`Saylor et al.
`
`US006400265B1
`(10) Patent N0.:
`US 6,400,265 B1
`(45) Date of Patent:
`Jun. 4, 2002
`
`(54) SYSTEM AND METHOD FOR MONITORING
`SECURITY SYSTEMS BY USING VIDEO
`IMAGES
`
`_
`-
`_
`-
`(75) Inventors. M1chaelJ.'Sayl0'r, McLean, Alison
`Slavln, Arlington, J ean-Paul Hugues
`.
`Mam“, Oaktom an of VA (Us)
`_
`_
`(73) Ass1gnee: MlcroStrategy, IIlC., McLean, VA (US)
`
`( * ) Notice:
`
`Subject to any disclaimer, the term of this
`patent is extended or adjusted under 35
`U‘SC' 154(k)) by 0 days‘
`
`(21) Appl. No.: 09/840,303
`(22) Filed:
`Apr. 24, 2001
`
`(51) Int. Cl.7 ................................................ .. G08B 1/00
`(52) US. Cl. ..................... .. 340/531; 340/506; 340/539;
`340/514; 340/937
`(58) Field of Search ............................... .. 340/506, 507,
`340/514, 517, 521, 539, 937, 53L 3-1
`
`(56)
`
`References Cited
`U_S_ PATENT DOCUMENTS
`
`6/1991 Reid
`5,027,104 A
`5,091,780 A * 2/1992 Pomerleau ................ .. 348/152
`5,111,291 A
`5/1992 Erickson et al.
`5,471,239 A 11/1995 Hill et al.
`5,581,297 A 12/1996 K01 et al.
`5,717,379 A
`2/1998 Peters
`5,731,832 A
`3/1998 Ng
`
`5,831,669 A 11/1998 Adrain
`5,926,210 A
`7/1999 Hacks?" et 91
`6,038,289 A
`3/2000 Sands
`6,049,353 A
`4/2000 Gray
`6,067,346 A
`5/2000 AkhteruZZaman et al.
`6,067,571 A
`50000 lgarashi et a1‘
`6 069 655 A
`5
`,
`,
`/2000 Seeley et al.
`6,091,771 A
`7/2000 Seeley et al.
`6,097,429 A
`8/2000 Seeley et al.
`6,108,034 A
`8/2000 Kim
`
`* Cited by eXaIIliner
`
`Primary Examzner—Daryl Pope
`(74) Attorney, Agent, or Firm—Hunton & Williams
`
`ABSTRACT
`(57)
`The present invention provides a monitoring system for
`providing images e.g., photos, pictures, video, diagram,
`illustration, etc‘) Wgere an alarm Situation may be defected
`by Comparing images‘ When a Change (indicating motion) is
`detected, an alarm may be signaled or other user-de?ned
`response may be invoked In addition, the image and other
`relevant data may be conveyed to a central security network
`where identi?ed individuals may be alerted via identi?ed
`methods. The user may also view the images (e.g., video
`clips) remotely‘ via the web or other method. The present
`invention provides a personal security network where an
`individual’s system or systems of security devices may be
`connected to a central security network. The central security
`network of the present invention may monitor a system’s
`status and alert the individual when an alert situation occurs.
`
`26 Claims, 14 Drawing Sheets
`
`100
`\v
`
`PROPERTY
`1_1g
`
`
`
`CONTROL PQQOEL
`
`_
`
`PERSONAL
`PROPERTY
`
`l/’’
`
`,
`
`I,’
`,1
`
`CENTRAL
`
`SECURITY
`SERvER
`
`1E
`
`CONTROL
`PANEL
`12
`
`/
`
`INTERNET
`150
`
`y
`
`/ \
`l
`uSER
`USER
`1Q
`1@
`
`}
`
`I
`
`I,
`
`'ND'V1'1'4UALS
`—
`CONTROL
`1g
`
`PANEL
`
`DATABASE
`1_4Q
`
`[gig/{SE
`142
`—
`
`DATABASE
`E
`
`DATABASE
`E
`
`: CONTACT1
`121
`
`:
`
`CONTACT
`N
`@N
`
`= EME§E4ENCY
`
`_
`
`SAMSUNG EXHIBIT 1013
`
`Page 1 of 28
`
`
`
`U.S. Patent
`
`Jun. 4, 2002
`
`Sheet 1 0f 14
`
`US 6,400,265 B1
`
`mm<m<e<amm<m<H<o
`
`mténmmm:,m>m_
`
`
`
`
`
`.IIfigcl:9;V:m_m<m_<Eomw<m<Eo
`
`QrBfizoo
`
`zmlfizBézoo
`
`E>ozmo~m_E
`
`F.O_n_
`
`4<mHzmo
`
`>:m=omm
`
`mm>mm_w
`
`.cm._
`
`>Emn_oE
`
`cl:
`
`4<zommm¢
`
`>»mm¢omm
`
`Page 2 of 28
`
`Page 2 of 28
`
`
`
`
`
`
`U.S. Patent
`
`Jun. 4, 2002
`
`Sheet 2 0f 14
`
`US 6,400,265 B1
`
`
`
`_2m._.w>mm_>_m_8~_oaé
`
`elm
`
`
`
`NmzmmtzammEsau
`
`dfl
`
`Page 3 of 28
`
`Page 3 of 28
`
`
`
`
`
`U.S. Patent
`
`Jun. 4, 2002
`
`Sheet 3 0f 14
`
`US 6,400,265 B1
`
`m u n
`
`m E Q
`
`m 228?
`
`m. ............ E2 ............. 1m ,5
`E20:
`
`m 582 921 m W?
`
`
`
`m “ E55 imam 92m
`
`Q3 2 25¢
`
`m .QE
`
`8.85.? § 3
`
`5 2 RE
`
`
`
`
`
`. < . ?zzmzmam 99a . < . 5% 218mm 55%
`
`“E2
`
`.252
`
`Q3055
`
`Page 4 of 28
`
`
`
`U.S. Patent
`
`Jun. 4, 2002
`
`Sheet 4 0f 14
`
`US 6,400,265 B1
`
`USER ACCESSES
`WEBSITE
`
`I
`
`USER CREATES
`PROFILE
`
`\4I0
`
`\ 412
`
`II
`USER CREATES
`
`PURCHASE
`SECURITY DEVICES
`APPROVED BY
`WEBSITE ?
`
`416
`
`SECURITY DEVICES
`ARE AUTOMATICALLY
`REG|STERED
`\
`41s
`
`REGISTER SECURITY
`DEVICES
`
`\420
`
`II
`ASSIGN FUNCTIONS TO
`EACH ALARM DEVICES
`
`\ 422
`
`Y
`ASSIGN NOTIFICATION
`
`FIG. 4
`
`Page 5 of 28
`
`
`
`U.S. Patent
`
`Jun. 4, 2002
`
`Sheet 5 0f 14
`
`US 6,400,265 B1
`
`DETECT ALARM SITUATION
`l
`
`\ 510
`
`CONTRON PANEL
`COMMUNICATES TO
`NETWORK
`
`V
`SEND DATA PACKET
`WITH IDENTIFICATION
`INFORMATION
`
`V
`
`ACCESS USER PROFILE
`INFORMATION
`
`V
`
`PROCESS ALARM
`INFORMATION
`
`\ 512
`
`\ 514
`
`\ 516
`
`\ 51s
`
`EXECUTE NOTIFICATIONS
`AND/OR
`OTHER OPERATIONS
`
`\ 520
`
`J
`
`Y
`
`FIG. 5
`
`Page 6 of 28
`
`
`
`U.S. Patent
`
`Jun. 4, 2002
`
`Sheet 6 6f 14
`
`US 6,400,265 B1
`
`CURRENT STATUS
`MODULE m
`
`PERSONAL REPORTS
`MODULE Q
`
`EQUIPMENT CONTROL
`MODULE gag
`
`FIG. 6
`
`Page 7 of 28
`
`
`
`U.S. Patent
`
`Jun. 4, 2002
`
`Sheet 7 of 14
`
`US 6,400,265 B1
`
`
`
`tomw.=<.EnIIm:.:Pws_m<._<hzmmmzo
`
`mmaommIigl |I
`
`Eaommmzoflz;_m_E2mQ zo=<o3
`
`
`
`
`mn__xozos_zo$_<oaE<>m_._m_Hmoodozaomo
`
`
`zoommozmmmmzooH._.:.;>ommmn_s_<»m<>>mu_<wm:o>az_<2m_o_u_.._o
`E.mH%_E_!gzmsmmEtous:Em._<$5Im__.:._.<25585.:>>m_>
`
`
`
`m_+m%.w_pmM_wm__,.‘_m,m__mm\V,mH__._4ooEm._<mm_<5.5
`
`.oz_w_mIi2,;Im_x<Sm.m=ommoz<n_IizoomammmmFo.<_2I
`mmnommgown._.<OmHIigl
`
`xoH335I
`
`xo
`
`N._U_u_
`
`om
`
`
`
`m_u=>>>.=2<u_
`
`
`
`
`
`
`
`Emmxaox._o25ozbtzoom_a:om._on_
`
`m..m_$E@_G®.0.0
`
`___.s_E9%magiseemas:§§_Em22,3*5
`
`
`
`s8.Em_m.;;§a2mm$_%<_
`
`
`
`
`
`2%w_8Hm2_§E5;amgm_.2290$502..tomEo_s_m..F<pm_2m«J<E
`
`
`
`
`
`Page 8 of 28
`
`Page 8 of 28
`
`
`
`
`U.S. Patent
`
`Jun. 4, 2002
`
`Sheet 8 of 14
`
`US 6,400,265 B1
`
`
`
`
`
`
`
`
`
`oE:.\._2_Eoown__c._Ew>oz$330.EEB%m.2a_.<22.2:...Es._E_<zen:Ewan»;bmzcwn
`
`
`
`
`
`
`
`
`
`w.O_u_
`
`aw
`
`
`
`kzmmzsoEozzwz>._Suom_m:cm._mn_
`
`
`
`
`
`m.@_%E@G®.9.nv
`
`E5__m_2SE...m2_._2au_55$wee:523.3.»52.:*3
`
`Eoo.E._m_m._s32<\_&Efl$e%<_
`
`
`
`9%.m_8H§_§$is:3gm_.m.o_axm.mE9:_tow9o__2mtoqomEou.E._m_<Q
`
`
`
`
`
`Page 9 of 28
`
`_m>w._
`
`HEn8PMOLNMmum
`
`:o_w:h:_Saws_..§Ir_nm._0009:0
`cofiuo
`
`MEENO850E;nm._0009:01
`
`
`
`co=moo._ow0>>_2m
`
`
`
`:o=o_>__u._m>xomm
`
`co:uoo._£5.
`
`co=moo._moo
`
`toaom<mmooso
`
`Page 9 of 28
`
`
`
`U.S. Patent
`
`Jun. 4, 2002
`
`Sheet 9 0f 14
`
`US 6,400,265 B1
`
`PROMPT USER WITH ALARM
`AND OPTIONS
`
`\ 910
`
`USER ACCESSES CENTRAL
`ALARM NETWORK \ 912
`
`CONFIRM IDENTITY
`
`\ 914
`
`NAVIGATE MENU
`
`\ 916
`
`SELECT ACTION
`
`\ 918
`
`FIG. 9
`
`Page 10 of 28
`
`
`
`U.S. Patent
`
`Jun. 4, 2002
`
`Sheet 10 0f 14
`
`US 6,400,265 B1
`
`7
`
`1012 / COMPARE IMAGE X+1 TO IMAGE X 4
`
`X=X+1
`
`NO
`
`E
`,
`
`STORE IN
`DATABASE
`
`104s
`
`1014
`
`YES
`
`1016 / COMPRESS IMAGES
`
`‘
`SEND IMAGES AND/OR
`/ INFORMATION TO CENTRAL
`102°
`SECURITY NETWORK
`I
`ACCESS USER
`INFORMATION
`I
`PROCESS IMAGES
`I024 / AND/OR INFORMATION
`
`I022 /
`
`_ V
`
`EXECUTE NOTIFICATIONS
`1026 / AND/OR OTHER OPERATIONS
`I
`ENABLE USER TO VIEW IMAGES
`1028 / AND/OR OTHER INFORMATION
`
`FIG. 10
`
`Page 11 of 28
`
`
`
`U.S. Patent
`
`Jun. 4, 2002
`
`Sheet 11 of 14
`
`US 6,400,265 B1
`
`Hwmowzmm
`
`_w5<:,_8
`
`_II
`
`
`
`om_zo_5_>_-mag;
`
`M20:
`
`w$E_>>Q.8|:éo>Ez
`asgME$Q_>oE
`_E8_>_oaé
`
`Ea$55:
`
`n__Eo._.
`
`5
`
`
`
`owl:EzmwmE%8Z<E_,mo
`
`§mzmom
`
`an$m_m8%w
`
`mm2_<s_-m
`
`as$9:
`
`g65>
`
`§mmmaomm
`
`Q2§s8
`
`8z_>_o5<
`
`E$53:5
`
`E5<8<o%
`
`§%5<8E
`
`85>
`
`maEa
`
`gEm$2
`
`3
`
`Page 12 of 28
`
`Page 12 of 28
`
`
`
`
`
`
`
`
`U.S. Patent
`
`Jun. 4, 2002
`
`Sheet 12 0f 14
`
`US 6,400,265 B1
`
`SUBSCRIPTION INTERFACE
`
`\20
`
`201_/ WWW
`
`OTHER
`
`PHONE \‘202
`
`SUBSCRIBERAPI
`
`A
`
`‘203
`
`CALL SERVER
`
`"
`ADMINISTRATIVE CONSOLE
`
`SOFTWARE
`
`=
`
`E
`
`HARDWARE
`
`BACKEND SERVER
`
`16
`
`M
`I
`
`A
`I
`
`DSS SERVER
`
`OUT INPUT/FILES
`
`\24
`
`14/
`
`CALLING
`DATABASE
`
`\12
`
`FIG. 12A
`
`Page 13 of 28
`
`
`
`U.S. Patent
`
`Jun. 4, 2002
`
`Sheet 13 0f 14
`
`US 6,400,265 B1
`
`ADMINISTRATOR CONSOLE
`
`/161
`
`1612/
`
`SCHEDULES
`
`SERVICE WIZARD
`\1616
`
`1613/
`
`EXCEPTIONS
`
`PERSONAL
`I614 ’ CALL SETTINGS
`
`ADDRESS
`HANDLING
`
`\1615
`
`SYSTEM ADMIN
`
`\1611
`
`VOICE SERVICE API
`
`\162
`
`BACKEND SERVER
`
`/163
`
`PERSONALIZATION
`1632/
`ENGINE
`
`1634/ SQL ENGINE
`
`1633/ SCHEDULER
`
`TML/XML
`ENGINE
`&
`REPORT
`FORMATTER
`
`REPOSITORY
`
`FIG. 12B
`
`\1631
`
`/164
`
`Page 14 of 28
`
`
`
`U.S. Patent
`
`Jun. 4, 2002
`
`Sheet 14 0f 14
`
`US 6,400,265 B1
`
`A \oo
`
`SOFTWARE COMPONENTS
`
`1811
`
`CALL DATABASE
`II
`
`1816
`/
`CALL STATISTICS
`
`->
`
`USER RESPONSE
`1815/
`
`II
`
`II
`
`\1812
`
`XML PARSING
`ENGINE
`II
`II
`CALL BUILDER
`{
`\1813
`
`v
`TEXT-TO-SPEECH
`ENGINE
`
`1814
`
`\
`181
`
`PHONES LINES
`
`HARDWARE COMPONENTS
`COMPUTER
`TELEPHONY
`
`PROCESSOR
`
`FIG. 12C
`
`Page 15 of 28
`
`
`
`US 6,400,265 B1
`
`1
`SYSTEM AND METHOD FOR MONITORING
`SECURITY SYSTEMS BY USING VIDEO
`IMAGES
`
`FIELD OF THE INVENTION
`
`The present invention relates generally to the ?eld of
`security systems, in particular to a system and method for
`monitoring a security system by using video images Where
`a Wireless communication system may be used to automati
`cally inform an oWner and other authoriZed entities in a
`manner predetermined by the user When alarm situations
`and/or alarm Worthy situations occur.
`
`BACKGROUND OF THE INVENTION
`Home security and personal safety are major concerns for
`individuals. People Want to protect their valuables and
`provide a safe haven for family members and loved ones.
`Traditional home security systems generally alert neighbors
`and others Within the vicinity With a loud noise Warning the
`intruder. or intruders that the invasion has been detected. In
`addition, home alarms generally inform a home security
`central system of the unauthoriZed entry. The home security,
`central system then alerts the police and/or third party
`security companies that an unauthoriZed. entry has occurred.
`Home security devices generally involve WindoW detectors,
`door detectors, motion sensors and other devices.
`High false alarm rates pose a serious problem in commu
`nities. False alarms deplete police resources and undermine
`the credibility of systems that appear to repeatedly malfunc
`tion. In response to the high number of false alarms (over
`90% in some areas), counties and other localities may ?ne
`alarm oWners Whose systems repeatedly produce false
`alarms in an attempt to reduce staggering false alarm rates.
`In some communities, laWs have been passed that prevent
`the police from responding to an alarm activated by a
`security system. As a result, alarm oWners may be forced to
`employ expensive third party security companies to respond
`to alarm situations.
`Some systems may place a con?rmation call or commu
`nication to the oWner before dispatching the police or other
`security entity. This may be helpful When the oWner is at
`home to eXplain that the alarm Was a false alarm thereby
`preempting the alarm and police dispatch. In other
`situations, the alarm may have been triggered inadvertently
`by a pet, falling branch or other innocent act While the home
`oWner is aWay. In such an event, an attempt to make a
`con?rmation call to the oWner at home is ineffective, Tra
`ditional central alarm systems often fail to proactively
`contact a home oWner While the home oWner is in transit. In
`addition, poWer failures and other poWer cutoffs may pre
`vent traditional alarm systems from contacting a user in the
`event of an alarm situation.
`Currently, home security systems offer limited services.
`Generally, all alarm situations are treated in the same
`manner. The industry itself has remained stagnant and
`in?exible. Generally, current security services are con?ned
`to sounding an alarm and/or dispatching the police or other
`security entity. Depending on the type of event detected, a
`user may desire responses in varying degrees of severity.
`Similar problems eXist With other security systems for of?ce
`buildings, cars, boats, vaults and other objects or locations.
`These and other draWbacks eXist With current systems.
`
`10
`
`15
`
`20
`
`25
`
`30
`
`35
`
`40
`
`45
`
`55
`
`60
`
`SUMMARY OF THE INVENTION
`The present invention provides a security system con
`nected to a Wireless communication system Which enables
`
`65
`
`2
`communication With a subscriber user When an alarm (or
`other de?ned), situation occurs. The security system may be
`applied to a user’s home, of?ce, vacation house or other
`location. The security system may also be applied to a user’s
`mobile property, such as a car, boat or other personal
`property. In addition, a security system may encompass
`personal security devices for individuals, such as a panic
`device.
`According to one embodiment, the present invention
`provides a personal security netWork Where one or more
`security devices related to a subscriber may be connected to
`a central security netWork over Wireless communication.
`The central security netWork of the present invention may
`monitor those security devices and alert a user When an alert
`situation occurs. The user may set up personaliZed alarms
`and alert services; identify various methods of contact;
`identify the order at Which to be contacted; individuals and
`entities to be contacted; select the type of situations for
`Which they Want to be alerted and provide other relevant
`security and other information.
`ApersonaliZed Web interface (e.g., Internet, Wireless Web,
`PDA Web, etc.) may also be provided through Which a user
`and authoriZed individuals may vieW current and historical
`security device status. Auser may initiate contact With a Web
`interface to conveniently vieW and/or monitor data for
`registered alarm sensors at various locations, Zones, etc. A
`user may also generate personaliZed reports or have those
`reports automatically generated for them from aggregated
`historical data and other information based on user de?ned
`factors, such as area of interest, type of event(s), time
`frame(s) and other factors. The reports may be displayed to
`the user in various formats, such as maps, graphs, statistics,
`and others formats.
`According to this or other embodiment, the present inven
`tion may further provide a monitoring system for providing
`images (e.g., photos, pictures, video, diagrams, illustrations,
`etc.) Where an alarm situation may be detected by comparing
`images. When a change in images (indicating motion) is
`detected, an alarm may be signaled. In addition, the image
`and other information may be conveyed to a central security
`netWork Where identi?ed individuals may be alerted via
`identi?ed methods. The user may also vieW the images (e. g.,
`video clips) remotely via the Web or other remote access
`methods.
`Users may also monitor and/or control appliances and
`objects remotely via a Wireless channel, Which may also be
`the channel used to send alarm events, alarm broadcasts and
`other information.
`According to another embodiment of the present
`invention, the system of the present invention provides a
`Wireless communication device at a home security system
`Which relays a Wireless communication from the home
`security device directly to the user’s desired devices in such
`a Way so that poWer failures and other poWer cutoff situa
`tions do not prevent the relay of information to the oWner
`and other points of contact.
`Additional advantages of the invention Will be set forth in
`part in the description Which folloWs, and in part Will be
`apparent from the description, or may be learned by practice
`of the invention. The advantages of the invention may be
`realiZed and attained by means of the instrumentalities and
`combinations particularly pointed out in the appended
`claims.
`The accompanying draWings, Which are incorporated in
`and constitute a part of this speci?cation, illustrate various
`embodiments of the invention and, together With the
`descriptions serve to eXplain the principles of the invention.
`
`Page 16 of 28
`
`
`
`US 6,400,265 B1
`
`3
`BRIEF DESCRIPTION OF THE DRAWINGS
`
`FIG. 1 is a graphical representation of a security system
`With Wireless access, according to an embodiment of the
`present invention.
`FIG. 2 is an example of an alarm transmission, according
`to an embodiment of the present invention.
`FIG. 3 is an example of alarm propagation, according to
`an embodiment of the present invention.
`FIG. 4 is a ?oWchart illustrating a subscription process,
`according to an embodiment of the present invention.
`FIG. 5 is a ?oWchart illustrating an alarm activation
`process, according to an embodiment of the present inven
`tion.
`FIG. 6 is an example of a personal status page, according
`to an embodiment of the present invention.
`FIG. 7 is an example of a current status report, according
`to an embodiment of the present invention.
`FIG. 8 is an example of a personal report based on current,
`historical and other data, according to an embodiment of the
`present invention.
`FIG. 9 is a ?oWchart illustrating a process for accessing
`a security system, according to an embodiment of the
`present invention.
`FIG. 10 is a ?oWchart illustrating a process for accessing
`video images provided by a security system, according to an
`embodiment of the present invention.
`FIG. 11 is an example of an alarm ?oW diagram, accord
`ing to an embodiment of the present invention.
`FIG. 12a is a schematic block diagram of a voice system,
`according to an embodiment of the present invention.
`FIG. 12b is a schematic block diagram of an intelligence
`server, according to an embodiment of the present invention.
`FIG. 12c is a schematic block diagram of call server,
`according to an embodiment of the present invention.
`
`DETAILED DESCRIPTION OF THE
`PREFERRED EMBODIMENTS
`The present invention may provide a security system
`Where a user may personaliZe alert noti?cations for various
`security devices and/or systems. The present invention may
`also provide access to a Web interface (e.g., personal Web
`page) Where a user may monitor current security status and
`other information. Historical data may also be available for
`the user to generate reports based on aggregate data from
`security systems Within the netWork and/or other sources of
`data. A user may register security devices and/or systems
`With the central security netWork of the present invention.
`The central security netWork may access the user’s personal
`preferences, pro?le information and/or other information
`Which may be used to execute noti?cations in the manner
`speci?ed by the user. For example, the user may identify
`various personal preferences, Which may include contact
`information, contact individuals, methods of
`communication, order of contact, special instructions and
`other information.
`For example, When an alert situation is detected, a secu
`rity device may inform a local control panel, Which may then
`inform a central security netWork. The user may be informed
`of an alarm situation and/or alarm Worthy situations via Web,
`WAP, voice and other methods of communication, depend
`ing on the user’s preferences, permissions and/or other
`information.
`According to an embodiment of the present invention, a
`central security system may include a netWork Where a user
`
`10
`
`15
`
`25
`
`35
`
`45
`
`55
`
`65
`
`4
`may bene?t from information from and connection to other
`users. For example, the system may immediately notify a
`user about burglar strikes (or other user identi?ed alarm
`situation) in the user’s neighborhood or de?ned area (radius
`of interest or other location). The present invention may
`further provide preventive information When a user is noti
`?ed of alarm information or other prede?ned situations.
`Users may sign up for services that contact the user
`(and/or other authoriZed individuals and/or entities) When an
`alarm goes off in the user’s system, When an alarm Worthy
`situation is predicted (or otherWise detected) by the netWork,
`When a neighbor is experiencing an alarm situation and/or at
`the occurrence of other events. The conditions setting off an
`alarm, the content of the alarm service, and list of recipients
`Who may be contacted in the event of an alarm, may be
`personaliZed and updated through a Web site (or other user
`interface system) of the present invention.
`FIG. 1 is a graphical representation of a central security
`netWork system 100, according to an embodiment of the
`present invention. A user may register various types of
`security devices, including those associated With property
`110, personal property 112 and/or individuals 114 With the
`central security netWork 130 of the present invention. Alarm
`situations may be detected by a control panel 120, 122, 124
`associated With and preferably local to each security device
`and/or system (e.g., property, personal property, individual,
`or combination). Control panels 120, 122, 124 may transmit
`alarm information to central security netWork 130. Central
`security netWork 130 may process the alarm situation, status
`data and/or other relevant information.
`Databases 140, 142, 144 and 146 may store relevant
`information for personaliZed alarm services. While shoWn as
`separate databases, it should be appreciated that the contents
`of these databases may be combined into feWer or greater
`numbers of databases and may be stored on one or more data
`storage systems. User information may be obtained from
`user database 140. Alarm events and other information may
`be stored in alarm events database 142. Auser may generate
`reports based on historical and/or other data Which may be
`stored in reports database 144. Other information may be
`accessed and/or stored in other database 146. Based on user
`preferences and other information, the user may be noti?ed
`via various methods of communication, as speci?ed in the
`user’s pro?le and preferences. information. Alert noti?ca
`tion may be communicated via the Internet 150, POTS 152,
`Wireless communication portals, voice portals, and/or other
`methods. Contact individuals and/or entities 162,—162N
`identi?ed by the user may also receive alert noti?cation in an
`order determined by the user. The contact order and other
`actions may be predetermined. In addition, the user may
`select contact order and/or other actions through menu
`options at the time of alarm situation noti?cation. An emer
`gency entity 164, such as police, ?re department, and/or
`rescue squads, may receive alert information.
`A user may subscribe security systems associated With
`various objects Within the central security netWork 130 of
`the present invention. The security system may be applied to
`property 110, personal property 112, individuals 114 and
`other objects. Property 110 may include user’s home, of?ce,
`vacation house or other locations. The security system may
`also be applied to a user’s personal property 112, such as a
`car, boat or other mobile property. A security system may
`encompass personal security devices for individuals 114,
`such as a panic device. Other objects, locations, and property
`may be protected.
`Various security devices may be associated With each
`location, item of personal property, or individual Within the
`
`Page 17 of 28
`
`
`
`US 6,400,265 B1
`
`5
`central security network of the present invention. For prop
`erty 110, security devices may include sensors, detectors
`and/or other devices for detecting alarm situations. For
`personal property 112, security devices may include global
`positioning devices associated With devices capable of sens
`ing and/or detecting alarm situations. For individuals 114,
`security devices may include a panic button or other similar
`device. Other security devices may be implemented With the
`system of the present invention. For example, Wireless panic
`buttons With GPS transponders may be available as stand
`alone devices and may be built into mobile phones, cars,
`Walkmen, bicycles, WristWatches and/or other portable or
`mobile devices. Thus, a user may alert the authorities any
`time the user is in danger, from anyWhere, and transmit
`location information detailing the user’s position and/or
`other information. Other variations may be implemented.
`According to an embodiment of the present invention,
`security devices may be predominantly Wireless and com
`municate locally over short-range radio or other modes of
`communication. Each of the sensors (or group of sensors)
`may be equipped With a transmitter and the control panel
`may be equipped With a receiver. A control panel of the
`present invention may receive regular status information
`from the sensors and may be alerted When a sensor detects
`an alarm situation. Other information may be received by the
`control panel. Transmission of regular status information
`may occur at predetermined intervals, as Well. For example,
`the sensors may send digital data packets providing status.
`and other data at 10 second intervals. Also, on or off status
`information may be conveyed to central security netWork
`130.
`When an alarm situation is detected, a local control panel
`120 or other similar device may communicate to a central
`security netWork 130 of the present invention. Control
`panels 120 may serve as a link betWeen an alarm system (for
`each property, personal property, individual, or
`combination) and a central security netWork of the present
`invention. Communication may be established through vari
`ous mediums. An example may include a radio modem (e.g.,
`CreateaLink 2XT radio modem) Which may transmit radio
`Waves at a predetermined frequency (e.g., 900 MHZ) Which
`may then be received by central security. netWork 130 or at
`an intermediary system that relays the signal over a second
`ary communication channel (e.g., TCP/IP system) to central
`security netWork 130. Other examples of modes of commu
`nication may include POTS (plain old telephone service),
`cable modem, DSL (digital subscriber links), Wireless (tWo
`Way pager, packet sWitched, telephone cellular netWorks)
`and others.
`FIG. 2 is an example of an alarm transmission, according
`to an embodiment of the present invention. A location, such
`as home 210, may include various security and/or other
`devices, such as panic button 212, motion sensor 214,
`motion contact 216, home automation modules 218, Which
`communicate With control panel 220. Control panel 220 may
`send a signal via radio modem 222 to radio receiver system
`230. For example, radio modem 222 may transmit alarm and
`other data at a frequency of approximately 900 MhZ. Other
`frequencies may also be transmitted and detected. Radio
`receiver system 230 may then communicate With central
`security server 130 via a TCP/IP connection. Other commu
`nication techniques may be implemented. Central security
`server 130 may then alert users and other identi?ed entities
`via Wireless and/or other devices, such as mobile device 240,
`via a voice alarm, text message and other noti?cations. For
`example, alerts may be transmitted to the user via email or
`other form of electronic communication to a personal com
`
`10
`
`15
`
`20
`
`25
`
`30
`
`35
`
`40
`
`45
`
`55
`
`60
`
`65
`
`6
`puter 242 or other device. In addition, users may check
`status and other data via mobile device 240, computer 242
`and other devices.
`FIG. 3 is an example of alarm propagation, according to
`an embodiment of the present invention. The alarm system
`of the present invention provides an ef?cient method for
`transmitting an alarm situation and promptly notifying a user
`and/or other identi?ed entity. According to an example of the
`present invention, alarm data may be transmitted from
`control panel 314 to a user’s mobile or other device at
`approximately 30 seconds to approximately 3 minutes. At
`time T, control panel 314, located at home 310 or other
`location, may communicate alarm data to radio modem 312,
`at time T+0:05. Radio receiver system 320 may receive the
`transmitted data at time T+0:10 to 1:00. Communication to
`central security server 130 may be established at time
`T+0:15 to 1:10. Communication to radio receiver system
`322 may be established at time T+0:20 to 1:20. At time
`T+0:30 to 3:00, alarm data may be transmitted to a user’s
`device, such as a tWo-Way pager 324.
`According to an embodiment of the present invention, the
`central security netWork may provide Wireless backup for
`one or more communication connections. For example, the
`present invention may include a combination of a POTS
`connection With Wireless back-up. In the event of an alarm,
`the control panel may attempt to use the phone line to
`transmit data to a central security netWork. If data transmis
`sion via POTS is unsuccessful (e.g., if someone Were using
`the phone), the control panel may send the data Wirelessly to
`the central security netWork. In another example, a user may
`integrate still or motion video into an alarm system through
`the use of a broadband landline (e.g., cable or DSL) for
`image transmission With a Wireless connection to send alarm
`data. Other combinations may be implemented.
`According to an embodiment of the present invention,
`control panel 120 may transmit alarm information to central
`security netWork. 130 at the detection of an alarm situation.
`Various user de?ned options may be available. For example,
`control panel 120 may trigger an alarm sound When an alarm
`situation has been detected. Based on user de?ned
`preferences, a user may be noti?ed before the sounding of an
`alarm and before contacting an emergency entity (e.g.,
`police, ambulance, etc.) to reduce false alarm penalties and
`fees. In addition, control panel 120 may trigger an alarm
`sound and con?rm With the user via noti?cation methods
`Where the user may terminate the alarm sound if determined
`to be false, before an emergency entity has been contacted.
`Thus, the user may specify that an alarm sound be triggered
`but police noti?cation to be con?rmed by the user before
`dispatch. In another example, if the user cannot be contacted
`for con?rmation Within a predetermined time frame, the
`system may automatically contact an emergency entity. The,
`user may personaliZe various parameters and responses
`based on the alarm situations involved. Other variations may
`be implemented.
`Central security netWork 130 may process the alarm
`situation. User pro?le information. may be retrieved from
`user database 140. User database 140 may contain user
`information, such as pro?le information, user preferences,
`contact information, special instructions and/or other infor
`mation. User pro?le information may include one or more of
`name, identi?cation information, address information, and
`other pro?le information. User preferences may include
`mode of communication, order of communication, contact
`information and other preferences. User preference infor
`mation may be associated With each security device, group
`of devices, systems or other combinations. For example,
`
`Page 18 of 28
`
`
`
`US 6,400,265 B1
`
`7
`different alarm situations that may be detected in various
`locations or systems may Warrant different levels of
`response. In addition, a user may maintain a personal
`address book Where contact information (e.g., phone, pager,
`mobile device, etc.) associated With various individuals may
`be stored and accessed based on various identi?ed alarm
`situations and/or potential alarm situations. Special instruc
`tions may include information to be conveyed to entities
`reacting to the alarm for a particular location or object. For
`eXample, When a ?re detector is activated, the user may Want
`to inform the ?re department that the user has tWo pets living
`at the user’s primary residence. Other instructions for dif
`ferent registered locations, objects and/or individuals may
`be stored and conveyed to entities reacting to the alarm
`situation per the user’s instructions or preferences.
`In another embodiment of the present invention, the
`functions described herein for central security server 130
`may be provided in each security device and/or control
`panel. In that embodiment, each individual security device
`and/or control panel may initiate noti?cation Wirelessly
`directly to the user based on user noti?cation preferences
`and data detected at the security device(s). Information from
`the individual security devices may still be transmitted to a
`central system to store as part of aggregate data discussed in
`more detail beloW.
`Alarm events database 142 may contain historical alarm
`and/or other data. Alarm events database 142 may maintain
`data related to alarm events and other alarm Worthy situa
`tions Within a netWork and/or community. Other information
`may be stored and other sources of information may be
`accessed. This data may be used to generate reports based on
`aggregated data. For example, a user may request a report
`regarding home burglaries or other break-ins Within a 10
`mile radius of the user’s primary home for the past 6 months.
`Other locations, time frames and factors may be identi?ed in
`generating a report. Maps, charts and/or other graphics may
`be used to display historical alarm data based on user
`speci?cs.
`Reports database 144 may contain a repository of user
`generated reports. These reports may be modi?ed by the user
`at later times. Also, a user may request periodic updates on
`generated reports at predetermined intervals of time. Ot