The invention relates to security systems and, more particularly, to proximity-triggered security systems.
Security systems have become a staple piece of technology implemented in homes, businesses, and schools to ensure a safe and secure environment. Security systems have been adapted and integrated to include intruder prevention, fire/smoke alarms, carbon monoxide alarms, and other features to protect occupants.
Further, the U.S. Justice System has implemented monitoring programs and technology to safely re-integrate and rehabilitate criminals back into society. However, although related, these technologies have little to no overlap. Thus, there exists a need for improvement in the field.
Embodiments of the present disclosure are directed to provide new layers of security for homeowners, business owners, schools, and other institutions requiring the implementation of security systems. Specifically, the present disclosure monitors and alerts homeowners, remote security companies, and/or law enforcement to the presence of criminals that have been paroled as part of a rehabilitation program, including sexual offenders, individuals on restraining orders, or habitual offenders, to name a few.
The security system, in some embodiments, utilizes proximity sensors that are configured to receive/pick up signals transmitted by a monitoring device worn by the criminal/person of interest. The proximity sensors, through remote signals, receive identifying information, date and time information, and/or geolocation information from the monitoring device and transmit said information to a panel located on the premises of the secured location. The panel is configured to alert occupants of the secured location to the presence of the individual and, in some embodiments, display the identifying information of the criminal. The system is further configured to transmit said identifying information to local law enforcement and/or a central monitoring agency, such as a security company. Importantly, the system allows for access by all authorized law enforcement agencies, including local police, sheriffs' offices, fire departments, DEA, FBI, state and local courts, U.S. Marshalls, and the like.
Further, in some embodiments, the system is configured to store and retain identifying information, date/time information, and geolocation information transmitted by the proximity sensors. In this manner, the activity and whereabouts of a known criminal may be closely monitored to ensure compliance with parole requirements and/or to serve as a check in for Parole Officers.
The security system may also be utilized in a proactive approach, rather than a reactive approach. For example, a monitoring device may be given to a child to track their location to ensure safety. The proximity sensors utilized in the system can detect when the monitoring device leaves a certain area and track identifying information, date/time information, and the like. In the event multiple systems are implemented (for example, at a child's home and school), the systems are configured to work together to ensure the child is safely located where they should be. In this way, the system can track and store data (such as geolocation data) of the child in the event the child goes missing or runs away from home.
The present disclosure is also directed to a method of monitoring the security of a premises. When an individual with a monitoring device enters a range of a proximity sensor, the sensor sends identifying information stored and associated with the monitoring device to the system panel, generally located on the premises. The panel is configured to alert both persons or staff located on-site an alert local law enforcement and/or a central monitoring agency of the presence of a potential intruder. The local law enforcement and/or central monitoring agency can then dispense necessary intervention, as required.
For the purposes of promoting an understanding of the principles of the invention, reference will now be made to certain embodiments and specific language will be used to describe the same. It will nevertheless be understood that no limitation of the scope of the invention is thereby intended, such alterations and further modifications, and such further applications of the principles of the invention as described herein being contemplated as would normally occur to one skilled in the art to which the invention relates. Additionally, in the detailed description below, numerous alternatives are given for various features. It will be understood that each such disclosed alternative, or combinations of such alternatives, can be combined with the more generalized features discussed in the Summary above, or set forth in the embodiments described below to provide additional disclosed embodiments herein.
The uses of the terms “a” and “an” and “the” and similar references in the context of the disclosure (especially in the context of the following claims) are to be construed to cover both the singular and the plural unless otherwise indicated herein or clearly contradicted by context. Recitation of ranges of values herein are merely intended to serve as a shorthand method of referring individually to each separate value falling within the range, unless otherwise indicated herein, and each separate value is incorporated into the specification as if it were individually recited herein. All methods described herein can be performed in any suitable order unless otherwise indicated herein or otherwise clearly contradicted by context. The use of any and all examples, or exemplary language (e.g., “such as”) provided herein, is intended merely to better illuminate the invention and does not pose a limitation on the scope of the invention unless otherwise claimed. No language in the specification should be construed as indicating any non-claimed element.
Embodiments of the present disclosure are directed to provide new layers of security for homeowners, business owners, schools, and other institutions requiring the implementation of security systems. Specifically, the present disclosure monitors and alerts homeowners, remote security companies, and/or law enforcement to the presence of criminals that have been paroled as part of a rehabilitation program, including sexual offenders, individuals on restraining orders, or habitual offenders, to name a few.
The security system, in some embodiments, utilizes proximity sensors that are configured to receive/pick up signals transmitted by a monitoring device worn by the criminal/person of interest. The proximity sensors, through remote signals, receive identifying information, date and time information, and/or geolocation information from the monitoring device and transmit said information to a panel located on the premises of the secured location. The panel is configured to alert occupants of the secured location to the presence of the individual and, in some embodiments, display the identifying information of the criminal. The system is further configured to transmit said identifying information to local law enforcement and/or a central monitoring agency, such as a security company. Importantly, the system allows for access by all authorized law enforcement agencies, including local police, sheriffs' offices, fire departments, DEA, FBI, state and local courts, U.S. Marshalls, and the like.
Further, in some embodiments, the system is configured to store and retain identifying information, date/time information, and geolocation information transmitted by the proximity sensors. In this manner, the activity and whereabouts of a known criminal may be closely monitored to ensure compliance with parole requirements and/or to serve as a check in for Parole Officers.
The security system may also be utilized in a proactive approach, rather than a reactive approach. For example, a monitoring device may be given to a child to track their location to ensure safety. The proximity sensors utilized in the system can detect when the monitoring device leaves a certain area and track identifying information, date/time information, and the like. In the event multiple systems are implemented (for example, at a child's home and school), the systems are configured to work together to ensure the child is safely located where they should be. In this way, the system can track and store data (such as geolocation data) of the child in the event the child goes missing or runs away from home.
The present disclosure is also directed to a method of monitoring the security of a premises. When an individual with a monitoring device enters a range of a proximity sensor, the sensor sends identifying information stored and associated with the monitoring device to the system panel, generally located on the premises. The panel is configured to alert both persons or staff located on-site an alert local law enforcement and/or a central monitoring agency of the presence of a potential intruder. The local law enforcement and/or central monitoring agency can then dispense necessary intervention, as required.
In some embodiments, the wearable monitoring device 15 is a bracelet, in other embodiments it is an anklet. Usually, monitoring device 15 is securely attached to the person of interest so it cannot be removed until the parole sentence is completed. In one embodiment of implementing security system 10, the monitoring device 15 is issued by courts and/or parole officers tasked with monitoring the activity/behavior of a criminal out on parole. The security system 10 thus integrates court-issued monitoring with home security to provide an added layer of protection and an added monitoring capabilities of law enforcement/courts.
The signal 16 emitted by the monitoring device 15, in some embodiments, contains identifying information associated with the person of interest wearing the device 15. For example, the signal may be embedded with an identification number that is associated with the individual. The signal 16 may also transmit date and time data, as well as geolocation information of the device 15. In the event of a crime, such data transmitted by signals 16 may be used by investigators/law enforcement to prove or disprove alibis or establish who committed a crime.
In other embodiments, the signal(s) 16 emitted by the monitoring device 15 transmit encrypted data through the proximity sensors 20/security panel 25/transmitter 30 to the monitoring facility and/or law enforcement, where the data is decrypted. The encrypted data emitted via signal(s) 16 may also include information related to the threat level of the individual wearing the monitoring device 15. The threat level, while encrypted, can be decrypted by the system to provide specific alerts/notifications to the homeowner. For example, during out-processing for criminals placed on parole, the encrypted data will include personal identifying information about the criminal. The data may also include specific details related to the criminal conduct/activity associated with the criminal. A criminal with a record related to selling drugs near a school or child sex offenders will alert a system 10/security panel 25 outfitted at a school of a high threat level, whereas a system 10 located near a neighborhood may indicate a medium or low threat level alert, depending on the distance from proximity sensors 20. In this manner, the system 10 is configured to provide generalized as well as specific alert notifications to owners of protected premises.
This may also include geographic information relevant to the criminal's record. For example, if a criminal was charged with burglary in a specific neighborhood, then the threat level alert notified to an owner of a house in that neighborhood would be higher than systems 10 located in other areas. The system 10 may be configured to provide various threat levels at varying degrees. For example, the system 10 may be configured to set threat levels at 1, 2, or 3, with 3 being the most severe. The system 10 may also set threat levels by color (e.g., green, yellow, or red). The security panel 25 may also produce increasingly loud alarms depending on the threat level of the near-by criminal. Further, such alerts, alarms, etc. may intensify as the monitoring device 20 gets closer to proximity sensors 20.
As the system 10/security panel 25 decrypts the threat level information tagged to the encrypted data emitted by the monitoring device 20, the threat level notification can be immediately alerted to an owner of a protected premises to allow for a quick, appropriate response, ensuring safety of the occupants.
In other embodiments, the threat level associated with a monitory device 15 used as a tether (see
The proximity sensors 20 receive and transmit the signals 16 emitted by the monitoring device 15. The sensors 20 are configured to receive signals 16 from any monitoring device 15, and are not limited to a particular ID/signal 16. The number of sensors implemented on a premises may depend on the size of the property and/or the level of protection desired. However, system 10 requires at least one sensor 20. The sensors 20 may receive and transmit signal 16 over WiFi, BlueTooth, RFID, or any other communications network. In other embodiments, the proximity sensors 20 may be hard-wired for a direct connection with security panel 25/transponder 30. In use, the sensors 20 transmit the signal 16 and any related information to the security panel 25 via the transmitter 30.
The security panel 25 is configured to receive the information/signal 16 from sensors 20/transmitter 30. The security panel 25 may alter occupants of the premises to the presence of an intruder/criminal outfitted with monitoring device 15. The security panel 25 is further configured to alter a central monitoring facility and/or local law enforcement. The alter to the central monitoring facility/local law enforcement may include identifying information emitted by monitoring device 15 through signal(s) 16. When an alter is received by the central monitoring facility/local law enforcement, appropriate action can be taken to ensure the safety of the occupants. The security panel 25, as known in the art, may include a display. The display may include alter information to warn the occupants of the premises to the potential threat, as well. In any event, the security panel 25 is configured to alter occupants to any security breaches via, for example, beeps, buzzes, vibrations, or notifications to a mobile app. The mobile app may be used to monitor the premises by occupants/owners of the property and/or the central monitoring facility and/or local law enforcement.
In some embodiments, security panels 25 located next to or near each other geographically, can communicate with one another (e.g., by a local area network transmitted through transmitters 30). For example, neighbors may allow their respective security panels 25 to communicate information between the systems, such as notifications, alerts, etc. If a first security system 10 is triggered by the presence of a monitoring device 15, then the system 10 can send “potential threat” notifications to neighboring systems 10 to alert a geographic area. In this way, a geographic area, such as a neighborhood, outfitted with two or more systems 10 creates a security blanket with the systems 10 sharing information, notifications, and alerts. This method also allows security companies or law enforcement to better log and track the movement of criminals outfitted with monitoring device 15. In another embodiment, the monitoring company or law enforcement can issue a “possible threat” notification to systems 10 located within a specified geographic area of a tripped system 10.
In one embodiment, the monitoring device 15 comprises a FOB that acts as a beacon. The monitoring device 15 is configured to emit a beacon signal that can be received by the system 10/panel 25. When the beacon signal is no longer picked up by the system 10, the system 10 is configured to send an alert and/or alarm. The alert may be sent to law enforcement, a remote monitoring facility, and/or the owners of the system 10. The alerts may be in the form of a notification, text message, phone call, etc.
While the invention has been described in detail in the foregoing description, the same is to be considered as illustrative and not restrictive in character, it being understood that all changes and modifications that come within the spirit of the invention are desired to be protected. In addition, all references cited herein are indicative of the level of skill in the art and are hereby incorporated by reference in their entirety.
The following numbered clauses represent example embodiments according to the present disclosure:
15. The method recited wherein the step of transferring data to the monitoring unit comprises transferring substantially the same data at two different frequencies separated in time to the monitoring unit.
16. An electronic monitoring system for monitoring a client, comprising: a transmitter that transmits status data regarding status of the transmitter; a client tracking unit that comprises a GPS-enabled wireless voice and data communication device that receives time-coded position data derived from satellites of the Global Positioning System, and a memory that stores the time-coded position data, client tracking unit is in communication with the transmitter; a wireless communication link; and a wireless portable monitoring device that comprises a wireless voice and data communication device, for communicating with the client tracking unit by way of the wireless communication link to remotely monitor the client.
This application is a continuation-in-part of U.S. patent application Ser. No. 16/946,921, filed Jul. 10, 2020.
Number | Date | Country | |
---|---|---|---|
Parent | 16946921 | Jul 2020 | US |
Child | 18908440 | US |