throbber
US00795,6735B2
`
`(12) United States Patent
`JacksOn
`
`(10) Patent No.:
`(45) Date of Patent:
`
`US 7.956,735 B2
`Jun. 7, 2011
`
`(54) AUTOMATED, REMOTELY VERIFIED
`ALARM SYSTEM WITH INTRUSION AND
`VIDEO SURVELLANCE AND DIGITAL
`VIDEO RECORDING
`
`(75) Inventor: Randall R. Jackson, Portland, OR (US)
`(73) Assignee: Cernium Corporation, Reston, VA (US)
`
`(*) Notice:
`
`Subject to any disclaimer, the term of this
`patent is extended or adjusted under 35
`U.S.C. 154(b) by 1013 days.
`(21) Appl. No.: 11/803,851
`
`(22) Filed:
`65
`(65)
`
`May 15, 2007
`Prior Publication Dat
`O DO
`US 2007/O262857 A1
`Nov. 15, 2007
`51) Int. C
`
`(2006.01)
`ins 29MO
`(51)
`(52) U.S. Cl. ..................... 340/506; 340/505; 340/539.1;
`340/539.11:34.0/539.25; 340/541; 340/3.1
`f
`(58) Field of Classification Search .................. 340/505,
`i. 539.1, 539.11,539.25,541, 545.1,
`S
`li 340 E. 545.7,
`3.1, R 825.49
`ee application file for complete search history.
`References Cited
`
`(56)
`
`U.S. PATENT DOCUMENTS
`4,857,912 A
`8, 1989 Everett, Jr. et al.
`5,486,819 A
`1/1996 Horie
`5,708.423 A
`1/1998 Ghaffari et al.
`5,712,830 A
`1/1998 ROSS et al.
`5,801,618 A
`9, 1998 Jenkins
`5,809,161 A
`9/1998 Auty et al.
`5,875,305 A
`2f1999 Winter et al.
`5,956,716 A
`9, 1999 Kenner et al.
`6,154,133 A 11/2000 ROSS
`6,625,383 B1
`9, 2003 Wakimoto et al.
`6,956,599 B2 * 10/2005 Lim et al. ................... 348, 14.02
`
`
`
`6,975,220 B1* 12/2005 Foodman et al. ............. 340,531
`29 38 R: ck 33: Naidoo et al. ................ 340,531
`7.209,035 B2 * 4/2007 Tabankin et al. ........ 340,539.11
`7.262,690 B2 * 8/2007 Heaton et al. ................. 340,500
`7,342.489 B1* 3/2008 Milinusic et al. ..
`... 340/506
`7,403,116 B2 * 7/2008 Bittner ...........
`... 340,540
`7,486,183 B2 * 2/2009 Luebke et al. .
`... 340/506
`7,612,666 B2 * 1 1/2009 Badawy ........................ 340,541
`(Continued)
`OTHER PUBLICATIONS
`M
`Website information, MTeyeWirelessVideo Verification and Remote
`Viewing Solutions, May 4, 2007. http://mteye.co.il/home/Index.
`aspX.
`
`(Continued)
`
`Primary Examiner — Daryl Pope
`
`(57)
`
`ABSTRACT
`
`N. that Eas E. lin
`singd EE VARGRI
`p
`is
`p
`ing by an image capture device at least one image in response
`to a detection event, and transmitting a first data signal includ
`ing the image to a local signal processing device. The signal
`processing device transmits a second signal including at least
`a portion of the image to a remote hosted server according to
`at least a first set of predetermined parameters. After receiv
`ing the second signal, the server transmits a third signal
`including at least a portion of the image from the hosted
`server to a user device. Using the user device, a user views the
`image and indicates a validity status of the alarm based at
`least in part on the content of the image. Based at least upon
`either the validation status indicated by the user, or upon a
`failure to receive a message including a validation status from
`the user within a predetermined duration of time, the server
`portion may send an alarm signal to an emergency response
`service.
`
`26 Claims, 7 Drawing Sheets
`
`

`

`US 7,956,735 B2
`Page 2
`
`U.S. PATENT DOCUMENTS
`2003/0081836 A1
`5, 2003 Averbuch et al.
`2005, 0132414 A1
`6/2005 Bentley et al.
`2005/0134450 A1
`6, 2005 Kovach
`2006.0167595 A1
`7/2006 Breed et al.
`2006/O195569 A1
`8, 2006 Barker
`2007/0094.716 A1
`4/2007 Farino et al.
`2007/0177800 A1
`8, 2007 Connell
`2007/0263905 A1 1 1/2007 Chang et al.
`2009/0022362 A1
`1/2009 Gagvani et al.
`2009,014 1939 A1
`6, 2009 Chambers et al.
`
`OTHER PUBLICATIONS
`Website information, Videofied, May 14, 2007. http://www.
`videofied.com/en. What is Videofied?.
`Website information, The iControl Solution, iControl Networks,
`May 14, 2007. http://www.icontrol.com/how WorksMain.jsp.
`
`Website information, Swann Alert DVR Camera Kit, May 14, 2007.
`http://www.costco.com/Browse//Product.aspx?Prodid=
`11206961&whse=BC&topnav=&browse=.
`Website information, Q-See 16 Ch MPEG4 DVR250 GB HDD with
`Built-in DVD Burner, May 14, 2007. http://www.costco.com/
`Browse//Product.aspx?Prodid=11200471&whse=
`BC&topnav=&browse=.
`International Search Report and Written Opinion for International
`PCT Application No. PCT/US2008/070134, mailed Oct. 7, 2008, 8
`pg.S.
`International Search Report and Written Opinion for International
`PCT Application No. PCT/US2008/084835, mailed Feb. 4, 2009, 7
`pg.S.
`International Search Report and Written Opinion for International
`PCT Application No. PCT/US 10/32013, mailed Jun. 28, 2010, 8 pgs.
`* cited by examiner
`
`

`

`U.S. Patent
`
`Jun. 7, 2011
`
`Sheet 1 of 7
`
`US 7,956,735 B2
`
`
`
`eWUiwvacAGDAWadaaudawMUNAdMuWuAuaawanes ohuMbUAABaOMGea
`
`LSis
`
`Motorola v. Stellar
`
`Motorola Exhibit 1055
`Page 003
`
`

`

`Jun. 7, 2011
`Jun. 7, 2011
`
`Sheet 2 of 7
`Sheet 2 of 7
`
`US 7.956,735 B2
`
`U.S. Patent
`U.S. Patent
`
`
`
`US 7,956,735 B2
`
`Motorola v. Stellar
`
`Motorola Exhibit 1055
`Page 004
`
`

`

`U.S. Patent
`
`Jun. 7, 2011
`
`Sheet 3 of 7
`
`US 7,956,735 B2
`
`UONCOYNSA
`
`
`
`Bulaiasayjeubis
`
`UOReoya/
`
`UONEUIYUOD
`
`sINpoY/|y
`
`aINpoy
`
`Jayiusuel|WUE
`
`
`
`
`
`
`
`a|NPpOWaBHes0}seyeq
`
`ee
`
`/
`
`
`
`ce
`
`Le
`
`6é
`
`ainpoy
`
`UOISSILUSUBL|jeuBisuoNoe}Eeq
`
`
`jeublguoNoa}eq
`ainpoWBunnoy
`
`jeuBlsuoNnde}98q
`
`Buiaisoay
`
`-ainpow
`
`ainpoyyBurwu!,JEA1a}U|
`
`[eUBIS
`
`aiNpo|sisAjeuy
`
`ejeqobew|
`
`ge
`
`A
`
`92
`
`Motorola v. Stellar
`
`Motorola Exhibit 1055
`Page 005
`
`
`
`
`
`
`
`

`

`U.S. Patent
`U.S. Patent
`
`Jun. 7, 2011
`
`Sheet 4 of 7
`
`US 7.956,735 B2
`US 7,956,735 B2
`
`
`
`
`
`
`
`
`
`Bulssed0id|eubis
`
`
`jeuBisguonoe}98q
`
`ainpoyy
`
`Bulaisoey
`
`3inpo;
`
`O
`w
`
`V
`
`
`
`
`
`ajnpow
`
`UOISSILUSUBI|jeuBigudHeoyWe/A
`
`?InpOW
`
`yndu|Jas
`a|NpoW
`
`ainpowAe\dsig
`
`a(/Npo|
`
`ejegebew|
`UONEONNEAWey
`
`
`
`Motorola v. Stellar
`
`Motorola Exhibit 1055
`Page 006
`
`
`
`
`
`
`
`

`

`U.S. Patent
`U.S. Patent
`
`Jun. 7, 2011
`Jun. 7, 2011
`
`Sheet 5 Of 7
`Sheet 5 of 7
`
`US 7.956,735 B2
`US 7,956,735 B2
`
`SIME ANSI A AL A AACS TRINA DOA SI AACA IA SDE AS SAC AAR AG DN A A AAS SUA
`
`
`
`S‘Old
`
`*.
`
`9
`
`Motorola v. Stellar
`
`Motorola Exhibit 1055
`Page 007
`
`

`

`U.S. Patent
`U.S. Patent
`
`Jun. 7, 2011
`Jun. 7, 2011
`
`Sheet 6 of 7
`Sheet 6 of 7
`
`US 7.956,735 B2
`
`US 7,956,735 B2
`
`
`
`
`
`
`
`s
`
`Motorola v. Stellar
`
`Motorola Exhibit 1055
`Page 008
`
`

`

`U.S. Patent
`U.S. Patent
`
`Jun. 7, 2011
`Jun. 7, 2011
`
`Sheet 7 of 7
`Sheet 7 of 7
`
`US 7.956,735 B2
`US 7,956,735 B2
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
` puejeuBbisjsul4saisoay|jeuBis
`
`
`
`sulylwwsuely
`
`
`
`puee}eq|ensiAaindey
`
`LZ
`
`
`
`
`
`puejeuBigpuodasanleodoye2
`
`
`JeuBlgPalyspusues]
`
`
`
`
`
`
`
`
`
`
`
`MalApukejeUBISPulyLSAIBDSyYbl
`
`
`
`
`
`Bjeqensi~910}S
`
`
`
`pueeyeqApeynduy
`
`
`
`Zz
`
`Z‘Sila
`
`
`
`
`
`jeubigyynoyywsuely
`
`
`
`
`
`jeuBisweyjlusuesy
`
`
`
`
`
`puejeubisyunoysaisoey
`
`GL
`
`Motorola v. Stellar
`
`Motorola Exhibit 1055
`Page 009
`
`
`
`
`
`

`

`1.
`AUTOMATED, REMOTELY VERIFIED
`ALARM SYSTEM WITH INTRUSION AND
`VIDEO SURVELLANCE AND DIGITAL
`VIDEO RECORDING
`
`RELATED APPLICATIONS
`
`The present application claims priority to U.S. Provisional
`Patent Application Ser. No. 60/800,505, entitled AUTO
`MATED SELF-MONITORED ALARM VERIFICATION 10
`SOLUTION and filed 15 May 2006, and U.S. Provisional
`Patent Application Ser. No. 60/800,504, entitled SELF
`MONITORED INTRUSION AND VIDEO SURVEIL
`LANCE SOLUTION WITH DIGITAL VIDEO RECORD
`ING filed May 15, 2006, the disclosures of which are 15
`incorporated herein in their entirety by this reference.
`
`FIELD OF THE INVENTION
`
`The present invention relates generally to intrusion alarm 20
`systems, and more specifically it relates to an automated,
`remotely-monitored alarm verification solution for visually
`identifying the root cause of alarm events.
`
`BACKGROUND OF THE INVENTION
`
`25
`
`It can be appreciated that intrusion alarm systems have
`been in use for years and are commonplace in commercial and
`residential applications. Typically, intrusion alarm systems
`are comprised of one or more passive sensors connected to a 30
`burglar alarm panel located at the monitored building or area.
`When the system is “armed” and any of the sensors is acti
`vated, a notification is sent to a central monitoring facility
`usually via a dial-up connection. Typically, an operator at the
`central station calls back the location and attempts to validate 35
`the alarm, usually via verbal exchange of a “secret code or
`password. Failure to validate the alarm usually results in a call
`being placed to 3rd parties such as law enforcement officials.
`These types of systems consist of one or more sensors
`connected to a control panel, which monitors the sensors, and 40
`delivers a status message to an alarm monitoring station when
`activated. In normal applications these types of sensors can
`only provide binary information indicating the active state of
`an alarm condition. In most instances, the alarm sensors are
`connected to an intrusion control panel, which monitors the 45
`sensors and determines the state of an alarm condition. The
`alarm activations are then sent to a manned alarm monitoring
`station usually via a public switched telephone network
`(PSTN) dial-up connection.
`The main problem with conventional intrusion alarm sys- 50
`tems is that they are very prone to false alarms due to inad
`equacies with existing technologies, and they provide no
`inexpensive means to visually validate an alarm remotely.
`False alarm statistics are persistently in the high 90% range,
`an extremely costly false-positive problem. Attempts have 55
`been made to try to address the false-alarm issue by deploying
`traditional closed circuit television (CCTV) cameras, how
`ever, these attempts have not met with Success due to the cost
`of installation and equipment. Another problem with conven
`tional intrusion alarm systems is that they are very expensive 60
`both for the initial equipment cost and monthly recurring
`charge to the end-user. Installation costs are typically passed
`on to the end-user. In addition, these systems typically use a
`dial-up connection to communicate alarm conditions back to
`a central monitoring station making validation a slow and 65
`tedious process. Another problem with conventional intru
`sion alarm systems is that they need to be actively monitored,
`
`US 7,956,735 B2
`
`2
`generally requiring the use of a third-party monitoring service
`which can be prohibitively expensive and does substantially
`reduce the false positive problem.
`
`BRIEF DESCRIPTION OF THE DRAWINGS
`
`FIG. 1 depicts an iconic representation of a premises por
`tion of an alarm system according to an embodiment of the
`invention.
`FIG. 2 depicts an iconic representation of an extended
`portion of analarm system according to an embodiment of the
`invention.
`FIG. 3 depicts a block diagram of a server portion of an
`alarm system according to an embodiment of the invention.
`FIG. 4 depicts a block diagram of an end-user device por
`tion of an alarm system according to an embodiment of the
`invention.
`FIG. 5 depicts an iconic diagram of data flow pathways
`within a premises portion of an alarm system according to an
`embodiment of the invention.
`FIG. 6 depicts an iconic diagram of data flow pathways
`throughout an extended portion of an alarm system according
`to an embodiment of the invention.
`FIG.7 depicts a block flow diagram of an alarm verification
`method according to an embodiment of the invention.
`
`DETAILED DESCRIPTION OF THE PREFERRED
`EMBODIMENTS
`
`The invention, in accordance with a typical embodiment,
`involves intrusion alarm systems which are verified remotely
`(e.g., by a user or another authorized entity, collectively
`“user hereinafter for simplicity of description). The
`remotely-verified alarm solutions of the present invention
`Substantially depart from the conventional concepts and
`designs of the prior art. In so doing, the invention provides
`embodiments of a system primarily developed for the purpose
`of visually identifying the root cause of alarm events directly
`and immediately, while utilizing modern high-speed Internet,
`phone networks, or private networks and web-enabled
`devices for remotely-monitoring. Furthermore, embodiments
`of the invention provide for contacting law enforcementagen
`cies, other emergency response services, and/or any other
`third party designated by a user or other authorized entity,
`only if an alarm event is valid, and Substantially or entirely
`without the intervention of a third party alarm monitoring
`company.
`An end user can install a premise security system, and
`verify an alarm event regardless of the proximity of the end
`user to the monitored location. When an alarm event takes
`place, the system delivers an alarm condition Substantially
`autonomously to an end-user. The system uses wired and/or
`wireless Internet, phone networks, private networks, and/or
`other communication networks to deliver to the end user an
`image-based indication of the cause of an alarm.
`Given the high incidence of false alarms due to less capable
`alarm systems, a highly desirable feature in embodiments of
`the invented alarm system is the ability to remotely and visu
`ally verify an alarm condition. False alarms can be caused in
`a variety of ways, including defective sensors and user error,
`Such as failing to deactivate an alarm system upon entry.
`Common means for remotely verifying an actual alarm con
`dition includes calling the premises and/or sending personnel
`to visit the premises from which the alarm signal originated.
`The invention seeks to alleviate the need for such inefficient,
`costly, and slow means of validation by providing the premise
`
`

`

`US 7,956,735 B2
`
`10
`
`15
`
`25
`
`3
`owner the ability to interrogate the cause of an alarm over any
`public network, Internet, phone network, or private network.
`According to one embodiment of the present invention, an
`automated, remotely-verified alarm system includes: a) an
`integrated Passive InfraRed (PIR) sensor (or other motion
`sensor) for motion detection with an integrated camera (PIR
`Cam) or separate sensor and camera, or motion sensing cam
`era; b) a premise Security System Media Gateway (SSMG)
`with storage that manages a number of PIRs, cameras, or
`PIRCams and transmits alarm events and associated video or
`static images to a remote central server; c) a hosted remote
`web-server (“central server') that provides authentication,
`communication and data delivery to external remote end
`users and law enforcement agencies; and d) remote end-user
`communication devices to receive telephone Voice messages
`and/or data messages via email, instant messaging including
`text messaging, Systems Management Server (SMS) and/or
`Multimedia Messaging Service (MMS) messaging, and/or
`other network or web-enabled communication media. The
`embodiments of the invention, however, are not so limited.
`Therefore, it is to be understood that the invention is not
`limited in its application to the details of construction and to
`the arrangements of the components set forth in the following
`description or illustrated in the drawings. The invention is
`capable of other embodiments and of being practiced and
`carried out in various ways. Also, it is to be understood that
`the terms and phrases employed herein are for the purpose of
`simplicity and clarity in the description and should not be
`regarded as limiting.
`Premises Portion of Alarm System
`FIG. 1 depicts an embodiment of a portion of a remotely
`verified alarm system configured to monitor a user's premises
`15 (or “premises portion'). Included in the system, according
`to embodiments, are one or more image capture means Such
`as cameras 2 for capturing images of portions of a monitored
`location. Most notably, locations such as building access
`points, windows, hallways, rooms containing high-value
`items, and other locations are typically beneficially moni
`tored for intrusion detection or other exigencies and/or emer
`gencies. Cameras 2 can be affixed to or at least partially
`within structural features of a building, such as a wall, ceiling,
`roof, structural Support, ventilation passage, or other features.
`Alternatively, cameras can be provided in Such landscape
`features as trees, shrubs, retaining walls, or other features.
`Wherever affixed, a camera 2 is configured so as to capture an
`45
`image of an area where intrusion monitoring is desired. When
`numerous areas are to be monitored, cameras can be deployed
`in multiple locations as part of a distributed, interconnected
`monitoring network.
`Cameras 2 in embodiments include stationary cameras,
`cameras capable of automatically Sweeping from side to side
`to capture a larger area than a comparable stationary camera.
`Cameras can include those capable of multiple directional
`angles and/or directionally controllable either remotely or
`according to a pre-programmed Scanning pattern. Cameras 2
`can be configured to capture still images, full motion images
`(hereinafter, video), or a combination thereof, and Such
`images will typically, but not exclusively, be either black-and
`white or color images. Alternatively, cameras are used that are
`configured for extremely low light conditions (e.g., night
`vision) or for capturing viewable images of transient thermal
`differentials (e.g., thermal imaging) in the ambient environ
`ment.
`Due to the highly variable placement of cameras 2, it may
`not always be convenient to extend wiring to a camera for
`wired transmission of signals to and from the camera. There
`fore, while cameras are frequently connected by a wire, they
`
`4
`may also transmit and receive signals wirelessly. Likewise, it
`may not be possible to maintain a continuous power Supply to
`a camera 2 in various locations and/or situations. Therefore,
`an alternative and/or self-contained power Supply can be pro
`vided in some situations. Examples of Such include power
`provided by batteries, by a solar panel, by a generator, by an
`uninterruptible power supply (i.e., U.P.S.), by a redundant
`hardwired power supply, or by another device or method.
`Cameras 2 used in a system according to embodiments
`may also possess other capabilities for enhancing the infor
`mational value from captured images. For example, cameras
`can include the ability to Zoom in or out. Such as to widen or
`narrow a field of view and increase the resolution of distant or
`Small objects, or to compensate for changing light conditions.
`In embodiments, a camera 2 includes a sensor capable of
`detecting changes in the ambient environmental conditions
`(hereinafter, alarm event and/or detection event), and the
`camera 2 is further configured to react to such changes by
`turning on or off, or by capturing a still image or video image
`(collectively, images). Alarm events can include a transient
`thermal (e.g., infrared, hereinafter IR) differential, a human
`audible or inaudible sound, a transient reflection of a beam or
`signal wave emitted by the camera or another device, or other
`Such changes. In embodiments, a sensor of a camera 2 can be
`calibrated relative to the background (e.g., normal) condi
`tions of the environment where the camera 2 is affixed and is
`to operate. Further, a sensor of a camera 2, Such as a passive
`IR sensor, can be configured to specifically detect and/or
`indicate the presence or occurrence of an alarm event only
`when such changes reach and/or exceed some threshold level
`(hereinafter, threshold).
`While a sensor can be configured as a unitary part of a
`camera 2, in other embodiments, a sensor can be coupled with
`a camera 2 either by a wire or wirelessly, and be located
`relatively separately from the camera2. For example, a sensor
`can include a magnetically coupled circuit affixed relative to
`a window or entryway Such that the opening of a door or
`window breaks the circuit and causes the sensor to indicate a
`threshold alarm event to the camera 2. Likewise, a sensor can
`include a pressure and/or tensile sensitive device (e.g., pad,
`plate, strip), an optical beam emitter/detector System, any of
`the integral sensors described above, or any other capable of
`detecting a threshold alarm event. In general, one or more
`cameras 2 capable of detecting a threshold alarm event,
`whether having integral or separately coupled sensors, are
`collectively referred to hereinafter as “motion sensing cam
`eras', or simply "cameras”.
`In still other embodiments, cameras 2 may simply be pas
`sive image gathering cameras not configured with threshold
`alarm event discrimination capability, but simply gather and
`transmit images to a signal processing device that has such
`capability. A signal processing device is described in more
`detail below.
`Each embodiment of a camera 2 has the capability to con
`Vert a captured image into an electronic and/or optical signal
`and to transmit the signal out from the camera 2. In embodi
`ments of a wireless camera, a wireless signal transmitter
`could transmit a signal including a converted image via IR
`transmission, laser, radio, BlueTooth technology, or some
`other relatively local and/or line of sight signal transmission
`technology. Alternatively, a camera transmitter can transmit
`an electronic signal via a conductive wire, or to convert an
`electronic signal to a suitable optical signal and transmit it via
`optical fiber. Therefore, a transmitter of a camera may be
`understood, according to alternate embodiments, to be one of
`a wired or wireless transmitter of electronic and/or optical
`signals including data corresponding to a captured image.
`
`30
`
`35
`
`40
`
`50
`
`55
`
`60
`
`65
`
`

`

`5
`A transmitted signal from a camera deployed as described
`in a premises portion 15 of the system, is received in embodi
`ments at a signal processing means 4 (hereinafter SSMG)
`configured to receive signals of the type transmitted by each
`of the cameras in the premises portion 15. A SSMG 4 can be
`thought of as a Security System Media Gateway; and it serves
`as a central collection and transmission device for security
`systems described in embodiments of the invention. Further,
`an SSMG 4 acts as a gateway for command signals sent to
`cameras 2 by one or more control devices in a system embodi
`ment, either automatically or as directed by a user. The SSMG
`4 typically is configured to and capable of monitoring,
`exchanging signals with, and/or controlling numerous cam
`eras 2.
`An example of a device that can be used as a SSMG 4 is a
`Media Gateway device available from MTeye Security Ltd,
`although the embodiments are not so limited, and others can
`be used according to alternative embodiments. The SSMG
`can be configured to receive power from a primary power
`source, for example an external 12V DC adaptor, but may also
`include a secondary (e.g., backup) power source. Such as one
`of those described above relative to cameras 2. The SSMG
`can be configured with status indicators for power, wireless
`connectivity, and alerts, although more or fewer than these
`may also be included.
`In an embodiment, the SSMG 4 continuously polls each
`camera 2 for an alarm condition over a secure wireless link,
`which is indicated by a change in state in, for example, a
`sensor device. Upon detection, the SSMG downloads an
`image from the camera and stores it locally. A signal relay
`device may be used in situations where a camera 2 is placed
`too far from the signal processing device 4 for consistent or
`effective signal transfer. For example, a camera 2 can transmit
`a wireless signal 3 to an intermediately located relay device,
`which then transmits the signal by wire to the signal process
`ing device 4. Furthermore, an embodiment can include the
`camera 2 and the SSMG 4 integrated as a relatively unitary
`device, wherein signal transmission between the camera 2
`and the SSMG 4 occurs internally within the integrated
`device. One having ordinary skill in the art will recognize
`numerous other alternatives, so they are not exhaustively
`described herein.
`The SSMG 4 can alternatively be configured with a data
`storage means 12 enabling local storage of captured images.
`Storage means 12 can be an integrated or peripheral hard disc
`drive, a memory chip or chip device (e.g., dual in-line
`memory module, DIMM or integrated memory within a
`micro processor), fixed or removable memory of any known
`format (e.g., RAM, flash, compact flash), an optical storage
`media device (e.g., DVD, CD), or some other mass storage
`device or combination of devices as known to those having
`skill in the art as the embodiments are not so limited. Further,
`inasmuch as storage media and device technologies continue
`to develop and change inform, capabilities, and perhaps most
`notably incapacity relative to size, embodiments of the inven
`tion are not limited to only those storage media and/or devices
`now in use. Rather, the disclosure of storage means 12 herein
`is intended to encompass any storage devices or media
`capable of storing data corresponding to images (e.g.,
`memory chip, optically and/or magnetically encoded data, or
`other memory device). In a particularly useful embodiment,
`the SSMG 4 is configured to include the functions and capa
`bilities of a digital video recorder (DVR), either integrally
`within the SSMG 4 or as a peripheral component controllably
`coupled with the SSMG 4.
`The SSMG 4 will typically, but not always, be coupled with
`other components within the premises 15. For example, a
`
`25
`
`30
`
`35
`
`40
`
`45
`
`50
`
`55
`
`60
`
`65
`
`US 7,956,735 B2
`
`10
`
`15
`
`6
`signal transmitting means 6 (e.g., router, modem, cable con
`Verterbox, computer) can be coupled in communication with
`the SSMG 4, either by a wire 5, or wirelessly. The signal
`transmitting means 6, for example, will further include a
`continuous and/or non-continuous connection, by wire 7 and/
`or wirelessly, to elements of the system external to the pre
`mises 15. In other embodiments, the functions of a signal
`transmitting means 6 can be integrated into the SSMG 4, thus
`eliminating the need for a peripheral signal transmitting
`means 6. Signal transmitting means 6, whether configured
`integrally with the SSMG 4 or separately, is configured to
`transmit a signal including data corresponding to one or more
`images, by at least one of the numerous transmission means
`and/or technologies currently available. Such transmission
`means and/or technologies can include any one or more of
`cable broadband, DSL, WAN, WiMAX, Wi-Fi, cellular phone
`signal, satellite, and/or others as known in the art.
`The SSMG 4 can be further coupled with a data input
`and/or computing means 9. Such as a computer (hereinafter
`“local computer”)(e.g., desktop computer, portable com
`puter) or similar device. Such local computer 9 is configured,
`according to alternative embodiments, to perform one or
`more of receiving, processing, storing, and/or conveying to
`the SSMG 4 at least a first set of configuration parameters.
`Configuration parameters can include any one or more of
`camera control parameters (e.g. image capture settings, cam
`era identification data), sensor control parameters (e.g., event
`trigger thresholds settings), data storage parameters (e.g.,
`compression, format, location), DVR functional parameters,
`security parameters (e.g., access codes, user passwords), and
`automated and/or remote system activation/deactivation
`parameters, although this is not intended to be an exclusive
`list, and other system configuration parameters are also
`anticipated according to embodiments. The local computer 9
`can also be preconfigured with configuration parameters
`including contact information and/or communication method
`selection for connecting with a central server upon the occur
`rence of an alarm event, with a remote end-user device, and
`contact information for emergency response services and/or
`agencies.
`The local computer 9 can be configured to be a DVR
`device, rather than the SSMG 4 in an embodiment, including
`capacity and means for storage, retrieval, and/or viewing of
`images. With regard to either the SSMG 4 or the local com
`puter 9, DVR capabilities can be configured at least in part as
`Software instructions fixed in a tangible medium, Such as a
`hard disc drive medium or an optical storage medium.
`The local computer 9 is coupled in communication with the
`SSMG 4 by a wire 8 according to an embodiment, but could
`alternatively be coupled wirelessly. For purposes of clarifica
`tion, a “wire' as referred to throughout this description
`includes any tangible signal conveying means embodied as
`hardware (i.e., not air). Such as an optical fiber orbundle, oran
`electrically conductive wire or cable, and is not limited to any
`one particular form. The local computer 9 typically includes
`a storage means for storing at least one or more configuration
`parameters, captured images, or other data related to system
`functions. A local computer 9 typically also includes a periph
`eral input device (e.g., mouse, keyboard), a display device
`(e.g., monitor), and/or an output device (e.g., printer),
`although one or more of these may be omitted in Some con
`figurations. Further, embodiments of a local computer 9 can
`also include an integrated signal transmitting means 6, obvi
`ating the need for a stand-alone signal transmitting means 6 or
`a signal transmitting means 6 integrated with the SSMG 4.
`While the local computer 9 typically exists separately from
`the SSMG, a particularly integrated embodiment of the
`
`

`

`7
`SSMG 4 can incorporate one or more of the features, devices,
`or functions of the local computer 9, or can even obviate the
`need for a separate local computer 9. Conversely, the func
`tions and/or structural features of an SSMG 4 can be inte
`grated into a local computer 9. Alternatively, the local com
`puter can instead be a remote computer located remotely from
`the premises, yet performing all or Substantially all of the
`functions as described herein, such as by communicating with
`the SSMG 4 over a public or private network.
`While most of the elements of a premises portion 15 typi
`cally remain relatively stationary, a system can include a
`portable, wireless signal transmitting means 11 configured to
`transmit a wireless signal 10 for remotely altering the activa
`tion status of the system. For example, a portable, wireless
`signal transmitter 11 can be configured as a key chain device
`(e.g., key fob) or other remote control device. Alternatively, a
`portable, wireless signal transmitter 11 can be integrated into
`another electronic device. Generally the portable, wireless
`signal transmitter 11 will be configured for relatively short
`range transmission, but is not necessarily so limited, and can
`provide for control even at extended distances. Further, the
`portable, wireless signal transmitter 11 will generally include
`an integral power Supply, such as a replaceable or recharge
`able battery, to enable portability. The portable, wireless sig
`nal transmitter 11 can be used to activate and/or deactivate the
`alarm system, and/or lock or unlock a door, and may include
`functions for otherwise altering at least a first set of configu
`ration parameters of an embodiment of a remotely-verified
`alarm system. In such embodiments, a wireless transceiver
`will be included in the SSMG 4 to receive and/or exchange
`signals with the portable, wireless signal transmitter 11,
`enabling the SSMG 4 to affect changes to the alarm system in
`response to the signals.
`Elements of the premises portion 15 will generally be
`powered by an existing electrical power system present at the
`35
`monitored location (e.g., a residence, business office). How
`ever, the electrical power system can be intentionally and/or
`accidentally interrupted. Therefore, embodiments of the pre
`mises portion of a self-monitored alarm system include a
`back-up power Source to provide Substantially continuous
`alarm system operation despite the interruption of a primary
`electrical system. A back-up system can include at least one
`of a solar energy power source, a power generator (e.g.,
`gasoline powered), a commercial uninterruptible power Sup
`ply (UPS), a battery system, or other power source.
`Server Portion of Alarm System
`The premises portion 15 comprises only a portion of
`embodiments of the invention. As shown in FIG. 2, the moni
`tored premises 20 (and the premises portion 15) is coupled in
`communication with a central server 22 (server). The central
`50
`server 22 typically includes both hardware and software com
`ponents, and is hosted at an off-site location relative to the
`user's monitored premises 20. It provides, among other func
`tions, premise and end-user authentication and/or authoriza
`tion, storage of preconfigured settings, and communication
`55
`capabilities including bu

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket