throbber
(12> Ulllted States Patent
`Saylor et al.
`
`US006400265B1
`(10) Patent N0.:
`US 6,400,265 B1
`(45) Date of Patent:
`Jun. 4, 2002
`
`(54) SYSTEM AND METHOD FOR MONITORING
`SECURITY SYSTEMS BY USING VIDEO
`IMAGES
`
`_
`-
`_
`-
`(75) Inventors. M1chaelJ.'Sayl0'r, McLean, Alison
`Slavln, Arlington, J ean-Paul Hugues
`.
`Mam“, Oaktom an of VA (Us)
`_
`_
`(73) Ass1gnee: MlcroStrategy, IIlC., McLean, VA (US)
`
`( * ) Notice:
`
`Subject to any disclaimer, the term of this
`patent is extended or adjusted under 35
`U‘SC' 154(k)) by 0 days‘
`
`(21) Appl. No.: 09/840,303
`(22) Filed:
`Apr. 24, 2001
`
`(51) Int. Cl.7 ................................................ .. G08B 1/00
`(52) US. Cl. ..................... .. 340/531; 340/506; 340/539;
`340/514; 340/937
`(58) Field of Search ............................... .. 340/506, 507,
`340/514, 517, 521, 539, 937, 53L 3-1
`
`(56)
`
`References Cited
`U_S_ PATENT DOCUMENTS
`
`6/1991 Reid
`5,027,104 A
`5,091,780 A * 2/1992 Pomerleau ................ .. 348/152
`5,111,291 A
`5/1992 Erickson et al.
`5,471,239 A 11/1995 Hill et al.
`5,581,297 A 12/1996 K01 et al.
`5,717,379 A
`2/1998 Peters
`5,731,832 A
`3/1998 Ng
`
`5,831,669 A 11/1998 Adrain
`5,926,210 A
`7/1999 Hacks?" et 91
`6,038,289 A
`3/2000 Sands
`6,049,353 A
`4/2000 Gray
`6,067,346 A
`5/2000 AkhteruZZaman et al.
`6,067,571 A
`50000 lgarashi et a1‘
`6 069 655 A
`5
`,
`,
`/2000 Seeley et al.
`6,091,771 A
`7/2000 Seeley et al.
`6,097,429 A
`8/2000 Seeley et al.
`6,108,034 A
`8/2000 Kim
`
`* Cited by eXaIIliner
`
`Primary Examzner—Daryl Pope
`(74) Attorney, Agent, or Firm—Hunton & Williams
`
`ABSTRACT
`(57)
`The present invention provides a monitoring system for
`providing images e.g., photos, pictures, video, diagram,
`illustration, etc‘) Wgere an alarm Situation may be defected
`by Comparing images‘ When a Change (indicating motion) is
`detected, an alarm may be signaled or other user-de?ned
`response may be invoked In addition, the image and other
`relevant data may be conveyed to a central security network
`where identi?ed individuals may be alerted via identi?ed
`methods. The user may also view the images (e.g., video
`clips) remotely‘ via the web or other method. The present
`invention provides a personal security network where an
`individual’s system or systems of security devices may be
`connected to a central security network. The central security
`network of the present invention may monitor a system’s
`status and alert the individual when an alert situation occurs.
`
`26 Claims, 14 Drawing Sheets
`
`100
`\v
`
`PROPERTY
`1_1g
`
`
`
`CONTROL PQQOEL
`
`_
`
`PERSONAL
`PROPERTY
`
`l/’’
`
`,
`
`I,’
`,1
`
`CENTRAL
`
`SECURITY
`SERvER
`
`1E
`
`CONTROL
`PANEL
`12
`
`/
`
`INTERNET
`150
`
`y
`
`/ \
`l
`uSER
`USER
`1Q
`1@
`
`}
`
`I
`
`I,
`
`'ND'V1'1'4UALS
`—
`CONTROL
`1g
`
`PANEL
`
`DATABASE
`1_4Q
`
`[gig/{SE
`142
`—
`
`DATABASE
`E
`
`DATABASE
`E
`
`: CONTACT1
`121
`
`:
`
`CONTACT
`N
`@N
`
`= EME§E4ENCY
`
`_
`
`SAMSUNG EXHIBIT 1013
`
`Page 1 of 28
`
`

`
`U.S. Patent
`
`Jun. 4, 2002
`
`Sheet 1 0f 14
`
`US 6,400,265 B1
`
`mm<m<e<amm<m<H<o
`
`mténmmm:,m>m_
`
`
`
`
`
`.IIfigcl:9;V:m_m<m_<Eomw<m<Eo
`
`QrBfizoo
`
`zmlfizBézoo
`
`E>ozmo~m_E
`
`F.O_n_
`
`4<mHzmo
`
`>:m=omm
`
`mm>mm_w
`
`.cm._
`
`>Emn_oE
`
`cl:
`
`4<zommm¢
`
`>»mm¢omm
`
`Page 2 of 28
`
`Page 2 of 28
`
`
`
`
`

`
`U.S. Patent
`
`Jun. 4, 2002
`
`Sheet 2 0f 14
`
`US 6,400,265 B1
`
`
`
`_2m._.w>mm_>_m_8~_oaé
`
`elm
`
`
`
`NmzmmtzammEsau
`
`dfl
`
`Page 3 of 28
`
`Page 3 of 28
`
`
`
`

`
`U.S. Patent
`
`Jun. 4, 2002
`
`Sheet 3 0f 14
`
`US 6,400,265 B1
`
`m u n
`
`m E Q
`
`m 228?
`
`m. ............ E2 ............. 1m ,5
`E20:
`
`m 582 921 m W?
`
`
`
`m “ E55 imam 92m
`
`Q3 2 25¢
`
`m .QE
`
`8.85.? § 3
`
`5 2 RE
`
`
`
`
`
`. < . ?zzmzmam 99a . < . 5% 218mm 55%
`
`“E2
`
`.252
`
`Q3055
`
`Page 4 of 28
`
`

`
`U.S. Patent
`
`Jun. 4, 2002
`
`Sheet 4 0f 14
`
`US 6,400,265 B1
`
`USER ACCESSES
`WEBSITE
`
`I
`
`USER CREATES
`PROFILE
`
`\4I0
`
`\ 412
`
`II
`USER CREATES
`
`PURCHASE
`SECURITY DEVICES
`APPROVED BY
`WEBSITE ?
`
`416
`
`SECURITY DEVICES
`ARE AUTOMATICALLY
`REG|STERED
`\
`41s
`
`REGISTER SECURITY
`DEVICES
`
`\420
`
`II
`ASSIGN FUNCTIONS TO
`EACH ALARM DEVICES
`
`\ 422
`
`Y
`ASSIGN NOTIFICATION
`
`FIG. 4
`
`Page 5 of 28
`
`

`
`U.S. Patent
`
`Jun. 4, 2002
`
`Sheet 5 0f 14
`
`US 6,400,265 B1
`
`DETECT ALARM SITUATION
`l
`
`\ 510
`
`CONTRON PANEL
`COMMUNICATES TO
`NETWORK
`
`V
`SEND DATA PACKET
`WITH IDENTIFICATION
`INFORMATION
`
`V
`
`ACCESS USER PROFILE
`INFORMATION
`
`V
`
`PROCESS ALARM
`INFORMATION
`
`\ 512
`
`\ 514
`
`\ 516
`
`\ 51s
`
`EXECUTE NOTIFICATIONS
`AND/OR
`OTHER OPERATIONS
`
`\ 520
`
`J
`
`Y
`
`FIG. 5
`
`Page 6 of 28
`
`

`
`U.S. Patent
`
`Jun. 4, 2002
`
`Sheet 6 6f 14
`
`US 6,400,265 B1
`
`CURRENT STATUS
`MODULE m
`
`PERSONAL REPORTS
`MODULE Q
`
`EQUIPMENT CONTROL
`MODULE gag
`
`FIG. 6
`
`Page 7 of 28
`
`

`
`U.S. Patent
`
`Jun. 4, 2002
`
`Sheet 7 of 14
`
`US 6,400,265 B1
`
`
`
`tomw.=<.EnIIm:.:Pws_m<._<hzmmmzo
`
`mmaommIigl |I
`
`Eaommmzoflz;_m_E2mQ zo=<o3
`
`
`
`
`mn__xozos_zo$_<oaE<>m_._m_Hmoodozaomo
`
`
`zoommozmmmmzooH._.:.;>ommmn_s_<»m<>>mu_<wm:o>az_<2m_o_u_.._o
`E.mH%_E_!gzmsmmEtous:Em._<$5Im__.:._.<25585.:>>m_>
`
`
`
`m_+m%.w_pmM_wm__,.‘_m,m__mm\V,mH__._4ooEm._<mm_<5.5
`
`.oz_w_mIi2,;Im_x<Sm.m=ommoz<n_IizoomammmmFo.<_2I
`mmnommgown._.<OmHIigl
`
`xoH335I
`
`xo
`
`N._U_u_
`
`om
`
`
`
`m_u=>>>.=2<u_
`
`
`
`
`
`
`
`Emmxaox._o25ozbtzoom_a:om._on_
`
`m..m_$E@_G®.0.0
`
`___.s_E9%magiseemas:§§_Em22,3*5
`
`
`
`s8.Em_m.;;§a2mm$_%<_
`
`
`
`
`
`2%w_8Hm2_§E5;amgm_.2290$502..tomEo_s_m..F<pm_2m«J<E
`
`
`
`
`
`Page 8 of 28
`
`Page 8 of 28
`
`
`

`
`U.S. Patent
`
`Jun. 4, 2002
`
`Sheet 8 of 14
`
`US 6,400,265 B1
`
`
`
`
`
`
`
`
`
`oE:.\._2_Eoown__c._Ew>oz$330.EEB%m.2a_.<22.2:...Es._E_<zen:Ewan»;bmzcwn
`
`
`
`
`
`
`
`
`
`w.O_u_
`
`aw
`
`
`
`kzmmzsoEozzwz>._Suom_m:cm._mn_
`
`
`
`
`
`m.@_%E@G®.9.nv
`
`E5__m_2SE...m2_._2au_55$wee:523.3.»52.:*3
`
`Eoo.E._m_m._s32<\_&Efl$e%<_
`
`
`
`9%.m_8H§_§$is:3gm_.m.o_axm.mE9:_tow9o__2mtoqomEou.E._m_<Q
`
`
`
`
`
`Page 9 of 28
`
`_m>w._
`
`HEn8PMOLNMmum
`
`:o_w:h:_Saws_..§Ir_nm._0009:0
`cofiuo
`
`MEENO850E;nm._0009:01
`
`
`
`co=moo._ow0>>_2m
`
`
`
`:o=o_>__u._m>xomm
`
`co:uoo._£5.
`
`co=moo._moo
`
`toaom<mmooso
`
`Page 9 of 28
`
`

`
`U.S. Patent
`
`Jun. 4, 2002
`
`Sheet 9 0f 14
`
`US 6,400,265 B1
`
`PROMPT USER WITH ALARM
`AND OPTIONS
`
`\ 910
`
`USER ACCESSES CENTRAL
`ALARM NETWORK \ 912
`
`CONFIRM IDENTITY
`
`\ 914
`
`NAVIGATE MENU
`
`\ 916
`
`SELECT ACTION
`
`\ 918
`
`FIG. 9
`
`Page 10 of 28
`
`

`
`U.S. Patent
`
`Jun. 4, 2002
`
`Sheet 10 0f 14
`
`US 6,400,265 B1
`
`7
`
`1012 / COMPARE IMAGE X+1 TO IMAGE X 4
`
`X=X+1
`
`NO
`
`E
`,
`
`STORE IN
`DATABASE
`
`104s
`
`1014
`
`YES
`
`1016 / COMPRESS IMAGES
`
`‘
`SEND IMAGES AND/OR
`/ INFORMATION TO CENTRAL
`102°
`SECURITY NETWORK
`I
`ACCESS USER
`INFORMATION
`I
`PROCESS IMAGES
`I024 / AND/OR INFORMATION
`
`I022 /
`
`_ V
`
`EXECUTE NOTIFICATIONS
`1026 / AND/OR OTHER OPERATIONS
`I
`ENABLE USER TO VIEW IMAGES
`1028 / AND/OR OTHER INFORMATION
`
`FIG. 10
`
`Page 11 of 28
`
`

`
`U.S. Patent
`
`Jun. 4, 2002
`
`Sheet 11 of 14
`
`US 6,400,265 B1
`
`Hwmowzmm
`
`_w5<:,_8
`
`_II
`
`
`
`om_zo_5_>_-mag;
`
`M20:
`
`w$E_>>Q.8|:éo>Ez
`asgME$Q_>oE
`_E8_>_oaé
`
`Ea$55:
`
`n__Eo._.
`
`5
`
`
`
`owl:EzmwmE%8Z<E_,mo
`
`§mzmom
`
`an$m_m8%w
`
`mm2_<s_-m
`
`as$9:
`
`g65>
`
`§mmmaomm
`
`Q2§s8
`
`8z_>_o5<
`
`E$53:5
`
`E5<8<o%
`
`§%5<8E
`
`85>
`
`maEa
`
`gEm$2
`
`3
`
`Page 12 of 28
`
`Page 12 of 28
`
`
`
`
`
`
`

`
`U.S. Patent
`
`Jun. 4, 2002
`
`Sheet 12 0f 14
`
`US 6,400,265 B1
`
`SUBSCRIPTION INTERFACE
`
`\20
`
`201_/ WWW
`
`OTHER
`
`PHONE \‘202
`
`SUBSCRIBERAPI
`
`A
`
`‘203
`
`CALL SERVER
`
`"
`ADMINISTRATIVE CONSOLE
`
`SOFTWARE
`
`=
`
`E
`
`HARDWARE
`
`BACKEND SERVER
`
`16
`
`M
`I
`
`A
`I
`
`DSS SERVER
`
`OUT INPUT/FILES
`
`\24
`
`14/
`
`CALLING
`DATABASE
`
`\12
`
`FIG. 12A
`
`Page 13 of 28
`
`

`
`U.S. Patent
`
`Jun. 4, 2002
`
`Sheet 13 0f 14
`
`US 6,400,265 B1
`
`ADMINISTRATOR CONSOLE
`
`/161
`
`1612/
`
`SCHEDULES
`
`SERVICE WIZARD
`\1616
`
`1613/
`
`EXCEPTIONS
`
`PERSONAL
`I614 ’ CALL SETTINGS
`
`ADDRESS
`HANDLING
`
`\1615
`
`SYSTEM ADMIN
`
`\1611
`
`VOICE SERVICE API
`
`\162
`
`BACKEND SERVER
`
`/163
`
`PERSONALIZATION
`1632/
`ENGINE
`
`1634/ SQL ENGINE
`
`1633/ SCHEDULER
`
`TML/XML
`ENGINE
`&
`REPORT
`FORMATTER
`
`REPOSITORY
`
`FIG. 12B
`
`\1631
`
`/164
`
`Page 14 of 28
`
`

`
`U.S. Patent
`
`Jun. 4, 2002
`
`Sheet 14 0f 14
`
`US 6,400,265 B1
`
`A \oo
`
`SOFTWARE COMPONENTS
`
`1811
`
`CALL DATABASE
`II
`
`1816
`/
`CALL STATISTICS
`
`->
`
`USER RESPONSE
`1815/
`
`II
`
`II
`
`\1812
`
`XML PARSING
`ENGINE
`II
`II
`CALL BUILDER
`{
`\1813
`
`v
`TEXT-TO-SPEECH
`ENGINE
`
`1814
`
`\
`181
`
`PHONES LINES
`
`HARDWARE COMPONENTS
`COMPUTER
`TELEPHONY
`
`PROCESSOR
`
`FIG. 12C
`
`Page 15 of 28
`
`

`
`US 6,400,265 B1
`
`1
`SYSTEM AND METHOD FOR MONITORING
`SECURITY SYSTEMS BY USING VIDEO
`IMAGES
`
`FIELD OF THE INVENTION
`
`The present invention relates generally to the ?eld of
`security systems, in particular to a system and method for
`monitoring a security system by using video images Where
`a Wireless communication system may be used to automati
`cally inform an oWner and other authoriZed entities in a
`manner predetermined by the user When alarm situations
`and/or alarm Worthy situations occur.
`
`BACKGROUND OF THE INVENTION
`Home security and personal safety are major concerns for
`individuals. People Want to protect their valuables and
`provide a safe haven for family members and loved ones.
`Traditional home security systems generally alert neighbors
`and others Within the vicinity With a loud noise Warning the
`intruder. or intruders that the invasion has been detected. In
`addition, home alarms generally inform a home security
`central system of the unauthoriZed entry. The home security,
`central system then alerts the police and/or third party
`security companies that an unauthoriZed. entry has occurred.
`Home security devices generally involve WindoW detectors,
`door detectors, motion sensors and other devices.
`High false alarm rates pose a serious problem in commu
`nities. False alarms deplete police resources and undermine
`the credibility of systems that appear to repeatedly malfunc
`tion. In response to the high number of false alarms (over
`90% in some areas), counties and other localities may ?ne
`alarm oWners Whose systems repeatedly produce false
`alarms in an attempt to reduce staggering false alarm rates.
`In some communities, laWs have been passed that prevent
`the police from responding to an alarm activated by a
`security system. As a result, alarm oWners may be forced to
`employ expensive third party security companies to respond
`to alarm situations.
`Some systems may place a con?rmation call or commu
`nication to the oWner before dispatching the police or other
`security entity. This may be helpful When the oWner is at
`home to eXplain that the alarm Was a false alarm thereby
`preempting the alarm and police dispatch. In other
`situations, the alarm may have been triggered inadvertently
`by a pet, falling branch or other innocent act While the home
`oWner is aWay. In such an event, an attempt to make a
`con?rmation call to the oWner at home is ineffective, Tra
`ditional central alarm systems often fail to proactively
`contact a home oWner While the home oWner is in transit. In
`addition, poWer failures and other poWer cutoffs may pre
`vent traditional alarm systems from contacting a user in the
`event of an alarm situation.
`Currently, home security systems offer limited services.
`Generally, all alarm situations are treated in the same
`manner. The industry itself has remained stagnant and
`in?exible. Generally, current security services are con?ned
`to sounding an alarm and/or dispatching the police or other
`security entity. Depending on the type of event detected, a
`user may desire responses in varying degrees of severity.
`Similar problems eXist With other security systems for of?ce
`buildings, cars, boats, vaults and other objects or locations.
`These and other draWbacks eXist With current systems.
`
`10
`
`15
`
`20
`
`25
`
`30
`
`35
`
`40
`
`45
`
`55
`
`60
`
`SUMMARY OF THE INVENTION
`The present invention provides a security system con
`nected to a Wireless communication system Which enables
`
`65
`
`2
`communication With a subscriber user When an alarm (or
`other de?ned), situation occurs. The security system may be
`applied to a user’s home, of?ce, vacation house or other
`location. The security system may also be applied to a user’s
`mobile property, such as a car, boat or other personal
`property. In addition, a security system may encompass
`personal security devices for individuals, such as a panic
`device.
`According to one embodiment, the present invention
`provides a personal security netWork Where one or more
`security devices related to a subscriber may be connected to
`a central security netWork over Wireless communication.
`The central security netWork of the present invention may
`monitor those security devices and alert a user When an alert
`situation occurs. The user may set up personaliZed alarms
`and alert services; identify various methods of contact;
`identify the order at Which to be contacted; individuals and
`entities to be contacted; select the type of situations for
`Which they Want to be alerted and provide other relevant
`security and other information.
`ApersonaliZed Web interface (e.g., Internet, Wireless Web,
`PDA Web, etc.) may also be provided through Which a user
`and authoriZed individuals may vieW current and historical
`security device status. Auser may initiate contact With a Web
`interface to conveniently vieW and/or monitor data for
`registered alarm sensors at various locations, Zones, etc. A
`user may also generate personaliZed reports or have those
`reports automatically generated for them from aggregated
`historical data and other information based on user de?ned
`factors, such as area of interest, type of event(s), time
`frame(s) and other factors. The reports may be displayed to
`the user in various formats, such as maps, graphs, statistics,
`and others formats.
`According to this or other embodiment, the present inven
`tion may further provide a monitoring system for providing
`images (e.g., photos, pictures, video, diagrams, illustrations,
`etc.) Where an alarm situation may be detected by comparing
`images. When a change in images (indicating motion) is
`detected, an alarm may be signaled. In addition, the image
`and other information may be conveyed to a central security
`netWork Where identi?ed individuals may be alerted via
`identi?ed methods. The user may also vieW the images (e. g.,
`video clips) remotely via the Web or other remote access
`methods.
`Users may also monitor and/or control appliances and
`objects remotely via a Wireless channel, Which may also be
`the channel used to send alarm events, alarm broadcasts and
`other information.
`According to another embodiment of the present
`invention, the system of the present invention provides a
`Wireless communication device at a home security system
`Which relays a Wireless communication from the home
`security device directly to the user’s desired devices in such
`a Way so that poWer failures and other poWer cutoff situa
`tions do not prevent the relay of information to the oWner
`and other points of contact.
`Additional advantages of the invention Will be set forth in
`part in the description Which folloWs, and in part Will be
`apparent from the description, or may be learned by practice
`of the invention. The advantages of the invention may be
`realiZed and attained by means of the instrumentalities and
`combinations particularly pointed out in the appended
`claims.
`The accompanying draWings, Which are incorporated in
`and constitute a part of this speci?cation, illustrate various
`embodiments of the invention and, together With the
`descriptions serve to eXplain the principles of the invention.
`
`Page 16 of 28
`
`

`
`US 6,400,265 B1
`
`3
`BRIEF DESCRIPTION OF THE DRAWINGS
`
`FIG. 1 is a graphical representation of a security system
`With Wireless access, according to an embodiment of the
`present invention.
`FIG. 2 is an example of an alarm transmission, according
`to an embodiment of the present invention.
`FIG. 3 is an example of alarm propagation, according to
`an embodiment of the present invention.
`FIG. 4 is a ?oWchart illustrating a subscription process,
`according to an embodiment of the present invention.
`FIG. 5 is a ?oWchart illustrating an alarm activation
`process, according to an embodiment of the present inven
`tion.
`FIG. 6 is an example of a personal status page, according
`to an embodiment of the present invention.
`FIG. 7 is an example of a current status report, according
`to an embodiment of the present invention.
`FIG. 8 is an example of a personal report based on current,
`historical and other data, according to an embodiment of the
`present invention.
`FIG. 9 is a ?oWchart illustrating a process for accessing
`a security system, according to an embodiment of the
`present invention.
`FIG. 10 is a ?oWchart illustrating a process for accessing
`video images provided by a security system, according to an
`embodiment of the present invention.
`FIG. 11 is an example of an alarm ?oW diagram, accord
`ing to an embodiment of the present invention.
`FIG. 12a is a schematic block diagram of a voice system,
`according to an embodiment of the present invention.
`FIG. 12b is a schematic block diagram of an intelligence
`server, according to an embodiment of the present invention.
`FIG. 12c is a schematic block diagram of call server,
`according to an embodiment of the present invention.
`
`DETAILED DESCRIPTION OF THE
`PREFERRED EMBODIMENTS
`The present invention may provide a security system
`Where a user may personaliZe alert noti?cations for various
`security devices and/or systems. The present invention may
`also provide access to a Web interface (e.g., personal Web
`page) Where a user may monitor current security status and
`other information. Historical data may also be available for
`the user to generate reports based on aggregate data from
`security systems Within the netWork and/or other sources of
`data. A user may register security devices and/or systems
`With the central security netWork of the present invention.
`The central security netWork may access the user’s personal
`preferences, pro?le information and/or other information
`Which may be used to execute noti?cations in the manner
`speci?ed by the user. For example, the user may identify
`various personal preferences, Which may include contact
`information, contact individuals, methods of
`communication, order of contact, special instructions and
`other information.
`For example, When an alert situation is detected, a secu
`rity device may inform a local control panel, Which may then
`inform a central security netWork. The user may be informed
`of an alarm situation and/or alarm Worthy situations via Web,
`WAP, voice and other methods of communication, depend
`ing on the user’s preferences, permissions and/or other
`information.
`According to an embodiment of the present invention, a
`central security system may include a netWork Where a user
`
`10
`
`15
`
`25
`
`35
`
`45
`
`55
`
`65
`
`4
`may bene?t from information from and connection to other
`users. For example, the system may immediately notify a
`user about burglar strikes (or other user identi?ed alarm
`situation) in the user’s neighborhood or de?ned area (radius
`of interest or other location). The present invention may
`further provide preventive information When a user is noti
`?ed of alarm information or other prede?ned situations.
`Users may sign up for services that contact the user
`(and/or other authoriZed individuals and/or entities) When an
`alarm goes off in the user’s system, When an alarm Worthy
`situation is predicted (or otherWise detected) by the netWork,
`When a neighbor is experiencing an alarm situation and/or at
`the occurrence of other events. The conditions setting off an
`alarm, the content of the alarm service, and list of recipients
`Who may be contacted in the event of an alarm, may be
`personaliZed and updated through a Web site (or other user
`interface system) of the present invention.
`FIG. 1 is a graphical representation of a central security
`netWork system 100, according to an embodiment of the
`present invention. A user may register various types of
`security devices, including those associated With property
`110, personal property 112 and/or individuals 114 With the
`central security netWork 130 of the present invention. Alarm
`situations may be detected by a control panel 120, 122, 124
`associated With and preferably local to each security device
`and/or system (e.g., property, personal property, individual,
`or combination). Control panels 120, 122, 124 may transmit
`alarm information to central security netWork 130. Central
`security netWork 130 may process the alarm situation, status
`data and/or other relevant information.
`Databases 140, 142, 144 and 146 may store relevant
`information for personaliZed alarm services. While shoWn as
`separate databases, it should be appreciated that the contents
`of these databases may be combined into feWer or greater
`numbers of databases and may be stored on one or more data
`storage systems. User information may be obtained from
`user database 140. Alarm events and other information may
`be stored in alarm events database 142. Auser may generate
`reports based on historical and/or other data Which may be
`stored in reports database 144. Other information may be
`accessed and/or stored in other database 146. Based on user
`preferences and other information, the user may be noti?ed
`via various methods of communication, as speci?ed in the
`user’s pro?le and preferences. information. Alert noti?ca
`tion may be communicated via the Internet 150, POTS 152,
`Wireless communication portals, voice portals, and/or other
`methods. Contact individuals and/or entities 162,—162N
`identi?ed by the user may also receive alert noti?cation in an
`order determined by the user. The contact order and other
`actions may be predetermined. In addition, the user may
`select contact order and/or other actions through menu
`options at the time of alarm situation noti?cation. An emer
`gency entity 164, such as police, ?re department, and/or
`rescue squads, may receive alert information.
`A user may subscribe security systems associated With
`various objects Within the central security netWork 130 of
`the present invention. The security system may be applied to
`property 110, personal property 112, individuals 114 and
`other objects. Property 110 may include user’s home, of?ce,
`vacation house or other locations. The security system may
`also be applied to a user’s personal property 112, such as a
`car, boat or other mobile property. A security system may
`encompass personal security devices for individuals 114,
`such as a panic device. Other objects, locations, and property
`may be protected.
`Various security devices may be associated With each
`location, item of personal property, or individual Within the
`
`Page 17 of 28
`
`

`
`US 6,400,265 B1
`
`5
`central security network of the present invention. For prop
`erty 110, security devices may include sensors, detectors
`and/or other devices for detecting alarm situations. For
`personal property 112, security devices may include global
`positioning devices associated With devices capable of sens
`ing and/or detecting alarm situations. For individuals 114,
`security devices may include a panic button or other similar
`device. Other security devices may be implemented With the
`system of the present invention. For example, Wireless panic
`buttons With GPS transponders may be available as stand
`alone devices and may be built into mobile phones, cars,
`Walkmen, bicycles, WristWatches and/or other portable or
`mobile devices. Thus, a user may alert the authorities any
`time the user is in danger, from anyWhere, and transmit
`location information detailing the user’s position and/or
`other information. Other variations may be implemented.
`According to an embodiment of the present invention,
`security devices may be predominantly Wireless and com
`municate locally over short-range radio or other modes of
`communication. Each of the sensors (or group of sensors)
`may be equipped With a transmitter and the control panel
`may be equipped With a receiver. A control panel of the
`present invention may receive regular status information
`from the sensors and may be alerted When a sensor detects
`an alarm situation. Other information may be received by the
`control panel. Transmission of regular status information
`may occur at predetermined intervals, as Well. For example,
`the sensors may send digital data packets providing status.
`and other data at 10 second intervals. Also, on or off status
`information may be conveyed to central security netWork
`130.
`When an alarm situation is detected, a local control panel
`120 or other similar device may communicate to a central
`security netWork 130 of the present invention. Control
`panels 120 may serve as a link betWeen an alarm system (for
`each property, personal property, individual, or
`combination) and a central security netWork of the present
`invention. Communication may be established through vari
`ous mediums. An example may include a radio modem (e.g.,
`CreateaLink 2XT radio modem) Which may transmit radio
`Waves at a predetermined frequency (e.g., 900 MHZ) Which
`may then be received by central security. netWork 130 or at
`an intermediary system that relays the signal over a second
`ary communication channel (e.g., TCP/IP system) to central
`security netWork 130. Other examples of modes of commu
`nication may include POTS (plain old telephone service),
`cable modem, DSL (digital subscriber links), Wireless (tWo
`Way pager, packet sWitched, telephone cellular netWorks)
`and others.
`FIG. 2 is an example of an alarm transmission, according
`to an embodiment of the present invention. A location, such
`as home 210, may include various security and/or other
`devices, such as panic button 212, motion sensor 214,
`motion contact 216, home automation modules 218, Which
`communicate With control panel 220. Control panel 220 may
`send a signal via radio modem 222 to radio receiver system
`230. For example, radio modem 222 may transmit alarm and
`other data at a frequency of approximately 900 MhZ. Other
`frequencies may also be transmitted and detected. Radio
`receiver system 230 may then communicate With central
`security server 130 via a TCP/IP connection. Other commu
`nication techniques may be implemented. Central security
`server 130 may then alert users and other identi?ed entities
`via Wireless and/or other devices, such as mobile device 240,
`via a voice alarm, text message and other noti?cations. For
`example, alerts may be transmitted to the user via email or
`other form of electronic communication to a personal com
`
`10
`
`15
`
`20
`
`25
`
`30
`
`35
`
`40
`
`45
`
`55
`
`60
`
`65
`
`6
`puter 242 or other device. In addition, users may check
`status and other data via mobile device 240, computer 242
`and other devices.
`FIG. 3 is an example of alarm propagation, according to
`an embodiment of the present invention. The alarm system
`of the present invention provides an ef?cient method for
`transmitting an alarm situation and promptly notifying a user
`and/or other identi?ed entity. According to an example of the
`present invention, alarm data may be transmitted from
`control panel 314 to a user’s mobile or other device at
`approximately 30 seconds to approximately 3 minutes. At
`time T, control panel 314, located at home 310 or other
`location, may communicate alarm data to radio modem 312,
`at time T+0:05. Radio receiver system 320 may receive the
`transmitted data at time T+0:10 to 1:00. Communication to
`central security server 130 may be established at time
`T+0:15 to 1:10. Communication to radio receiver system
`322 may be established at time T+0:20 to 1:20. At time
`T+0:30 to 3:00, alarm data may be transmitted to a user’s
`device, such as a tWo-Way pager 324.
`According to an embodiment of the present invention, the
`central security netWork may provide Wireless backup for
`one or more communication connections. For example, the
`present invention may include a combination of a POTS
`connection With Wireless back-up. In the event of an alarm,
`the control panel may attempt to use the phone line to
`transmit data to a central security netWork. If data transmis
`sion via POTS is unsuccessful (e.g., if someone Were using
`the phone), the control panel may send the data Wirelessly to
`the central security netWork. In another example, a user may
`integrate still or motion video into an alarm system through
`the use of a broadband landline (e.g., cable or DSL) for
`image transmission With a Wireless connection to send alarm
`data. Other combinations may be implemented.
`According to an embodiment of the present invention,
`control panel 120 may transmit alarm information to central
`security netWork. 130 at the detection of an alarm situation.
`Various user de?ned options may be available. For example,
`control panel 120 may trigger an alarm sound When an alarm
`situation has been detected. Based on user de?ned
`preferences, a user may be noti?ed before the sounding of an
`alarm and before contacting an emergency entity (e.g.,
`police, ambulance, etc.) to reduce false alarm penalties and
`fees. In addition, control panel 120 may trigger an alarm
`sound and con?rm With the user via noti?cation methods
`Where the user may terminate the alarm sound if determined
`to be false, before an emergency entity has been contacted.
`Thus, the user may specify that an alarm sound be triggered
`but police noti?cation to be con?rmed by the user before
`dispatch. In another example, if the user cannot be contacted
`for con?rmation Within a predetermined time frame, the
`system may automatically contact an emergency entity. The,
`user may personaliZe various parameters and responses
`based on the alarm situations involved. Other variations may
`be implemented.
`Central security netWork 130 may process the alarm
`situation. User pro?le information. may be retrieved from
`user database 140. User database 140 may contain user
`information, such as pro?le information, user preferences,
`contact information, special instructions and/or other infor
`mation. User pro?le information may include one or more of
`name, identi?cation information, address information, and
`other pro?le information. User preferences may include
`mode of communication, order of communication, contact
`information and other preferences. User preference infor
`mation may be associated With each security device, group
`of devices, systems or other combinations. For example,
`
`Page 18 of 28
`
`

`
`US 6,400,265 B1
`
`7
`different alarm situations that may be detected in various
`locations or systems may Warrant different levels of
`response. In addition, a user may maintain a personal
`address book Where contact information (e.g., phone, pager,
`mobile device, etc.) associated With various individuals may
`be stored and accessed based on various identi?ed alarm
`situations and/or potential alarm situations. Special instruc
`tions may include information to be conveyed to entities
`reacting to the alarm for a particular location or object. For
`eXample, When a ?re detector is activated, the user may Want
`to inform the ?re department that the user has tWo pets living
`at the user’s primary residence. Other instructions for dif
`ferent registered locations, objects and/or individuals may
`be stored and conveyed to entities reacting to the alarm
`situation per the user’s instructions or preferences.
`In another embodiment of the present invention, the
`functions described herein for central security server 130
`may be provided in each security device and/or control
`panel. In that embodiment, each individual security device
`and/or control panel may initiate noti?cation Wirelessly
`directly to the user based on user noti?cation preferences
`and data detected at the security device(s). Information from
`the individual security devices may still be transmitted to a
`central system to store as part of aggregate data discussed in
`more detail beloW.
`Alarm events database 142 may contain historical alarm
`and/or other data. Alarm events database 142 may maintain
`data related to alarm events and other alarm Worthy situa
`tions Within a netWork and/or community. Other information
`may be stored and other sources of information may be
`accessed. This data may be used to generate reports based on
`aggregated data. For example, a user may request a report
`regarding home burglaries or other break-ins Within a 10
`mile radius of the user’s primary home for the past 6 months.
`Other locations, time frames and factors may be identi?ed in
`generating a report. Maps, charts and/or other graphics may
`be used to display historical alarm data based on user
`speci?cs.
`Reports database 144 may contain a repository of user
`generated reports. These reports may be modi?ed by the user
`at later times. Also, a user may request periodic updates on
`generated reports at predetermined intervals of time. Ot

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket