WO2008056320A1 - A security system - Google Patents

A security system Download PDF

Info

Publication number
WO2008056320A1
WO2008056320A1 PCT/IB2007/054492 IB2007054492W WO2008056320A1 WO 2008056320 A1 WO2008056320 A1 WO 2008056320A1 IB 2007054492 W IB2007054492 W IB 2007054492W WO 2008056320 A1 WO2008056320 A1 WO 2008056320A1
Authority
WO
WIPO (PCT)
Prior art keywords
video
security system
audio
monitoring station
surveillance
Prior art date
Application number
PCT/IB2007/054492
Other languages
French (fr)
Inventor
David Miles Winson
Original Assignee
David Miles Winson
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by David Miles Winson filed Critical David Miles Winson
Priority to GB0815477A priority Critical patent/GB2449584A/en
Publication of WO2008056320A1 publication Critical patent/WO2008056320A1/en

Links

Classifications

    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms
    • G08B13/18Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength
    • G08B13/189Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems
    • G08B13/194Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems
    • G08B13/196Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B25/00Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems
    • G08B25/008Alarm setting and unsetting, i.e. arming or disarming of the security system
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B25/00Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems
    • G08B25/01Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems characterised by the transmission medium
    • G08B25/10Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems characterised by the transmission medium using wireless transmission systems
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N7/00Television systems
    • H04N7/18Closed-circuit television [CCTV] systems, i.e. systems in which the video signal is not broadcast

Definitions

  • THIS INVENTION relates to a security system. It more particularly relates to a method of monitoring a property (residential and or industrial), to a method of monitoring a security system, to a security system, to a security system installation, and to a building structure.
  • the invention relates also to a security system installation, and to a building including such security system.
  • a method of monitoring a property including: dividing the property into monitoring channels made up of a defined number of zones, and monitoring a set of trigger events; upon sensing of a trigger event, transmitting a wireless alarm signal to a remote monitoring station that a trigger event has been sensed, thereby notifying the remote monitoring station of the sensed event; and activating video surveillance in at least one monitor zone, and wirelessly sending video material taken in the monitor zone to the remote monitoring station, thereby enabling the remote monitoring station visually to determine the nature of the trigger event.
  • the method may include activation of a defense mechanism such as a non-lethal gas-discharge.
  • video surveillance may include taking a video snapshot.
  • the method may include activating audio surveillance in at least one monitor zone and wirelessly transmitting an audio stream taken in the at least one monitor zone to the remote monitoring station, thereby enabling the remote monitoring station audibly to determine the nature of the trigger event.
  • the set of trigger events may include any one or more of detection of unauthorized entry into the property; a system malfunction; a status request received from the remote monitoring station; a surveillance request received from the remote monitoring station to activate any one of video surveillance and audio surveillance in at least one monitor zone; a surveillance request received via the monitoring station from a predefined party to activate any one of video surveillance and audio surveillance in at least one monitor zone; an operational request received via the monitoring station from a predefined party to perform an operational task; an arm/disarm signal; an alarm mode signal; a panic signal; a power failure signal and a low battery signal.
  • the method may further include transmitting predetermined status notifications, e.g. in the case of a power failure, via the remote monitoring station to a cellular telephone number of a user or another designated party.
  • the method may therefore include receiving via the remote monitoring station a status request from a mobile communication device of a user and, in response to receipt of the valid, security verified status request, transmitting a specified status notification, specified in the status request, to the predefined authorized mobile communication device from which the request originated.
  • Operational requests may include arming/disarming requests, requests to operate a device located on the property, e.g. a gate or garage door, a request to switch on/off certain lights at the property, and the like.
  • the method may include authenticating the request from the predefined party prior to executing the request.
  • the method may include transmitting from the remote monitoring station a notification message indicating the nature of the trigger event to a predefined party via a wireless mobile communication network.
  • the notification message may be in the form of any one of a short message service (SMS) message and a multi-media messaging service (MMS) message.
  • SMS short message service
  • MMS multi-media messaging service
  • the method may include forwarding video material transmitted to the remote monitoring station to a predefined user via a wireless communication network.
  • the method may include receiving from the remote monitoring station an activation signal for activating a defense mechanism at the monitored property.
  • the method may include activating any one of an audible alarm and a visual alarm at the monitored property.
  • the audible alarm may be in the form of a siren and the visual alarm may be in the form of a strobe light.
  • the method may include activating at least one tracking device secured to at least one valuable located at the monitored property.
  • the method may therefore include tracking the at least one valuable to which the at least one tracking device is secured if they are removed from the property by a party or parties who have gained unauthorized access to the property.
  • a method of monitoring a security system from a remote location including: receiving an alarm signal from the security system upon sensing of a trigger event at a property where the security system is installed; and receiving, in real time, any one of video surveillance material and audio surveillance material, taken at the property where the security system is installed, from the security system, thereby enabling visual/audible identification, from the remote location, of the nature of the trigger event sensed at the property.
  • the method may include transmitting a surveillance request to the security system for activating any one of a video surveillance facility and an audio surveillance facility at the property, and thereafter receiving said surveillance material taken at the property where the security system is installed.
  • the method may include receipt of stored video surveillance material from the security system.
  • the method may include transmitting a defense signal to the property for activating a defense mechanism at the property.
  • the defense mechanism may be in the form of a painful audible sound, a gas discharge device containing a staining gas or an unpleasant gas such as teargas, or the like.
  • the method may include forwarding any one of the video surveillance material and the audio surveillance material via a wireless communication network to a mobile communications device of a user.
  • a security system which includes: sensing means for sensing a trigger event; any one of a video monitoring facility for monitoring a video signal originating from a video surveillance device and an audio monitoring facility for monitoring an audio signal originating from an audio surveillance device in response to sensing of the trigger event by the sensing means; and a first wireless communications device connected to any one of the video monitoring facility and the audio monitoring facility operable to transmit any one of the video signal and the audio signal via a wireless communication network to a remote monitoring station.
  • the first wireless communication device may be in the form of a mobile telephone network interface, operable to transmit any one of the video signal and the audio signal to the remote monitoring station via a mobile telephone network, such as a global system for mobile communications (GSM) network.
  • GSM global system for mobile communications
  • the security system may include a user interface in the form of any one or both of a user keypad for accepting inputs from a user and a user display for displaying information to a user.
  • the security system may include a second wireless communications device operable to receive command signals originating from a short range radio frequency (RF) transmitter.
  • RF radio frequency
  • the second wireless communications device may be in the form of a radio frequency receiver, operable to receive command signals in the form of any one of a panic signal, an activation signal, a de-activation signal, an arming mode signal, auxiliary signals to operate auxiliary devices such as opening and closing of motorized gates, turning on or off lighting in different areas of the property.
  • the user or other designated party may transmit, via the short range radio frequency transmitter, a panic signal to the second wireless communications device which causes an alarm trigger event to be transmitted by the first wireless communications device to the remote monitoring station.
  • the short range radio frequency transmitter may also provide for transmission of arming and disarming signals to the wireless receiver, the system being configured upon receipt of such arming and disarming signals by the wireless receiver, respectively to arm and disarm the security system.
  • the system provides for different arming modes, e.g. "stay” mode, in which case only pre-specified zones are armed, or "away” mode, in which all the different pre-defined zones are typically armed.
  • the security system may include a defense controller connectable to a defense mechanism, the defense controller operable to receive a defense command upon which the defense mechanism is activated.
  • the security system may be programmable wirelessly to accept communications from a specified remote monitoring station only, signals transmitted from the remote monitoring station being embedded with identification details, and the security system being programmed to identify said identification details.
  • the first wireless communication device may therefore be operable to receive a command signal from the remote monitoring station.
  • the command signal may be in the form of any one of a surveillance request signal upon receipt of which the video/audio surveillance devices produce video/audio monitoring signals and the first wireless communication device transmits the video/audio signals to the remote monitor; a status request signal upon receipt of which a status of the monitoring signal is transmitted via the first wireless communication device; a programming message; and an operational request signal upon receipt of which a controller of the monitoring system executes operational requests.
  • the security system may include authentication means, operable upon receipt of a command signal to authenticate the source of the command signal against predefined permitted sources.
  • the authentication means may include a security code which authenticates the remote monitoring station from which the command signal is transmitted or may authenticate the mobile communication device from which the command signal originates
  • the security system may include storage means for storing any one of video material and audio material taken by the video monitoring facility and the audio monitoring facility respectively.
  • the storage means may be in the form of a memory module.
  • the memory module may include at least two memory devices, one for storage of video surveillance material, the other for storage of audio surveillance material.
  • the video and audio module may include at least one analogue to digital (A/D) converter for converting analogue signals originating from each video surveillance camera and a separate analogue to digital converter for converting analog signals originating from each audio device, to digital signals.
  • the module may also include at least one filter associated with each of the converters.
  • the security system may include a real time clock and at least one on-screen display controller for embedding the time, date and a unique system code onto the video surveillance material prior to storage thereof in the memory module.
  • the security system may include at least one digital to analogue converter unit connected to the storage means for converting stored digital video/audio material to analogue video/audio material.
  • Stored digital video and audio material are thus in use retrieved from the memory module by the control module and directed to the converter unit, and after conversion thereof to analogue signals, the analogue signals are routed to the first wireless communications device for transmission. This allows the flexibility of both digital and or analogue video and or audio data transmissions to the base station.
  • the video monitoring facility and the audio monitoring facility may be in the form of a multi-channel facility providing for independent monitoring of a plurality of video surveillance devices and audio surveillance devices respectively.
  • the security system may be configured independently to address and activate, on a channel-by-channel basis, operation of each of the components of the system, e.g. the alarm module and the video and audio module, associated with the plurality of channels.
  • video and audio surveillance material from each zone on the property can selectively be taken and stored or transmitted.
  • the security system may include a plurality of sensors comprising of any one or more of motion detection sensors, glass break detectors, vibration sensors, video detectors, microphones, ultra-sonic detectors, magnetic switches, video motion detectors.
  • the security system may include at least one auxiliary output connectable to an auxiliary device operable upon receipt of an operational request signal to control the auxiliary device by switching the auxiliary output.
  • the security system may be configured in response to receipt of an operational request signal, to operate at least one auxiliary device, e.g. a gate or garage door, on the property where the security system is installed.
  • a user or other specified party can, via their cellular telephone, cause said device to be operated, i.e. in the case of a gate or garage door causing it to open or close.
  • the security system may be associated with at least one asset tracking device which may be secured to a valuable asset located at the monitored property.
  • the asset tracking device may be in the form of a global positioning system (GPS) receiver in combination with a global system for mobile communications (GSM) communications interface, operable to determine the GPS location of the asset and to transmit such location via the GSM receiver or a mobile network modem programmed to transmit data such as signal strength nearest tower identification, additional nearest tower's identification to the Monitoring Station where via various calculations, asset positioning can be determined.
  • GPS global positioning system
  • GSM global system for mobile communications
  • the security system may be operable upon detection of a predefined trigger event to activate the at least one asset tracking device with which it is associated.
  • a security system installation comprising a security system as described and at least one sensor being selected from any one or more of motion detection sensors, glass break detectors, vibration sensors, video detectors, microphones, ultra-sonic detectors, magnetic switches, video motion detectors, proximity detectors, audio sensors and at least one sensor and at least one video surveillance device.
  • a building structure comprising a building into which a security installation as described is installed.
  • a monitoring station which includes: a first wireless data interface operable to exchange operational messages with a remote security system and to receive any one or both of a video feed and an audio feed originating from the remote security system; a configuration system arranged to configure the data interface to exchange operational messages and to receive video feeds from multiple remote security systems; and a display screen operable to display operational messages exchanged with a remote security system and video feeds received from the remote security system.
  • the first wireless data interface may be a radio frequency (RF) interface.
  • RF radio frequency
  • the monitoring station may include a second data interface operable to exchange operational messages with a remote security system and to receive any one or both of a video feed and an audio feed originating from a remote security system.
  • the second data interface may be in the form of a wireless mobile communication data interface, such as a GSM interface, operable to exchange for e.g. SMS, MMS and GPRS messages.
  • the second data interface may also be configured to exchange operational messages and any one or both of a video feed and an audio feed originating from a remote security system, with a mobile communications device of a user.
  • the monitoring station may be operable to assign different levels of access to different user profiles, each user profile authorized to perform a predefined set of actions.
  • the monitoring station may be operable to exchange operational messages and receive audio/video feeds only from predefined security systems.
  • the monitoring station may be operable to verify incoming communications against predefined security profiles.
  • the monitoring station may be operable to log all operations to create an audit trail.
  • FIG. 1 shows, schematically, a high level component diagram of a security system in accordance with the invention
  • FIG. 2 shows, schematically, a more detailed component diagram of the security system
  • FIG. 3 shows, schematically a remote monitoring station in accordance with the invention.
  • Figures 4 to 10 shows screen displays of a monitoring station in accordance with the invention.
  • the security system 10 is, in use, installed at a property to be monitored against unauthorized entry and/or movement.
  • the security system 10 is generally in the form of a burglar or intruder alarm.
  • the security system 10 is, as will be described in more detail hereunder, a modular system which includes basic monitoring components which provides for easy, plug-in, addition of further components which enables more sophisticated functionalities.
  • the security system 10 includes a keypad module 12 connected to an alarm module 14.
  • the keypad module 12 serves as a user interface of the security system 10, and as such provides for input of instructions and the like to the security system 10, and for display of the status and the like of the system 10.
  • the keypad module 12 additionally provides features such as "Quick keys" for arming the system in arm, stay and away modes. Additional Quick keys are provided for panic, bypass of zones as well as a static display mode which allows the user to view the video stream of the requested zone on a separate video monitor associated with keypad module 12.
  • the alarm module 14 provides for connection thereto of motion detection sensors, described in more detail with reference to Figure 2, which are distributed over a property to be monitored.
  • a radio frequency (RF) receiver 16 is also connected to the alarm module 14 for receiving an RF signal, notionally represented by arrow 18, from a short range radio frequency transmitter (not shown), such as a fixed or mobile, typically carried on a person, alarm transmitter, colloquially known as a panic button.
  • the RF receiver 16 also provides for receipt of arming and disarming signals.
  • the security system 10 further includes a control module 20 for controlling certain operational functions of the various components of the security system 10, as will be described in more detail hereunder.
  • the security system 10 includes an RF communications device 22 for bidirectional communication, as notionally represented by arrow 24, with an offsite or remote monitoring or monitoring station (not shown) which monitors operation of a multiplicity of security systems 10.
  • the security system 10 still further includes a video and audio module 26 providing for video and audio surveillance, a memory module 28 for storage video and audio surveillance material, an inhibit controller/defense mechanism controller 27, and a communications module 30.
  • the communications module 30 provides for bidirectional communications, as notionally represented by arrow 32, between the security system 10 and a cellular telephone of an owner of or other designated party associated with the property where the system 10 is installed. Communication between the communications module 30 and a said cellular telephone is thus wireless and, typically effected by means of a global system for mobile network, e.g. GSM.
  • the system yet further includes a power supply unit 34 for supplying all the components of the system 10 with power. Electrical wiring connecting all the components of the system 10 to the power supply unit 34 is omitted from he drawings for clarity.
  • I 2 C Inter-Integrated Circuit
  • the system 10 is a sixteen channel security system which, as will become more apparent hereunder, provides for individual control of each of the sixteen channels, each of which is associated with a particular zone.
  • a property to be monitored is thus typically divided into up to sixteen zones. Sensing and surveillance devices are thus distributed across the zones to be monitored.
  • the system 10 further provides for activation of audible and visual alarms, as well as discharge of incapacitating and/or marking substances, typically in gas form, by the inhibit controller 27 into each or at least some of the zones. Further, the system 10 provides for activation of tracking units secured to valuables located on the property to be monitored.
  • the power supply unit 34 comprises 3 separate sections (not individually shown), namely:
  • the unit 34 is in use connected to mains electricity and includes a switch which, when switched on, causes 220V alternating current to be supplied to the SM power supply unit from the mains.
  • the SM power supply unit provides 14V direct current (DC) to the battery.
  • the battery supplies constant DC voltage to the regulators.
  • the regulators then regulate voltage which is supplied to the various components of the system 10.
  • the SM power supply unit provides protection against current and temperature overload conditions. The system 10 is thus powered by the powers supply unit, whose battery is charged when mains electricity is supplied to the unit 34, and which battery powers the system 10 upon failure of the mains electricity.
  • the keypad module 12 includes a keypad microcontroller 42 for controlling operation of part of the keypad module 12.
  • each of the microcontrollers is in the form of a reduced instruction set computer (RISC), permitting programming and re-programming thereof.
  • RISC reduced instruction set computer
  • the keypad module 12 further includes a keypad/graphic liquid crystal display (LCD) and buzzer, all of which are referred to by reference numeral 44 for clarity, connected to the microcontroller 42.
  • the keypad microcontroller 42 control operation of the keypad module 12. Input to the keypad module 12 is effected by means of the keypad 44, and the GLCD provides for display of inputs and/or the status of the security system 10. Further, Light Emitting
  • LED's give an indication of the system status of the security system 10 as well as the status in each zone.
  • the alarm module 14 includes a microcontroller 46 for controlling operation of the alarm module 14.
  • the microcontroller 46 enables communication between the alarm module 14, on the one hand, and the keypad module 12, the communications module 30, and the control module 20, respectively on the other hand.
  • the alarm module 14 includes inputs and outputs associated with channel 1 , zones one to eight of the system 10, said inputs and outputs notionally being represented by block 48, and inputs and outputs associated with channel2, zones nine to sixteen of the system 10, said inputs and outputs notionally being represented by block 50.
  • a panic input 52 is provided to receive a digital panic trigger from a user. More particularly, the alarm module 14 includes the following inputs and outputs: Inputs: » 16 Digital inputs (48, 50), for connection thereto of sensors distributed through the zones of the property
  • the system 10 is connected to sensors, (e.g. any sensor that provides a normally open or normally closed contacts and/or generates a defined digital signal e.g. a condition changing state when activated e.g. motion detection is achieved) which could be in the form of passive infrared detection (PIR) sensors, infrared beam sensors, acoustic sensors, magnetic sensors, or strip sensors, for detecting unauthorized entry to or motion on the property.
  • PIR passive infrared detection
  • the security system 10 also includes at least one panic button (not shown), either directly connected to the alarm module's panic input 52, or in communication therewith via the RF receiver 16.
  • the outputs from the alarm microcontroller 54 are communicated via the Inter-Integrated Circuit (I 2 C) bus 19.
  • I 2 C Inter-Integrated Circuit
  • the alarm module 14 further includes a digital output for connection to auxiliary devices such as a strobe light and a siren, which in use indicates whether or not the security system 10 has been triggered.
  • auxiliary devices such as a strobe light and a siren
  • the various modules and components of the system 10 communicate with each or one another via addressable universal synchronous asynchronous receiver/transmitters (USART), inter-integrated circuit (I2C) or specific peripheral interrupts or direct addressing. Further, each microcontroller runs at the required clock frequency via its own external crystal, so that each microcontroller is independent of each other microcontroller. Each module of the system 10 thus operates, in accordance with its pre-programmed instructions and communications received from another module, independently of every other module. Timing sequences are separately calculated for each microcontroller.
  • video and audio module 26 includes two video multiplexers
  • MUX's operable to receive video inputs from two video channels 58, 60 and an analogue switch 62.
  • the analogue switch is connected to an on-screen display module 64, which in turn is receivably connected to a real-time clock 66 and which output is connected to an RF transmitter 68 and a high speed analogue to digital converter 70 so as to digitize the video signals.
  • video images are received via the multiplexers 54, 56 and are directed via the analogue switch 62, the on-screen display module 64 and the A/D converter 70 to video first-in- first-out (FIFO) frame memory 72, which is controlled by the video control microcontroller 74.
  • FIFO video first-in- first-out
  • video surveillance cameras located in pre-specified zones on a property at which the alarm 10 is installed, are connected to the respective multiplexers 54, 56. Eight video surveillance cameras can be connected to each of the multiplexers 54, 56.
  • the onscreen display module 64 insert, on a channel-by-channel basis, the date, time and a unique system code into video signals stemming from the video multiplexers 54, 56.
  • the video module 26 further reads the time and date from the real-time clock 66.
  • Outputs from the onscreen display module 64 are transmitted, together with the analogue audio signal, in use via the RF transmitter 68, to a remote monitoring station.
  • the video and audio module 26 further includes two audio multiplexers 76, 78, which are connected to an analogue switch 80 and via an analogue to digital (A/D) converter 82, to an audio compact flash memory 84, which is controlled by an audio control microcontroller 86.
  • audio signals are received via the multiplexers 76, 78 as indicated by 88, 90.
  • the multiplexers 76, 78 switches the signals through the analogue switch 80 and the analogue audio signals are converted to digital format by the A/D converter 82.
  • the digitized analogue signals are then stored in the audio compact flash memory 84 under control of the audio control microcontroller 86.
  • the system 40 includes microphones (not shown) connected to the audio multiplexers 76, 78.
  • the audio inputs provided by the microphones are associated with video surveillance material taken by the video surveillance cameras.
  • the audio multiplexers 76, 78 are synchronized with the video multiplexers 54, 56.
  • the video and audio module 26 is controllably connected to the control module 20, shown as a control microcontroller.
  • the control module 20 communicates with the microcontrollers of each of the other components of the security system 10 and also controls, in accordance with setup or program instruction provided by a user via the keypad 44, operation of certain of the components of the security system 10.
  • the control module 20 provides for:
  • the control module 20 is connected to a digital output switching module 92 for controlling auxiliary devices, such as gate motors and garage doors.
  • the control module 20 is further connected to the communications device 22, comprising a communications microcontroller 94, an RF receiver and a mobile network (e.g. General Packed Radio Switched (GPRS) and High-Speed Downlink Packet Access (HSDPA)) transceiver 98.
  • a communications microcontroller 94 e.g. General Packed Radio Switched (GPRS) and High-Speed Downlink Packet Access (HSDPA) transceiver 98.
  • GPRS General Packed Radio Switched
  • HSDPA High-Speed Downlink Packet Access
  • the control module is furthermore connected to an Ethernet microcontroller 102, which is also connected to an RF transceiver 104.
  • the Ethernet microcontroller 102 in use provides for easy connection of the security system onto an Ethernet network (not shown) for data transmission over the World Wide Web, via CAT5 cable on a Local Area Network, a Wide
  • the control module 20 is also controllably connected to a defense mechanism microcontroller 100, which is connected to defensive mechanisms such as gas discharge devices (not shown).
  • a defense mechanism microcontroller 100 which is connected to defensive mechanisms such as gas discharge devices (not shown).
  • the control module 20 can activate the defense mechanism microcontroller 100 to halt or inhibit the intruder.
  • the defensive mechanisms may be deployed per monitoring zone, to improve the effectiveness of the defensive mechanisms.
  • the communications device 22 controls communications to the remote external environment and provides for flexibility of the system 10.
  • the communications device 22 allows for the following communication from the system 10: • GPRS communications via the GPRS transceiver 98.
  • Alarm is activated: to remote monitoring station and user
  • Panic pressed to remote monitoring station and user
  • Request specific channel video snapshot from user with password via the remote monitoring station
  • Request retransmit of video data from user with password via the remote monitoring station •
  • User request : RF Tx : Open gate
  • All variables are kept in the microcontroller memory 94 and all messages are mobile network based. Messages in to the system 10 have authentication means in the form of a password and the header of the message contains a client specific code generated by the system 10. If messages do not conform to this authentication standard the messages are discarded.
  • a communications error can be reset by a permitted user entering a permitted password.
  • the keypad module 12 is used by a user to set up or program the system 10.
  • Reprogramming and general operation of the system 10 is also effected via the keypad module 12, and is done in similar fashion as the setting up or programming of the system 10, as hereunder described in detail.
  • the following menu options are displayed to the user by the LCD 46 (so as not to be confused with other reference numerals used in this description, the menu options are hereunder referred to as 12.1 - 12.12):
  • a user selects, via the keypad 44, one of the menu options 12.1 - 12.12. According to the menu option selected, the following requested details are displayed by the GLCD 46, whereafter the user provides the requested details by means of the keypad 44.
  • Away #1 Active Zones
  • o Away #2 Active Zones
  • o Away #3 Active Zones
  • o Away #4 Active Zones
  • a user Upon display of a particular item on the LCD, a user has to populate, i.e. provide information, the requested X's and Y's by means of the keypad 44.
  • the keypad microcontroller 42 selectively communicates setup data or programming instructions to the respective other microcontrollers associated with the particular setup data or programming instructions.
  • the security system 10 can be used to monitor a property where it is installed.
  • the security system 10 can then be armed, i.e. any one of the "armed", “stay” or “away” modes is selected, after which pre- specified zones associated with the selected mode of arming will continuously be monitored.
  • Arming of the security system 10 takes place either via the keypad 44 or via the RF remote control unit, i.e. an arming signal is sent to the RF receiver 16. Instead, arming and disarming may take place via the communications module 30, i.e. an arming or disarming signal request is received from a mobile device.
  • the offsite monitoring station is notified and, if requested, the user or other designated party is notified by means of a notification transmitted to their cellular telephone number(s).
  • the control unit 20 Upon sensing of an alarm condition, i.e. unauthorized entry, by any one of the sensors, or upon receipt of a panic alarm signal by the RF receiver 16, the control unit 20 causes an alarm or panic signal to be transmitted by the RF communications device 22 to the offsite monitoring station. Said signal will include information about the zone of the property from which the alarm or panic alarm signal originates. Simultaneously with transmission of the alarm or panic alarm signal to the offsite monitoring station, the alarm module 14 will activate operation of the video camera located in the zone of the property where the alarm or panic alarm signal originates from. This is effected by addressing the applicable multiplexer 54, 56.
  • video and audio material taken by the video camera in question will, after passing through the associated on screen display module 64 be caused to be streamed, via the RF communication device 22, to the offsite monitoring station.
  • the control module 20 will also cause activation of operation of the asset tracking devices. This may also be done upon of an activation request from the offsite monitoring station.
  • personnel at the offsite monitoring station can make an informed decision as to what type of action should be taken in response to the alarm condition. For example, if an animal has obtained unauthorized entry to the property and the presence of the animal has triggered the alarm, then there should be no need for the offsite monitoring station to have a patrol unit sent out to the property.
  • the video and audio surveillance material taken is, after being converted by the A/D converter 82, stored on the audio/video flash memories 72, 84, in a fashion hereinbefore described.
  • a request is communicated from the offsite monitoring station to the RF communications device 22.
  • the control module 20 causes stored video and audio surveillance material to be retrieved from the compact flash memories 72, 84 whereafter the control module 20 causes the material to be transmitted to the offsite monitoring station via the RF communications device 22.
  • the streamed video and audio data is additionally stored on the monitoring station database.
  • a user of the security system 10 can, via their cellular phone acquire the status of the security system 10 by sending a request to the monitoring station which will verify the message/request authenticity and relay the request to the security system.
  • a user can also, within limits, change the setup or reprogram the security system 10 via their cellular telephone e.g. arm the system with specific zones bypassed.
  • the security system 10 as mentioned above, further provides for arming and disarming of the system by means of the cellular telephone of the user.
  • a user can, by means of their cellular telephone, cause the gate and/or at least one garage door located on the property at which the security system 10 is installed to be opened and closed.
  • the security system 10 is configured to permit receipt by the communications module 30 of a request for a video snapshot by a user 10 via their cellular telephone to the monitoring station.
  • a user would transmit such a request to the monitoring station which verifies the authenticity there of and forwards the security approved request to the security system's communications module 30.
  • the request is routed to the alarm module 14 from where it is transmitted, via the communications device 30, to the offsite monitoring station.
  • the request is granted once the password and verification process is positive and a grant signal is transmitted back to the communications device 30.
  • the grant request is routed to the alarm module 14, which then addresses the video and audio surveillance module 26 to activate each video surveillance camera located in a zone or zones in question.
  • a video snapshot is then taken by the video surveillance camera, after which it is via the alarm module 14 routed to the communications module 16, which then transmits the video snapshot to the offsite monitoring station which in turn sends the requested snapshot to the cellular telephone number of the user.
  • the system 10 can operate as a conventional burglar alarm system including only the keypad module 12, the alarm module 14, the RF receiver 16, the RF communications device 22, the power supply 34, a plurality of sensors connected to the alarm module 14, and at least one panic button.
  • the communications module 30 the system 10 provides for mobile communications between the system 10 and a cellular telephone of at least one user, which communications, by virtue of the password system is secure.
  • the video and audio module 26 video cameras and microphones on selected or all channels, the system 10 provides for real time viewing by the an offsite monitoring station of surveillance material taken in any particular zone at any desired time. This addition to the basic system also permits a user to receive video and audio surveillance material.
  • the system 10 provides for digital storage or backup of video and audio surveillance material taken throughout the zones which are fitted with video cameras and microphones, for later viewing.
  • the monitoring station includes a central computer 122, providing a central user interface and control facility.
  • the monitoring station includes a database 124 on which customer details and customer security system details are stored as well as the transmitted video and audio data from the installed Security System.
  • the remote monitoring station includes also at least a Global System for Mobile communications (GSM) interface 126 for interfacing via a mobile telephone network with other mobile communication devices such as mobile telephones of users.
  • GSM Global System for Mobile communications
  • the remote monitoring station further includes at least a dedicated General Packet Radio Switched network interface 128, for communication with multiple security systems 10.
  • the remote monitoring station further includes at least an asset tracking device 130, dedicated to the tracking of assets of system users.
  • the asset tracking device is operable upon activation of asset tracking devices of users to communicate with the tracking devices and to determine the location of such devices by receiving from the devices their GPS location or GSM Cell identification.
  • the central computer includes a standard Ethernet interface 132 for interfacing with other external devices.
  • a login screen 140 is shown permitting an operator to enter a predefined username in 142 and password in 144.
  • the username and password confirmation is necessary to confirm that the operator is an authorized person as well as providing the user "rights" for system operation i.e. the "rights" of the "Monitoring System Operator" differ from that of the
  • the port number is set up in 152, the port speed in 154, the number of data bits in 156, the parity protocol in 158, the number of stop bits in 160 the flow control at 162, and the echo status of the interface at 164, provided data setup / entry is carried out by a user with "Administrative" rights.
  • a profile definition screen 170 is displayed to set up the operator profiles.
  • the username is set up in 172 and the password in 174.
  • the profile to be defined is set up in 176.
  • 178 a list of operator profiles is displayed.
  • a main display screen 180 is shown. This screen is the main interface to the various user's security systems.
  • the user's name can be entered, at 184, the user's surname.
  • the user's address is viewed and at 188, the user's telephone contact details.
  • the status of the user's security system is displayed.
  • a list of the messages exchanged with the security system of the user is displayed.
  • a video feed is displayed of the various video cameras located in the user's house. It is to be appreciated that the monitor station also has an audio feed to correspond with the video display, displayed in 194 as well as the fact that multiple "screens are displayed should a number of separate security systems be
  • a client information display screen 200 is shown.
  • the client's name is displayed, at 204, the client's surname, a 206, the client's identity number, at 208 the client's telephone contact details, at 210 the client's physical address, at 212 the clients postal address, at 214, the model number of the client's security number.
  • a list of clients are displayed.
  • an alternate contact information screen 220 is showed with the contact person's name at 222, the person's surname at 224, the person's identity number at 226, the relationship to the client at 228 the person's telephone contact details at 230 the person's physical address at 232, the active period for the alternate contacts relevancy at 234 and 236.
  • a model identification screen is showed.
  • a model number is displayed at 242, a model description at 244 and the number of the particular models being used at 246.
  • a list of models is displayed for easy identification.
  • the display screens Figures 4 to 10 can be used to define a complete security arrangement of which a monitor station 120 and a plurality of security systems 10 can form part.
  • the method of relaying security information through the monitor station directly to users with the associated security provisions build into the arrangement is believed to be of particular advantage to ensure a secure, yet friendly to operate arrangement on the user's side as well as on the monitoring station's side.
  • the security system as described and illustrated provides the following functionalities:
  • An offsite monitoring station can immediately, via the video and audio streamed, determine the cause and nature of an alarm condition or activation, thereby permitting an informed decision as how to respond to the alarm condition.
  • the system automatically searches for the specific area, i.e. zone, where the panic signal originates from by sequentially addressing the video surveillance channels through the property, thereby enabling appropriate action by the offsite monitoring station.
  • Each PIR sensor includes a day/night light activation circuit so as to enhance night video surveillance.
  • Gas discharge or defense mechanisms are only activated when the system is in any of the "armed, stay or away” modes and is setup or programmed to discharge or liberate gas, and then only in the zones to which unauthorized entry has been obtained or where motion has been sensed. Gas is then also only discharged for the duration specified in the setup data or programming instructions as well as the "authorization" signal by the monitoring station operator being received by the security system.
  • the system additionally, provides for activation of asset tracking devices secured to valuables located on a property to be monitored, and upon such activation notifies the offsite monitoring station that this has been done and accordingly provides whereabouts of such assets for tracking and/or retrieval purposes.
  • the system provides for receipt by the offsite monitoring station of tracking details from asset tracking devices secured to valuables located on the property prior to an alarm condition. Further, the system is configured that de-activation of the asset tracking devices can only be effected by the offsite monitoring station.
  • the system provides for activation of an audible and a visual alarm upon sensing of an alarm condition, or upon receipt of a panic signal.
  • the system also provides for operation of a gate to the property and at least one garage door on the property by means of GSM, i.e. via a cellular telephone of a user.

Abstract

A method of monitoring a property, the method including dividing the property into monitoring zones and monitoring a set of trigger events, upon sensing of a trigger event, transmitting a wireless alarm signal to a remote monitoring station that a trigger event has been sensed thereby notifying the remote monitoring station of the sensed event and activating video surveillance in at least one monitor zone, and wirelessly sending video material taken in the monitor zone to the remote monitoring station, thereby enabling the remote monitoring station visually to determine the nature of the trigger event.

Description

A SECURITY SYSTEM
THIS INVENTION relates to a security system. It more particularly relates to a method of monitoring a property (residential and or industrial), to a method of monitoring a security system, to a security system, to a security system installation, and to a building structure. The invention relates also to a security system installation, and to a building including such security system.
SUMMARY OF THE INVENTION
In accordance with one aspect of the invention, there is provided a method of monitoring a property, the method including: dividing the property into monitoring channels made up of a defined number of zones, and monitoring a set of trigger events; upon sensing of a trigger event, transmitting a wireless alarm signal to a remote monitoring station that a trigger event has been sensed, thereby notifying the remote monitoring station of the sensed event; and activating video surveillance in at least one monitor zone, and wirelessly sending video material taken in the monitor zone to the remote monitoring station, thereby enabling the remote monitoring station visually to determine the nature of the trigger event.
The method may include activation of a defense mechanism such as a non-lethal gas-discharge.
The term video surveillance may include taking a video snapshot.
The method may include activating audio surveillance in at least one monitor zone and wirelessly transmitting an audio stream taken in the at least one monitor zone to the remote monitoring station, thereby enabling the remote monitoring station audibly to determine the nature of the trigger event.
The set of trigger events may include any one or more of detection of unauthorized entry into the property; a system malfunction; a status request received from the remote monitoring station; a surveillance request received from the remote monitoring station to activate any one of video surveillance and audio surveillance in at least one monitor zone; a surveillance request received via the monitoring station from a predefined party to activate any one of video surveillance and audio surveillance in at least one monitor zone; an operational request received via the monitoring station from a predefined party to perform an operational task; an arm/disarm signal; an alarm mode signal; a panic signal; a power failure signal and a low battery signal.
The method may further include transmitting predetermined status notifications, e.g. in the case of a power failure, via the remote monitoring station to a cellular telephone number of a user or another designated party.
The method may therefore include receiving via the remote monitoring station a status request from a mobile communication device of a user and, in response to receipt of the valid, security verified status request, transmitting a specified status notification, specified in the status request, to the predefined authorized mobile communication device from which the request originated.
Operational requests may include arming/disarming requests, requests to operate a device located on the property, e.g. a gate or garage door, a request to switch on/off certain lights at the property, and the like.
In the method where the trigger event is any one of a surveillance request received via the monitoring station from a predefined party to activate any one of video surveillance and audio surveillance in at least one monitor zone and an operational request received via the monitoring station from a predefined party to perform an operational task, the method may include authenticating the request from the predefined party prior to executing the request.
The method may include transmitting from the remote monitoring station a notification message indicating the nature of the trigger event to a predefined party via a wireless mobile communication network.
The notification message may be in the form of any one of a short message service (SMS) message and a multi-media messaging service (MMS) message.
The method may include forwarding video material transmitted to the remote monitoring station to a predefined user via a wireless communication network. The method may include receiving from the remote monitoring station an activation signal for activating a defense mechanism at the monitored property.
The method may include activating any one of an audible alarm and a visual alarm at the monitored property. For example, the audible alarm may be in the form of a siren and the visual alarm may be in the form of a strobe light.
The method may include activating at least one tracking device secured to at least one valuable located at the monitored property. The method may therefore include tracking the at least one valuable to which the at least one tracking device is secured if they are removed from the property by a party or parties who have gained unauthorized access to the property.
In accordance with another aspect of the invention, there is provided a method of monitoring a security system from a remote location, the method including: receiving an alarm signal from the security system upon sensing of a trigger event at a property where the security system is installed; and receiving, in real time, any one of video surveillance material and audio surveillance material, taken at the property where the security system is installed, from the security system, thereby enabling visual/audible identification, from the remote location, of the nature of the trigger event sensed at the property.
The method may include transmitting a surveillance request to the security system for activating any one of a video surveillance facility and an audio surveillance facility at the property, and thereafter receiving said surveillance material taken at the property where the security system is installed.
The method may include receipt of stored video surveillance material from the security system.
The method may include transmitting a defense signal to the property for activating a defense mechanism at the property. For example, the defense mechanism may be in the form of a painful audible sound, a gas discharge device containing a staining gas or an unpleasant gas such as teargas, or the like.
The method may include forwarding any one of the video surveillance material and the audio surveillance material via a wireless communication network to a mobile communications device of a user. In accordance with another aspect of the invention, there is provided a security system which includes: sensing means for sensing a trigger event; any one of a video monitoring facility for monitoring a video signal originating from a video surveillance device and an audio monitoring facility for monitoring an audio signal originating from an audio surveillance device in response to sensing of the trigger event by the sensing means; and a first wireless communications device connected to any one of the video monitoring facility and the audio monitoring facility operable to transmit any one of the video signal and the audio signal via a wireless communication network to a remote monitoring station.
The first wireless communication device may be in the form of a mobile telephone network interface, operable to transmit any one of the video signal and the audio signal to the remote monitoring station via a mobile telephone network, such as a global system for mobile communications (GSM) network.
The security system may include a user interface in the form of any one or both of a user keypad for accepting inputs from a user and a user display for displaying information to a user.
The security system may include a second wireless communications device operable to receive command signals originating from a short range radio frequency (RF) transmitter.
The second wireless communications device may be in the form of a radio frequency receiver, operable to receive command signals in the form of any one of a panic signal, an activation signal, a de-activation signal, an arming mode signal, auxiliary signals to operate auxiliary devices such as opening and closing of motorized gates, turning on or off lighting in different areas of the property.
Thus, in an emergency, the user or other designated party may transmit, via the short range radio frequency transmitter, a panic signal to the second wireless communications device which causes an alarm trigger event to be transmitted by the first wireless communications device to the remote monitoring station. The short range radio frequency transmitter may also provide for transmission of arming and disarming signals to the wireless receiver, the system being configured upon receipt of such arming and disarming signals by the wireless receiver, respectively to arm and disarm the security system. Naturally, the system provides for different arming modes, e.g. "stay" mode, in which case only pre-specified zones are armed, or "away" mode, in which all the different pre-defined zones are typically armed.
The security system may include a defense controller connectable to a defense mechanism, the defense controller operable to receive a defense command upon which the defense mechanism is activated.
The security system may be programmable wirelessly to accept communications from a specified remote monitoring station only, signals transmitted from the remote monitoring station being embedded with identification details, and the security system being programmed to identify said identification details.
The first wireless communication device may therefore be operable to receive a command signal from the remote monitoring station.
The command signal may be in the form of any one of a surveillance request signal upon receipt of which the video/audio surveillance devices produce video/audio monitoring signals and the first wireless communication device transmits the video/audio signals to the remote monitor; a status request signal upon receipt of which a status of the monitoring signal is transmitted via the first wireless communication device; a programming message; and an operational request signal upon receipt of which a controller of the monitoring system executes operational requests.
The security system may include authentication means, operable upon receipt of a command signal to authenticate the source of the command signal against predefined permitted sources. For example, the authentication means may include a security code which authenticates the remote monitoring station from which the command signal is transmitted or may authenticate the mobile communication device from which the command signal originates
The security system may include storage means for storing any one of video material and audio material taken by the video monitoring facility and the audio monitoring facility respectively. The storage means may be in the form of a memory module. In particular, the memory module may include at least two memory devices, one for storage of video surveillance material, the other for storage of audio surveillance material. To permit said storage, the video and audio module may include at least one analogue to digital (A/D) converter for converting analogue signals originating from each video surveillance camera and a separate analogue to digital converter for converting analog signals originating from each audio device, to digital signals. In this case, the module may also include at least one filter associated with each of the converters.
The security system may include a real time clock and at least one on-screen display controller for embedding the time, date and a unique system code onto the video surveillance material prior to storage thereof in the memory module.
The security system may include at least one digital to analogue converter unit connected to the storage means for converting stored digital video/audio material to analogue video/audio material. Stored digital video and audio material are thus in use retrieved from the memory module by the control module and directed to the converter unit, and after conversion thereof to analogue signals, the analogue signals are routed to the first wireless communications device for transmission. This allows the flexibility of both digital and or analogue video and or audio data transmissions to the base station.
The video monitoring facility and the audio monitoring facility may be in the form of a multi-channel facility providing for independent monitoring of a plurality of video surveillance devices and audio surveillance devices respectively. The security system may be configured independently to address and activate, on a channel-by-channel basis, operation of each of the components of the system, e.g. the alarm module and the video and audio module, associated with the plurality of channels. Thus, video and audio surveillance material from each zone on the property can selectively be taken and stored or transmitted.
The security system may include a plurality of sensors comprising of any one or more of motion detection sensors, glass break detectors, vibration sensors, video detectors, microphones, ultra-sonic detectors, magnetic switches, video motion detectors.
The security system may include at least one auxiliary output connectable to an auxiliary device operable upon receipt of an operational request signal to control the auxiliary device by switching the auxiliary output. For example, the security system may be configured in response to receipt of an operational request signal, to operate at least one auxiliary device, e.g. a gate or garage door, on the property where the security system is installed. Thus, a user or other specified party can, via their cellular telephone, cause said device to be operated, i.e. in the case of a gate or garage door causing it to open or close.
The security system may be associated with at least one asset tracking device which may be secured to a valuable asset located at the monitored property. For example the asset tracking device may be in the form of a global positioning system (GPS) receiver in combination with a global system for mobile communications (GSM) communications interface, operable to determine the GPS location of the asset and to transmit such location via the GSM receiver or a mobile network modem programmed to transmit data such as signal strength nearest tower identification, additional nearest tower's identification to the Monitoring Station where via various calculations, asset positioning can be determined.
The security system may be operable upon detection of a predefined trigger event to activate the at least one asset tracking device with which it is associated.
According to another aspect of the invention there is provided a security system installation comprising a security system as described and at least one sensor being selected from any one or more of motion detection sensors, glass break detectors, vibration sensors, video detectors, microphones, ultra-sonic detectors, magnetic switches, video motion detectors, proximity detectors, audio sensors and at least one sensor and at least one video surveillance device.
According to yet another aspect of the invention, there is provided a building structure comprising a building into which a security installation as described is installed.
According to another aspect of the invention, there is provided a monitoring station, which includes: a first wireless data interface operable to exchange operational messages with a remote security system and to receive any one or both of a video feed and an audio feed originating from the remote security system; a configuration system arranged to configure the data interface to exchange operational messages and to receive video feeds from multiple remote security systems; and a display screen operable to display operational messages exchanged with a remote security system and video feeds received from the remote security system.
In particular the first wireless data interface may be a radio frequency (RF) interface.
The monitoring station may include a second data interface operable to exchange operational messages with a remote security system and to receive any one or both of a video feed and an audio feed originating from a remote security system. In particular the second data interface may be in the form of a wireless mobile communication data interface, such as a GSM interface, operable to exchange for e.g. SMS, MMS and GPRS messages. The second data interface may also be configured to exchange operational messages and any one or both of a video feed and an audio feed originating from a remote security system, with a mobile communications device of a user.
The monitoring station may be operable to assign different levels of access to different user profiles, each user profile authorized to perform a predefined set of actions.
The monitoring station may be operable to exchange operational messages and receive audio/video feeds only from predefined security systems.
The monitoring station may be operable to verify incoming communications against predefined security profiles.
The monitoring station may be operable to log all operations to create an audit trail.
The invention is now described, by way of non-limiting example, with reference to the accompanying diagrammatic drawings.
DRAWING(S)
In the drawings:
Figure 1 shows, schematically, a high level component diagram of a security system in accordance with the invention;
Figure 2 shows, schematically, a more detailed component diagram of the security system;
Figure 3 shows, schematically a remote monitoring station in accordance with the invention; and
Figures 4 to 10 shows screen displays of a monitoring station in accordance with the invention.
EMBODIMENT OF THE INVENTION
With reference to Figure 1 of the drawings, a high level component diagram of a security system in accordance with the invention is generally designated by reference numeral
10. The security system 10 is, in use, installed at a property to be monitored against unauthorized entry and/or movement. Thus, the security system 10 is generally in the form of a burglar or intruder alarm. The security system 10 is, as will be described in more detail hereunder, a modular system which includes basic monitoring components which provides for easy, plug-in, addition of further components which enables more sophisticated functionalities.
Briefly, with reference to Figure 1 of the drawings, the security system 10 includes a keypad module 12 connected to an alarm module 14. The keypad module 12 serves as a user interface of the security system 10, and as such provides for input of instructions and the like to the security system 10, and for display of the status and the like of the system 10. The keypad module 12 additionally provides features such as "Quick keys" for arming the system in arm, stay and away modes. Additional Quick keys are provided for panic, bypass of zones as well as a static display mode which allows the user to view the video stream of the requested zone on a separate video monitor associated with keypad module 12. The alarm module 14 provides for connection thereto of motion detection sensors, described in more detail with reference to Figure 2, which are distributed over a property to be monitored. A radio frequency (RF) receiver 16 is also connected to the alarm module 14 for receiving an RF signal, notionally represented by arrow 18, from a short range radio frequency transmitter (not shown), such as a fixed or mobile, typically carried on a person, alarm transmitter, colloquially known as a panic button. The RF receiver 16 also provides for receipt of arming and disarming signals. The security system 10 further includes a control module 20 for controlling certain operational functions of the various components of the security system 10, as will be described in more detail hereunder. As is conventional with security systems of the type in question, the security system 10 includes an RF communications device 22 for bidirectional communication, as notionally represented by arrow 24, with an offsite or remote monitoring or monitoring station (not shown) which monitors operation of a multiplicity of security systems 10. The security system 10 still further includes a video and audio module 26 providing for video and audio surveillance, a memory module 28 for storage video and audio surveillance material, an inhibit controller/defense mechanism controller 27, and a communications module 30. The communications module 30 provides for bidirectional communications, as notionally represented by arrow 32, between the security system 10 and a cellular telephone of an owner of or other designated party associated with the property where the system 10 is installed. Communication between the communications module 30 and a said cellular telephone is thus wireless and, typically effected by means of a global system for mobile network, e.g. GSM. The system yet further includes a power supply unit 34 for supplying all the components of the system 10 with power. Electrical wiring connecting all the components of the system 10 to the power supply unit 34 is omitted from he drawings for clarity. The connection between the keypad module 12, the alarm module 14, the RF receiver 16, the control module 20, the RF communications device 22, the audio/video module 26, the memory module 28, the communications module 30 and the inhibit controller 27 is by means of a so called Inter-Integrated Circuit (I2C) communication bus, indicated by reference numeral 19.
The system 10 is a sixteen channel security system which, as will become more apparent hereunder, provides for individual control of each of the sixteen channels, each of which is associated with a particular zone. A property to be monitored is thus typically divided into up to sixteen zones. Sensing and surveillance devices are thus distributed across the zones to be monitored. By virtue of the separate controllability of each of the channels of the system 10 each of the zones into which the property has been divided can be monitored individually.
The system 10 further provides for activation of audible and visual alarms, as well as discharge of incapacitating and/or marking substances, typically in gas form, by the inhibit controller 27 into each or at least some of the zones. Further, the system 10 provides for activation of tracking units secured to valuables located on the property to be monitored.
The power supply unit 34 comprises 3 separate sections (not individually shown), namely:
• Switched mode (SM) power supply unit • Regulators
• Battery
The unit 34 is in use connected to mains electricity and includes a switch which, when switched on, causes 220V alternating current to be supplied to the SM power supply unit from the mains. The SM power supply unit, in turn, provides 14V direct current (DC) to the battery. The battery supplies constant DC voltage to the regulators. The regulators then regulate voltage which is supplied to the various components of the system 10. The SM power supply unit provides protection against current and temperature overload conditions. The system 10 is thus powered by the powers supply unit, whose battery is charged when mains electricity is supplied to the unit 34, and which battery powers the system 10 upon failure of the mains electricity.
Referring now in particular to Figure 2 of the drawings, a more detailed component diagram of the security system 10 is generally designated by reference numeral 40. Each of the components forming part of the system 10, as well as their functionality, is described in detail in the paragraphs which follow. The keypad module 12 includes a keypad microcontroller 42 for controlling operation of part of the keypad module 12. The microcontroller 42 and all the microcontrollers forming part of the other components of the security system 10, which will be described in more detail hereunder. Thus, each of the microcontrollers is in the form of a reduced instruction set computer (RISC), permitting programming and re-programming thereof. The keypad module 12 further includes a keypad/graphic liquid crystal display (LCD) and buzzer, all of which are referred to by reference numeral 44 for clarity, connected to the microcontroller 42.
Briefly, in use, the keypad microcontroller 42 control operation of the keypad module 12. Input to the keypad module 12 is effected by means of the keypad 44, and the GLCD provides for display of inputs and/or the status of the security system 10. Further, Light Emitting
Diodes (LED's) give an indication of the system status of the security system 10 as well as the status in each zone.
Referring now to the alarm module 14, it includes a microcontroller 46 for controlling operation of the alarm module 14. The microcontroller 46 enables communication between the alarm module 14, on the one hand, and the keypad module 12, the communications module 30, and the control module 20, respectively on the other hand. The alarm module 14 includes inputs and outputs associated with channel 1 , zones one to eight of the system 10, said inputs and outputs notionally being represented by block 48, and inputs and outputs associated with channel2, zones nine to sixteen of the system 10, said inputs and outputs notionally being represented by block 50. A panic input 52 is provided to receive a digital panic trigger from a user. More particularly, the alarm module 14 includes the following inputs and outputs: Inputs: » 16 Digital inputs (48, 50), for connection thereto of sensors distributed through the zones of the property
• Digital panic input, (52) for connection to a wired or wireless panic button Outputs:
• Output for Channel 1 , zones one to eight video and audio addressing • Output for Channel 2, zones nine to sixteen video and audio addressing
• Digital output for external / remote display of arming (12v DC)
• A digital output for connection of visual and audible notification devices.
The system 10 is connected to sensors, (e.g. any sensor that provides a normally open or normally closed contacts and/or generates a defined digital signal e.g. a condition changing state when activated e.g. motion detection is achieved) which could be in the form of passive infrared detection (PIR) sensors, infrared beam sensors, acoustic sensors, magnetic sensors, or strip sensors, for detecting unauthorized entry to or motion on the property. The security system 10 also includes at least one panic button (not shown), either directly connected to the alarm module's panic input 52, or in communication therewith via the RF receiver 16. The outputs from the alarm microcontroller 54 are communicated via the Inter-Integrated Circuit (I2C) bus 19.
The alarm module 14 further includes a digital output for connection to auxiliary devices such as a strobe light and a siren, which in use indicates whether or not the security system 10 has been triggered.
The various modules and components of the system 10 communicate with each or one another via addressable universal synchronous asynchronous receiver/transmitters (USART), inter-integrated circuit (I2C) or specific peripheral interrupts or direct addressing. Further, each microcontroller runs at the required clock frequency via its own external crystal, so that each microcontroller is independent of each other microcontroller. Each module of the system 10 thus operates, in accordance with its pre-programmed instructions and communications received from another module, independently of every other module. Timing sequences are separately calculated for each microcontroller.
Referring now to the video and audio module 26, it includes two video multiplexers
(MUX's) 54, 56 operable to receive video inputs from two video channels 58, 60 and an analogue switch 62. The analogue switch is connected to an on-screen display module 64, which in turn is receivably connected to a real-time clock 66 and which output is connected to an RF transmitter 68 and a high speed analogue to digital converter 70 so as to digitize the video signals.
In use video images are received via the multiplexers 54, 56 and are directed via the analogue switch 62, the on-screen display module 64 and the A/D converter 70 to video first-in- first-out (FIFO) frame memory 72, which is controlled by the video control microcontroller 74.
In use, video surveillance cameras (not shown) located in pre-specified zones on a property at which the alarm 10 is installed, are connected to the respective multiplexers 54, 56. Eight video surveillance cameras can be connected to each of the multiplexers 54, 56.
In use, the onscreen display module 64 insert, on a channel-by-channel basis, the date, time and a unique system code into video signals stemming from the video multiplexers 54, 56. To provide for insertion of the exact time and date, the video module 26 further reads the time and date from the real-time clock 66.
Outputs from the onscreen display module 64 are transmitted, together with the analogue audio signal, in use via the RF transmitter 68, to a remote monitoring station.
The video and audio module 26 further includes two audio multiplexers 76, 78, which are connected to an analogue switch 80 and via an analogue to digital (A/D) converter 82, to an audio compact flash memory 84, which is controlled by an audio control microcontroller 86. In use, audio signals are received via the multiplexers 76, 78 as indicated by 88, 90. The multiplexers 76, 78 switches the signals through the analogue switch 80 and the analogue audio signals are converted to digital format by the A/D converter 82. The digitized analogue signals are then stored in the audio compact flash memory 84 under control of the audio control microcontroller 86.
The system 40 includes microphones (not shown) connected to the audio multiplexers 76, 78. The audio inputs provided by the microphones are associated with video surveillance material taken by the video surveillance cameras. To this end, the audio multiplexers 76, 78 are synchronized with the video multiplexers 54, 56.
The video and audio module 26 is controllably connected to the control module 20, shown as a control microcontroller. The control module 20 communicates with the microcontrollers of each of the other components of the security system 10 and also controls, in accordance with setup or program instruction provided by a user via the keypad 44, operation of certain of the components of the security system 10. In particular, the control module 20 provides for:
• Video and Audio address creation based on received data from the Alarm Module.
• Memory storage control signals to the Memory MCs
• Handles the Intruder Inhibit Mechanism addressing • System Digital Output processing
The control module 20 is connected to a digital output switching module 92 for controlling auxiliary devices, such as gate motors and garage doors.
The control module 20 is further connected to the communications device 22, comprising a communications microcontroller 94, an RF receiver and a mobile network (e.g. General Packed Radio Switched (GPRS) and High-Speed Downlink Packet Access (HSDPA)) transceiver 98.
The control module is furthermore connected to an Ethernet microcontroller 102, which is also connected to an RF transceiver 104. The Ethernet microcontroller 102, in use provides for easy connection of the security system onto an Ethernet network (not shown) for data transmission over the World Wide Web, via CAT5 cable on a Local Area Network, a Wide
Area Network, and a wireless transceiver.
The control module 20 is also controllably connected to a defense mechanism microcontroller 100, which is connected to defensive mechanisms such as gas discharge devices (not shown). In use, when an alarm situation occurs and such scenario is confirmed via the remote monitoring station, the control module 20 can activate the defense mechanism microcontroller 100 to halt or inhibit the intruder. The defensive mechanisms may be deployed per monitoring zone, to improve the effectiveness of the defensive mechanisms.
The communications device 22 controls communications to the remote external environment and provides for flexibility of the system 10. The communications device 22 allows for the following communication from the system 10: • GPRS communications via the GPRS transceiver 98.
Ethernet communications via the Ethernet microcontroller 102
In use, the following outwardly bound communications can take place from the system 10: • Alarm is armed: to remote monitoring station and user
Alarm is activated: to remote monitoring station and user
Alarm is off: to remote monitoring station and user
Panic pressed: to remote monitoring station and user
Mains fail: to remote monitoring station and user • User request for specific video channel snapshot: to remote monitoring station
User request for all video channels snapshot: to remote monitoring station
Request Processed successfully: to remote monitoring station and user
Request failed: to remote monitoring station and user
In use, the following inwardly bound communications can take place into the system
10:
Arm alarm: from user with password via the remote monitoring station Dis-arm alarm: from user with password via the remote monitoring station Arm alarm with zones bypassed: from user with password via the remote monitoring station
Request specific channel video snapshot: from user with password via the remote monitoring station
Request all video channels snapshot: from user with password via the remote monitoring station
Request retransmit of video data: from user with password via the remote monitoring station • User request : RF Tx : Open gate
User request : RF Tx : Open garage
User request : RF Tx : Turn on Internal Lighting
User request : RF Tx : Turn on External Lighting
All variables are kept in the microcontroller memory 94 and all messages are mobile network based. Messages in to the system 10 have authentication means in the form of a password and the header of the message contains a client specific code generated by the system 10. If messages do not conform to this authentication standard the messages are discarded.
Should communication into or from the system 10 generate an error message, a "communications error" status LED is activated. A communications error can be reset by a permitted user entering a permitted password.
In use, the keypad module 12 is used by a user to set up or program the system 10.
Reprogramming and general operation of the system 10 is also effected via the keypad module 12, and is done in similar fashion as the setting up or programming of the system 10, as hereunder described in detail. During programming or setting up of the system 10, the following menu options are displayed to the user by the LCD 46 (so as not to be confused with other reference numerals used in this description, the menu options are hereunder referred to as 12.1 - 12.12):
• 12.1 = Zone Setup
• 12.2 = Mobile Setup • 12.3 = Remote Monitoring Station Setup
• 12.4 = Time and Date Setup
• 12.5 = Buzzer or Chime Setup • 12.6 = Discharge or Liberation Detail Setup
• 12.7 = Away Setup
• 12.8 = Stay Setup
• 12.9 = Bypass • 12.10 = Power Option Setup
• 12.1 1 = General System Setup
Upon display of the above password protected menu options, a user selects, via the keypad 44, one of the menu options 12.1 - 12.12. According to the menu option selected, the following requested details are displayed by the GLCD 46, whereafter the user provides the requested details by means of the keypad 44.
• 12.1 Zone Setup o Zone Number (one - sixteen) o Zone Status (Active / Inactive)
If Active : Location
• Internal (Within building)
• External (Perimeter)
Video capability (Yes / No) ■ If Yes : Black and White or Colour
Gas Discharge capability (Yes / No)
Lighting capability (Yes / No) o Entry Zone (Yes / No) o Exit Zone (Yes / No)
• 12.2 Mobile Setup o Mobile #1 Number : XXX XXX XXXX o Mobile #1 Password : YYYY o Mobile #2 Number : XXX XXX XXXX o Mobile #2 Password : YYYY o Mobile #3 Number : XXX XXX XXXX o Mobile #3 Password : YYYY o Mobile #4 Number : XXX XXX XXXX o Mobile #4 Password : YYYY
• 12.3 Monitoring Station Setup o Monitoring Station Number #1 : XXX XXX XXXX o Monitoring Station Alternate Number#1 :XXX XXX XXXX o Monitoring Station IP Address#1 : XXX.XXX.XXX.XXX o Monitoring Station IP Address#2 : XXX.XXX.XXX.XXX o Monitoring Station Subnet Mask 1 : YYY.YYY.YYY.YYY
• 12.4 Chime or Buzzer Setup o Zone Number (Activate / De-activate)
• 12.5 Discharge or Liberation Detail Setup o Zone Number (Yes / No) o If Yes
Duration of pulse in seconds (XXX)
• 12.6 Away Setup o Away #1 : Active Zones, o Away #2 : Active Zones, o Away #3 : Active Zones, o Away #4 : Active Zones,
• 12.7 Stay Setup o Stay #1 : Active Zones : X.X.X.X.X.X.X.X.X. o Stay #2 : Active Zones : Y.Y.Y.Y.Y.Y.Y
• 12.8 Bypass o Zone Number
• 12.9 Power Option Setup o Notify on Mains fail (Yes / No) o If Yes
Mobile Number to contact XXXXXXXXXX o Power Reset Notification o If Yes
Mobile Number to contact XXXXXXXXXX
• 12.10 System General Setup o Arm code #1 : XXXX o Arm code #2 : XXXX o Arm code #3 : XXXX o Arm code #4 : XXXX o Duress code #1 : YYYY o Duress code #2 : YYYY o Duress code #3 : YYYY o Duress code #4 : YYYY o Siren Duration : seconds (XXX) o Strobe Duration : seconds (XXXX) 1000 = on until system reset o Delay arm duration : seconds (XXX) o Gas Discharge or liberation installed (Y/N) o If (Y) Gas Discharge or liberation installed
Gas Discharge duration channel (Ch) one (XX) seconds ■ Gas Discharge duration Ch two (XX) seconds
Gas Discharge duration Ch three (XX) seconds
Gas Discharge duration Ch four (XX) seconds
Gas Discharge duration Ch five (XX) seconds
Gas Discharge duration Ch six (XX) seconds ■ Gas Discharge duration Ch seven (XX) seconds
Gas Discharge duration Ch eight (XX) seconds
Gas Discharge duration Ch nine (XX) seconds
Gas Discharge duration Ch ten (XX) seconds
Gas Discharge duration Ch eleven (XX) seconds ■ Gas Discharge duration Ch twelve (XX) seconds
Gas Discharge duration Ch thirteen (XX) seconds
Gas Discharge duration Ch fourteen (XX) seconds
Gas Discharge duration Ch fifteen (XX) seconds
Gas Discharge duration Ch sixteen (XX) seconds o CF Installed for Ch's one - eight (Yes / No) o CF Installed for Ch's nine - sixteen (Yes / No) o CF Installed for Audio Ch's one - eight (Yes / No) o CF Installed for audio Ch's nine - sixteen (Yes / No) o CF Memory size in MB for video Ch's one - eight o CF Memory size in MB for video Ch's nine - sixteen o CF Memory size in MB for audio Ch's one - eight o CF Memory size in MB for audio Ch's nine - sixteen o Asset Tracking Enabled (Yes / No)
Upon display of a particular item on the LCD, a user has to populate, i.e. provide information, the requested X's and Y's by means of the keypad 44.
During setting up or programming of the security system 10, the keypad microcontroller 42 selectively communicates setup data or programming instructions to the respective other microcontrollers associated with the particular setup data or programming instructions.
Once the security system 10 has been set up or programmed as hereinbefore described, it can be used to monitor a property where it is installed. The security system 10 can then be armed, i.e. any one of the "armed", "stay" or "away" modes is selected, after which pre- specified zones associated with the selected mode of arming will continuously be monitored. Arming of the security system 10 takes place either via the keypad 44 or via the RF remote control unit, i.e. an arming signal is sent to the RF receiver 16. Instead, arming and disarming may take place via the communications module 30, i.e. an arming or disarming signal request is received from a mobile device. Upon arming, and likewise disarming of the system 10, the offsite monitoring station is notified and, if requested, the user or other designated party is notified by means of a notification transmitted to their cellular telephone number(s).
Upon sensing of an alarm condition, i.e. unauthorized entry, by any one of the sensors, or upon receipt of a panic alarm signal by the RF receiver 16, the control unit 20 causes an alarm or panic signal to be transmitted by the RF communications device 22 to the offsite monitoring station. Said signal will include information about the zone of the property from which the alarm or panic alarm signal originates. Simultaneously with transmission of the alarm or panic alarm signal to the offsite monitoring station, the alarm module 14 will activate operation of the video camera located in the zone of the property where the alarm or panic alarm signal originates from. This is effected by addressing the applicable multiplexer 54, 56. In order for the offsite monitoring station to determine the nature of the alarm condition, video and audio material taken by the video camera in question will, after passing through the associated on screen display module 64 be caused to be streamed, via the RF communication device 22, to the offsite monitoring station. If the security system 10 is set up or programmed as such, the control module 20 will also cause activation of operation of the asset tracking devices. This may also be done upon of an activation request from the offsite monitoring station. Upon viewing of the streamed video and audio material, personnel at the offsite monitoring station can make an informed decision as to what type of action should be taken in response to the alarm condition. For example, if an animal has obtained unauthorized entry to the property and the presence of the animal has triggered the alarm, then there should be no need for the offsite monitoring station to have a patrol unit sent out to the property.
Simultaneously with streaming of video and audio surveillance material to the offsite monitoring station, the video and audio surveillance material taken is, after being converted by the A/D converter 82, stored on the audio/video flash memories 72, 84, in a fashion hereinbefore described. Should the need then arise at a later stage again to view the video and audio material, such a request is communicated from the offsite monitoring station to the RF communications device 22. Upon receipt of such a request, the control module 20 causes stored video and audio surveillance material to be retrieved from the compact flash memories 72, 84 whereafter the control module 20 causes the material to be transmitted to the offsite monitoring station via the RF communications device 22. The streamed video and audio data is additionally stored on the monitoring station database.
As foreshadowed above, a user of the security system 10 can, via their cellular phone acquire the status of the security system 10 by sending a request to the monitoring station which will verify the message/request authenticity and relay the request to the security system. A user can also, within limits, change the setup or reprogram the security system 10 via their cellular telephone e.g. arm the system with specific zones bypassed. The security system 10, as mentioned above, further provides for arming and disarming of the system by means of the cellular telephone of the user. Further, a user can, by means of their cellular telephone, cause the gate and/or at least one garage door located on the property at which the security system 10 is installed to be opened and closed.
Further, the security system 10 is configured to permit receipt by the communications module 30 of a request for a video snapshot by a user 10 via their cellular telephone to the monitoring station. In particular, should a user request a video snapshot of a particular zone or zones in the property, they would transmit such a request to the monitoring station which verifies the authenticity there of and forwards the security approved request to the security system's communications module 30. Upon receipt of a video snapshot request by the communications module 16, the request is routed to the alarm module 14 from where it is transmitted, via the communications device 30, to the offsite monitoring station. Upon receipt of the request by the offsite monitoring station, the request is granted once the password and verification process is positive and a grant signal is transmitted back to the communications device 30. Upon receipt of such a grant signal by the communications device 30, the grant request is routed to the alarm module 14, which then addresses the video and audio surveillance module 26 to activate each video surveillance camera located in a zone or zones in question. A video snapshot is then taken by the video surveillance camera, after which it is via the alarm module 14 routed to the communications module 16, which then transmits the video snapshot to the offsite monitoring station which in turn sends the requested snapshot to the cellular telephone number of the user.
The system 10, by virtue of its modular construction, can operate as a conventional burglar alarm system including only the keypad module 12, the alarm module 14, the RF receiver 16, the RF communications device 22, the power supply 34, a plurality of sensors connected to the alarm module 14, and at least one panic button. By adding the communications module 30, the system 10 provides for mobile communications between the system 10 and a cellular telephone of at least one user, which communications, by virtue of the password system is secure. By further addition of the video and audio module 26, video cameras and microphones on selected or all channels, the system 10 provides for real time viewing by the an offsite monitoring station of surveillance material taken in any particular zone at any desired time. This addition to the basic system also permits a user to receive video and audio surveillance material. By adding the memory module 28, the system 10 provides for digital storage or backup of video and audio surveillance material taken throughout the zones which are fitted with video cameras and microphones, for later viewing.
Referring now to Figure 3, there is shown a remote monitoring station 120 in accordance with the invention operable to communicate with multiple security systems 40. The monitoring station includes a central computer 122, providing a central user interface and control facility. The monitoring station includes a database 124 on which customer details and customer security system details are stored as well as the transmitted video and audio data from the installed Security System. The remote monitoring station includes also at least a Global System for Mobile communications (GSM) interface 126 for interfacing via a mobile telephone network with other mobile communication devices such as mobile telephones of users. The remote monitoring station further includes at least a dedicated General Packet Radio Switched network interface 128, for communication with multiple security systems 10. The remote monitoring station further includes at least an asset tracking device 130, dedicated to the tracking of assets of system users. The asset tracking device, is operable upon activation of asset tracking devices of users to communicate with the tracking devices and to determine the location of such devices by receiving from the devices their GPS location or GSM Cell identification. The central computer includes a standard Ethernet interface 132 for interfacing with other external devices.
Operation of the monitoring station 120 will be described by means of screen displays of the central computer shown in Figures 4 to 10.
In Figure 4 a login screen 140 is shown permitting an operator to enter a predefined username in 142 and password in 144. The username and password confirmation is necessary to confirm that the operator is an authorized person as well as providing the user "rights" for system operation i.e. the "rights" of the "Monitoring System Operator" differ from that of the
"Monitoring System Administrator".
Upon successful login the various communication interfaces 126, 128, 130 are tested and the opportunity is provided to configure the interfaces by means of the communications configuration screen 150 shown in Figure 5. The port number is set up in 152, the port speed in 154, the number of data bits in 156, the parity protocol in 158, the number of stop bits in 160 the flow control at 162, and the echo status of the interface at 164, provided data setup / entry is carried out by a user with "Administrative" rights.
In Figure 6 a profile definition screen 170 is displayed to set up the operator profiles.
The username is set up in 172 and the password in 174. The profile to be defined is set up in 176. In 178 a list of operator profiles is displayed.
In Figure 7 a main display screen 180 is shown. This screen is the main interface to the various user's security systems. At 182 the user's name can be entered, at 184, the user's surname. At 186, the user's address is viewed and at 188, the user's telephone contact details.
At 190, the status of the user's security system is displayed. At 192 a list of the messages exchanged with the security system of the user is displayed. At 194 a video feed is displayed of the various video cameras located in the user's house. It is to be appreciated that the monitor station also has an audio feed to correspond with the video display, displayed in 194 as well as the fact that multiple "screens are displayed should a number of separate security systems be
"triggered / activated" simultaneously.
In Figure 8 a client information display screen 200 is shown. At 202, the client's name is displayed, at 204, the client's surname, a 206, the client's identity number, at 208 the client's telephone contact details, at 210 the client's physical address, at 212 the clients postal address, at 214, the model number of the client's security number. At 216 a list of clients are displayed.
In Figure 9 an alternate contact information screen 220 is showed with the contact person's name at 222, the person's surname at 224, the person's identity number at 226, the relationship to the client at 228 the person's telephone contact details at 230 the person's physical address at 232, the active period for the alternate contacts relevancy at 234 and 236.
In Figure 10 a model identification screen is showed. A model number is displayed at 242, a model description at 244 and the number of the particular models being used at 246. At 248 a list of models is displayed for easy identification.
The display screens Figures 4 to 10 can be used to define a complete security arrangement of which a monitor station 120 and a plurality of security systems 10 can form part. The method of relaying security information through the monitor station directly to users with the associated security provisions build into the arrangement is believed to be of particular advantage to ensure a secure, yet friendly to operate arrangement on the user's side as well as on the monitoring station's side.
The security system as described and illustrated provides the following functionalities:
• It is of modular construction and, accordingly easily expandable by adding, in addition to the basic modules, further modules with provides the system with enhanced functionality.
• It provides for real time video and audio surveillance of zones associated with activated channels of the system.
• An offsite monitoring station can immediately, via the video and audio streamed, determine the cause and nature of an alarm condition or activation, thereby permitting an informed decision as how to respond to the alarm condition.
• When a panic signal is received, the system automatically searches for the specific area, i.e. zone, where the panic signal originates from by sequentially addressing the video surveillance channels through the property, thereby enabling appropriate action by the offsite monitoring station.
• On receipt of a panic signal, the system is armed with no channels or zones bypassed, thereby permitting, as quick as possible, identification of an area to which unauthorized access has been gained or where motion has been detected, i.e. the zone where the panic condition occurred, after which video and audio surveillance material taken in the relevant zone is streamed to the offsite monitoring station. • Each PIR sensor includes a day/night light activation circuit so as to enhance night video surveillance.
• Gas discharge or defense mechanisms are only activated when the system is in any of the "armed, stay or away" modes and is setup or programmed to discharge or liberate gas, and then only in the zones to which unauthorized entry has been obtained or where motion has been sensed. Gas is then also only discharged for the duration specified in the setup data or programming instructions as well as the "authorization" signal by the monitoring station operator being received by the security system.
• The system, additionally, provides for activation of asset tracking devices secured to valuables located on a property to be monitored, and upon such activation notifies the offsite monitoring station that this has been done and accordingly provides whereabouts of such assets for tracking and/or retrieval purposes.
• The system provides for receipt by the offsite monitoring station of tracking details from asset tracking devices secured to valuables located on the property prior to an alarm condition. Further, the system is configured that de-activation of the asset tracking devices can only be effected by the offsite monitoring station.
• In addition, the system provides for activation of an audible and a visual alarm upon sensing of an alarm condition, or upon receipt of a panic signal.
• The system also provides for operation of a gate to the property and at least one garage door on the property by means of GSM, i.e. via a cellular telephone of a user.

Claims

CLAIMS:
1. A method of monitoring a property, the method including: dividing the property into monitoring zones, and monitoring a set of trigger events; upon sensing of a trigger event, transmitting a wireless alarm signal to a remote monitoring station that a trigger event has been sensed, thereby notifying the remote monitoring station of the sensed event; and activating video surveillance in at least one monitor zone, and wirelessly sending video material taken in the monitor zone to the remote monitoring station, thereby enabling the remote monitoring station visually to determine the nature of the trigger event.
2. A method as claimed in claim 1 , which includes activating audio surveillance in at least one monitor zone and wirelessly transmitting an audio stream taken in the at least one monitor zone to the remote monitoring station, thereby enabling the remote monitoring station audibly to determine the nature of the trigger event.
3. A method as claimed in any one of claims 1 and 2 in which the set of trigger events includes any one or more of detection of unauthorized entry into the property; a system malfunction; a surveillance request received from the remote monitoring station to activate any one of video surveillance and audio surveillance in at least one monitor zone; a surveillance request received via the monitoring station from a predefined party to activate any one of video surveillance and audio surveillance in at least one monitor zone; an operational request received via the monitoring station from a predefined party to perform an operational task; a radio frequency signal originating from a hand-held short range radio frequency transmitter
4. A method as claimed in claim 3, in which the trigger event is any one of a surveillance request received via the monitoring station from a predefined party to activate any one of video surveillance and audio surveillance in at least one monitor zone and an operational request received via the monitoring station from a predefined party to perform an operational task, which method includes authenticating the request from the predefined party prior to executing the request.
5. A method as claimed in any one of claims 1 to 4 which includes transmitting from the remote monitoring station a notification message indicating the nature of the trigger event to a predefined party via a wireless mobile communication network.
6. A method as claimed in claim 5 in which the notification message is in the form of any one or both of a short message service (SMS) message and a multi-media messaging service (MMS) message.
7. A method as claimed in any one of claims 1 to 6, which includes forwarding video material transmitted to the remote monitoring station to a predefined user via a wireless communication network.
8. A method as claimed in any one of claims 1 to 7, which includes receiving from the remote monitoring station an activation signal for activating a defense mechanism at the monitored property.
9. A method as claimed in any one of claims 1 to 8, which includes activating any one of an audible alarm and a visual alarm at the monitored property.
10. A method as claimed in any one of claims 1 to 9, which includes activating tracking devices secured to valuables located at the monitored property.
11. A method of monitoring a security system from a remote location, the method including: receiving an alarm signal from the security system upon sensing of a trigger event at a property where the security system is installed; and receiving, in real time, any one of video surveillance material and audio surveillance material, taken at the property where the security system is installed, from the security system, thereby enabling visual/audible identification, from the remote location, of the nature of the trigger event sensed at the property.
12. A method as claimed in claim 1 1 , which includes transmitting a surveillance request to the security system for activating any one of a video surveillance facility and an audio surveillance facility at the property, and thereafter receiving said surveillance material taken at the property where the security system is installed.
13. A method as claimed in any one of claims 11 and 12, which includes transmitting a defense signal to the property for activating a defense mechanism at the property.
14. A method as claimed in any one of claims 11 to 13 which includes forwarding any one of the video surveillance material and the audio surveillance material via a wireless communication network to a mobile communications device of a user.
15. A security system which includes: sensing means for sensing a trigger event; any one of a video monitoring facility for monitoring a video signal originating from a video surveillance device and an audio monitoring facility for monitoring an audio signal originating from an audio surveillance device in response to sensing of the trigger event by the sensing means; and a first wireless communications device connected to any one of the video monitoring facility and the audio monitoring facility operable to transmit any one of the video signal and the audio signal via a wireless communication network to a remote monitoring station.
16. A security system as claimed in claim 15, in which the first wireless communication device is in the form of a mobile telephone network interface, operable to transmit any one of the video signal and the audio signal to the remote monitoring station via a mobile telephone network.
17. A security system as claimed in any one of claims 15 and 16, which includes a user interface in the form of any one or both of a user keypad for accepting inputs from a user, a user liquid crystal display for displaying system information to a user, and a video monitor for displaying video signals originating from a particular zone.
18. A security system as claimed in any one of claims 15 to 17, which includes a second wireless communications device operable to receive command signals originating from a short range radio frequency transmitter.
19. A security system as claimed in claim 18 in which the second wireless communications device is in the form of a radio frequency receiver, operable to receive command signals in the form of any one of a panic signal, an activation signal, a de-activation signal, an arming mode signal, auxiliary switching signals to operate auxiliary devices.
20. A security system as claimed in any one of claims 15 to 19, which includes a defense controller connectable to a defense mechanism, the defense controller operable to receive a defense command upon which the defense mechanism is activated.
21. A security system as claimed in any one of claims 15 to 20, in which the first wireless communication device is operable to receive a command signal from a remote monitoring station.
22. A security system as claimed in claim 21 in which the command signal is in the form of any one of a surveillance request signal upon receipt of which the video/audio surveillance devices produce video/audio monitoring signals and the first wireless communication device transmits the video/audio signals to the remote monitor; a status request signal upon receipt of which a status of the monitoring signal is transmitted via the first wireless communication device; a programming message; and an operational request signal upon receipt of which a controller of the monitoring system executes operational requests.
23. A security system as claimed in claim 22, which includes authentication means, operable upon receipt of a command signal to authenticate the source of the command signal against predefined permitted sources.
24. A security system as claimed in any one of claims 15 to 23, which includes storage means for storing any one of video material and audio material taken by the video monitoring facility and the audio monitoring facility respectively.
25. A security system as claimed in claim 24, which includes a real time clock and at least one on-screen display controller for inserting the time, date and a unique system code on which video surveillance material is taken into the video surveillance material prior to storage thereof in the memory module.
26. A security system as claimed in any one of claims 24 and 25, which includes a converter unit connected to the storage means for converting stored digital video/audio material to analogue video/audio material.
27. A security system as claimed in any one of claims 15 to 26, in which any one of the video monitoring facility and the audio monitoring facility is a multi-channel facility providing for independent monitoring of a plurality of video surveillance devices and audio surveillance devices respectively.
28. A security system as claimed in any one of claims 15 to 27, which includes a plurality of sensors comprising of any one or more of motion detection sensors, glass break detectors, vibration sensors, video detectors, microphones, acoustic sensors, ultrasonic detectors, proximity detectors, and thermal detectors.
29. A security system as claimed in any one of claims 15 to 28 which includes at least one auxiliary output connectable to an auxiliary device operable upon receipt of an operational request signal to control the auxiliary device by switching the auxiliary output.
30. A security system as claimed in any one of claims 15 to 28, which is associated with at least one asset tracking device which may be secured to a valuable asset located at the monitored property.
31. A security system as claimed in any one of claims 15 to 30, in which the security system is operable upon detection of a predefined trigger event to activate the at least one asset tracking device with which it is associated.
32. A security system installation comprising a security system as claimed in any one of claims 15 to 31 and at least one sensor being selected from any one or more of motion detection sensors, glass break detectors, vibration sensors, video detectors, microphones, acoustic sensors, ultrasonic detectors, proximity detectors, thermal detectors, and at least one video surveillance device.
33. A building structure comprising a building into which a security installation as claimed in claim 32 is installed.
34. A monitoring station, which includes: a first wireless data interface operable to exchange operational messages with a remote security system and to receive any one or both of a video feed and an audio feed originating from a remote security system; a configuration system arranged to configure the data interface to exchange operational messages and to receive video feeds from multiple remote security systems; and a display screen operable to display operational messages exchanged with a remote security system and video feeds received from the remote security system.
35. A monitoring station as claimed in claim 34 in which the first wireless data interface is a radio frequency (RF) interface.
36. A monitoring station as claimed in claim 34, which includes a second data interface operable to exchange operational messages with a remote security system and to receive any one or both of a video feed and an audio feed originating from a remote security system.
37. A monitoring station as claimed in claim 36, in which the second data interface is in the form of a wireless mobile communication data interface, being any one of a GSM interface, GPRS interface, and an HSDPA interface.
38. A monitoring station as claimed in any one of claims 34 to 37, which is operable to assign different levels of access to different user profiles, each user profile authorized to perform a predefined set of actions.
39. A monitoring station as claimed in any one of claims 34 to 38, which is operable to exchange operational messages and receive audio/video feeds only from predefined security systems.
40. A monitoring station as claimed in any one of claims 34 to 39, which is operable to verify incoming communications against predefined security profiles.
41. A monitoring station as claimed in any one of claims 34 to 39, which is operable to log internal operations to create an audit trail.
42. A method as claimed in claim 1 , substantially as herein described and illustrated.
43. A method as claimed in claim 11 , substantially as herein described and illustrated.
44. A security system as claimed in claim 15, substantially as herein described and illustrated.
45. A security system installation as claimed in claim 32, substantially as herein described and illustrated.
46. A building structure as claimed in claim 33, substantially as herein described and illustrated.
PCT/IB2007/054492 2006-11-07 2007-11-06 A security system WO2008056320A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
GB0815477A GB2449584A (en) 2006-11-07 2007-11-06 A security system

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
ZA200609289 2006-11-07
ZA2006/09289 2006-11-07

Publications (1)

Publication Number Publication Date
WO2008056320A1 true WO2008056320A1 (en) 2008-05-15

Family

ID=39271308

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/IB2007/054492 WO2008056320A1 (en) 2006-11-07 2007-11-06 A security system

Country Status (3)

Country Link
GB (1) GB2449584A (en)
WO (1) WO2008056320A1 (en)
ZA (1) ZA200709538B (en)

Cited By (89)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8094026B1 (en) 2011-05-02 2012-01-10 Robert M Green Organized retail crime detection security system and method
EP2407944A1 (en) * 2010-07-14 2012-01-18 Honeywell International, Inc. Method and apparatus for activating and deactivating video cameras in a security system
ES2400759A1 (en) * 2010-09-06 2013-04-12 Enrique Caruncho Torga Video surveillance team (Machine-translation by Google Translate, not legally binding)
US20140172957A1 (en) * 2007-06-12 2014-06-19 Marc Baum Security network integrated with premise security system
CN104408894A (en) * 2014-07-01 2015-03-11 唐路 Alarm system and alarm method thereof
US20150237313A1 (en) * 2012-10-12 2015-08-20 Zte Corporation Intelligent monitoring terminal and video monitoring method
US20160274759A1 (en) 2008-08-25 2016-09-22 Paul J. Dawes Security system with networked touchscreen and gateway
WO2018027498A1 (en) * 2016-08-08 2018-02-15 刘文婷 Home alarm device capable of remote monitoring
US10051078B2 (en) 2007-06-12 2018-08-14 Icontrol Networks, Inc. WiFi-to-serial encapsulation in systems
US10062245B2 (en) 2005-03-16 2018-08-28 Icontrol Networks, Inc. Cross-client sensor user interface in an integrated security network
US10062273B2 (en) 2010-09-28 2018-08-28 Icontrol Networks, Inc. Integrated security system with parallel processing architecture
US10079839B1 (en) 2007-06-12 2018-09-18 Icontrol Networks, Inc. Activation of gateway device
US10078958B2 (en) 2010-12-17 2018-09-18 Icontrol Networks, Inc. Method and system for logging security event data
US10091014B2 (en) 2005-03-16 2018-10-02 Icontrol Networks, Inc. Integrated security network with security alarm signaling system
US10127801B2 (en) 2005-03-16 2018-11-13 Icontrol Networks, Inc. Integrated security system with parallel processing architecture
US10142166B2 (en) 2004-03-16 2018-11-27 Icontrol Networks, Inc. Takeover of security network
US10142394B2 (en) 2007-06-12 2018-11-27 Icontrol Networks, Inc. Generating risk profile using data of home monitoring and security system
US10142392B2 (en) 2007-01-24 2018-11-27 Icontrol Networks, Inc. Methods and systems for improved system performance
US10140840B2 (en) 2007-04-23 2018-11-27 Icontrol Networks, Inc. Method and system for providing alternate network access
US10156831B2 (en) 2004-03-16 2018-12-18 Icontrol Networks, Inc. Automation system with mobile interface
US10156959B2 (en) 2005-03-16 2018-12-18 Icontrol Networks, Inc. Cross-client sensor user interface in an integrated security network
US10200504B2 (en) 2007-06-12 2019-02-05 Icontrol Networks, Inc. Communication protocols over internet protocol (IP) networks
US10237806B2 (en) 2009-04-30 2019-03-19 Icontrol Networks, Inc. Activation of a home automation controller
US10237237B2 (en) 2007-06-12 2019-03-19 Icontrol Networks, Inc. Communication protocols in integrated systems
US10313303B2 (en) 2007-06-12 2019-06-04 Icontrol Networks, Inc. Forming a security network including integrated security system components and network devices
US10348575B2 (en) 2013-06-27 2019-07-09 Icontrol Networks, Inc. Control system user interface
US10365810B2 (en) 2007-06-12 2019-07-30 Icontrol Networks, Inc. Control system user interface
US10382452B1 (en) 2007-06-12 2019-08-13 Icontrol Networks, Inc. Communication protocols in integrated systems
US10380871B2 (en) 2005-03-16 2019-08-13 Icontrol Networks, Inc. Control system user interface
US10389736B2 (en) 2007-06-12 2019-08-20 Icontrol Networks, Inc. Communication protocols in integrated systems
US10423309B2 (en) 2007-06-12 2019-09-24 Icontrol Networks, Inc. Device integration framework
US10498830B2 (en) 2007-06-12 2019-12-03 Icontrol Networks, Inc. Wi-Fi-to-serial encapsulation in systems
US10522026B2 (en) 2008-08-11 2019-12-31 Icontrol Networks, Inc. Automation system user interface with three-dimensional display
US10523689B2 (en) 2007-06-12 2019-12-31 Icontrol Networks, Inc. Communication protocols over internet protocol (IP) networks
US10530839B2 (en) 2008-08-11 2020-01-07 Icontrol Networks, Inc. Integrated cloud system with lightweight gateway for premises automation
US10559193B2 (en) 2002-02-01 2020-02-11 Comcast Cable Communications, Llc Premises management systems
US10616075B2 (en) 2007-06-12 2020-04-07 Icontrol Networks, Inc. Communication protocols in integrated systems
WO2020085894A1 (en) * 2018-10-23 2020-04-30 Rocha Cortez Douglas Rene Portable defensive protective alarm device with gsm device
US10666523B2 (en) 2007-06-12 2020-05-26 Icontrol Networks, Inc. Communication protocols in integrated systems
US10721087B2 (en) 2005-03-16 2020-07-21 Icontrol Networks, Inc. Method for networked touchscreen with integrated interfaces
US10747216B2 (en) 2007-02-28 2020-08-18 Icontrol Networks, Inc. Method and system for communicating with and controlling an alarm system from a remote server
US10785319B2 (en) 2006-06-12 2020-09-22 Icontrol Networks, Inc. IP device discovery systems and methods
US10841381B2 (en) 2005-03-16 2020-11-17 Icontrol Networks, Inc. Security system with networked touchscreen
US10979389B2 (en) 2004-03-16 2021-04-13 Icontrol Networks, Inc. Premises management configuration and control
US10999254B2 (en) 2005-03-16 2021-05-04 Icontrol Networks, Inc. System for data routing in networks
US11089122B2 (en) 2007-06-12 2021-08-10 Icontrol Networks, Inc. Controlling data routing among networks
US11113950B2 (en) 2005-03-16 2021-09-07 Icontrol Networks, Inc. Gateway integrated with premises security system
US11146637B2 (en) 2014-03-03 2021-10-12 Icontrol Networks, Inc. Media content management
US11153266B2 (en) 2004-03-16 2021-10-19 Icontrol Networks, Inc. Gateway registry methods and systems
US11182060B2 (en) 2004-03-16 2021-11-23 Icontrol Networks, Inc. Networked touchscreen with integrated interfaces
US11201755B2 (en) 2004-03-16 2021-12-14 Icontrol Networks, Inc. Premises system management using status signal
US11212192B2 (en) 2007-06-12 2021-12-28 Icontrol Networks, Inc. Communication protocols in integrated systems
US11218878B2 (en) 2007-06-12 2022-01-04 Icontrol Networks, Inc. Communication protocols in integrated systems
DE102013017184B4 (en) 2012-10-18 2022-01-13 Heinz-Peter Weiland Alarm system with multiple criteria sensors to detect theft and vandalism of vehicles and moving or fixed parts
US11240059B2 (en) 2010-12-20 2022-02-01 Icontrol Networks, Inc. Defining and implementing sensor triggered response rules
US11237714B2 (en) 2007-06-12 2022-02-01 Control Networks, Inc. Control system user interface
US11244545B2 (en) 2004-03-16 2022-02-08 Icontrol Networks, Inc. Cross-client sensor user interface in an integrated security network
US11258625B2 (en) 2008-08-11 2022-02-22 Icontrol Networks, Inc. Mobile premises automation platform
US11277465B2 (en) 2004-03-16 2022-03-15 Icontrol Networks, Inc. Generating risk profile using data of home monitoring and security system
US11310199B2 (en) 2004-03-16 2022-04-19 Icontrol Networks, Inc. Premises management configuration and control
US11316958B2 (en) 2008-08-11 2022-04-26 Icontrol Networks, Inc. Virtual device systems and methods
US11316753B2 (en) 2007-06-12 2022-04-26 Icontrol Networks, Inc. Communication protocols in integrated systems
US11343380B2 (en) 2004-03-16 2022-05-24 Icontrol Networks, Inc. Premises system automation
US11368327B2 (en) 2008-08-11 2022-06-21 Icontrol Networks, Inc. Integrated cloud system for premises automation
US11398147B2 (en) 2010-09-28 2022-07-26 Icontrol Networks, Inc. Method, system and apparatus for automated reporting of account and sensor zone information to a central station
US11405463B2 (en) 2014-03-03 2022-08-02 Icontrol Networks, Inc. Media content management
US11423756B2 (en) 2007-06-12 2022-08-23 Icontrol Networks, Inc. Communication protocols in integrated systems
US11424980B2 (en) 2005-03-16 2022-08-23 Icontrol Networks, Inc. Forming a security network including integrated security system components
US11451409B2 (en) 2005-03-16 2022-09-20 Icontrol Networks, Inc. Security network integrating security system and network devices
US11489812B2 (en) 2004-03-16 2022-11-01 Icontrol Networks, Inc. Forming a security network including integrated security system components and network devices
US11496568B2 (en) 2005-03-16 2022-11-08 Icontrol Networks, Inc. Security system with networked touchscreen
US11582065B2 (en) 2007-06-12 2023-02-14 Icontrol Networks, Inc. Systems and methods for device communication
US11601810B2 (en) 2007-06-12 2023-03-07 Icontrol Networks, Inc. Communication protocols in integrated systems
US11615697B2 (en) 2005-03-16 2023-03-28 Icontrol Networks, Inc. Premise management systems and methods
US11646907B2 (en) 2007-06-12 2023-05-09 Icontrol Networks, Inc. Communication protocols in integrated systems
US11677577B2 (en) 2004-03-16 2023-06-13 Icontrol Networks, Inc. Premises system management using status signal
US11700142B2 (en) 2005-03-16 2023-07-11 Icontrol Networks, Inc. Security network integrating security system and network devices
US11706279B2 (en) 2007-01-24 2023-07-18 Icontrol Networks, Inc. Methods and systems for data communication
US11706045B2 (en) 2005-03-16 2023-07-18 Icontrol Networks, Inc. Modular electronic display platform
US11729255B2 (en) 2008-08-11 2023-08-15 Icontrol Networks, Inc. Integrated cloud system with lightweight gateway for premises automation
US11750414B2 (en) 2010-12-16 2023-09-05 Icontrol Networks, Inc. Bidirectional security sensor communication for a premises security system
US11758026B2 (en) 2008-08-11 2023-09-12 Icontrol Networks, Inc. Virtual device systems and methods
US11792330B2 (en) 2005-03-16 2023-10-17 Icontrol Networks, Inc. Communication and automation in a premises management system
US11792036B2 (en) 2008-08-11 2023-10-17 Icontrol Networks, Inc. Mobile premises automation platform
US11811845B2 (en) 2004-03-16 2023-11-07 Icontrol Networks, Inc. Communication protocols over internet protocol (IP) networks
US11816323B2 (en) 2008-06-25 2023-11-14 Icontrol Networks, Inc. Automation system user interface
US11831462B2 (en) 2007-08-24 2023-11-28 Icontrol Networks, Inc. Controlling data routing in premises management systems
US11916928B2 (en) 2008-01-24 2024-02-27 Icontrol Networks, Inc. Communication protocols over internet protocol (IP) networks
US11916870B2 (en) 2004-03-16 2024-02-27 Icontrol Networks, Inc. Gateway registry methods and systems

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO1999039505A1 (en) * 1998-01-29 1999-08-05 Sol Frank Kavy Networked security system for network-based monitoring and control of an environment
US6385772B1 (en) * 1998-04-30 2002-05-07 Texas Instruments Incorporated Monitoring system having wireless remote viewing and control
US6400265B1 (en) * 2001-04-24 2002-06-04 Microstrategy, Inc. System and method for monitoring security systems by using video images
EP1304672A1 (en) * 2000-06-30 2003-04-23 Japan Network Service Co., Ltd Remote monitoring method and monitor control server
US20040080618A1 (en) * 2000-11-20 2004-04-29 Norris Timothy Sweyn Smart camera system
US20050068175A1 (en) * 2002-07-08 2005-03-31 Faulkner James Otis Security system and method with realtime imagery

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO1999039505A1 (en) * 1998-01-29 1999-08-05 Sol Frank Kavy Networked security system for network-based monitoring and control of an environment
US6385772B1 (en) * 1998-04-30 2002-05-07 Texas Instruments Incorporated Monitoring system having wireless remote viewing and control
EP1304672A1 (en) * 2000-06-30 2003-04-23 Japan Network Service Co., Ltd Remote monitoring method and monitor control server
US20040080618A1 (en) * 2000-11-20 2004-04-29 Norris Timothy Sweyn Smart camera system
US6400265B1 (en) * 2001-04-24 2002-06-04 Microstrategy, Inc. System and method for monitoring security systems by using video images
US20050068175A1 (en) * 2002-07-08 2005-03-31 Faulkner James Otis Security system and method with realtime imagery

Cited By (167)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10559193B2 (en) 2002-02-01 2020-02-11 Comcast Cable Communications, Llc Premises management systems
US11184322B2 (en) 2004-03-16 2021-11-23 Icontrol Networks, Inc. Communication protocols in integrated systems
US11159484B2 (en) 2004-03-16 2021-10-26 Icontrol Networks, Inc. Forming a security network including integrated security system components and network devices
US10992784B2 (en) 2004-03-16 2021-04-27 Control Networks, Inc. Communication protocols over internet protocol (IP) networks
US11811845B2 (en) 2004-03-16 2023-11-07 Icontrol Networks, Inc. Communication protocols over internet protocol (IP) networks
US11810445B2 (en) 2004-03-16 2023-11-07 Icontrol Networks, Inc. Cross-client sensor user interface in an integrated security network
US11410531B2 (en) 2004-03-16 2022-08-09 Icontrol Networks, Inc. Automation system user interface with three-dimensional display
US11782394B2 (en) 2004-03-16 2023-10-10 Icontrol Networks, Inc. Automation system with mobile interface
US11757834B2 (en) 2004-03-16 2023-09-12 Icontrol Networks, Inc. Communication protocols in integrated systems
US10979389B2 (en) 2004-03-16 2021-04-13 Icontrol Networks, Inc. Premises management configuration and control
US10890881B2 (en) 2004-03-16 2021-01-12 Icontrol Networks, Inc. Premises management networking
US11082395B2 (en) 2004-03-16 2021-08-03 Icontrol Networks, Inc. Premises management configuration and control
US10796557B2 (en) 2004-03-16 2020-10-06 Icontrol Networks, Inc. Automation system user interface with three-dimensional display
US11677577B2 (en) 2004-03-16 2023-06-13 Icontrol Networks, Inc. Premises system management using status signal
US11656667B2 (en) 2004-03-16 2023-05-23 Icontrol Networks, Inc. Integrated security system with parallel processing architecture
US10754304B2 (en) 2004-03-16 2020-08-25 Icontrol Networks, Inc. Automation system with mobile interface
US11153266B2 (en) 2004-03-16 2021-10-19 Icontrol Networks, Inc. Gateway registry methods and systems
US11625008B2 (en) 2004-03-16 2023-04-11 Icontrol Networks, Inc. Premises management networking
US10142166B2 (en) 2004-03-16 2018-11-27 Icontrol Networks, Inc. Takeover of security network
US11626006B2 (en) 2004-03-16 2023-04-11 Icontrol Networks, Inc. Management of a security system at a premises
US10735249B2 (en) 2004-03-16 2020-08-04 Icontrol Networks, Inc. Management of a security system at a premises
US10692356B2 (en) 2004-03-16 2020-06-23 Icontrol Networks, Inc. Control system user interface
US10156831B2 (en) 2004-03-16 2018-12-18 Icontrol Networks, Inc. Automation system with mobile interface
US10691295B2 (en) 2004-03-16 2020-06-23 Icontrol Networks, Inc. User interface in a premises network
US11601397B2 (en) 2004-03-16 2023-03-07 Icontrol Networks, Inc. Premises management configuration and control
US11893874B2 (en) 2004-03-16 2024-02-06 Icontrol Networks, Inc. Networked touchscreen with integrated interfaces
US11175793B2 (en) 2004-03-16 2021-11-16 Icontrol Networks, Inc. User interface in a premises network
US11588787B2 (en) 2004-03-16 2023-02-21 Icontrol Networks, Inc. Premises management configuration and control
US11537186B2 (en) 2004-03-16 2022-12-27 Icontrol Networks, Inc. Integrated security system with parallel processing architecture
US11043112B2 (en) 2004-03-16 2021-06-22 Icontrol Networks, Inc. Integrated security system with parallel processing architecture
US11489812B2 (en) 2004-03-16 2022-11-01 Icontrol Networks, Inc. Forming a security network including integrated security system components and network devices
US11182060B2 (en) 2004-03-16 2021-11-23 Icontrol Networks, Inc. Networked touchscreen with integrated interfaces
US11449012B2 (en) 2004-03-16 2022-09-20 Icontrol Networks, Inc. Premises management networking
US11201755B2 (en) 2004-03-16 2021-12-14 Icontrol Networks, Inc. Premises system management using status signal
US11244545B2 (en) 2004-03-16 2022-02-08 Icontrol Networks, Inc. Cross-client sensor user interface in an integrated security network
US11916870B2 (en) 2004-03-16 2024-02-27 Icontrol Networks, Inc. Gateway registry methods and systems
US11277465B2 (en) 2004-03-16 2022-03-15 Icontrol Networks, Inc. Generating risk profile using data of home monitoring and security system
US11310199B2 (en) 2004-03-16 2022-04-19 Icontrol Networks, Inc. Premises management configuration and control
US11343380B2 (en) 2004-03-16 2022-05-24 Icontrol Networks, Inc. Premises system automation
US11378922B2 (en) 2004-03-16 2022-07-05 Icontrol Networks, Inc. Automation system with mobile interface
US10447491B2 (en) 2004-03-16 2019-10-15 Icontrol Networks, Inc. Premises system management using status signal
US11368429B2 (en) 2004-03-16 2022-06-21 Icontrol Networks, Inc. Premises management configuration and control
US11792330B2 (en) 2005-03-16 2023-10-17 Icontrol Networks, Inc. Communication and automation in a premises management system
US11706045B2 (en) 2005-03-16 2023-07-18 Icontrol Networks, Inc. Modular electronic display platform
US10156959B2 (en) 2005-03-16 2018-12-18 Icontrol Networks, Inc. Cross-client sensor user interface in an integrated security network
US10721087B2 (en) 2005-03-16 2020-07-21 Icontrol Networks, Inc. Method for networked touchscreen with integrated interfaces
US10930136B2 (en) 2005-03-16 2021-02-23 Icontrol Networks, Inc. Premise management systems and methods
US11824675B2 (en) 2005-03-16 2023-11-21 Icontrol Networks, Inc. Networked touchscreen with integrated interfaces
US10380871B2 (en) 2005-03-16 2019-08-13 Icontrol Networks, Inc. Control system user interface
US11424980B2 (en) 2005-03-16 2022-08-23 Icontrol Networks, Inc. Forming a security network including integrated security system components
US11451409B2 (en) 2005-03-16 2022-09-20 Icontrol Networks, Inc. Security network integrating security system and network devices
US11496568B2 (en) 2005-03-16 2022-11-08 Icontrol Networks, Inc. Security system with networked touchscreen
US10841381B2 (en) 2005-03-16 2020-11-17 Icontrol Networks, Inc. Security system with networked touchscreen
US11595364B2 (en) 2005-03-16 2023-02-28 Icontrol Networks, Inc. System for data routing in networks
US10999254B2 (en) 2005-03-16 2021-05-04 Icontrol Networks, Inc. System for data routing in networks
US11615697B2 (en) 2005-03-16 2023-03-28 Icontrol Networks, Inc. Premise management systems and methods
US10091014B2 (en) 2005-03-16 2018-10-02 Icontrol Networks, Inc. Integrated security network with security alarm signaling system
US10062245B2 (en) 2005-03-16 2018-08-28 Icontrol Networks, Inc. Cross-client sensor user interface in an integrated security network
US10127801B2 (en) 2005-03-16 2018-11-13 Icontrol Networks, Inc. Integrated security system with parallel processing architecture
US11113950B2 (en) 2005-03-16 2021-09-07 Icontrol Networks, Inc. Gateway integrated with premises security system
US11367340B2 (en) 2005-03-16 2022-06-21 Icontrol Networks, Inc. Premise management systems and methods
US11700142B2 (en) 2005-03-16 2023-07-11 Icontrol Networks, Inc. Security network integrating security system and network devices
US10785319B2 (en) 2006-06-12 2020-09-22 Icontrol Networks, Inc. IP device discovery systems and methods
US10616244B2 (en) 2006-06-12 2020-04-07 Icontrol Networks, Inc. Activation of gateway device
US11418518B2 (en) 2006-06-12 2022-08-16 Icontrol Networks, Inc. Activation of gateway device
US10225314B2 (en) 2007-01-24 2019-03-05 Icontrol Networks, Inc. Methods and systems for improved system performance
US10142392B2 (en) 2007-01-24 2018-11-27 Icontrol Networks, Inc. Methods and systems for improved system performance
US11418572B2 (en) 2007-01-24 2022-08-16 Icontrol Networks, Inc. Methods and systems for improved system performance
US11412027B2 (en) 2007-01-24 2022-08-09 Icontrol Networks, Inc. Methods and systems for data communication
US11706279B2 (en) 2007-01-24 2023-07-18 Icontrol Networks, Inc. Methods and systems for data communication
US11194320B2 (en) 2007-02-28 2021-12-07 Icontrol Networks, Inc. Method and system for managing communication connectivity
US10747216B2 (en) 2007-02-28 2020-08-18 Icontrol Networks, Inc. Method and system for communicating with and controlling an alarm system from a remote server
US11809174B2 (en) 2007-02-28 2023-11-07 Icontrol Networks, Inc. Method and system for managing communication connectivity
US10657794B1 (en) 2007-02-28 2020-05-19 Icontrol Networks, Inc. Security, monitoring and automation controller access and use of legacy security control panel information
US10672254B2 (en) 2007-04-23 2020-06-02 Icontrol Networks, Inc. Method and system for providing alternate network access
US10140840B2 (en) 2007-04-23 2018-11-27 Icontrol Networks, Inc. Method and system for providing alternate network access
US11663902B2 (en) 2007-04-23 2023-05-30 Icontrol Networks, Inc. Method and system for providing alternate network access
US11132888B2 (en) 2007-04-23 2021-09-28 Icontrol Networks, Inc. Method and system for providing alternate network access
US10616075B2 (en) 2007-06-12 2020-04-07 Icontrol Networks, Inc. Communication protocols in integrated systems
US11625161B2 (en) 2007-06-12 2023-04-11 Icontrol Networks, Inc. Control system user interface
US10666523B2 (en) 2007-06-12 2020-05-26 Icontrol Networks, Inc. Communication protocols in integrated systems
US11423756B2 (en) 2007-06-12 2022-08-23 Icontrol Networks, Inc. Communication protocols in integrated systems
US10365810B2 (en) 2007-06-12 2019-07-30 Icontrol Networks, Inc. Control system user interface
US10313303B2 (en) 2007-06-12 2019-06-04 Icontrol Networks, Inc. Forming a security network including integrated security system components and network devices
US11894986B2 (en) 2007-06-12 2024-02-06 Icontrol Networks, Inc. Communication protocols in integrated systems
US11212192B2 (en) 2007-06-12 2021-12-28 Icontrol Networks, Inc. Communication protocols in integrated systems
US11218878B2 (en) 2007-06-12 2022-01-04 Icontrol Networks, Inc. Communication protocols in integrated systems
US11722896B2 (en) 2007-06-12 2023-08-08 Icontrol Networks, Inc. Communication protocols in integrated systems
US10051078B2 (en) 2007-06-12 2018-08-14 Icontrol Networks, Inc. WiFi-to-serial encapsulation in systems
US10079839B1 (en) 2007-06-12 2018-09-18 Icontrol Networks, Inc. Activation of gateway device
US11237714B2 (en) 2007-06-12 2022-02-01 Control Networks, Inc. Control system user interface
US10339791B2 (en) * 2007-06-12 2019-07-02 Icontrol Networks, Inc. Security network integrated with premise security system
US10382452B1 (en) 2007-06-12 2019-08-13 Icontrol Networks, Inc. Communication protocols in integrated systems
US11646907B2 (en) 2007-06-12 2023-05-09 Icontrol Networks, Inc. Communication protocols in integrated systems
US11632308B2 (en) 2007-06-12 2023-04-18 Icontrol Networks, Inc. Communication protocols in integrated systems
US20140172957A1 (en) * 2007-06-12 2014-06-19 Marc Baum Security network integrated with premise security system
US10523689B2 (en) 2007-06-12 2019-12-31 Icontrol Networks, Inc. Communication protocols over internet protocol (IP) networks
US10142394B2 (en) 2007-06-12 2018-11-27 Icontrol Networks, Inc. Generating risk profile using data of home monitoring and security system
US11316753B2 (en) 2007-06-12 2022-04-26 Icontrol Networks, Inc. Communication protocols in integrated systems
US11089122B2 (en) 2007-06-12 2021-08-10 Icontrol Networks, Inc. Controlling data routing among networks
US11611568B2 (en) 2007-06-12 2023-03-21 Icontrol Networks, Inc. Communication protocols over internet protocol (IP) networks
US11601810B2 (en) 2007-06-12 2023-03-07 Icontrol Networks, Inc. Communication protocols in integrated systems
US10200504B2 (en) 2007-06-12 2019-02-05 Icontrol Networks, Inc. Communication protocols over internet protocol (IP) networks
US10498830B2 (en) 2007-06-12 2019-12-03 Icontrol Networks, Inc. Wi-Fi-to-serial encapsulation in systems
US10444964B2 (en) 2007-06-12 2019-10-15 Icontrol Networks, Inc. Control system user interface
US10423309B2 (en) 2007-06-12 2019-09-24 Icontrol Networks, Inc. Device integration framework
US11582065B2 (en) 2007-06-12 2023-02-14 Icontrol Networks, Inc. Systems and methods for device communication
US10237237B2 (en) 2007-06-12 2019-03-19 Icontrol Networks, Inc. Communication protocols in integrated systems
US10389736B2 (en) 2007-06-12 2019-08-20 Icontrol Networks, Inc. Communication protocols in integrated systems
US11815969B2 (en) 2007-08-10 2023-11-14 Icontrol Networks, Inc. Integrated security system with parallel processing architecture
US11831462B2 (en) 2007-08-24 2023-11-28 Icontrol Networks, Inc. Controlling data routing in premises management systems
US11916928B2 (en) 2008-01-24 2024-02-27 Icontrol Networks, Inc. Communication protocols over internet protocol (IP) networks
US11816323B2 (en) 2008-06-25 2023-11-14 Icontrol Networks, Inc. Automation system user interface
US11711234B2 (en) 2008-08-11 2023-07-25 Icontrol Networks, Inc. Integrated cloud system for premises automation
US11758026B2 (en) 2008-08-11 2023-09-12 Icontrol Networks, Inc. Virtual device systems and methods
US11190578B2 (en) 2008-08-11 2021-11-30 Icontrol Networks, Inc. Integrated cloud system with lightweight gateway for premises automation
US11792036B2 (en) 2008-08-11 2023-10-17 Icontrol Networks, Inc. Mobile premises automation platform
US11729255B2 (en) 2008-08-11 2023-08-15 Icontrol Networks, Inc. Integrated cloud system with lightweight gateway for premises automation
US11962672B2 (en) 2008-08-11 2024-04-16 Icontrol Networks, Inc. Virtual device systems and methods
US11258625B2 (en) 2008-08-11 2022-02-22 Icontrol Networks, Inc. Mobile premises automation platform
US10530839B2 (en) 2008-08-11 2020-01-07 Icontrol Networks, Inc. Integrated cloud system with lightweight gateway for premises automation
US11641391B2 (en) 2008-08-11 2023-05-02 Icontrol Networks Inc. Integrated cloud system with lightweight gateway for premises automation
US11316958B2 (en) 2008-08-11 2022-04-26 Icontrol Networks, Inc. Virtual device systems and methods
US11368327B2 (en) 2008-08-11 2022-06-21 Icontrol Networks, Inc. Integrated cloud system for premises automation
US11616659B2 (en) 2008-08-11 2023-03-28 Icontrol Networks, Inc. Integrated cloud system for premises automation
US10522026B2 (en) 2008-08-11 2019-12-31 Icontrol Networks, Inc. Automation system user interface with three-dimensional display
US20160274759A1 (en) 2008-08-25 2016-09-22 Paul J. Dawes Security system with networked touchscreen and gateway
US10375253B2 (en) 2008-08-25 2019-08-06 Icontrol Networks, Inc. Security system with networked touchscreen and gateway
US11856502B2 (en) 2009-04-30 2023-12-26 Icontrol Networks, Inc. Method, system and apparatus for automated inventory reporting of security, monitoring and automation hardware and software at customer premises
US11665617B2 (en) 2009-04-30 2023-05-30 Icontrol Networks, Inc. Server-based notification of alarm event subsequent to communication failure with armed security system
US10275999B2 (en) 2009-04-30 2019-04-30 Icontrol Networks, Inc. Server-based notification of alarm event subsequent to communication failure with armed security system
US10332363B2 (en) 2009-04-30 2019-06-25 Icontrol Networks, Inc. Controller and interface for home security, monitoring and automation having customizable audio alerts for SMA events
US11284331B2 (en) 2009-04-30 2022-03-22 Icontrol Networks, Inc. Server-based notification of alarm event subsequent to communication failure with armed security system
US10237806B2 (en) 2009-04-30 2019-03-19 Icontrol Networks, Inc. Activation of a home automation controller
US11356926B2 (en) 2009-04-30 2022-06-07 Icontrol Networks, Inc. Hardware configurable security, monitoring and automation controller having modular communication protocol interfaces
US11223998B2 (en) 2009-04-30 2022-01-11 Icontrol Networks, Inc. Security, monitoring and automation controller access and use of legacy security control panel information
US11553399B2 (en) 2009-04-30 2023-01-10 Icontrol Networks, Inc. Custom content for premises management
US10674428B2 (en) 2009-04-30 2020-06-02 Icontrol Networks, Inc. Hardware configurable security, monitoring and automation controller having modular communication protocol interfaces
US11601865B2 (en) 2009-04-30 2023-03-07 Icontrol Networks, Inc. Server-based notification of alarm event subsequent to communication failure with armed security system
US10813034B2 (en) 2009-04-30 2020-10-20 Icontrol Networks, Inc. Method, system and apparatus for management of applications for an SMA controller
US11129084B2 (en) 2009-04-30 2021-09-21 Icontrol Networks, Inc. Notification of event subsequent to communication failure with security system
US11778534B2 (en) 2009-04-30 2023-10-03 Icontrol Networks, Inc. Hardware configurable security, monitoring and automation controller having modular communication protocol interfaces
US9449482B2 (en) 2010-07-14 2016-09-20 Honeywell International Inc. Method and apparatus for activating and deactivating video cameras in a security system
EP2407944A1 (en) * 2010-07-14 2012-01-18 Honeywell International, Inc. Method and apparatus for activating and deactivating video cameras in a security system
ES2400759A1 (en) * 2010-09-06 2013-04-12 Enrique Caruncho Torga Video surveillance team (Machine-translation by Google Translate, not legally binding)
US11398147B2 (en) 2010-09-28 2022-07-26 Icontrol Networks, Inc. Method, system and apparatus for automated reporting of account and sensor zone information to a central station
US11900790B2 (en) 2010-09-28 2024-02-13 Icontrol Networks, Inc. Method, system and apparatus for automated reporting of account and sensor zone information to a central station
US10062273B2 (en) 2010-09-28 2018-08-28 Icontrol Networks, Inc. Integrated security system with parallel processing architecture
US10127802B2 (en) 2010-09-28 2018-11-13 Icontrol Networks, Inc. Integrated security system with parallel processing architecture
US10223903B2 (en) 2010-09-28 2019-03-05 Icontrol Networks, Inc. Integrated security system with parallel processing architecture
US11750414B2 (en) 2010-12-16 2023-09-05 Icontrol Networks, Inc. Bidirectional security sensor communication for a premises security system
US10741057B2 (en) 2010-12-17 2020-08-11 Icontrol Networks, Inc. Method and system for processing security event data
US10078958B2 (en) 2010-12-17 2018-09-18 Icontrol Networks, Inc. Method and system for logging security event data
US11341840B2 (en) 2010-12-17 2022-05-24 Icontrol Networks, Inc. Method and system for processing security event data
US11240059B2 (en) 2010-12-20 2022-02-01 Icontrol Networks, Inc. Defining and implementing sensor triggered response rules
US8094026B1 (en) 2011-05-02 2012-01-10 Robert M Green Organized retail crime detection security system and method
EP2908514A4 (en) * 2012-10-12 2015-11-04 Zte Corp Intelligent monitoring terminal and video monitoring method
US20150237313A1 (en) * 2012-10-12 2015-08-20 Zte Corporation Intelligent monitoring terminal and video monitoring method
DE102013017184B4 (en) 2012-10-18 2022-01-13 Heinz-Peter Weiland Alarm system with multiple criteria sensors to detect theft and vandalism of vehicles and moving or fixed parts
US10348575B2 (en) 2013-06-27 2019-07-09 Icontrol Networks, Inc. Control system user interface
US11296950B2 (en) 2013-06-27 2022-04-05 Icontrol Networks, Inc. Control system user interface
US11146637B2 (en) 2014-03-03 2021-10-12 Icontrol Networks, Inc. Media content management
US11943301B2 (en) 2014-03-03 2024-03-26 Icontrol Networks, Inc. Media content management
US11405463B2 (en) 2014-03-03 2022-08-02 Icontrol Networks, Inc. Media content management
CN104408894A (en) * 2014-07-01 2015-03-11 唐路 Alarm system and alarm method thereof
WO2018027498A1 (en) * 2016-08-08 2018-02-15 刘文婷 Home alarm device capable of remote monitoring
WO2020085894A1 (en) * 2018-10-23 2020-04-30 Rocha Cortez Douglas Rene Portable defensive protective alarm device with gsm device

Also Published As

Publication number Publication date
ZA200709538B (en) 2008-05-28
GB2449584A (en) 2008-11-26
GB0815477D0 (en) 2008-10-01

Similar Documents

Publication Publication Date Title
WO2008056320A1 (en) A security system
EP2011093B1 (en) Security monitoring with programmable mapping
US9189934B2 (en) Security monitoring with programmable mapping
US20200250964A1 (en) Premises Management Systems
CA2626045C (en) Security system reporting events through e-mail messages
US20060181401A1 (en) Vacation mode security system and method
US20060271695A1 (en) System for remote secured operation, monitoring and control of security and other types of events
GB2325548A (en) Security alarm systems
EP1803305A2 (en) Network communication for a security system
US20040036596A1 (en) Security system and methods
US20220215728A1 (en) Security system communicator and keypad device
GB2363028A (en) Surveillance system with remote receiving unit.
WO2022109104A2 (en) System and method for property monitoring
KR200188880Y1 (en) Security system for video transmission
JP2005208878A (en) Security system
KR101594053B1 (en) Security System Through Convergence Solutions
JP2005182471A (en) Central processing unit for monitoring device and its program
EP2439709B1 (en) Alarm system power supply housing has integrated signal transmitting means
RU2303289C1 (en) System for individual protection of real estate
WO2022243359A1 (en) Security installations and methods
JP3679761B2 (en) Remote management system
WO2024068032A1 (en) Security installations and methods
WO2024068031A1 (en) Method and apparatus for authentication in a security system
RU99639U1 (en) AUTONOMOUS GSM SIGNALING SYSTEM
JP2004140770A (en) Trespass report instrument capable of transmitting e-mail with picture

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 07826982

Country of ref document: EP

Kind code of ref document: A1

ENP Entry into the national phase

Ref document number: 0815477

Country of ref document: GB

Kind code of ref document: A

Free format text: PCT FILING DATE = 20071106

WWE Wipo information: entry into national phase

Ref document number: 0815477.5

Country of ref document: GB

Ref document number: 815477

Country of ref document: GB

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 07826982

Country of ref document: EP

Kind code of ref document: A1