 16 can provides a variety of new call
`management services as is more fully described below.
`In the present invention, user identi?cation is accom
`plished through a keypad 18, a card reader 20, a radio fre
`quency receiver 22, a voice processing system 24 or the like.
`Keypad 18 canbe located anywhere in house 10 and identi?es
`users and changes system settings through input of unique
`passcodes and command codes. Card reader 20 is usually
`located near an entrance to house 10 and identi?es users
`through a magnetically coded door key that is unique to each
`user. Radio frequency receiver 22 is located so that it can
`receive a signal from a unique transponder (not pictured)
`carried by any user of security system 12. Users are identi?ed
`through communication between the individual transponder
`and radio frequency receiver 22. Voice processing system 24
`is located so that it can receive voice commands from security
`system users. Voice processing system 24 includes a speaker
`veri?cation module to identify individual users and a speech
`recognition module to process verbal commands.
`The user identi?cation devices allow security system 12 to
`identify individuals and monitor their presence in house 10.
`Thus, each individual not only has an identity, but also has a
`speci?c security status associated with their identity. Know
`ing which users are in house 10 and knowing each individu
`al’s security status and the security status of security system
`12 allows call management controller 16 to de?ne and cus
`tomize call management services. These novel services can
`include night mode privacy, automated attendant, “follow
`me” service, “kid kontrol”, “maid minder”, and voice mail
`delivery.
`In operation, the night mode privacy service functions in
`the following manner. When the security system 12 has been
`placed in night mode, all calls will be answered and the caller
`will be advised to leave a message unless it is an emergency.
`If the caller insists the call is important, the telephone 26 will
`
`PAGE 4
`
`
`
`US 8,705,701 B2
`
`3
`ring. In the preferred embodiment, the telephone 26 will ring
`with a distinctive ring to denote an emergency call.
`The automated attendant service functions in the following
`manner. Each user has a unique telephone number. When a
`call comes for a speci?c user, the telephone 26 rings as usual
`if the user is present in house 10. User presence is determined,
`as above, by the identi?cation device. If the user is not present
`in house 10, an automated attendant offers to take a message
`without ringing telephone 26. If a call for a user known to be
`present in house 10 is not answered, then the automated
`attendant answers the call and takes a message. In this case,
`the automated attendant may also page the intended user, or
`ask the caller to hold the line and continue ringing telephone
`26. If a user is on a call and another comes through, the user
`would get a call-waiting signal. Preferably, this call-waiting
`signal would be unique for each user.
`The “follow me” service functions in the following man
`ner. Multiple security systems may be interfaced to monitor
`several locations for user presence. In such a case, the security
`system distinguishes whether, for example, a user is occupy
`ing house 10, a neighbor’s house 110 or a work location 210.
`Thus, the security system controller 14 is aware when the user
`leaves or enters a location. In this manner, calls are directed
`toward a telephone 26 nearest the user location. Alternatively,
`calls could be transferred to voice mail if the user is not
`present, or forwarded to a known location, such as a cellular
`or mobile phone or other location.
`The “kid kontrol” service functions in the following man
`ner. Because each individual not only has a unique identity,
`but also has a speci?c security status associated with their
`identity, the presence of only minor children in house 10 can
`be determined. When this is determined, outbound telephone
`calls can be restricted in one of several ways. For example,
`toll calls can be prohibited or limited in length, total number
`of calls can be limited, duration of individual calls or total
`time on telephone 26 could be limited, etc. Another example
`of this service is “maid minder” that will limit numbers or
`types of calls when only service personnel are in the resi
`dence.
`The voice mail delivery service functions in the following
`way. When a user enters house 10 and is identi?ed, the secu
`rity system could notify them that they have voice mail,
`e-mail, facsimiles or other messages. The call management
`system 16 could then offer to deliver these messages. Prefer
`ably, voice-processing system 24 would verbally notify the
`user and commence playback of any messages. Alternatives
`include using a speaker integrated with keypad 18, where the
`user is noti?ed of messages upon manual passcode entry. If
`the user’s identity is established using some device that
`requires no active involvement by the user, i.e., a radio fre
`quency receiver/transponder, then the voice mail delivery
`service rings telephone 26 and noti?es the user that they have
`messages. Preferably, the voice mail delivery service uses a
`distinctive ring.
`From the foregoing, it can be seen that there has been
`brought to the art a new and improved security system with
`call management functionality. It is to be understood that the
`preceding description is merely illustrative of some of the
`many speci?c embodiments that represent applications of the
`principles of the present invention. Clearly, numerous and
`other arrangements would be evident to those skilled in the art
`without departing from the scope of the invention as de?ned
`by the following claims:
`What is claimed is:
`1. A system comprising:
`a call management controller to con?gure a telephone ser
`vice based on a security status of a user; and
`
`20
`
`25
`
`30
`
`35
`
`40
`
`45
`
`50
`
`55
`
`60
`
`65
`
`4
`a ?rst security controller con?gured to perform operations
`comprising:
`receiving ?rst identi?cation information of the user from
`a user identi?cation device located at a ?rst location;
`receiving second identi?cation information of the user
`from a second security controller located at a second
`location that is remote from the ?rst location;
`determining the security status of the user based on the
`?rst identi?cation information and the second identi
`?cation information, wherein the security status of the
`user indicates whether the user is present at one of the
`?rst location and the second location and whether
`outbound calling by the user is restricted; and
`communicating the security status of the user to the call
`management controller, wherein the call management
`controller and the ?rst security controller are located
`at the ?rst location.
`2. The system of claim 1, wherein the call management
`controller is further con?gured to:
`receive the security status of the user from the ?rst security
`controller;
`receive an incoming call associated with the user via an
`interface to a network; and
`route the incoming call based on the security status of the
`user.
`3. The system of claim 2, wherein the incoming call is
`routed to a device located at the second location when the
`security status of the user indicates that the user is present at
`the second location.
`4. The system of claim 2, wherein the incoming call is
`routed to a device located at the ?rst location when the secu
`rity status of the user indicates that the user is present at the
`?rst location.
`5. The system of claim 2, wherein the incoming call is
`routed to a mobile communication device associated with the
`user when the security status of the user indicates that the user
`is not present at the ?rst location and that the user is not
`present at the second location.
`6. The system of claim 2, wherein the incoming call is
`routed to a voice mail service associated with the user when
`the security status of the user indicates that the user is not
`present at the ?rst location and that the user is not present at
`the second location.
`7. The system of claim 1, wherein the second security
`controller is located at a home location of the user, and
`wherein the ?rst security controller is located at one of a work
`location of the user and a home location of a neighbor of the
`user.
`8. The system of claim 1, wherein the ?rst security con
`troller is located at a home location of the user, and wherein
`the second security controller is located at one of a work
`location of the user and a home location of a neighbor of the
`user.
`9. The system of claim 1, wherein the user identi?cation
`device includes a keypad to receive entry of a user passcode,
`a card reading device to read a magnetic user identi?cation
`card, a radio frequency receiver to receive a radio frequency
`signal from a transponder, a voice processing system to
`receive voice commands, or any combination thereof.
`10. The system of claim 1, wherein the ?rst security con
`troller is further con?gured to provide a home security func
`tion based on home security information received from a
`security sensor, wherein the security sensor includes a door
`position sensor, a window position sensor, or a motion detec
`tor.
`11. The system of claim 10, wherein the ?rst security
`controller is further con?gured to contact a public safety
`
`PAGE 5
`
`
`
`US 8,705,701 B2
`
`5
`answering point of an emergency-calling system or a private
`emergency monitoring center based on the home security
`information.
`12. A call management controller, comprising;
`a ?rst interface to a communication service network;
`a second interface to receive identi?cation information
`from a plurality of security controllers associated with a
`plurality of security systems, wherein a ?rst security
`system of the plurality of security systems is associated
`with a home location of a user, wherein the identi?cation
`information includes ?rst identi?cation information and
`second identi?cation information, wherein the ?rst iden
`ti?cation information is received from the ?rst security
`system, and wherein the second identi?cation informa
`tion is received from a second security system located at
`a second location that is remote to the home location;
`and
`logic con?gured to:
`determine a security status of the user based on the ?rst
`identi?cation information and the second identi?ca
`tion information, wherein the security status of the
`user indicates whether the user is present at one of the
`home location of the user and the second location and
`whether outbound calling by the user is restricted;
`communicate the security status of the user to a call
`management controller that is located at the home
`location; and
`enable, disable, or modify a phone service of the call
`management controller based on the security status of
`the user.
`13. The call management controller of claim 12, wherein a
`particular security controller of the plurality of security con
`trollers receives the identi?cation information from a user
`identi?cation device accessible to the particular security con
`troller.
`14. The call management controller of claim 12, wherein
`the telephone service includes a follow-me service, and
`wherein the logic is further con?gured to:
`receive an incoming call associated with the user via the
`?rst interface; and
`route the incoming call based on the security status of the
`user.
`15. The call management controller of claim 14, wherein
`the logic routes the incoming call to a ?rst device located at
`the home location of the user when the security status of the
`user indicates that the user is present at the home location, and
`wherein the logic routes the incoming call to a second device
`located at a second location when the security status of the
`user indicates that the user is present at the second location,
`
`15
`
`20
`
`25
`
`30
`
`35
`
`40
`
`45
`
`6
`wherein the second location is associated with a security
`controller of the plurality of security controllers.
`16. The call management controller of claim 12, wherein
`each of the plurality of security controllers includes ?rst
`interface to a security sensor, wherein the security sensor
`includes a door position sensor, a window position sensor, a
`motion detector, or any combination thereof, and wherein
`each of the plurality of security controllers further includes
`second interface to a communication path to contact a public
`safety answering point of an emergency-calling system or a
`private emergency monitoring center.
`17. A method comprising:
`receiving, at a ?rst security controller, ?rst identi?cation
`information of a user from a user identi?cation device
`located at a ?rst location;
`receiving, at the ?rst security controller, second identi?ca
`tion information of the user from a second security con
`troller located at a second location that is remote from
`the ?rst location;
`determining a security status of a user based on the ?rst
`identi?cation information and the second identi?cation
`information, wherein the security status of the user indi
`cates whether the user is present at one of the ?rst loca
`tion and the second location and whether outbound call
`ing of the user is restricted;
`communicating the security status of the user to a call
`management controller that is located at the ?rst loca
`tion; and
`con?guring a communication service of the call manage
`ment controller based on the security status of the user.
`18. The method of claim 17, further comprising:
`receiving, at the call management controller, an incoming
`call associated with the user via an interface to a com
`munications network; and
`routing the incoming call based on a con?guration of the
`communication service.
`19. The method of claim 18, further comprising forwarding
`the incoming call to a device located at the second location
`when the security status indicates that the user is not present
`at the ?rst location and when the security status indicates that
`the user is present at the second location, wherein the second
`location includes a work location, a neighbor location, a car
`location, or a business location.
`20. The method of claim 18, wherein the communication
`service includes a night mode privacy service, an automated
`attendant service, a follow-me service, a kid control service,
`a maid minder service, a voice mail delivery service, or any
`combination thereof.
`
`PAGE 6