`
`(12) United States Patent
`JacksOn
`
`(10) Patent No.:
`(45) Date of Patent:
`
`US 7.956,735 B2
`Jun. 7, 2011
`
`(54) AUTOMATED, REMOTELY VERIFIED
`ALARM SYSTEM WITH INTRUSION AND
`VIDEO SURVELLANCE AND DIGITAL
`VIDEO RECORDING
`
`(75) Inventor: Randall R. Jackson, Portland, OR (US)
`(73) Assignee: Cernium Corporation, Reston, VA (US)
`
`(*) Notice:
`
`Subject to any disclaimer, the term of this
`patent is extended or adjusted under 35
`U.S.C. 154(b) by 1013 days.
`(21) Appl. No.: 11/803,851
`
`(22) Filed:
`65
`(65)
`
`May 15, 2007
`Prior Publication Dat
`O DO
`US 2007/O262857 A1
`Nov. 15, 2007
`51) Int. C
`
`(2006.01)
`ins 29MO
`(51)
`(52) U.S. Cl. ..................... 340/506; 340/505; 340/539.1;
`340/539.11:34.0/539.25; 340/541; 340/3.1
`f
`(58) Field of Classification Search .................. 340/505,
`i. 539.1, 539.11,539.25,541, 545.1,
`S
`li 340 E. 545.7,
`3.1, R 825.49
`ee application file for complete search history.
`References Cited
`
`(56)
`
`U.S. PATENT DOCUMENTS
`4,857,912 A
`8, 1989 Everett, Jr. et al.
`5,486,819 A
`1/1996 Horie
`5,708.423 A
`1/1998 Ghaffari et al.
`5,712,830 A
`1/1998 ROSS et al.
`5,801,618 A
`9, 1998 Jenkins
`5,809,161 A
`9/1998 Auty et al.
`5,875,305 A
`2f1999 Winter et al.
`5,956,716 A
`9, 1999 Kenner et al.
`6,154,133 A 11/2000 ROSS
`6,625,383 B1
`9, 2003 Wakimoto et al.
`6,956,599 B2 * 10/2005 Lim et al. ................... 348, 14.02
`
`
`
`6,975,220 B1* 12/2005 Foodman et al. ............. 340,531
`29 38 R: ck 33: Naidoo et al. ................ 340,531
`7.209,035 B2 * 4/2007 Tabankin et al. ........ 340,539.11
`7.262,690 B2 * 8/2007 Heaton et al. ................. 340,500
`7,342.489 B1* 3/2008 Milinusic et al. ..
`... 340/506
`7,403,116 B2 * 7/2008 Bittner ...........
`... 340,540
`7,486,183 B2 * 2/2009 Luebke et al. .
`... 340/506
`7,612,666 B2 * 1 1/2009 Badawy ........................ 340,541
`(Continued)
`OTHER PUBLICATIONS
`M
`Website information, MTeyeWirelessVideo Verification and Remote
`Viewing Solutions, May 4, 2007. http://mteye.co.il/home/Index.
`aspX.
`
`(Continued)
`
`Primary Examiner — Daryl Pope
`
`(57)
`
`ABSTRACT
`
`N. that Eas E. lin
`singd EE VARGRI
`p
`is
`p
`ing by an image capture device at least one image in response
`to a detection event, and transmitting a first data signal includ
`ing the image to a local signal processing device. The signal
`processing device transmits a second signal including at least
`a portion of the image to a remote hosted server according to
`at least a first set of predetermined parameters. After receiv
`ing the second signal, the server transmits a third signal
`including at least a portion of the image from the hosted
`server to a user device. Using the user device, a user views the
`image and indicates a validity status of the alarm based at
`least in part on the content of the image. Based at least upon
`either the validation status indicated by the user, or upon a
`failure to receive a message including a validation status from
`the user within a predetermined duration of time, the server
`portion may send an alarm signal to an emergency response
`service.
`
`26 Claims, 7 Drawing Sheets
`
`
`
`US 7,956,735 B2
`Page 2
`
`U.S. PATENT DOCUMENTS
`2003/0081836 A1
`5, 2003 Averbuch et al.
`2005, 0132414 A1
`6/2005 Bentley et al.
`2005/0134450 A1
`6, 2005 Kovach
`2006.0167595 A1
`7/2006 Breed et al.
`2006/O195569 A1
`8, 2006 Barker
`2007/0094.716 A1
`4/2007 Farino et al.
`2007/0177800 A1
`8, 2007 Connell
`2007/0263905 A1 1 1/2007 Chang et al.
`2009/0022362 A1
`1/2009 Gagvani et al.
`2009,014 1939 A1
`6, 2009 Chambers et al.
`
`OTHER PUBLICATIONS
`Website information, Videofied, May 14, 2007. http://www.
`videofied.com/en. What is Videofied?.
`Website information, The iControl Solution, iControl Networks,
`May 14, 2007. http://www.icontrol.com/how WorksMain.jsp.
`
`Website information, Swann Alert DVR Camera Kit, May 14, 2007.
`http://www.costco.com/Browse//Product.aspx?Prodid=
`11206961&whse=BC&topnav=&browse=.
`Website information, Q-See 16 Ch MPEG4 DVR250 GB HDD with
`Built-in DVD Burner, May 14, 2007. http://www.costco.com/
`Browse//Product.aspx?Prodid=11200471&whse=
`BC&topnav=&browse=.
`International Search Report and Written Opinion for International
`PCT Application No. PCT/US2008/070134, mailed Oct. 7, 2008, 8
`pg.S.
`International Search Report and Written Opinion for International
`PCT Application No. PCT/US2008/084835, mailed Feb. 4, 2009, 7
`pg.S.
`International Search Report and Written Opinion for International
`PCT Application No. PCT/US 10/32013, mailed Jun. 28, 2010, 8 pgs.
`* cited by examiner
`
`
`
`U.S. Patent
`
`Jun. 7, 2011
`
`Sheet 1 of 7
`
`US 7,956,735 B2
`
`
`
`eWUiwvacAGDAWadaaudawMUNAdMuWuAuaawanes ohuMbUAABaOMGea
`
`LSis
`
`Motorola v. Stellar
`
`Motorola Exhibit 1055
`Page 003
`
`
`
`Jun. 7, 2011
`Jun. 7, 2011
`
`Sheet 2 of 7
`Sheet 2 of 7
`
`US 7.956,735 B2
`
`U.S. Patent
`U.S. Patent
`
`
`
`US 7,956,735 B2
`
`Motorola v. Stellar
`
`Motorola Exhibit 1055
`Page 004
`
`
`
`U.S. Patent
`
`Jun. 7, 2011
`
`Sheet 3 of 7
`
`US 7,956,735 B2
`
`UONCOYNSA
`
`
`
`Bulaiasayjeubis
`
`UOReoya/
`
`UONEUIYUOD
`
`sINpoY/|y
`
`aINpoy
`
`Jayiusuel|WUE
`
`
`
`
`
`
`
`a|NPpOWaBHes0}seyeq
`
`ee
`
`/
`
`
`
`ce
`
`Le
`
`6é
`
`ainpoy
`
`UOISSILUSUBL|jeuBisuoNoe}Eeq
`
`
`jeublguoNoa}eq
`ainpoWBunnoy
`
`jeuBlsuoNnde}98q
`
`Buiaisoay
`
`-ainpow
`
`ainpoyyBurwu!,JEA1a}U|
`
`[eUBIS
`
`aiNpo|sisAjeuy
`
`ejeqobew|
`
`ge
`
`A
`
`92
`
`Motorola v. Stellar
`
`Motorola Exhibit 1055
`Page 005
`
`
`
`
`
`
`
`
`
`U.S. Patent
`U.S. Patent
`
`Jun. 7, 2011
`
`Sheet 4 of 7
`
`US 7.956,735 B2
`US 7,956,735 B2
`
`
`
`
`
`
`
`
`
`Bulssed0id|eubis
`
`
`jeuBisguonoe}98q
`
`ainpoyy
`
`Bulaisoey
`
`3inpo;
`
`O
`w
`
`V
`
`
`
`
`
`ajnpow
`
`UOISSILUSUBI|jeuBigudHeoyWe/A
`
`?InpOW
`
`yndu|Jas
`a|NpoW
`
`ainpowAe\dsig
`
`a(/Npo|
`
`ejegebew|
`UONEONNEAWey
`
`
`
`Motorola v. Stellar
`
`Motorola Exhibit 1055
`Page 006
`
`
`
`
`
`
`
`
`
`U.S. Patent
`U.S. Patent
`
`Jun. 7, 2011
`Jun. 7, 2011
`
`Sheet 5 Of 7
`Sheet 5 of 7
`
`US 7.956,735 B2
`US 7,956,735 B2
`
`SIME ANSI A AL A AACS TRINA DOA SI AACA IA SDE AS SAC AAR AG DN A A AAS SUA
`
`
`
`S‘Old
`
`*.
`
`9
`
`Motorola v. Stellar
`
`Motorola Exhibit 1055
`Page 007
`
`
`
`U.S. Patent
`U.S. Patent
`
`Jun. 7, 2011
`Jun. 7, 2011
`
`Sheet 6 of 7
`Sheet 6 of 7
`
`US 7.956,735 B2
`
`US 7,956,735 B2
`
`
`
`
`
`
`
`s
`
`Motorola v. Stellar
`
`Motorola Exhibit 1055
`Page 008
`
`
`
`U.S. Patent
`U.S. Patent
`
`Jun. 7, 2011
`Jun. 7, 2011
`
`Sheet 7 of 7
`Sheet 7 of 7
`
`US 7.956,735 B2
`US 7,956,735 B2
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
` puejeuBbisjsul4saisoay|jeuBis
`
`
`
`sulylwwsuely
`
`
`
`puee}eq|ensiAaindey
`
`LZ
`
`
`
`
`
`puejeuBigpuodasanleodoye2
`
`
`JeuBlgPalyspusues]
`
`
`
`
`
`
`
`
`
`
`
`MalApukejeUBISPulyLSAIBDSyYbl
`
`
`
`
`
`Bjeqensi~910}S
`
`
`
`pueeyeqApeynduy
`
`
`
`Zz
`
`Z‘Sila
`
`
`
`
`
`jeubigyynoyywsuely
`
`
`
`
`
`jeuBisweyjlusuesy
`
`
`
`
`
`puejeubisyunoysaisoey
`
`GL
`
`Motorola v. Stellar
`
`Motorola Exhibit 1055
`Page 009
`
`
`
`
`
`
`
`1.
`AUTOMATED, REMOTELY VERIFIED
`ALARM SYSTEM WITH INTRUSION AND
`VIDEO SURVELLANCE AND DIGITAL
`VIDEO RECORDING
`
`RELATED APPLICATIONS
`
`The present application claims priority to U.S. Provisional
`Patent Application Ser. No. 60/800,505, entitled AUTO
`MATED SELF-MONITORED ALARM VERIFICATION 10
`SOLUTION and filed 15 May 2006, and U.S. Provisional
`Patent Application Ser. No. 60/800,504, entitled SELF
`MONITORED INTRUSION AND VIDEO SURVEIL
`LANCE SOLUTION WITH DIGITAL VIDEO RECORD
`ING filed May 15, 2006, the disclosures of which are 15
`incorporated herein in their entirety by this reference.
`
`FIELD OF THE INVENTION
`
`The present invention relates generally to intrusion alarm 20
`systems, and more specifically it relates to an automated,
`remotely-monitored alarm verification solution for visually
`identifying the root cause of alarm events.
`
`BACKGROUND OF THE INVENTION
`
`25
`
`It can be appreciated that intrusion alarm systems have
`been in use for years and are commonplace in commercial and
`residential applications. Typically, intrusion alarm systems
`are comprised of one or more passive sensors connected to a 30
`burglar alarm panel located at the monitored building or area.
`When the system is “armed” and any of the sensors is acti
`vated, a notification is sent to a central monitoring facility
`usually via a dial-up connection. Typically, an operator at the
`central station calls back the location and attempts to validate 35
`the alarm, usually via verbal exchange of a “secret code or
`password. Failure to validate the alarm usually results in a call
`being placed to 3rd parties such as law enforcement officials.
`These types of systems consist of one or more sensors
`connected to a control panel, which monitors the sensors, and 40
`delivers a status message to an alarm monitoring station when
`activated. In normal applications these types of sensors can
`only provide binary information indicating the active state of
`an alarm condition. In most instances, the alarm sensors are
`connected to an intrusion control panel, which monitors the 45
`sensors and determines the state of an alarm condition. The
`alarm activations are then sent to a manned alarm monitoring
`station usually via a public switched telephone network
`(PSTN) dial-up connection.
`The main problem with conventional intrusion alarm sys- 50
`tems is that they are very prone to false alarms due to inad
`equacies with existing technologies, and they provide no
`inexpensive means to visually validate an alarm remotely.
`False alarm statistics are persistently in the high 90% range,
`an extremely costly false-positive problem. Attempts have 55
`been made to try to address the false-alarm issue by deploying
`traditional closed circuit television (CCTV) cameras, how
`ever, these attempts have not met with Success due to the cost
`of installation and equipment. Another problem with conven
`tional intrusion alarm systems is that they are very expensive 60
`both for the initial equipment cost and monthly recurring
`charge to the end-user. Installation costs are typically passed
`on to the end-user. In addition, these systems typically use a
`dial-up connection to communicate alarm conditions back to
`a central monitoring station making validation a slow and 65
`tedious process. Another problem with conventional intru
`sion alarm systems is that they need to be actively monitored,
`
`US 7,956,735 B2
`
`2
`generally requiring the use of a third-party monitoring service
`which can be prohibitively expensive and does substantially
`reduce the false positive problem.
`
`BRIEF DESCRIPTION OF THE DRAWINGS
`
`FIG. 1 depicts an iconic representation of a premises por
`tion of an alarm system according to an embodiment of the
`invention.
`FIG. 2 depicts an iconic representation of an extended
`portion of analarm system according to an embodiment of the
`invention.
`FIG. 3 depicts a block diagram of a server portion of an
`alarm system according to an embodiment of the invention.
`FIG. 4 depicts a block diagram of an end-user device por
`tion of an alarm system according to an embodiment of the
`invention.
`FIG. 5 depicts an iconic diagram of data flow pathways
`within a premises portion of an alarm system according to an
`embodiment of the invention.
`FIG. 6 depicts an iconic diagram of data flow pathways
`throughout an extended portion of an alarm system according
`to an embodiment of the invention.
`FIG.7 depicts a block flow diagram of an alarm verification
`method according to an embodiment of the invention.
`
`DETAILED DESCRIPTION OF THE PREFERRED
`EMBODIMENTS
`
`The invention, in accordance with a typical embodiment,
`involves intrusion alarm systems which are verified remotely
`(e.g., by a user or another authorized entity, collectively
`“user hereinafter for simplicity of description). The
`remotely-verified alarm solutions of the present invention
`Substantially depart from the conventional concepts and
`designs of the prior art. In so doing, the invention provides
`embodiments of a system primarily developed for the purpose
`of visually identifying the root cause of alarm events directly
`and immediately, while utilizing modern high-speed Internet,
`phone networks, or private networks and web-enabled
`devices for remotely-monitoring. Furthermore, embodiments
`of the invention provide for contacting law enforcementagen
`cies, other emergency response services, and/or any other
`third party designated by a user or other authorized entity,
`only if an alarm event is valid, and Substantially or entirely
`without the intervention of a third party alarm monitoring
`company.
`An end user can install a premise security system, and
`verify an alarm event regardless of the proximity of the end
`user to the monitored location. When an alarm event takes
`place, the system delivers an alarm condition Substantially
`autonomously to an end-user. The system uses wired and/or
`wireless Internet, phone networks, private networks, and/or
`other communication networks to deliver to the end user an
`image-based indication of the cause of an alarm.
`Given the high incidence of false alarms due to less capable
`alarm systems, a highly desirable feature in embodiments of
`the invented alarm system is the ability to remotely and visu
`ally verify an alarm condition. False alarms can be caused in
`a variety of ways, including defective sensors and user error,
`Such as failing to deactivate an alarm system upon entry.
`Common means for remotely verifying an actual alarm con
`dition includes calling the premises and/or sending personnel
`to visit the premises from which the alarm signal originated.
`The invention seeks to alleviate the need for such inefficient,
`costly, and slow means of validation by providing the premise
`
`
`
`US 7,956,735 B2
`
`10
`
`15
`
`25
`
`3
`owner the ability to interrogate the cause of an alarm over any
`public network, Internet, phone network, or private network.
`According to one embodiment of the present invention, an
`automated, remotely-verified alarm system includes: a) an
`integrated Passive InfraRed (PIR) sensor (or other motion
`sensor) for motion detection with an integrated camera (PIR
`Cam) or separate sensor and camera, or motion sensing cam
`era; b) a premise Security System Media Gateway (SSMG)
`with storage that manages a number of PIRs, cameras, or
`PIRCams and transmits alarm events and associated video or
`static images to a remote central server; c) a hosted remote
`web-server (“central server') that provides authentication,
`communication and data delivery to external remote end
`users and law enforcement agencies; and d) remote end-user
`communication devices to receive telephone Voice messages
`and/or data messages via email, instant messaging including
`text messaging, Systems Management Server (SMS) and/or
`Multimedia Messaging Service (MMS) messaging, and/or
`other network or web-enabled communication media. The
`embodiments of the invention, however, are not so limited.
`Therefore, it is to be understood that the invention is not
`limited in its application to the details of construction and to
`the arrangements of the components set forth in the following
`description or illustrated in the drawings. The invention is
`capable of other embodiments and of being practiced and
`carried out in various ways. Also, it is to be understood that
`the terms and phrases employed herein are for the purpose of
`simplicity and clarity in the description and should not be
`regarded as limiting.
`Premises Portion of Alarm System
`FIG. 1 depicts an embodiment of a portion of a remotely
`verified alarm system configured to monitor a user's premises
`15 (or “premises portion'). Included in the system, according
`to embodiments, are one or more image capture means Such
`as cameras 2 for capturing images of portions of a monitored
`location. Most notably, locations such as building access
`points, windows, hallways, rooms containing high-value
`items, and other locations are typically beneficially moni
`tored for intrusion detection or other exigencies and/or emer
`gencies. Cameras 2 can be affixed to or at least partially
`within structural features of a building, such as a wall, ceiling,
`roof, structural Support, ventilation passage, or other features.
`Alternatively, cameras can be provided in Such landscape
`features as trees, shrubs, retaining walls, or other features.
`Wherever affixed, a camera 2 is configured so as to capture an
`45
`image of an area where intrusion monitoring is desired. When
`numerous areas are to be monitored, cameras can be deployed
`in multiple locations as part of a distributed, interconnected
`monitoring network.
`Cameras 2 in embodiments include stationary cameras,
`cameras capable of automatically Sweeping from side to side
`to capture a larger area than a comparable stationary camera.
`Cameras can include those capable of multiple directional
`angles and/or directionally controllable either remotely or
`according to a pre-programmed Scanning pattern. Cameras 2
`can be configured to capture still images, full motion images
`(hereinafter, video), or a combination thereof, and Such
`images will typically, but not exclusively, be either black-and
`white or color images. Alternatively, cameras are used that are
`configured for extremely low light conditions (e.g., night
`vision) or for capturing viewable images of transient thermal
`differentials (e.g., thermal imaging) in the ambient environ
`ment.
`Due to the highly variable placement of cameras 2, it may
`not always be convenient to extend wiring to a camera for
`wired transmission of signals to and from the camera. There
`fore, while cameras are frequently connected by a wire, they
`
`4
`may also transmit and receive signals wirelessly. Likewise, it
`may not be possible to maintain a continuous power Supply to
`a camera 2 in various locations and/or situations. Therefore,
`an alternative and/or self-contained power Supply can be pro
`vided in some situations. Examples of Such include power
`provided by batteries, by a solar panel, by a generator, by an
`uninterruptible power supply (i.e., U.P.S.), by a redundant
`hardwired power supply, or by another device or method.
`Cameras 2 used in a system according to embodiments
`may also possess other capabilities for enhancing the infor
`mational value from captured images. For example, cameras
`can include the ability to Zoom in or out. Such as to widen or
`narrow a field of view and increase the resolution of distant or
`Small objects, or to compensate for changing light conditions.
`In embodiments, a camera 2 includes a sensor capable of
`detecting changes in the ambient environmental conditions
`(hereinafter, alarm event and/or detection event), and the
`camera 2 is further configured to react to such changes by
`turning on or off, or by capturing a still image or video image
`(collectively, images). Alarm events can include a transient
`thermal (e.g., infrared, hereinafter IR) differential, a human
`audible or inaudible sound, a transient reflection of a beam or
`signal wave emitted by the camera or another device, or other
`Such changes. In embodiments, a sensor of a camera 2 can be
`calibrated relative to the background (e.g., normal) condi
`tions of the environment where the camera 2 is affixed and is
`to operate. Further, a sensor of a camera 2, Such as a passive
`IR sensor, can be configured to specifically detect and/or
`indicate the presence or occurrence of an alarm event only
`when such changes reach and/or exceed some threshold level
`(hereinafter, threshold).
`While a sensor can be configured as a unitary part of a
`camera 2, in other embodiments, a sensor can be coupled with
`a camera 2 either by a wire or wirelessly, and be located
`relatively separately from the camera2. For example, a sensor
`can include a magnetically coupled circuit affixed relative to
`a window or entryway Such that the opening of a door or
`window breaks the circuit and causes the sensor to indicate a
`threshold alarm event to the camera 2. Likewise, a sensor can
`include a pressure and/or tensile sensitive device (e.g., pad,
`plate, strip), an optical beam emitter/detector System, any of
`the integral sensors described above, or any other capable of
`detecting a threshold alarm event. In general, one or more
`cameras 2 capable of detecting a threshold alarm event,
`whether having integral or separately coupled sensors, are
`collectively referred to hereinafter as “motion sensing cam
`eras', or simply "cameras”.
`In still other embodiments, cameras 2 may simply be pas
`sive image gathering cameras not configured with threshold
`alarm event discrimination capability, but simply gather and
`transmit images to a signal processing device that has such
`capability. A signal processing device is described in more
`detail below.
`Each embodiment of a camera 2 has the capability to con
`Vert a captured image into an electronic and/or optical signal
`and to transmit the signal out from the camera 2. In embodi
`ments of a wireless camera, a wireless signal transmitter
`could transmit a signal including a converted image via IR
`transmission, laser, radio, BlueTooth technology, or some
`other relatively local and/or line of sight signal transmission
`technology. Alternatively, a camera transmitter can transmit
`an electronic signal via a conductive wire, or to convert an
`electronic signal to a suitable optical signal and transmit it via
`optical fiber. Therefore, a transmitter of a camera may be
`understood, according to alternate embodiments, to be one of
`a wired or wireless transmitter of electronic and/or optical
`signals including data corresponding to a captured image.
`
`30
`
`35
`
`40
`
`50
`
`55
`
`60
`
`65
`
`
`
`5
`A transmitted signal from a camera deployed as described
`in a premises portion 15 of the system, is received in embodi
`ments at a signal processing means 4 (hereinafter SSMG)
`configured to receive signals of the type transmitted by each
`of the cameras in the premises portion 15. A SSMG 4 can be
`thought of as a Security System Media Gateway; and it serves
`as a central collection and transmission device for security
`systems described in embodiments of the invention. Further,
`an SSMG 4 acts as a gateway for command signals sent to
`cameras 2 by one or more control devices in a system embodi
`ment, either automatically or as directed by a user. The SSMG
`4 typically is configured to and capable of monitoring,
`exchanging signals with, and/or controlling numerous cam
`eras 2.
`An example of a device that can be used as a SSMG 4 is a
`Media Gateway device available from MTeye Security Ltd,
`although the embodiments are not so limited, and others can
`be used according to alternative embodiments. The SSMG
`can be configured to receive power from a primary power
`source, for example an external 12V DC adaptor, but may also
`include a secondary (e.g., backup) power source. Such as one
`of those described above relative to cameras 2. The SSMG
`can be configured with status indicators for power, wireless
`connectivity, and alerts, although more or fewer than these
`may also be included.
`In an embodiment, the SSMG 4 continuously polls each
`camera 2 for an alarm condition over a secure wireless link,
`which is indicated by a change in state in, for example, a
`sensor device. Upon detection, the SSMG downloads an
`image from the camera and stores it locally. A signal relay
`device may be used in situations where a camera 2 is placed
`too far from the signal processing device 4 for consistent or
`effective signal transfer. For example, a camera 2 can transmit
`a wireless signal 3 to an intermediately located relay device,
`which then transmits the signal by wire to the signal process
`ing device 4. Furthermore, an embodiment can include the
`camera 2 and the SSMG 4 integrated as a relatively unitary
`device, wherein signal transmission between the camera 2
`and the SSMG 4 occurs internally within the integrated
`device. One having ordinary skill in the art will recognize
`numerous other alternatives, so they are not exhaustively
`described herein.
`The SSMG 4 can alternatively be configured with a data
`storage means 12 enabling local storage of captured images.
`Storage means 12 can be an integrated or peripheral hard disc
`drive, a memory chip or chip device (e.g., dual in-line
`memory module, DIMM or integrated memory within a
`micro processor), fixed or removable memory of any known
`format (e.g., RAM, flash, compact flash), an optical storage
`media device (e.g., DVD, CD), or some other mass storage
`device or combination of devices as known to those having
`skill in the art as the embodiments are not so limited. Further,
`inasmuch as storage media and device technologies continue
`to develop and change inform, capabilities, and perhaps most
`notably incapacity relative to size, embodiments of the inven
`tion are not limited to only those storage media and/or devices
`now in use. Rather, the disclosure of storage means 12 herein
`is intended to encompass any storage devices or media
`capable of storing data corresponding to images (e.g.,
`memory chip, optically and/or magnetically encoded data, or
`other memory device). In a particularly useful embodiment,
`the SSMG 4 is configured to include the functions and capa
`bilities of a digital video recorder (DVR), either integrally
`within the SSMG 4 or as a peripheral component controllably
`coupled with the SSMG 4.
`The SSMG 4 will typically, but not always, be coupled with
`other components within the premises 15. For example, a
`
`25
`
`30
`
`35
`
`40
`
`45
`
`50
`
`55
`
`60
`
`65
`
`US 7,956,735 B2
`
`10
`
`15
`
`6
`signal transmitting means 6 (e.g., router, modem, cable con
`Verterbox, computer) can be coupled in communication with
`the SSMG 4, either by a wire 5, or wirelessly. The signal
`transmitting means 6, for example, will further include a
`continuous and/or non-continuous connection, by wire 7 and/
`or wirelessly, to elements of the system external to the pre
`mises 15. In other embodiments, the functions of a signal
`transmitting means 6 can be integrated into the SSMG 4, thus
`eliminating the need for a peripheral signal transmitting
`means 6. Signal transmitting means 6, whether configured
`integrally with the SSMG 4 or separately, is configured to
`transmit a signal including data corresponding to one or more
`images, by at least one of the numerous transmission means
`and/or technologies currently available. Such transmission
`means and/or technologies can include any one or more of
`cable broadband, DSL, WAN, WiMAX, Wi-Fi, cellular phone
`signal, satellite, and/or others as known in the art.
`The SSMG 4 can be further coupled with a data input
`and/or computing means 9. Such as a computer (hereinafter
`“local computer”)(e.g., desktop computer, portable com
`puter) or similar device. Such local computer 9 is configured,
`according to alternative embodiments, to perform one or
`more of receiving, processing, storing, and/or conveying to
`the SSMG 4 at least a first set of configuration parameters.
`Configuration parameters can include any one or more of
`camera control parameters (e.g. image capture settings, cam
`era identification data), sensor control parameters (e.g., event
`trigger thresholds settings), data storage parameters (e.g.,
`compression, format, location), DVR functional parameters,
`security parameters (e.g., access codes, user passwords), and
`automated and/or remote system activation/deactivation
`parameters, although this is not intended to be an exclusive
`list, and other system configuration parameters are also
`anticipated according to embodiments. The local computer 9
`can also be preconfigured with configuration parameters
`including contact information and/or communication method
`selection for connecting with a central server upon the occur
`rence of an alarm event, with a remote end-user device, and
`contact information for emergency response services and/or
`agencies.
`The local computer 9 can be configured to be a DVR
`device, rather than the SSMG 4 in an embodiment, including
`capacity and means for storage, retrieval, and/or viewing of
`images. With regard to either the SSMG 4 or the local com
`puter 9, DVR capabilities can be configured at least in part as
`Software instructions fixed in a tangible medium, Such as a
`hard disc drive medium or an optical storage medium.
`The local computer 9 is coupled in communication with the
`SSMG 4 by a wire 8 according to an embodiment, but could
`alternatively be coupled wirelessly. For purposes of clarifica
`tion, a “wire' as referred to throughout this description
`includes any tangible signal conveying means embodied as
`hardware (i.e., not air). Such as an optical fiber orbundle, oran
`electrically conductive wire or cable, and is not limited to any
`one particular form. The local computer 9 typically includes
`a storage means for storing at least one or more configuration
`parameters, captured images, or other data related to system
`functions. A local computer 9 typically also includes a periph
`eral input device (e.g., mouse, keyboard), a display device
`(e.g., monitor), and/or an output device (e.g., printer),
`although one or more of these may be omitted in Some con
`figurations. Further, embodiments of a local computer 9 can
`also include an integrated signal transmitting means 6, obvi
`ating the need for a stand-alone signal transmitting means 6 or
`a signal transmitting means 6 integrated with the SSMG 4.
`While the local computer 9 typically exists separately from
`the SSMG, a particularly integrated embodiment of the
`
`
`
`7
`SSMG 4 can incorporate one or more of the features, devices,
`or functions of the local computer 9, or can even obviate the
`need for a separate local computer 9. Conversely, the func
`tions and/or structural features of an SSMG 4 can be inte
`grated into a local computer 9. Alternatively, the local com
`puter can instead be a remote computer located remotely from
`the premises, yet performing all or Substantially all of the
`functions as described herein, such as by communicating with
`the SSMG 4 over a public or private network.
`While most of the elements of a premises portion 15 typi
`cally remain relatively stationary, a system can include a
`portable, wireless signal transmitting means 11 configured to
`transmit a wireless signal 10 for remotely altering the activa
`tion status of the system. For example, a portable, wireless
`signal transmitter 11 can be configured as a key chain device
`(e.g., key fob) or other remote control device. Alternatively, a
`portable, wireless signal transmitter 11 can be integrated into
`another electronic device. Generally the portable, wireless
`signal transmitter 11 will be configured for relatively short
`range transmission, but is not necessarily so limited, and can
`provide for control even at extended distances. Further, the
`portable, wireless signal transmitter 11 will generally include
`an integral power Supply, such as a replaceable or recharge
`able battery, to enable portability. The portable, wireless sig
`nal transmitter 11 can be used to activate and/or deactivate the
`alarm system, and/or lock or unlock a door, and may include
`functions for otherwise altering at least a first set of configu
`ration parameters of an embodiment of a remotely-verified
`alarm system. In such embodiments, a wireless transceiver
`will be included in the SSMG 4 to receive and/or exchange
`signals with the portable, wireless signal transmitter 11,
`enabling the SSMG 4 to affect changes to the alarm system in
`response to the signals.
`Elements of the premises portion 15 will generally be
`powered by an existing electrical power system present at the
`35
`monitored location (e.g., a residence, business office). How
`ever, the electrical power system can be intentionally and/or
`accidentally interrupted. Therefore, embodiments of the pre
`mises portion of a self-monitored alarm system include a
`back-up power Source to provide Substantially continuous
`alarm system operation despite the interruption of a primary
`electrical system. A back-up system can include at least one
`of a solar energy power source, a power generator (e.g.,
`gasoline powered), a commercial uninterruptible power Sup
`ply (UPS), a battery system, or other power source.
`Server Portion of Alarm System
`The premises portion 15 comprises only a portion of
`embodiments of the invention. As shown in FIG. 2, the moni
`tored premises 20 (and the premises portion 15) is coupled in
`communication with a central server 22 (server). The central
`50
`server 22 typically includes both hardware and software com
`ponents, and is hosted at an off-site location relative to the
`user's monitored premises 20. It provides, among other func
`tions, premise and end-user authentication and/or authoriza
`tion, storage of preconfigured settings, and communication
`55
`capabilities including bu