US20120257615A1 - Self-Contained Security System Including Voice and Video Calls Via the Internet - Google Patents
Self-Contained Security System Including Voice and Video Calls Via the Internet Download PDFInfo
- Publication number
- US20120257615A1 US20120257615A1 US13/079,831 US201113079831A US2012257615A1 US 20120257615 A1 US20120257615 A1 US 20120257615A1 US 201113079831 A US201113079831 A US 201113079831A US 2012257615 A1 US2012257615 A1 US 2012257615A1
- Authority
- US
- United States
- Prior art keywords
- control panel
- user interface
- security system
- portable
- connection
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
Images
Classifications
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B13/00—Burglar, theft or intruder alarms
- G08B13/18—Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength
- G08B13/189—Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems
- G08B13/194—Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems
- G08B13/196—Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
- G08B13/19695—Arrangements wherein non-video detectors start video recording or forwarding but do not generate an alarm themselves
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/01—Input arrangements or combined input and output arrangements for interaction between user and computer
- G06F3/048—Interaction techniques based on graphical user interfaces [GUI]
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B13/00—Burglar, theft or intruder alarms
- G08B13/18—Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength
- G08B13/189—Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems
- G08B13/194—Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems
- G08B13/196—Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
- G08B13/19697—Arrangements wherein non-video detectors generate an alarm themselves
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B25/00—Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems
- G08B25/01—Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems characterised by the transmission medium
- G08B25/014—Alarm signalling to a central station with two-way communication, e.g. with signalling back
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B25/00—Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems
- G08B25/01—Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems characterised by the transmission medium
- G08B25/08—Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems characterised by the transmission medium using communication transmission lines
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L65/00—Network arrangements, protocols or services for supporting real-time applications in data packet communication
- H04L65/1066—Session management
- H04L65/1069—Session establishment or de-establishment
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M11/00—Telephonic communication systems specially adapted for combination with other electrical systems
- H04M11/04—Telephonic communication systems specially adapted for combination with other electrical systems with alarm systems, e.g. fire, police or burglar alarm systems
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N7/00—Television systems
- H04N7/18—Closed-circuit television [CCTV] systems, i.e. systems in which the video signal is not broadcast
- H04N7/183—Closed-circuit television [CCTV] systems, i.e. systems in which the video signal is not broadcast for receiving images from a single remote source
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B25/00—Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems
- G08B25/01—Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems characterised by the transmission medium
- G08B25/10—Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems characterised by the transmission medium using wireless transmission systems
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B25/00—Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems
- G08B25/14—Central alarm receiver or annunciator arrangements
Definitions
- the field relates to security systems and more particularly to communication through security systems.
- Security systems for homes are generally known. Such systems are typically based upon the use of a number of intrusion sensors distributed throughout the home that are, in turn, connected to a control panel.
- the control panel monitors the sensors for activation and upon detecting activation of one of the sensors, activates a local audible alarm.
- the control panel may also transmit an alarm message to a central monitoring station.
- Associated with the control panel may be a keypad or touchpad and display (user interface) used to control the functionality of the control panel.
- a controller within the security panel monitors the touchpad for arm and disarm commands and displays a status indicator on the display.
- a user may be required to enter a password or other identifier in order change the status of the system.
- the controller will access a local connection to a public communication network and send the message to a central monitoring station.
- the message (e.g., an alarm message) would include a communication system identifier of the central monitoring station as well as an identifier of the security system. An identifier of the sensor or zone from which the alarm originated is also typically included within the alarm message.
- POTS plain old telephone service
- FIG. 1 is a simplified block diagram of a security system shown generally in accordance with an illustrated embodiment.
- FIG. 1 is a simplified block diagram of an alarm system 10 shown generally in accordance with an illustrated embodiment. Included within the security system 10 may be a control panel 12 coupled to a number of intrusion sensors 18 , 20 within a secured area (e.g., a home) 14 .
- the intrusion sensors 18 , 20 may be any of a number of different types of devices (e.g., door or window switches, PIR motion detectors, video motion detectors, etc.) that detect intruders.
- the control panel 12 may be portable with a user interface 16 built into a housing of the control panel 12 .
- the control panel 12 may be stationary (i.e., fixed in location by screws, bolts, etc.) and coupled to a portable user interface 18 .
- control panel 12 may monitor the intrusion detectors 18 , 20 for activation by an intruder. In the event of activation by an intruder, the control panel 12 may compose and send an alarm message to a central monitoring station 22 . The central monitoring station 22 may respond to the alarm message by dispatching the police to the home 14 .
- control panel 12 may be a number of processors 24 , 26 programmed with one or more software programs 28 , 30 loaded from a non-transitory computer readable medium (memory) 32 . It should be noted in this regard that reference made below to any step or operation performed by the security system 10 also refers to the respective programmed processor 24 , 26 that performed that step or operation.
- each of the user interfaces 16 , 18 may be a keypad (touchpad) or keyboard 34 and a display 36 . While shown separately in FIG. 1 , the keyboard 34 and display 36 may be combined into a single interactive display device.
- the display 36 may be used to display to a user (homeowner), the current status of the security system 10 . In the event of an alarm, the display 36 may also an identifier of any activated sensors 18 , 20 .
- the keyboard 34 may be used by the homeowner to arm and disarm the system 10 .
- a status processor 24 , 26 within the panel 12 may monitor the keyboard 34 for information from the user. If the user should enter a personal identification number (PIN) and activate a button labeled “ARMED AWAY”, then the system 10 may enter an armed state. Similarly, if the user should enter a personal identification number (PIN) and activate a button labeled “ALARM OFF”, then the system 10 may enter a disarmed state.
- PIN personal identification number
- AARM OFF a button labeled “ALARM OFF”
- the control panel 12 may be coupled to the intrusion sensors 18 , 20 and to the central monitoring station 22 via either a wired or wireless connection. If connected wirelessly, the control panel 12 may be provided with a radio frequency (RF) transceiver (e.g., WiFi, a GSM transceiver, etc.) 38 to provide complete portability within the secured area 14 .
- RF radio frequency
- the RF transceiver 38 may operate under a first transmission format (e.g., Bluetooth) to communicate with the intrusion sensors 18 , 20 and a second transmission format (e.g., a control channel of a local cellular base station) to communicate with the central monitoring station 22 through the Internet 46 .
- a first transmission format e.g., Bluetooth
- a second transmission format e.g., a control channel of a local cellular base station
- the control panel 12 may also be coupled to the intrusion sensors 18 , 20 via a wired connection to provide a tethered portability within the secured area 14 .
- the control panel 12 and intrusion sensors 18 , 20 may each plug into and exchange messages via a home communication system (e.g., the Ethernet, VPLEX, twisted pair of wires, etc.) via an appropriate plug and socket arrangement (e.g., RJ45 plugs and receptacles).
- the control panel 12 may communicate with the central monitoring station through the local communication system, a broadband connection 52 and the Internet 46 .
- control panel 12 is portable, the control panel 12 is provided with the capability of establishing a voice and video or simply a voice connection with virtually any other party 48 having an Internet connection or who is connected to the public switch telephone network (PSTN).
- PSTN public switch telephone network
- the control panel 12 is provided with a VoIP processor 24 , 26 controlled through the user interface 16 physically located on the housing of the control panel 12 .
- one or more externally accessible VOICE/VIDEO CALL pushbuttons 40 is provided on the control panel 12 that may be activated to make or receive voice or video calls.
- a video camera 42 is also provided that captures images in the secured area 14 directly adjacent the touch pad 16 .
- a voice transducer e.g., a microphone and speaker combination 44 is provided for exchanging sound between the user and the other party.
- the homeowner may simply activate the VOICE CALL pushbutton 40 and enter a destination (called party) telephone number through the keyboard 34 .
- the VoIP processor 24 , 26 may detect activation of the VOICE CALL pushbutton 40 , receive the telephone number from the keyboard 34 and proceed to set of a voice connection with the other party 48 using an appropriate Internet VoIP resource (e.g., AOL, YAHOO, GOOGLE, SKYPE, etc.).
- an appropriate Internet VoIP resource e.g., AOL, YAHOO, GOOGLE, SKYPE, etc.
- the user may converse with the other party 48 in a conventional manner.
- the user may simply activate the pushbutton 40 a second time to terminate the connection.
- Incoming voice calls may be handled in a similar manner.
- the user simply registers his/her system identifier (e.g., telephone number, IP address, etc.) with the Internet VoIP resource and calls are routed appropriately.
- the user simply activates the pushbutton 40 to accept calls.
- the main advantage of this feature is that a user doesn't have to be at their PC.
- a video and voice connection may be established in a similar manner.
- the user may activate a VOICE AND VIDEO pushbutton 40 and enter a destination identifier (e.g., IP address, telephone number, etc.) of the other party 48 through the keyboard 34 .
- a voice and video processor 24 , 26 may detect activation of the pushbutton 40 and destination identifier and set up the voice and video connection in a known manner.
- the voice and video connection may also operate in a conventional manner. Incoming voice and video calls may be handled in conventional manner. At the end of the voice and video call, the user may simply activate the pushbutton 40 to terminate the connection.
- the ability of the control panel 12 to establish VoIP or voice and video connections with other parties 48 offer functionality not available by simply combining a voice and video conferencing device with a security system.
- the availability of the camera 42 and voice transducer 44 within the portable control panel 12 also allows an alarm processor 24 , 26 to activate the camera 42 and to record video directly proximate the control panel 12 in cases where the system 10 is armed and an intrusion sensor 18 , 20 indicates to an alarm processor 24 , 26 that an intruder is present within the secured area 14 .
- This allows images of the intruder to be captured and saved in memory 32 for later analysis or sent to the central monitoring station 22 in real time as the intrusion is occurring.
- the camera 42 may be used by the central station in the event of an alarm to verify that a person in the secured area 14 is an authorized user or homeowner.
- the central station 22 may be provided with a pushbutton (similar to the pushbutton 40 ) that activates a voice and video connection between the secured area 14 and central station 22 .
- the camera 42 and voice transducer 44 on the portable control panel 12 allows a situation to be evaluated in cases where an ambush alarm on the keyboard 34 of the security system 10 is activated.
- personnel at the central monitoring station 22 may activate the camera 42 and/or voice transducer 44 via a monitoring processor 24 , 26 based upon instructions sent from the central monitoring station 22 .
- This ability allows security personnel to use the user interface 16 as an intercom, to identify hostage situations within the home 14 or otherwise identify a situation where the alarm has been activated accidentally (e.g., by children playing with keyboard 34 ).
- a non-portable control panel 12 may be provided where the control panel 12 is located in some secure space (e.g., a closet or basement) and where the security system 10 is controlled via a portable user interface 18 .
- the non-portable control panel 12 may be fixed or otherwise attached within the secure space by some appropriate mechanism (e.g., screws, bolts, locks, etc.).
- the user interface 18 includes the touchpad 34 , the display 36 , the camera 42 and the voice transducer 44 . This may be important in order to prevent an intruder from disabling the security system 10 by destroying the control panel 12 .
- the portable user interface 18 may include a wired or wireless connection to the control panel 12 . Similar to the portable control panel 12 (discussed above), the portable user interface 18 may be coupled to the control panel 12 via a wireless link 50 using wireless transceiver 38 (e.g., Bluetooth, WiFi, etc.) or if wired via a plug and connector arrangement (e.g., RJ45 connectors).
- the portable interface 18 in other aspects, may operate in a similar manner to the portable control panel 12 .
Landscapes
- Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Physics & Mathematics (AREA)
- Multimedia (AREA)
- Business, Economics & Management (AREA)
- Signal Processing (AREA)
- Emergency Management (AREA)
- General Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- General Business, Economics & Management (AREA)
- Human Computer Interaction (AREA)
- Alarm Systems (AREA)
- Telephonic Communication Services (AREA)
Abstract
A security system is provided. The security system includes a control panel located within a secured space, a plurality of sensors coupled to the control panel that detect security events within the secured space, a user interface within the secured area coupled to the control panel, a camera located in the user interface that collects video images in the secured space surrounding the user interface upon activation of one of the plurality of sensors, a sound transducer located in the user interface, a programmed processor within one of the user interface and the control panel that supports VoIP calls between a called or calling party and the user interface and a control button on the user interface that activates a VoIP connection with a called or calling party through the user interface and control panel.
Description
- The field relates to security systems and more particularly to communication through security systems.
- Security systems for homes are generally known. Such systems are typically based upon the use of a number of intrusion sensors distributed throughout the home that are, in turn, connected to a control panel.
- The control panel monitors the sensors for activation and upon detecting activation of one of the sensors, activates a local audible alarm. The control panel may also transmit an alarm message to a central monitoring station.
- Associated with the control panel may be a keypad or touchpad and display (user interface) used to control the functionality of the control panel. In this regard, a controller within the security panel monitors the touchpad for arm and disarm commands and displays a status indicator on the display. In this regard, a user may be required to enter a password or other identifier in order change the status of the system.
- In the event of a change in status, the controller will access a local connection to a public communication network and send the message to a central monitoring station. The message (e.g., an alarm message) would include a communication system identifier of the central monitoring station as well as an identifier of the security system. An identifier of the sensor or zone from which the alarm originated is also typically included within the alarm message.
- While the controllers of some security systems communicate with central monitoring stations through plain old telephone service (POTS) lines, other newer systems are connected through the Internet. Because of the importance of such systems, a need exists for added flexibility in the way user interfaces are used.
-
FIG. 1 is a simplified block diagram of a security system shown generally in accordance with an illustrated embodiment. -
FIG. 1 is a simplified block diagram of analarm system 10 shown generally in accordance with an illustrated embodiment. Included within thesecurity system 10 may be acontrol panel 12 coupled to a number of 18, 20 within a secured area (e.g., a home) 14. Theintrusion sensors 18, 20 may be any of a number of different types of devices (e.g., door or window switches, PIR motion detectors, video motion detectors, etc.) that detect intruders.intrusion sensors - The
control panel 12 may be portable with auser interface 16 built into a housing of thecontrol panel 12. Alternatively, thecontrol panel 12 may be stationary (i.e., fixed in location by screws, bolts, etc.) and coupled to aportable user interface 18. - In use, the
control panel 12 may monitor the 18, 20 for activation by an intruder. In the event of activation by an intruder, theintrusion detectors control panel 12 may compose and send an alarm message to acentral monitoring station 22. Thecentral monitoring station 22 may respond to the alarm message by dispatching the police to thehome 14. - Included within the
control panel 12 may be a number of 24, 26 programmed with one orprocessors 28, 30 loaded from a non-transitory computer readable medium (memory) 32. It should be noted in this regard that reference made below to any step or operation performed by themore software programs security system 10 also refers to the respective programmed 24, 26 that performed that step or operation.processor - Included within each of the
16, 18 may be a keypad (touchpad) oruser interfaces keyboard 34 and adisplay 36. While shown separately inFIG. 1 , thekeyboard 34 anddisplay 36 may be combined into a single interactive display device. - The
display 36 may be used to display to a user (homeowner), the current status of thesecurity system 10. In the event of an alarm, thedisplay 36 may also an identifier of any 18, 20.activated sensors - The
keyboard 34 may be used by the homeowner to arm and disarm thesystem 10. In this regard, a 24, 26 within thestatus processor panel 12 may monitor thekeyboard 34 for information from the user. If the user should enter a personal identification number (PIN) and activate a button labeled “ARMED AWAY”, then thesystem 10 may enter an armed state. Similarly, if the user should enter a personal identification number (PIN) and activate a button labeled “ALARM OFF”, then thesystem 10 may enter a disarmed state. - The
control panel 12 may be coupled to the 18, 20 and to theintrusion sensors central monitoring station 22 via either a wired or wireless connection. If connected wirelessly, thecontrol panel 12 may be provided with a radio frequency (RF) transceiver (e.g., WiFi, a GSM transceiver, etc.) 38 to provide complete portability within the securedarea 14. In this regard, theRF transceiver 38 may operate under a first transmission format (e.g., Bluetooth) to communicate with the 18, 20 and a second transmission format (e.g., a control channel of a local cellular base station) to communicate with theintrusion sensors central monitoring station 22 through the Internet 46. - The
control panel 12 may also be coupled to the 18, 20 via a wired connection to provide a tethered portability within the securedintrusion sensors area 14. In this case, thecontrol panel 12 and 18, 20 may each plug into and exchange messages via a home communication system (e.g., the Ethernet, VPLEX, twisted pair of wires, etc.) via an appropriate plug and socket arrangement (e.g., RJ45 plugs and receptacles). As above, theintrusion sensors control panel 12 may communicate with the central monitoring station through the local communication system, abroadband connection 52 and the Internet 46. - Where the
control panel 12 is portable, thecontrol panel 12 is provided with the capability of establishing a voice and video or simply a voice connection with virtually anyother party 48 having an Internet connection or who is connected to the public switch telephone network (PSTN). In this regard, thecontrol panel 12 is provided with a 24, 26 controlled through theVoIP processor user interface 16 physically located on the housing of thecontrol panel 12. In this regard, one or more externally accessible VOICE/VIDEO CALL pushbuttons 40 is provided on thecontrol panel 12 that may be activated to make or receive voice or video calls. - A
video camera 42 is also provided that captures images in the securedarea 14 directly adjacent thetouch pad 16. Similarly, a voice transducer (e.g., a microphone and speaker combination) 44 is provided for exchanging sound between the user and the other party. - To make a voice call, the homeowner may simply activate the VOICE CALL
pushbutton 40 and enter a destination (called party) telephone number through thekeyboard 34. The 24, 26 may detect activation of the VOICEVoIP processor CALL pushbutton 40, receive the telephone number from thekeyboard 34 and proceed to set of a voice connection with theother party 48 using an appropriate Internet VoIP resource (e.g., AOL, YAHOO, GOOGLE, SKYPE, etc.). - Once the voice connection has been set up, the user may converse with the
other party 48 in a conventional manner. At the end of the conversation, the user may simply activate the pushbutton 40 a second time to terminate the connection. - Incoming voice calls may be handled in a similar manner. In this case, the user simply registers his/her system identifier (e.g., telephone number, IP address, etc.) with the Internet VoIP resource and calls are routed appropriately. As VoIP calls arrive through the
panel 12, the user simply activates thepushbutton 40 to accept calls. The main advantage of this feature is that a user doesn't have to be at their PC. - A video and voice connection may be established in a similar manner. In this case, the user may activate a VOICE AND
VIDEO pushbutton 40 and enter a destination identifier (e.g., IP address, telephone number, etc.) of theother party 48 through thekeyboard 34. A voice and 24, 26 may detect activation of thevideo processor pushbutton 40 and destination identifier and set up the voice and video connection in a known manner. Once established, the voice and video connection may also operate in a conventional manner. Incoming voice and video calls may be handled in conventional manner. At the end of the voice and video call, the user may simply activate thepushbutton 40 to terminate the connection. - The ability of the
control panel 12 to establish VoIP or voice and video connections withother parties 48 offer functionality not available by simply combining a voice and video conferencing device with a security system. For example, the availability of thecamera 42 andvoice transducer 44 within theportable control panel 12 also allows an 24, 26 to activate thealarm processor camera 42 and to record video directly proximate thecontrol panel 12 in cases where thesystem 10 is armed and an 18, 20 indicates to anintrusion sensor 24, 26 that an intruder is present within the securedalarm processor area 14. This allows images of the intruder to be captured and saved inmemory 32 for later analysis or sent to thecentral monitoring station 22 in real time as the intrusion is occurring. Alternatively, thecamera 42 may be used by the central station in the event of an alarm to verify that a person in the securedarea 14 is an authorized user or homeowner. In this case, thecentral station 22 may be provided with a pushbutton (similar to the pushbutton 40) that activates a voice and video connection between thesecured area 14 andcentral station 22. - Moreover, the
camera 42 andvoice transducer 44 on theportable control panel 12 allows a situation to be evaluated in cases where an ambush alarm on thekeyboard 34 of thesecurity system 10 is activated. In this case, personnel at thecentral monitoring station 22 may activate thecamera 42 and/orvoice transducer 44 via a 24, 26 based upon instructions sent from themonitoring processor central monitoring station 22. This ability allows security personnel to use theuser interface 16 as an intercom, to identify hostage situations within thehome 14 or otherwise identify a situation where the alarm has been activated accidentally (e.g., by children playing with keyboard 34). Other situations may include recognizing that one of the people present has a knife (hostage situation), that all the faces are unfamiliar (probable intruders), or that the faces are familiar (match photo in database). When the faces are familiar, security personnel at thecentral station 22 may assume that the alarm has been activated inadvertently and take less aggressive steps (e.g., call or send a message to the homeowner notifying the homeowner of the activation). - In an alternate embodiment, a
non-portable control panel 12 may be provided where thecontrol panel 12 is located in some secure space (e.g., a closet or basement) and where thesecurity system 10 is controlled via aportable user interface 18. Thenon-portable control panel 12 may be fixed or otherwise attached within the secure space by some appropriate mechanism (e.g., screws, bolts, locks, etc.). In this embodiment, theuser interface 18 includes thetouchpad 34, thedisplay 36, thecamera 42 and thevoice transducer 44. This may be important in order to prevent an intruder from disabling thesecurity system 10 by destroying thecontrol panel 12. - In this case, the
portable user interface 18 may include a wired or wireless connection to thecontrol panel 12. Similar to the portable control panel 12 (discussed above), theportable user interface 18 may be coupled to thecontrol panel 12 via awireless link 50 using wireless transceiver 38 (e.g., Bluetooth, WiFi, etc.) or if wired via a plug and connector arrangement (e.g., RJ45 connectors). Theportable interface 18, in other aspects, may operate in a similar manner to theportable control panel 12. - Although a few embodiments have been described in detail above, other modifications are possible. For example, the logic flows depicted in the figures do not require the particular order shown, or sequential order, to achieve desirable results. Other steps may be provided, or steps may be eliminated, from the described flows, and other components may be added to, or removed from, the described systems. Other embodiments may be within the scope of the following claims.
Claims (21)
1. A security system comprising:
a control panel located within a secured space;
a plurality of sensors coupled to the control panel that detects security events within the secured space;
a portable user interface within the secured area coupled to the control panel;
a camera located in the user interface that collects video images in the secured space surrounding the user interface upon activation of one of the plurality of sensors;
a sound transducer located in the user interface;
a programmed processor within one of the user interface and the control panel that supports VoIP calls between a called or calling party and the user interface; and
a control button on the user interface that activates a VoIP connection with a called or calling party through the user interface and control panel.
2. The security system as in claim 1 further comprising the programmed processor forming a voice and video connection between the user interface and called or calling party.
3. The security system as in claim 1 wherein the portable user interface further comprises an integral portion of the control panel and where the user interface and control panel are integrated into a single portable unit.
4. The security system as in claim 3 further comprising a wireless link that connects the integrated portable user interface and control panel with the called or calling party through an Internet connection.
5. The security system as in claim 4 wherein the wireless connection further comprises WiFi.
6. The security system as in claim 1 wherein the control panel is non-portable and is fixed at a specific location within the secured space.
7. The security system as in claim 6 further comprising a wireless link that connects the portable user interface and non-portable control panel with the called or calling party through an Internet connection.
8. The security system as in claim 7 wherein the wireless connection further comprises WiFi.
9. A security system comprising:
a portable control panel;
a plurality of sensors coupled to the control panel that detects security events within a space secured by the portable control panel;
a touchpad located on the control panel;
a camera located in the control panel that collects video images in the secured space surrounding the control panel upon activation of one of the plurality of sensors;
a sound transducer located in the control panel;
a programmed processor within the control panel that performs VoIP calls using the camera and sound transducer; and
a button on the control panel that activates a VoIP connection with a called or calling party through the control panel.
10. The security system as in claim 9 further comprising a wireless link that couples the control panel to each of the plurality of intrusion sensors.
11. The security system as in claim 10 wherein the wireless link further comprises a Bluetooth transceiver.
12. The security system as in claim 9 further comprising a wireless link that couples the control panel to the called or calling party through an Internet connection.
13. The security system as in claim 12 further comprising a wired link where the wired link is an Ethernet connection.
14. The security system as in claim 12 wherein the wireless link further comprises a cellular connection.
15. The security system as in claim 9 wherein the key further comprises a first key that activates the VoIP connection and a second key that establishes a voice and video connection.
16. A security system comprising:
a non-portable portable control panel;
a plurality of sensors coupled to the control panel that detects security events within a space secured by the portable control panel;
a user interface;
a data link that couple the user interface to the control panel;
a camera located in the user interface that collects video images in the secured space surrounding the user interface upon activation of one of the plurality of sensors;
a sound transducer located in the user interface;
a programmed processor within one of the user interface and the control panel that performs VoIP calls using the camera and sound transducer; and
a key on the user interface that activates a VoIP connection with a called or calling party through the data link and control panel.
17. The security system as in claim 16 further comprising a voice and video processor within the control panel or user interface that establishes a voice and video conference in response to activation of the key.
18. The security system as in claim 16 wherein the data link further comprises WiFi.
19. The security system as in claim 16 further comprising a wired connection between the non-portable control panel and each of the intrusion sensors.
20. The security system as in claim 16 further comprising an Internet connection that couples the non-portable security panel to the called or calling party.
21. The security system as in claim 1 further comprising a pushbutton at the central monitoring station that activates a VoIP connection between the central station and protected premises through the user interface and control panel.
Priority Applications (2)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| US13/079,831 US20120257615A1 (en) | 2011-04-05 | 2011-04-05 | Self-Contained Security System Including Voice and Video Calls Via the Internet |
| US15/000,813 US11475745B2 (en) | 2011-04-05 | 2016-01-19 | Self-contained security system including voice and video calls via the internet |
Applications Claiming Priority (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| US13/079,831 US20120257615A1 (en) | 2011-04-05 | 2011-04-05 | Self-Contained Security System Including Voice and Video Calls Via the Internet |
Related Child Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| US15/000,813 Continuation US11475745B2 (en) | 2011-04-05 | 2016-01-19 | Self-contained security system including voice and video calls via the internet |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| US20120257615A1 true US20120257615A1 (en) | 2012-10-11 |
Family
ID=46966090
Family Applications (2)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| US13/079,831 Abandoned US20120257615A1 (en) | 2011-04-05 | 2011-04-05 | Self-Contained Security System Including Voice and Video Calls Via the Internet |
| US15/000,813 Active 2033-01-13 US11475745B2 (en) | 2011-04-05 | 2016-01-19 | Self-contained security system including voice and video calls via the internet |
Family Applications After (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| US15/000,813 Active 2033-01-13 US11475745B2 (en) | 2011-04-05 | 2016-01-19 | Self-contained security system including voice and video calls via the internet |
Country Status (1)
| Country | Link |
|---|---|
| US (2) | US20120257615A1 (en) |
Cited By (28)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| WO2015073443A1 (en) * | 2013-11-12 | 2015-05-21 | Jacobs Michael Jahangir | Security condition notification system |
| US20160189453A1 (en) * | 2014-03-12 | 2016-06-30 | August Home Inc. | Intellegent door lock system with automatic unlock |
| US20160189503A1 (en) * | 2013-03-15 | 2016-06-30 | August Home Inc. | Intelligent door lock system including intelligent security system with reduced latency |
| CN105825644A (en) * | 2015-01-27 | 2016-08-03 | 霍尼韦尔国际公司 | Integrated security system based on real-time location information of security guards in the premises |
| WO2017120022A1 (en) * | 2016-01-06 | 2017-07-13 | Vivint, Inc. | Home automation system-initiated calls |
| US9916746B2 (en) | 2013-03-15 | 2018-03-13 | August Home, Inc. | Security system coupled to a door lock system |
| WO2018200130A1 (en) * | 2017-04-25 | 2018-11-01 | Abode Systems, Inc. | On-demand monitoring |
| EP3503059A1 (en) * | 2017-12-21 | 2019-06-26 | Carrier Corporation | Integrated voice over ip communication in fire systems |
| US10339788B2 (en) * | 2015-03-12 | 2019-07-02 | Alarm.Com Incorporated | Providing internet access through a property monitoring system |
| US10382729B2 (en) | 2016-01-06 | 2019-08-13 | Vivint, Inc. | Home automation system-initiated calls |
| US10388094B2 (en) | 2013-03-15 | 2019-08-20 | August Home Inc. | Intelligent door lock system with notification to user regarding battery status |
| US10443266B2 (en) | 2013-03-15 | 2019-10-15 | August Home, Inc. | Intelligent door lock system with manual operation and push notification |
| US10691953B2 (en) | 2013-03-15 | 2020-06-23 | August Home, Inc. | Door lock system with one or more virtual fences |
| US10846957B2 (en) | 2013-03-15 | 2020-11-24 | August Home, Inc. | Wireless access control system and methods for intelligent door lock system |
| US10970983B2 (en) | 2015-06-04 | 2021-04-06 | August Home, Inc. | Intelligent door lock system with camera and motion detector |
| US11043055B2 (en) | 2013-03-15 | 2021-06-22 | August Home, Inc. | Door lock system with contact sensor |
| US11074792B2 (en) | 2013-11-12 | 2021-07-27 | Michael Jahangir Jacobs | Mental health, safety, and wellness support system |
| US11072945B2 (en) | 2013-03-15 | 2021-07-27 | August Home, Inc. | Video recording triggered by a smart lock device |
| US11352812B2 (en) | 2013-03-15 | 2022-06-07 | August Home, Inc. | Door lock system coupled to an image capture device |
| US11421445B2 (en) | 2013-03-15 | 2022-08-23 | August Home, Inc. | Smart lock device with near field communication |
| US11441332B2 (en) | 2013-03-15 | 2022-09-13 | August Home, Inc. | Mesh of cameras communicating with each other to follow a delivery agent within a dwelling |
| US11527121B2 (en) | 2013-03-15 | 2022-12-13 | August Home, Inc. | Door lock system with contact sensor |
| US11802422B2 (en) | 2013-03-15 | 2023-10-31 | August Home, Inc. | Video recording triggered by a smart lock device |
| US11959308B2 (en) | 2020-09-17 | 2024-04-16 | ASSA ABLOY Residential Group, Inc. | Magnetic sensor for lock position |
| US12067855B2 (en) | 2020-09-25 | 2024-08-20 | ASSA ABLOY Residential Group, Inc. | Door lock with magnetometers |
| US12347291B2 (en) * | 2021-02-19 | 2025-07-01 | Tyco Fire & Security Gmbh | Security / automation system control panel with removable back speaker |
| US12373540B2 (en) | 2021-02-19 | 2025-07-29 | Tyco Fire & Security Gmbh | Facial recognition by a security / automation system control panel |
| US12387591B2 (en) | 2021-02-19 | 2025-08-12 | Tyco Fire & Security Gmbh | Security / automation system control panel with short range communication disarming |
Citations (2)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20060209857A1 (en) * | 2005-03-15 | 2006-09-21 | Bellsouth Intellectual Property Corporation | Broadband home applications gateway/residential gateway systems, methods and computer program products |
| US20080048861A1 (en) * | 2002-02-01 | 2008-02-28 | Security Broadband Corp. | Lifestyle multimedia security system |
Family Cites Families (16)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| AU4136701A (en) * | 1999-11-30 | 2001-06-12 | Joseph N. D'amico | Security system linked to the internet |
| US7990985B2 (en) | 2000-01-31 | 2011-08-02 | 3E Technologies International, Inc. | Broadband communications access device |
| JP4003591B2 (en) * | 2002-07-11 | 2007-11-07 | ソニー株式会社 | Monitoring system, monitoring method and program |
| US20040086093A1 (en) * | 2002-10-29 | 2004-05-06 | Schranz Paul Steven | VoIP security monitoring & alarm system |
| US20050248453A1 (en) * | 2004-05-10 | 2005-11-10 | Fechter Cary E | Multiple deterrent, emergency response and localization system and method |
| US7786891B2 (en) * | 2004-08-27 | 2010-08-31 | Embarq Holdings Company, Llc | System and method for an interactive security system for a home |
| US7292142B2 (en) | 2004-10-20 | 2007-11-06 | Honeywell International, Inc. | Method and apparatus for interfacing security systems by periodic check in with remote facility |
| US7397371B2 (en) * | 2005-01-31 | 2008-07-08 | Honeywell International Inc. | Security system access control and method |
| US9189934B2 (en) * | 2005-09-22 | 2015-11-17 | Rsi Video Technologies, Inc. | Security monitoring with programmable mapping |
| GB2435979A (en) * | 2006-03-07 | 2007-09-12 | Helen Theresa Haywood | Door intercom telephone device |
| US7746223B2 (en) * | 2006-12-01 | 2010-06-29 | Embarq Holdings Company, Llc | System and method for receiving security content from wireless cameras |
| US7853199B2 (en) | 2007-07-10 | 2010-12-14 | Honeywell International Inc. | Alarm signaling with hybrid data and two-way voice channel |
| US8004399B2 (en) | 2007-10-11 | 2011-08-23 | Honeywell International Inc. | Life safety device with integrated Wi-Fi and GPS capability |
| US8897433B2 (en) * | 2009-02-02 | 2014-11-25 | Alarmforce Industries Inc. | Security system with two-way communication and video |
| US8223201B2 (en) * | 2009-05-04 | 2012-07-17 | Honeywell International Inc. | Voice and video over internet protocol enabled security system |
| EP2325712A1 (en) * | 2009-11-20 | 2011-05-25 | Zerogroup Holding OÜ | Control panel for a control system and a control system |
-
2011
- 2011-04-05 US US13/079,831 patent/US20120257615A1/en not_active Abandoned
-
2016
- 2016-01-19 US US15/000,813 patent/US11475745B2/en active Active
Patent Citations (2)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20080048861A1 (en) * | 2002-02-01 | 2008-02-28 | Security Broadband Corp. | Lifestyle multimedia security system |
| US20060209857A1 (en) * | 2005-03-15 | 2006-09-21 | Bellsouth Intellectual Property Corporation | Broadband home applications gateway/residential gateway systems, methods and computer program products |
Cited By (44)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US10388094B2 (en) | 2013-03-15 | 2019-08-20 | August Home Inc. | Intelligent door lock system with notification to user regarding battery status |
| US10445999B2 (en) | 2013-03-15 | 2019-10-15 | August Home, Inc. | Security system coupled to a door lock system |
| US20160189503A1 (en) * | 2013-03-15 | 2016-06-30 | August Home Inc. | Intelligent door lock system including intelligent security system with reduced latency |
| US11352812B2 (en) | 2013-03-15 | 2022-06-07 | August Home, Inc. | Door lock system coupled to an image capture device |
| US11072945B2 (en) | 2013-03-15 | 2021-07-27 | August Home, Inc. | Video recording triggered by a smart lock device |
| US11043055B2 (en) | 2013-03-15 | 2021-06-22 | August Home, Inc. | Door lock system with contact sensor |
| US11436879B2 (en) | 2013-03-15 | 2022-09-06 | August Home, Inc. | Wireless access control system and methods for intelligent door lock system |
| US9683391B2 (en) * | 2013-03-15 | 2017-06-20 | August Home, Inc. | Intelligent door lock system including intelligent security system with reduced latency |
| US11421445B2 (en) | 2013-03-15 | 2022-08-23 | August Home, Inc. | Smart lock device with near field communication |
| US9916746B2 (en) | 2013-03-15 | 2018-03-13 | August Home, Inc. | Security system coupled to a door lock system |
| US11802422B2 (en) | 2013-03-15 | 2023-10-31 | August Home, Inc. | Video recording triggered by a smart lock device |
| US10977919B2 (en) | 2013-03-15 | 2021-04-13 | August Home, Inc. | Security system coupled to a door lock system |
| US10304273B2 (en) | 2013-03-15 | 2019-05-28 | August Home, Inc. | Intelligent door lock system with third party secured access to a dwelling |
| US11441332B2 (en) | 2013-03-15 | 2022-09-13 | August Home, Inc. | Mesh of cameras communicating with each other to follow a delivery agent within a dwelling |
| US10846957B2 (en) | 2013-03-15 | 2020-11-24 | August Home, Inc. | Wireless access control system and methods for intelligent door lock system |
| US10691953B2 (en) | 2013-03-15 | 2020-06-23 | August Home, Inc. | Door lock system with one or more virtual fences |
| US12460447B2 (en) | 2013-03-15 | 2025-11-04 | Master Lock Company Llc | Video recording triggered by a smart lock device |
| US11527121B2 (en) | 2013-03-15 | 2022-12-13 | August Home, Inc. | Door lock system with contact sensor |
| US10443266B2 (en) | 2013-03-15 | 2019-10-15 | August Home, Inc. | Intelligent door lock system with manual operation and push notification |
| US11074792B2 (en) | 2013-11-12 | 2021-07-27 | Michael Jahangir Jacobs | Mental health, safety, and wellness support system |
| WO2015073443A1 (en) * | 2013-11-12 | 2015-05-21 | Jacobs Michael Jahangir | Security condition notification system |
| US9652917B2 (en) * | 2014-03-12 | 2017-05-16 | August Home, Inc. | Intelligent door lock system with automatic unlock |
| US10993111B2 (en) | 2014-03-12 | 2021-04-27 | August Home Inc. | Intelligent door lock system in communication with mobile device that stores associated user data |
| US20160189453A1 (en) * | 2014-03-12 | 2016-06-30 | August Home Inc. | Intellegent door lock system with automatic unlock |
| US9582975B2 (en) | 2015-01-27 | 2017-02-28 | Honeywell International Inc. | Alarm routing in integrated security system based on security guards real-time location information in the premises for faster alarm response |
| EP3051510A1 (en) * | 2015-01-27 | 2016-08-03 | Honeywell International Inc. | Improved alarm routing in integrated security system based on security guard s real-time location information in the premises for faster alarm response |
| CN105825644A (en) * | 2015-01-27 | 2016-08-03 | 霍尼韦尔国际公司 | Integrated security system based on real-time location information of security guards in the premises |
| US10339788B2 (en) * | 2015-03-12 | 2019-07-02 | Alarm.Com Incorporated | Providing internet access through a property monitoring system |
| US11043107B2 (en) | 2015-03-12 | 2021-06-22 | Alarm.Com Incorporated | Providing internet access through a property monitoring system |
| US11657698B2 (en) | 2015-03-12 | 2023-05-23 | Alarm.Com Incorporated | Providing internet access through a property monitoring system |
| US10783768B2 (en) | 2015-03-12 | 2020-09-22 | Alarm.Com Incorporated | Providing internet access through a property monitoring system |
| US10970983B2 (en) | 2015-06-04 | 2021-04-06 | August Home, Inc. | Intelligent door lock system with camera and motion detector |
| US10271012B2 (en) | 2016-01-06 | 2019-04-23 | Vivint, Inc. | Home automation system-initiated calls |
| US11025863B2 (en) | 2016-01-06 | 2021-06-01 | Vivint, Inc. | Home automation system-initiated calls |
| US10873728B2 (en) | 2016-01-06 | 2020-12-22 | Vivint, Inc. | Home automation system-initiated calls |
| US10382729B2 (en) | 2016-01-06 | 2019-08-13 | Vivint, Inc. | Home automation system-initiated calls |
| WO2017120022A1 (en) * | 2016-01-06 | 2017-07-13 | Vivint, Inc. | Home automation system-initiated calls |
| WO2018200130A1 (en) * | 2017-04-25 | 2018-11-01 | Abode Systems, Inc. | On-demand monitoring |
| EP3503059A1 (en) * | 2017-12-21 | 2019-06-26 | Carrier Corporation | Integrated voice over ip communication in fire systems |
| US11959308B2 (en) | 2020-09-17 | 2024-04-16 | ASSA ABLOY Residential Group, Inc. | Magnetic sensor for lock position |
| US12067855B2 (en) | 2020-09-25 | 2024-08-20 | ASSA ABLOY Residential Group, Inc. | Door lock with magnetometers |
| US12347291B2 (en) * | 2021-02-19 | 2025-07-01 | Tyco Fire & Security Gmbh | Security / automation system control panel with removable back speaker |
| US12373540B2 (en) | 2021-02-19 | 2025-07-29 | Tyco Fire & Security Gmbh | Facial recognition by a security / automation system control panel |
| US12387591B2 (en) | 2021-02-19 | 2025-08-12 | Tyco Fire & Security Gmbh | Security / automation system control panel with short range communication disarming |
Also Published As
| Publication number | Publication date |
|---|---|
| US11475745B2 (en) | 2022-10-18 |
| US20160133104A1 (en) | 2016-05-12 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| US11475745B2 (en) | Self-contained security system including voice and video calls via the internet | |
| US20220172597A1 (en) | Systems and methods for service address provisioning appliance devices | |
| US10937282B2 (en) | Methods, systems, and products for security services | |
| US10347103B2 (en) | Methods, systems, and products for security services | |
| KR102586760B1 (en) | DIY monitoring device and method | |
| KR102470001B1 (en) | A village broadcasting apparatus and a town broadcasting method | |
| RU2554549C2 (en) | Interactive door intercom | |
| JP2019527963A (en) | Wireless speaker device for wireless audio / video recording and communication device | |
| JP2020078036A (en) | Intercom system, processing method, and program | |
| JP2005208878A (en) | Security system | |
| JP6005509B2 (en) | Safety confirmation system | |
| JP6507188B2 (en) | Housing security system | |
| KR20160115620A (en) | Household situation inform system using intelligent entry equipment | |
| KR102165377B1 (en) | Emergency remote monitoring method using smart phone | |
| JP3879641B2 (en) | Intercom system | |
| JP2014081689A (en) | Abnormal condition notification device and program | |
| JP6706338B2 (en) | Building controller and intercom system | |
| JP4258233B2 (en) | Remote control device | |
| JP7693358B2 (en) | Apartment Intercom System | |
| JP5846990B2 (en) | Intercom device | |
| EP3258405A1 (en) | A telecare system | |
| JP2001211269A (en) | Supervisory system for specific area | |
| JP2025075151A (en) | Information processing system, information processing method, and information processing program | |
| JP2014187560A (en) | Intercom system | |
| JP2024132308A (en) | Intercom and fire detector |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| AS | Assignment |
Owner name: HONEYWELL INTERNATIONAL INC., NEW JERSEY Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:ESKILDSEN, KENNETH G.;LEE, ROBERT E.;REEL/FRAME:026075/0555 Effective date: 20110331 |
|
| STCB | Information on status: application discontinuation |
Free format text: ABANDONED -- AFTER EXAMINER'S ANSWER OR BOARD OF APPEALS DECISION |