The present disclosure relates generally to security systems. More particularly, the present disclosure relates to security system with wireless sensors.
A number of security systems employ security sensors that are disposed about a facility that is being protected by the security system. In some cases, individual security sensors may be susceptible to being tampered with in an attempt to break into a facility. If individual security sensors only infrequently check-in with a security panel, it is possible for the security system to not report an alarm condition for an extended period of time, especially when the security system must confirm an alarm condition detected by a security sensor before the security system reports the detected alarm condition. Confirmation of the alarm conditions detected by the security sensors may be desirable to reduce false alarms and thus increase the robustness of the security system. When so provided, if a security sensor is tampered with and goes off-line before a detected alarm condition can be confirmed by the security system, the detected alarm condition may go unreported until, for example, the corresponding security sensor misses its next infrequent check-in time. What would be desirable are security systems that can vary the rate in which the security sensors check-in to help avoid missing detected alarm conditions.
The present disclosure relates generally to security systems and more particularly to adaptable supervision rates for wireless security sensors within a security system. An example may be found in a method for operating a security system controller. The illustrative method includes receiving supervisory check-in signals from a first wireless security sensor at a first supervisory rate, which when received, repeatedly confirm to the security system controller that the first wireless security sensor remains operatively coupled to the security system controller. A first security sensor alarm is received from the first wireless security sensor indicating an alarm condition detected by the first wireless security sensor. In response to receiving the first security sensor alarm from the first wireless security sensor, the first supervisory rate is changed to a second supervisory rate, wherein the second supervisory rate is a higher rate (e.g. more frequent) than the first supervisory rate. The method includes determining when supervisory signals are not received from the first wireless security sensor at the second supervisory rate before receiving a second security alarm from the first wireless security sensor confirming the alarm condition of the first security sensor alarm, and in response, the security system controller issuing a tamper alarm associated with the first wireless security sensor.
Another example may be found in a method for operating a security system that includes a plurality of security sensors. The illustrative method includes repeatedly confirming at a first supervisory rate that each of the plurality of security sensors are in operation. When a first alarm is received from any of the plurality of security sensors, the first supervisory rate for each of the plurality of security sensors is dynamically adjusted to a second supervisory rate that is higher than the first supervisory rate. The illustrative method includes repeatedly confirming at the second supervisory rate that each of the plurality of security sensors are in operation.
Another example may be found in a method for operating a security system controller. The illustrative method includes receiving supervisory signals from a first wireless security sensor at a supervisory rate assigned to the first wireless security sensor, which when received, repeatedly confirm to the security system controller that the first wireless security sensor remains operatively coupled to the security system controller. The illustrative method includes receiving supervisory signals from a second wireless security sensor at a supervisory rate that is assigned to the second wireless security sensor, which when received, repeatedly confirm to the security system controller that the second wireless security sensor remains operatively coupled to the security system controller. In this example, the supervisory rate that is assigned to the first wireless security sensor is different from the supervisory rate that is assigned to the second wireless security sensor. The illustrative method includes receiving a first security sensor alarm from the first wireless security sensor indicating an alarm condition detected by the first wireless security sensor and receiving a second security sensor alarm from the first wireless security sensor within a predetermined period of time of the first security sensor alarm, the second security sensor alarm confirming the alarm condition. The illustrative method includes issuing an alarm condition detection alarm from the security system controller after receiving the second security sensor alarm from the first wireless security sensor within the predetermined period of time. In some cases, and in response to receiving the first security sensor alarm from the first wireless security sensor, the supervisory rate that is assigned to the first wireless security sensor may be changed to a higher supervisory rate.
The preceding summary is provided to facilitate an understanding of some of the innovative features unique to the present disclosure and is not intended to be a full description. A full appreciation of the disclosure can be gained by taking the entire specification, claims, figures, and abstract as a whole.
The disclosure may be more completely understood in consideration of the following description of various examples in connection with the accompanying drawings, in which:
While the disclosure is amenable to various modifications and alternative forms, specifics thereof have been shown by way of example in the drawings and will be described in detail. It should be understood, however, that the intention is not to limit the disclosure to the particular examples described. On the contrary, the intention is to cover all modifications, equivalents, and alternatives falling within the spirit and scope of the disclosure.
The following description should be read with reference to the drawings, in which like elements in different drawings are numbered in like fashion. The drawings, which are not necessarily to scale, depict examples that are not intended to limit the scope of the disclosure. Although examples are illustrated for the various elements, those skilled in the art will recognize that many of the examples provided have suitable alternatives that may be utilized.
All numbers are herein assumed to be modified by the term “about”, unless the content clearly dictates otherwise. The recitation of numerical ranges by endpoints includes all numbers subsumed within that range (e.g., 1 to 5 includes 1, 1.5, 2, 2.75, 3, 3.80, 4, and 5).
As used in this specification and the appended claims, the singular forms “a”, “an”, and “the” include the plural referents unless the content clearly dictates otherwise. As used in this specification and the appended claims, the term “or” is generally employed in its sense including “and/or” unless the content clearly dictates otherwise.
It is noted that references in the specification to “an embodiment”, “some embodiments”, “other embodiments”, etc., indicate that the embodiment described may include a particular feature, structure, or characteristic, but every embodiment may not necessarily include the particular feature, structure, or characteristic. Moreover, such phrases are not necessarily referring to the same embodiment. Further, when a particular feature, structure, or characteristic is described in connection with an embodiment, it is contemplated that the feature, structure, or characteristic may be applied to other embodiments whether or not explicitly described unless clearly stated to the contrary.
In some instances, the security panel 14 may be part of a security system controller 16. In some instances, the security panel 14 may include the security system controller 16. In some instances, the security panel 14 and the security system controller 16 may be separate. In some instances, at least some features of the security panel 14 and/or the security system controller 16 may be provided within one or more edge controllers while other features of the security panel 14 and/or the security system controller 16 may be provided within one or more remote or cloud-based servers, for example.
In the example shown, the security system controller 16 communicates with a central monitoring station 18. In some instances, the central monitoring station 18 may be configured to monitor for alarms and other alerts from a number of different security systems 10 within a number of different facilities. The central monitoring station 18 may be configured to display a dashboard displaying various alarms and other alerts so that a person is able to quickly see and ascertain what is happening in each of the facilities, for example. In some instances, the security system controller 16 may include the central monitoring station 18.
In some instances, if a first sensor alarm (e.g. motion, tamper, etc.) is received from any of the wireless security sensors, the security system controller may be configured to wait for the wireless security sensor to send a second sensor alarm confirming the first sensor alarm before presenting an alarm notification to the operator of the CMS. This may help reduce the number of false alarms that must be dealt with by the operator of the CMS. However, if an intruder removes and/or destroys a wireless security sensor, such as after the first wireless security sensor issued the first sensor alarm, then the second sensor alarm confirming the first sensor alarm may never be received, and thus an alarm notification to the operator of the CMS may not be provided until a missing sensor alarm is generated at the next supervisory time. When the supervisory rate is for example every 2 hours, then the missing sensor alarm for the first wireless sensor will not be generated for up to 2 hours after the intruder removes and/or destroys the wireless security sensor. In this case, the missing sensor alarm may act as a confirmation of the first sensor alarm, and thus may cause the alarm notification to be presented to the operator of the CMS. To help avoid such a delay, once the first sensor alarm is received from the first wireless security sensor, the supervision time for the first wireless security sensor is switched to a higher supervisory rate (e.g. if the normal supervisory rate is very 2 hours, it will be changed to every 2 minutes once the first sensor alarm is received). After changing the supervisory rate to the higher supervisory rate, the missing sensor alarm will be generated in a relatively shorter time period (e.g. within 2 minutes), which cause a corresponding alarm notification to be presented to the operator of the CMS.
The first supervisory rate may be set to reduce the power draw on the battery of the first wireless security sensor by having appropriately infrequent supervisory check-in wireless transmissions from the first wireless sensor. In some cases, the first supervisory rate may depend on the security grade of the security system. For example, according to one standard (EN50131-1 section 8.8.4.1 Periodic communication), for Grade 1 security panels, the maximum permitted intervals between periodic communication signals or message is 240 minutes, for Grade 2, it is 120 minutes, for Grade 3, it is 100 seconds and for Grade 4, it is 10 seconds. Grade 1 intruder alarm systems would only be of interest in domestic properties (without an insurance requirement for an alarm system). Grade 2 intruder alarm systems would be most domestic properties and low-risk commercial (e.g. florists). Grade 3 intruder alarm systems would be for high-risk domestics and most commercial properties (e.g. Newsagent with cigarette sales). Grade 4 intruder alarm systems would be for extremely high-risk domestic and higher risk commercial properties (e.g. bullion stores). These are just examples.
Returning to
When the supervisory signals are received from the first wireless security sensor at the second supervisory rate before receiving the second security alarm from the first wireless security sensor confirming the alarm condition of the first security sensor alarm, the supervisory signals from the first wireless security sensor repeatedly confirm to the security system controller that the first wireless security sensor remains operatively coupled to the security system controller, as indicated at block 29. In this example, a second security sensor alarm is received from the first wireless security sensor within a predetermined period of time of the first security sensor alarm, which confirms the alarm condition of the first security sensor alarm, as indicated at block 30. The predetermined time may be configurable, for example. An alarm condition detection alarm is issued from the security system controller after receiving the second (i.e. confirming) security sensor alarm from the first wireless security sensor within the predetermined period of time, as indicated at block 32.
Continuing on
In some instances, when the supervisory signals from the first wireless security sensor are not received at the first supervisory rate, a missing device alarm may be issued by the security system controller indicating that the first wireless security sensor no longer remains operatively coupled to the security system controller. In some instances, when the supervisory signals from the first wireless security sensor are not received at the second supervisory rate, the missing device alarm may be issued indicating that the first wireless security sensor no longer remains operatively coupled to the security system controller. In some instances, when the supervisory signals are not received from the first wireless security sensor at the second supervisory rate before receiving the second security alarm from the first wireless security sensor confirming the alarm condition of the first security sensor alarm, the security panel issues a missing device alarm indicating that the first wireless security sensor no longer remains operatively coupled to the security system controller, wherein the missing device alarm triggers the tamper alarm at the CMS, as indicated at block 39.
In some instances, the method 20 may further include receiving supervisory signals from a second wireless security sensor (such as the security sensor 12b) at the first supervisory rate, which when received, repeatedly confirm to the security system controller that the second wireless security sensor remains operatively coupled to the security system controller, as indicated at block 40. In response to receiving the first security sensor alarm from the first wireless security sensor, the first supervisory rate may be changed to the second supervisory rate for the second wireless security sensor (e.g. in addition to the first wireless security sensor), as indicated at block 42. Thereafter, supervisory signals may be received from the second wireless security sensor at the second supervisory rate, which when received, repeatedly confirm to the security system controller that the second wireless security sensor remains operatively coupled to the security system controller, as indicated at block 44.
Continuing on
In some instances, when a second alarm is received from the same one of the plurality of security sensors from which the first alarm was received, an alarm condition detection alarm is issued by the security system, as indicated at block 62. In some instances, the method 54 may further include receiving an acknowledgement of the alarm condition detection alarm, as indicated at block 64. In response to receiving the acknowledgement of the alarm condition detection alarm, the second supervisory rate may be dynamically adjusted for each of the plurality of security sensors back to the first supervisory rate, as indicated at block 66. The method 54 may include repeatedly confirming at the first supervisory rate that each of the plurality of security sensors are in operation, as indicated at block 68. When one or more of the plurality of security sensors are not confirmed to be in operation, a missing device alarm may be issued.
In some instances, security sensors that are located within a periphery of a facility may be more likely to be tampered with by an intruder attempting to enter the facility. Since periphery sensors are more likely to be tampered with, these security sensors may have a supervisory rate that is more frequent than those security sensors that are less likely to be tampered with during an attempted intrusion. Security sensors within an interior of the facility may have a supervisory rate that is less frequent. As an example, security sensors within the periphery of a facility may have a supervisory rate of 5 minutes while security sensors within an interior of a facility may have a supervisory rate of 2 hours. Other supervisory rates are contemplated. It is contemplated that the supervisory rates for each of the sensors may be user configurable, and each sensor may be assigned a desired supervisory rate depending on the type of sensor, the location of the sensor and/or any other characteristic of the sensor. In some cases, the supervisory rates for each sensor may be changes in accordance with a schedule that is programmable by a user. For example, one or more of the sensors may be scheduled to have a more frequent supervisory rate during the night time or when the building is closed, and may be scheduled to have a less frequency supervisory rate during the day time or when the building is open for business. These are just examples.
Continuing with
Referring to
In some instances, the method 70 may include receiving an acknowledgement of the alarm condition detection alarm, as indicated at block 86. In response to receiving the acknowledgement of the alarm condition detection alarm, the supervisory rate that is assigned to the first wireless security sensor may be changed from the higher supervisory rate assigned to the first wireless security sensor back to the original supervisory rate assigned to the first wireless security sensor, as indicated at block 88. In some instances, in response to receiving the acknowledgement of the alarm condition detection alarm, the supervisory rate that is assigned to the second wireless security sensor may be changed from the higher supervisory rate assigned to the second wireless security sensor back to the original supervisory rate assigned to the second wireless security sensor.
Having thus described several illustrative embodiments of the present disclosure, those of skill in the art will readily appreciate that yet other embodiments may be made and used within the scope of the claims hereto attached. It will be understood, however, that this disclosure is, in many respects, only illustrative. Changes may be made in details, particularly in matters of shape, size, arrangement of parts, and exclusion and order of steps, without exceeding the scope of the disclosure. The disclosure's scope is, of course, defined in the language in which the appended claims are expressed.
Number | Name | Date | Kind |
---|---|---|---|
11004316 | Krishnamoorthy et al. | May 2021 | B2 |
11367341 | Rodolico et al. | Jun 2022 | B2 |
20060119476 | Hope | Jun 2006 | A1 |
20120188072 | Dawes | Jul 2012 | A1 |
20130155242 | Hevia et al. | Jun 2013 | A1 |
20150254950 | Patterson | Sep 2015 | A1 |
20180182235 | Lin | Jun 2018 | A1 |
20200100115 | Skaaksrud | Mar 2020 | A1 |
20200193803 | Rodolico | Jun 2020 | A1 |
20200226894 | Krishnamoorthy | Jul 2020 | A1 |
Entry |
---|
EN 50131 for Wireless Alarm Systems: Grade Explained, 5 pages, Jun. 6, 2023. |
Fortecho Arts Specifications, 12 pages, 2023. https://fortecho.com/all-products/micro-climate-tag/. |
Partial European Search Report, EP Application No. 24178007.1, European Patent Office, Nov. 5, 2024 (14 pages). |
Number | Date | Country | |
---|---|---|---|
20240420562 A1 | Dec 2024 | US |