throbber
(19) United States
`(12) Patent Application Publication (10) Pub. No.: US 2003/0062997 A1
`(43) Pub. Date:
`Apr. 3, 2003
`Naidoo et al.
`
`US 20030062997A1
`
`(54) DISTRIBUTED MONITORING FOR A VIDEO
`SECURITY SYSTEM
`
`(76) Inventors: Surendra N. Naidoo, Austin, TX (US);
`William P. Glasgow, Austin, TX (US);
`Gregory E. Feldkamp, South Lake, TX
`(Us)
`
`Correspondence Address:
`CONLEY, ROSE & TAYON, RC.
`5700 GRANITE PARKWAY,
`SUITE 330
`PLANO, TX 75024-6616 (US)
`
`(21) Appl. No.:
`
`09/969,521
`
`(22) Filed:
`
`Oct. 2, 2001
`
`Publication Classi?cation
`
`.............................. .. G08B 13/00
`(51) Int. Cl.7 .
`(52) US. Cl. ......................... .. 340/531; 340/506; 348/152
`(57)
`ABSTRACT
`Asystem and method for distributed monitoring and remote
`veri?cation of conditions surrounding an alarm condition in
`a security system. A security gateway detects alarm condi
`tions at a premises and records video relating to the alarm
`condition. The security gateWay transmits an alarm noti?
`cation and the video across a network to a security system
`server in substantially real time. The security system server
`relays information to one or more distributed monitoring
`clients using rules-based routines for veri?cation of the
`alarm condition. An operator at a monitoring client deter
`mines Whether the alarm condition represents an actual
`alarm event and activates an appropriate response.
`
`110
`
`100
`
`r)
`
`5112
`
`115
`
`Security
`Gateway
`
`iictgl
`
`105
`
`|
`|
`l
`I
`I
`|
`|
`|
`|
`|
`I
`l
`I
`I
`l
`l
`I
`I
`
`120
`
`133
`
`/
`Monitoring
`Client
`
`131
`
`Security
`System
`Server
`
`SecureNet Technologies, LLC Exhibit 1007 Page 1
`
`

`
`Patent Application Publication
`
`Apr. 3, 2003 Sheet 1 0f 8
`
`US 2003/0062997 A1
`
`mm?
`
`056::22
`
`E25
`
`3:
`
`SecureNet Technologies, LLC Exhibit 1007 Page 2
`
`

`
`Patent Application Publication
`
`Apr. 3, 2003 Sheet 2 0f 8
`
`US 2003/0062997 A1
`
`\ ................. :
`
`\ _
`
`\ _ _
`
`mccotcgz \ n _
`E20 ................... .. _ _
`
`QELQEQE _ _
`
`mm? \
`
`n u _
`
`
`
`m2 #2 W 5P 8P __ /m: n
`
`E26 _
`
`N2 _ _
`
`_
`
`_
`
`m2 “
`
`E20 _
`
`mccotcoz “
`
`. . _ _
`
`_ _
`
`. _
`
`_ _
`
`_ _ _
`
`_
`
`_ _ “
`
`SecureNet Technologies, LLC Exhibit 1007 Page 3
`
`

`
`Patent Application Publication
`
`Apr. 3, 2003 Sheet 3 0f 8
`
`US 2003/0062997 A1
`
`mph-“SE22 W mm?
`
`E26
`
`SecureNet Technologies, LLC Exhibit 1007 Page 4
`
`

`
`Patent Application Publication
`
`Apr. 3, 2003 Sheet 4 0f 8
`
`US 2003/0062997 A1
`
`mczozcoz
`
`E20
`
`mccotcoé
`
`E20
`
`mm?
`
`/
`
`mccotcoz
`
`E25
`
`3230mm H 3:.
`
`Empgm
`
`63mm
`
`mwm
`
`_ 2%8: _
`
`m|||||_ _
`
`Ewygw
`
`620w
`
`2.50am
`
`
`
`If 5v
`
`2 5m
`
`mmw
`
`r1. | I II |._
`_ 220$: _
`_ wEmO _
`
`_
`
`w .QE
`
`SecureNet Technologies, LLC Exhibit 1007 Page 5
`
`

`
`Patent Application Publication
`
`Apr. 3, 2003 Sheet 5 0f 8
`
`US 2003/0062997 A1
`
`Security gateway detects
`alarm condition
`
`51of
`
`Y
`
`Security gateway sends
`alarm information and alarm
`video to security system
`520 /
`server
`
`i
`
`Activate alarm on
`premises
`
`i
`
`Operator reviews
`information
`
`A
`
`530 f
`
`540
`
`Notify Customer
`
`4
`
`NO
`
`False Alarm?
`
`550 \
`
`Turn off alarm
`
`Can not
`determine
`
`———l
`Reconfigure
`/\/ system if
`555
`necessary
`
`Contact
`Authorities
`
`545i
`
`Request additional f 560
`information
`
`FIG. 5
`
`SecureNet Technologies, LLC Exhibit 1007 Page 6
`
`

`
`Patent Application Publication
`
`Apr. 3, 2003 Sheet 6 0f 8
`
`US 2003/0062997 A1
`
`wcozmoEsEEoo
`
`39:25
`
`moo
`
`c
`
`gm Emggw
`
`wumtEE 6m:
`
`05
`
`293
`
`momt?E
`
`wmo
`
`96.3922
`
`hwxmonw
`
`wow
`
`SecureNet Technologies, LLC Exhibit 1007 Page 7
`
`

`
`Patent Application Publication
`
`Apr. 3, 2003 Sheet 7 0f 8
`
`US 2003/0062997 A1
`
`I
`3 :S?m
`
`E62
`
`E2801
`
`m2
`||||| I Y | | I | 1 | 1
`
`
`
`mccotcoi :EEmU
`
`m2
`
`m2
`
`9;
`
`mccozco?
`
`E20
`
`mccotcoé
`
`E20
`
`mEmE
`
`>201
`
`no»
`f
`
`mEmmwwmE
`
`mumtBE
`
`own
`
`E296
`66cm:
`@522
`E53 628mm
`
`m:
`
`m:
`_ _ wmaEEa
`
`/
`
`SecureNet Technologies, LLC Exhibit 1007 Page 8
`
`

`
`Patent Application Publication
`
`Apr. 3, 2003 Sheet 8 0f 8
`
`US 2003/0062997 A1
`
`_
`
`l
`Security system sewer provides /
`user with a digitally signed Access
`Token
`
`_
`
`950
`
`/ Remote user connects to
`
`905
`
`website
`
`L
`910 / Remote user. provides
`authentication information
`
`920 / secg'ty s?fenttsetrver
`Ven 'e.s au Q.“ ‘Ca ‘on
`information
`lv
`
`925
`
`955
`
`User connects to security gateway
`and provides access token to
`security gateway
`
`_
`
`Authentic’?
`
`Yes
`
`y
`
`I
`_
`_
`_
`Security gateway inspects digital
`signature on access token
`
`960
`
`/
`
`Security system server
`determines if user has
`necessary permissions?
`
`965
`
`Necessary
`permissions?
`
`940
`
`Yes
`
`f
`
`User may access account
`portion of website
`
`970
`
`Yes
`
`User may access
`designated security
`gateway features
`
`1
`
`980
`
`SecureNet Technologies, LLC Exhibit 1007 Page 9
`
`

`
`US 2003/0062997 A1
`
`Apr. 3, 2003
`
`DISTRIBUTED MONITORING FOR A VIDEO
`SECURITY SYSTEM
`
`RELATED APPLICATIONS
`
`[0001] The present invention is a continuation-in-part of
`US. application Ser. No.
`, ?led Sep.
`, 2001,
`titled “Video Security System.”
`
`BACKGROUND OF THE INVENTION
`
`[0002] 1. Field of the Invention
`
`[0003] The present invention relates generally to a security
`system. More speci?cally, this invention relates to a device
`and method for the remote veri?cation and monitoring of
`conditions surrounding an alarm signal.
`
`[0004] 2. Description of Related Art
`[0005] Inherent in security systems is the problem of false
`alarms. In situations Where local authorities are noti?ed of
`alarms, false alarms can result in the oWner of the system
`being subject to signi?cant ?nes. In addition, false alarms
`Waste the limited resources available to the authorities to
`respond to legitimate alarm situations. It is therefore desir
`able that a security system permits veri?cation of detected
`alarm conditions.
`[0006] Conventional security systems typically protect a
`building using make/break contacts strategically placed at
`doors, WindoWs, and other potential entry points. Sensors
`are installed on doors and/or WindoWs. Motion sensors are
`installed in strategic areas inside the home. Other devices
`such as glass breakage detectors, panic or medical alert
`buttons, loW temperature and ?ood sensors can be installed
`as Well. When the system is on and a sensor is tripped, a
`signal is sent through a Wire, or using radio frequencies (on
`Wireless systems), to the main controller Which sounds a
`siren and dials out via telephone or cellular service to the
`monitoring station Whenever an alarm occurs.
`
`[0007] When a contact is broken an alarm is sounded or
`relayed to a central control station located Within the build
`ing, nearby to the building, or remotely to a central control
`station of the security company. Besides make/break sen
`sors, security companies also use P.I.R. (passive infra red)
`sensors Which sense heat differences caused by animate
`objects such as humans or animals. Also used are vibration
`sensors Which, When placed upon a WindoW for eXample,
`detect When the WindoW is broken, and radio frequency (rf),
`radar, and microWave sensors, as Well as laser sensing. As
`With the make/break sensors, When any one of the sensors
`indicates a detection, a system alarm is indicated. Atrouble
`indication is also given if an alarm unit for the building to
`Which the sensors are connected senses that a path to a
`sensor is interrupted or broken.
`
`[0008] With many current alarm systems, all that the
`receiver of an alarm, Whether at a local or remote central
`station, knoWs is that an alarm has occurred. HoWever, the
`occurrence of an alarm provides no indication as to its cause.
`Thus, the operator has no other knoWledge by Which he can
`determine if an alarm signals the presence of a real intruder,
`or if it is a false alarm. Sensors may commonly go off during
`inclement Weather (they are sensitive to large electromag
`netic ?elds such as occurring during lightning conditions).
`Such an erroneous condition is properly referred to as a false
`
`alarm. Regardless of Why they occur, all false and unWanted
`alarms detrimentally affect the ef?ciency and operation of a
`security system.
`[0009] Many criteria determine Whether or not an alarm
`condition eXists. For eXample, When a person opens a door
`monitored by a sensor, a potential alarm condition is created.
`HoWever, an alarm system typically has a keypad or other
`coded system control by Which, if an appropriate entry is
`made Within a prescribed period of time, signi?es that the
`alarm condition is not to be acted upon. Rather, the entrant
`is someone authoriZed to enter the premises. Further, the
`class of intruder (e.g., human or animal) may be perfectly
`acceptable in one set of circumstances, but not so in another.
`The common situation is one Where an intruder is a human,
`and his presence results in an alarm being given.
`[0010] One technological approach to obtaining such veri
`?cation is through the use of separate audio monitors
`operating in concert With separate alarm sensors. US. Pat.
`Nos. 4,591,834 and 4,918,717 are directed to such systems.
`For example, US. Pat. No. 4,591,834 refers to the use of
`miniature, loW-frequency dynamic microphones. Alarm
`activities noted at the microphones are veri?ed via a separate
`netWork of discriminator sensors Which comprise geo
`phones. Signal processing techniques are utiliZed to distin
`guish alarm activity. Intrusion and discriminator sensors are
`arranged in knoWn patterns comprised of multiple sensors of
`each type. US. Pat. No. 4,918,717 refers to a system
`Wherein a number of microphones are distributed about a
`secured premises in relation to other intrusion sensors. Upon
`detection of an intrusion alarm, the microphones can be
`manually enabled one at a time from the central station to
`alloW an operator to listen to audio activity in proximity to
`the sensor alarm.
`
`[0011] Another approach is the use of video images to
`monitor a location. HoWever, in prior art devices these
`images have been loW-resolution, freeZe-frame pictures,
`making it dif?cult for a vieWer to discern What is being
`shoWn. In addition, in many prior art devices, the video
`images may not be received by the monitoring party until
`several moments have passed after the recorded event has
`actually taken place likely causing any response to be late
`and less effective.
`[0012] An additional problem With some eXisting security
`systems is that once a person has left the property, it is
`common for that person to Worry that he or she has forgotten
`to activate or arm the security system. In addition, such
`persons may have the desire to monitor the property even in
`the absence of alarm conditions. Further, a person may have
`the desire to modify aspects of the security system While
`they are absent. In prior art systems, it has been necessary to
`telephone a neighbor to ask them to check on the property
`and report back to the person.
`
`SUMMARY OF THE INVENTION
`
`[0013] In one broad respect, the present invention
`describes a security system for providing security monitor
`ing, comprising: a security gateWay located at a designated
`premises, Wherein the security gateWay is operable to detect
`an alarm condition and to record video of at least a portion
`of the premises relating to the alarm condition, said video
`hereinafter referred to the Alarm Video; a security system
`server operatively coupled to the security gateWay, Wherein
`
`SecureNet Technologies, LLC Exhibit 1007 Page 10
`
`

`
`US 2003/0062997 Al
`
`Apr. 3, 2003
`
`the security gateway is con?gured to transfer to the security
`system server a noti?cation of the alarm condition and the
`corresponding Alarm Video to the security system server in
`substantially real time; a plurality of monitoring clients
`operatively coupled to the security system server; Wherein
`the security system server is con?gured to transfer the
`noti?cation of the alarm condition and the Alarm Video to
`one or more of the plurality of monitoring clients, referred
`to as designated monitoring clients, based upon a prede?ned
`set of one or more rules; and Wherein said designated
`monitoring clients are con?gured to display at least a portion
`of the Alarm Video and the Associated User Data, and
`Wherein said designated monitoring clients are con?gured to
`notify the security system server Whether the noti?cation of
`the alarm condition corresponds to an actual alarm condi
`tion. In a narroW respect, the set of rules comprises a
`geography-requirement that must be met by the designated
`monitoring clients. In another narroW respect, the set of rules
`comprises one or more minimum resource requirements that
`must be met by the designated monitoring clients. In a
`narroWer respect, one or more minimum resource require
`ments comprises an availability requirement. In another
`narroWer respect, the one or more minimum resource
`requirements comprises a netWork-ef?ciency requirement.
`In another narroW respect, at least one of the plurality of
`monitoring clients is designated as having a pro?ciency, and
`Wherein said set of rules comprises a pro?ciency require
`ment that must be met by the designated monitoring clients.
`In another narroW respect, the set of rules comprises an
`availability requirement that must be met by the designated
`monitoring clients. In another narroW respect, at least one of
`the plurality of monitoring clients is operatively coupled to
`the security system server through the Internet. In another
`narroW respect, at least one of the plurality of monitoring
`clients is located at a location apart from the other of the
`plurality of monitoring clients.
`
`[0014] In another broad respect, the present invention
`describes a method for providing monitoring in a security
`system comprising a security system server operatively
`coupled to a plurality of monitoring clients, Wherein at least
`one of the plurality of monitoring clients is located at a
`location apart from the other of the plurality of monitoring
`clients, comprising the steps of: the security system server
`receiving noti?cation of an alarm condition and video cor
`responding to the alarm condition, referred to as Alarm
`Video; the security system routing the noti?cation of the
`alarm condition and the Alarm Video to one or more
`monitoring clients, referred to as designated monitoring
`clients, based upon a prede?ned set of rules; the designated
`monitoring clients displaying the noti?cation of the alarm
`condition and Alarm Video; the respective operator at each
`of the designated monitoring clients determining Whether
`the noti?cation of the alarm condition corresponds to an
`actual alarm condition; and notifying the security system of
`the operator’s determination. In a narroW respect, the set of
`rules comprises a geography-requirement that must be met
`by the designated monitoring clients. In another narroW
`respect, the set of rules comprises one or more minimum
`resource requirements that must be met by the designated
`monitoring clients. In a narroWer respect, one or more
`minimum resource requirements comprises an availability
`requirement. In another narroWer respect, one or more
`minimum resource requirements comprises a network-effi
`ciency requirement. In another narroW respect, at least one
`
`of the plurality of monitoring clients is designated as having
`a pro?ciency, and Wherein said set of rules comprises a
`pro?ciency requirement that must be met by the designated
`monitoring clients. In another narroW respect, the set of rules
`comprises a netWork-ef?ciency requirement that must be
`met by the designated monitoring clients.
`[0015] In another broad respect, the present invention
`describes a security system for providing security monitor
`ing, comprising: a plurality of security gateWays, each
`located at a designated premises, Wherein each security
`gateWay is operable to detect an alarm condition and to
`record video of at least a portion of the respective premises
`relating to the alarm condition, said video hereinafter
`referred to the Alarm Video; a plurality of security systems
`servers, each security systems server operatively coupled to
`at least some of the plurality of security gateWays such that
`each of the plurality of the security gateWays is operatively
`coupled to at least one of the plurality of security systems
`servers, Wherein each security gateWay is con?gured to
`transfer to the one or more security system servers to Which
`said security gateWay is operably coupled, a noti?cation of
`the alarm condition and the corresponding Alarm Video in
`substantially real time; a plurality of monitoring clients
`operatively coupled to the plurality of security system
`servers; Wherein the security system servers are con?gured
`to transfer the received noti?cation of the alarm condition
`and the Alarm Video to one or more of the plurality of
`monitoring clients, referred to as designated monitoring
`clients, based upon a prede?ned set of one or more rules; and
`Wherein said designated monitoring clients are con?gured to
`display at least a portion of the Alarm Video and the
`Associated User Data, and Wherein said designated moni
`toring clients are con?gured to notify the security system
`server Whether the noti?cation of the alarm condition cor
`responds to an actual alarm condition. In a narroW respect,
`at least one of the plurality of monitoring clients is opera
`tively coupled to the security system server through the
`Internet. In another narroW respect, at least one of the
`plurality of monitoring clients is located at a location apart
`from the other of the plurality of monitoring clients.
`
`BRIEF DESCRIPTION OF THE DRAWINGS
`[0016] The folloWing draWings form part of the present
`speci?cation and are included to further demonstrate certain
`aspects of the present invention. The invention may be better
`understood by reference to one or more of these draWings in
`combination With the detailed description of speci?c
`embodiments presented herein.
`
`[0017] It is to be noted, hoWever, that the appended
`draWings illustrate only exemplary embodiments of the
`invention and are therefore not to be considered limiting of
`its scope, for the invention may admit to other equally
`effective embodiments. In addition, although the ?gures may
`depict embodiments Wherein each of the components rep
`resent different devices or locations, they can be combined
`into a single device or location. In addition, a single com
`ponent may be comprised of a combination of components.
`[0018] FIG. 1 is a simpli?ed block diagram of a security
`system according to one embodiment of the disclosed sys
`tem and method.
`
`[0019] FIG. 2 is a more detailed block diagram of a
`security system according to one embodiment of the dis
`closed system and method.
`
`SecureNet Technologies, LLC Exhibit 1007 Page 11
`
`

`
`US 2003/0062997 A1
`
`Apr. 3, 2003
`
`[0020] FIG. 3 is a simpli?ed block diagram of a security
`system utilizing the cable infrastructure according to one
`embodiment of the disclosed system and method.
`
`[0021] FIG. 4 is a block diagram of a security system
`featuring redundancy according to one embodiment of the
`disclosed system and method.
`
`[0022] FIG. 5 is a ?oWchart of the operation of the
`security system according to one embodiment of the dis
`closed system and method.
`
`[0023] FIG. 6 is a more detailed block diagram of a
`security gateWay according to one embodiment of the dis
`closed system and method.
`
`[0024] FIG. 7 is a more detailed block diagram of a
`security system according to one embodiment of the dis
`closed system and method.
`
`[0025] FIG. 8 is a ?oWchart of depicting the operation of
`a remote terminal accessing a security system according to
`one embodiment of the disclosed system and method.
`
`DESCRIPTION OF ILLUSTRATIVE
`EMBODIMENTS
`
`[0026] The present invention addresses several shortcom
`ings of the prior art With a security system and framework
`that is con?gured to deliver real-time information, including
`video and/or about alarm conditions to monitoring personnel
`for them to verify alarm conditions and take appropriate
`folloW up action. As a further advantage, the frameWork may
`be easily adapted for use in other applications that incorpo
`rate real-time information and video delivery.
`
`[0027] The term “security system” is used broadly to mean
`a system for monitoring a premises, e.g., for the purpose of
`discouraging and responding to burglaries, ?res, and other
`emergency situations. Such a security system is suited for
`residential homes, but may also ?nd use With schools,
`nursing homes, hospitals, businesses or any other location in
`Which real-time information may be useful in obtaining
`adequate response upon the occurrence of alarm conditions.
`By integrating broadband features, including audio and
`video capabilities, Web access and Wireless capabilities,
`embodiments of the present invention provides audio and
`video alarm veri?cation, 24-hour monitoring capabilities,
`and a secure Web-site With remote access features and
`security-focused content. Embodiments of the present
`invention may be used to reduce false alarms, improve
`police effectiveness, and generally increase its users’ peace
`of mind While they are aWay from home.
`
`[0028] Referring to the draWings, FIG. 1 is a high-level
`block diagram of an exemplary security system according to
`one embodiment of the present invention. The security
`system 100 includes a security gateWay 115 (also called a
`“base station”), Which is typically located at the desired
`premises 110 to be monitored, and a monitoring client 133,
`typically located at a central station and operatively coupled
`to security gateWay 115 through a netWork 120. Often,
`security gateWay 115 is located at the target site. HoWever,
`on some occasions, some or all components of security
`gateWay 115 may be located remotely, but remain opera
`tively coupled to security sensors 105 and video cameras
`112 Which are at the premises. Upon detection of an alarm
`condition, security gateWay 115 captures video (usually
`
`through an attached video camera 112) of the target site, and
`sends the video to security system server 131 in real time.
`
`[0029] For purposes of the present invention the term
`“premises” refers to any location to be monitored, Whether
`residential, commercial, public, or secured. Further, the term
`“a” is generally used in the present disclosure to mean one
`or more. Still further, the terms “coupled” and “operatively
`coupled” mean connected in such a Way that data may be
`exchanged. It is understood that “coupled” and “operatively
`coupled” do not require a direct connection, a Wired con
`nection, or even a permanent connection. It is suf?cient for
`purposes of the present invention that the connection(s) be
`established for the sole purpose of exchanging information.
`
`[0030] In general, netWork 120 may be a public netWork
`or private netWork, a single netWork or a combination of
`several netWorks. In most embodiments, netWork 120 may
`be, but is not required to be, an IP-based netWork. In some
`embodiments it may be desirable for all or a portion of
`netWork 120 to include publicly available netWorks, such as
`the Internet, to avoid the need for installing, purchasing, or
`leasing additional infrastructure. HoWever, in some systems,
`eg those that use high-bandWidth transmissions, it may be
`desirable to include dedicated high-bandWidth connections
`including, Without limitation, as leased lines, frame relay
`netWorks, and ATM netWorks, Within netWork 120. Further,
`in some systems it may be desirable to use a netWork 120
`With quality of service guarantees given the real-time nature
`of the information that is transmitted.
`
`[0031] In the present disclosure, the term “high-speed” or
`“high-bandwidth” connections generally means those con
`nections capable of providing enough bandWidth for data to
`be transmitted to the central station in real-time. In one
`embodiment, high-speed connections are those capable of
`transmitting at speeds of at least 128 KBPS. High-speed
`connections include but are not limited to cable modem
`connections, xDSL connections, and high-speed Wireless
`connections.
`
`[0032] Generally, security gateWay 115 is a processor
`based device that functions to detect alarm conditions at a
`target site, to capture information relating to such alarm
`conditions, and upon occasion of an alarm condition, to send
`such information ultimately to security system server 131
`for veri?cation and response. Monitoring client 133 is
`generally a softWare program that may be used to display
`some or all of the information provided by security gateWay
`115. Monitoring client 133 may be a stand-alone program or
`integrated into one or more existing softWare programs. One
`or more operators may then use this information to evaluate
`Whether the alarm condition corresponds to an actual alarm
`condition and then take additional action, if desired, such as
`alerting the appropriate authorities. Advantageously, in
`many instances the incidence of false alarm being reported
`to the authorities is reduced, and the response effectiveness
`of the authorities is improved.
`
`[0033] Security system 100 may include one or more
`sensors 105 coupled to security gateWay 115 to detect alarm
`conditions. Security system 100 is not limited to any speci?c
`type or model of sensor 105. Any sensor 105 may be used,
`depending on the desired type and level of protection.
`Examples include, Without limitation, magnetic contact
`sWitches, audio sensors, infrared sensors, motion detectors,
`?re alarms, and carbon monoxide sensors. Alarm sensors
`
`SecureNet Technologies, LLC Exhibit 1007 Page 12
`
`

`
`US 2003/0062997 A1
`
`Apr. 3, 2003
`
`105 may be Wired directly into an alarm control panel built
`into security gateWay 115 or they may be Wirelessly con
`nected. The type of sensor 105 to be used depends on the
`speci?c application for Which security system 100 is
`designed. In some embodiments, multiple alarm sensors 105
`may be used. In such multiple sensor embodiments, security
`gateWay 115 may consider data from all, some, or one of
`sensors 105 in the detection of alarm conditions.
`
`[0034] In addition, security system 100 includes one or
`more video cameras 112 that is operable to capture video of
`monitored premises 110. Camera 112 may be (but is not
`required to be) a 360-degree camera or a panoramic camera.
`In addition, security gateWay 115 may be con?gured to
`create an association betWeen one or more sensors and an
`associated video camera 112. Whether separate alarm sen
`sors 105 are present or not, security gateWay 115 may use
`video from video camera 112 to assist in the determination
`of Whether an alarm condition eXists and thereby Whether to
`generate and send an alarm signal to the security system
`server 131. For eXample, in one embodiment, sensors 105
`such as motion detectors, infra-red and audio sensors may be
`replaced by an intelligent alarm module that is able to detect
`motion or intrusion by analyZing the video image generated
`from camera 112. In another embodiment, security gateWay
`115 may analyZe images from camera 112 and audio sound
`from an audio sensor 105 to detect an alarm condition. In
`some embodiments, the sensitivity of system 100 may be
`adjusted to account for the siZe and speed of intruders. For
`eXample, system 100 may be adjusted to trigger an alarm if
`a person Walks across a monitored area but not a dog
`Walking across the same area. Advantageously, a visual
`intelligent security system based on changes in the video
`image eliminates the need for many sometimes-expensive
`hardWare sensors. Intelligent alarm applications typically
`require a signi?cant amount of processing by security gate
`Way 115, but may be easier to setup, maintain and upgrade
`since they are generally programmable. In one embodiment
`described beloW in greater detail, security gateWay 115 may
`include a processor and memory to record and process video
`information for the intelligent alarm application.
`[0035] The alarm video sent to the security system server
`131 preferably begins at least just prior to the occurrence of
`the alarm condition and may end upon after the conclusion
`of the alarm condition, or alternatively, after a speci?ed
`duration. Preferably, the segment shoWs enough of a time
`period to provide monitoring personnel With enough infor
`mation to determine Whether the alarm signal is a false alarm
`or not. In some embodiments, the segment of real-time video
`may be compressed using any compression techniques
`knoWn by one of skill in the art. For eXample, this may
`involve the use of video compression algorithms such as
`“mpeg.” Further, the resolution and/or color depth of the
`video may be reduced to decrease the required transmission
`bandWidth.
`
`[0036] In one embodiment, alarm video is transmitted at
`least 3 frames per second. In addition, the alarm video may
`have an end resolution (i.e., after interpolation and/or image
`enhancement, etc.) of 320 piXels by 240 piXels or higher, and
`optionally may be transmitted in color. Further, said alarm
`video may but is not required to include a corresponding
`audio portion.
`[0037] It is noted that the present invention is not limited
`to any particular audio, video, or communications standards.
`
`The present invention may incorporate any such standards,
`including, Without limitation: H.323, ADPCM, H.263,
`MPEG, UDP, and TCP/IP.
`[0038] In some embodiments, security gateWay 115 may
`be installed similar to a conventional security system, e.g.,
`mounted betWeen studs in an un?nished area of the resi
`dence, for eXample a utility room. Preferably, cabling to
`security gateWay 115 is restrained such that the cables
`cannot be pulled out of the unit, and security gateWay 115
`panel may be in a cabinet that can be locked to prevent
`unauthoriZed physical access.
`[0039] In addition, because security gateWay 115 is
`coupled to a netWork 120, it may be desirable to implement
`precautions to minimiZe risk from hackers, e.g., by mini
`miZing the number of access points for hackers Who might
`try to gain access to the unit. In addition, communication
`With security gateWay 115 may be restricted and security
`gateWay 115 may strictly control access, similar to a ?reWall
`With most ports blocked and having no external Way to open
`them.
`
`[0040] In addition, some embodiments of the present
`invention may include the functionality to alloW access to
`security gateWay 115 and security system server 131 using
`a remote station 155 operatively coupled to security gateWay
`115 and security system server 131. Remote user 155 must
`?rst be authenticated by security system server 131. It is
`noted that the present invention contemplates the use of any
`authentication techniques. Once authenticated, remote user
`may access some or all of the features of base station 115.
`These features may include, Without limitation, arming or
`disarming the security system; adjusting sensitivities of
`sensors (if present); adjusting alarm condition detection
`sensitivity; remote surveillance; adjusting camera settings;
`and revieWing alarms and recordings. These functions may
`also include remote surveillance, referred to as “lifestyle
`video.”
`
`[0041] Remote user 155 may connect to security system
`server 131 and base station 115 (after authentication)
`through netWork 120. Because a remote user does not
`necessarily need real-time access to alarm video, a loW
`bandWidth connection may be used to connect remote sta
`tion 155 to security system server 131 and base station 115.
`After authentication, security system server 131 may be
`con?gured to create a data connection betWeen remote
`station 155 and security gateWay 115 such that communi
`cations betWeen remote station 155 and security gateWay
`115 bypass security system server 131. Advantageously, this
`avoids netWork bottlenecks at the security system server
`131, particularly When transmitting large amounts of data
`such as during the transmission of streaming video.
`
`[0042] In one embodiment, remote user 155, once authen
`ticated, may perform remote surveillance through base sta
`tion 115. The remote surveillance feature alloWs remote user
`155 to vieW all or portions of the video signal from video
`camera 112. Depending on the bandWidth of the connection,
`the video may be of a loWer quality than that transmitted to
`security system server 131 for veri?cation of alarm signals.
`For eXample, in one embodiment, the video transmitted to
`remote user 155 may have a loWer frame rate, loWer
`resolution, and/or loWer color depth. In addition, remote
`user 155 may be able to con?gure the quality of the video for
`

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket