A portion of the disclosure of this patent document and its attachments contain material which is subject to copyright protection. The copyright owner has no objection to the facsimile reproduction by anyone of the patent document or the patent disclosure, as it appears in the Patent and Trademark Office patent files or records, but otherwise reserves all copyrights whatsoever.
Video data can waste network resources. For example, some security systems route the video data into a cellular network for delivery to some destination. This video data, though, often unnecessarily consumes bandwidth in the cellular network.
The features, aspects, and advantages of the exemplary embodiments are understood when the following Detailed Description is read with reference to the accompanying drawings, wherein:
The exemplary embodiments will now be described more fully hereinafter with reference to the accompanying drawings. The exemplary embodiments may, however, be embodied in many different forms and should not be construed as limited to the embodiments set forth herein. These embodiments are provided so that this disclosure will be thorough and complete and will fully convey the exemplary embodiments to those of ordinary skill in the art. Moreover, all statements herein reciting embodiments, as well as specific examples thereof, are intended to encompass both structural and functional equivalents thereof. Additionally, it is intended that such equivalents include both currently known equivalents as well as equivalents developed in the future (i.e., any elements developed that perform the same function, regardless of structure).
Thus, for example, it will be appreciated by those of ordinary skill in the art that the diagrams, schematics, illustrations, and the like represent conceptual views or processes illustrating the exemplary embodiments. The functions of the various elements shown in the figures may be provided through the use of dedicated hardware as well as hardware capable of executing associated software. Those of ordinary skill in the art further understand that the exemplary hardware, software, processes, methods, and/or operating systems described herein are for illustrative purposes and, thus, are not intended to be limited to any particular named manufacturer.
As used herein, the singular forms “a,” “an,” and “the” are intended to include the plural forms as well, unless expressly stated otherwise. It will be further understood that the terms “includes,” “comprises,” “including,” and/or “comprising,” when used in this specification, specify the presence of stated features, integers, steps, operations, elements, and/or components, but do not preclude the presence or addition of one or more other features, integers, steps, operations, elements, components, and/or groups thereof. It will be understood that when an element is referred to as being “connected” or “coupled” to another element, it can be directly connected or coupled to the other element or intervening elements may be present. Furthermore, “connected” or “coupled” as used herein may include wirelessly connected or coupled. As used herein, the term “and/or” includes any and all combinations of one or more of the associated listed items.
It will also be understood that, although the terms first, second, etc. may be used herein to describe various elements, these elements should not be limited by these terms. These terms are only used to distinguish one element from another. For example, a first device could be termed a second device, and, similarly, a second device could be termed a first device without departing from the teachings of the disclosure.
The benign events 42, however, may have a different routing strategy 70. The benign events 42 are comparatively routine or minor with little or no urgency, consequence, or importance. The corresponding video data 28 is similarly of a lesser concern. Exemplary embodiments may thus judiciously route the video data 28 associated with the benign events 42. For example, the security controller 34 may implement a delay 76 before sending the video data 28 representing the benign events 42. That is, the security controller 34 may locally cache or store the video data 28 representing the benign events 42 until some condition 78 is satisfied. There may be many conditions 78 depending on the circumstances. Regardless, when the conditions 78 are satisfied, the security controller 34 may then release the video data 28 for routing and delivery to the destination address 74. In simple words, the video data 28 representing the benign events 42 may have a lesser priority 72 that the alarm events 44.
Exemplary embodiments reduce congestion. All the different events 40, and their associated video data 28, may generate significant cellular data usage. Exemplary embodiments may thus upload only the most urgent video data 28 associated with the alarm events 44. This routing strategy 70 minimizes cellular traffic, reduces operational costs, and decreases cellular congestion. The video data 28 associated with the benign events 42 (such as routine or scheduled tasks and “snapshots”) may be cached until broadband service is restored. Should cache memory 100 become full, exemplary embodiments may allocate more memory 100 for storing additional video data 28. Exemplary embodiments may optionally begin utilizing the wireless connection 90, even for the benign events 42, in response to the cache memory 100 approaching a maximum byte size. This intelligent “store and forward” routing strategy 70 may be managed by a software application and/or by firmware (such as the security controller 34). Exemplary embodiments thus smartly prioritize alarm traffic over the 3G/4G/LTE wireless connection 90.
Exemplary embodiments may consult an electronic database 112 of events. The database 112 of events is illustrated as being locally stored in the security controller 34, but the database 112 of events may be remotely stored and accessed. Once the security controller 34 assigns or determines the event identifier 110, the security controller 34 may query the database 112 of events for the event identifier 110 and retrieve its corresponding priority 72 and routing strategy 70. Each event 40, in other words, may have an electronic database association with its corresponding event identifier 110, its corresponding priority 72, and its corresponding routing strategy 70. Whenever the security controller 34 generates or determines one of the events 40, the security controller 34 may query the electronic database 112 of events and retrieve the corresponding event identifier 110, its priority 72, and its routing strategy 70.
Exemplary embodiments may thus perform a database lookup. Suppose all the benign events 42 have the same routing strategy 70. That is, as earlier explained, perhaps all the benign events 42 are reserved for the wireline broadband connection 84. The electronic database 112 of events may thus have entries specifying the wireline broadband connection 84 for any event identifier 110 having the “benign” priority 72. The security controller 34 may cache or hold back the video data 28 associated with any benign event 42 until the wireline broadband connection 84 is available (e.g., its network connectivity 80 is confirmed or verified). Indeed, exemplary embodiments may command or enforce a general rule 114 that the wireline broadband connection 84 is preferred for all events 40, regardless of the priority 72. However, if the event identifier 110 indicates the “alarm” priority 72, and the wireline broadband connection 84 is down (e.g., its network connectivity 80 indicates unavailable), the routing strategy 70 may authorize or permit routing the video data 28 via the wireless connection 90 into the private cellular network 96. The routing strategy 70, in other words, may override or supersede the general rule 114 that prefers the wireline broadband connection 84. Exemplary embodiments thus ensure that the alarm events 44 are urgently relayed.
Wireless resources are thus conserved. Exemplary embodiments judiciously reserve the private cellular network 96 for perhaps only the urgent situations (e.g., the alarm events 44). The general routing rule 114 may thus force all messages and packets of data (such as the video data 28) via the wireline broadband connection 84, even if the wireless connection 90 is simultaneously available. Exemplary embodiments may thus prefer the wireline broadband connection 84 that has perhaps a substantially greater bitrate and can accommodate more packet traffic. However, when the security controller 34 determines an error with the wireline broadband connection 84, the routing strategy 70 may permit an alternative routing via the wireless connection 90 into the private cellular network 96. The alarm events 44, for example, may be wirelessly sent to ensure reporting and summons.
Any connectivity scheme may be used. There are many known connectivity schemes, such as polling or “ping” messages to determine a status of the corresponding connection 84 and 90. If no response is received, or if an error code indicates an operational concern or unavailability, the security controller 34 may infer or conclude that the corresponding connection 84 or 90 is down. Regardless, exemplary embodiments may utilize any other scheme for determining the network connectivity 80.
The security controller 34 may generate the events 40. The controller application 122 may assign the event identifier 110 to each event 40. While there may be hundreds or perhaps thousands of different events 40, in actual practice the events 40 may be generally categorized or grouped based on some common criterion or criteria. Exemplary embodiments may thus map all the different events 40 to a lesser or more manageable number by assigning a common one of the different event identifiers 110.
Exemplary embodiments may be applied regardless of networking environment. Exemplary embodiments may be easily adapted to stationary or mobile devices having cellular, WI-FI®, near field, and/or BLUETOOTH® capability. Exemplary embodiments may be applied to mobile devices utilizing any portion of the electromagnetic spectrum and any signaling standard (such as the IEEE 802 family of standards, GSM/CDMA/TDMA or any cellular standard, and/or the ISM band). Exemplary embodiments, however, may be applied to any processor-controlled device operating in the radio-frequency domain and/or the Internet Protocol (IP) domain. Exemplary embodiments may be applied to any processor-controlled device utilizing a distributed computing network, such as the Internet (sometimes alternatively known as the “World Wide Web”), an intranet, a local-area network (LAN), and/or a wide-area network (WAN). Exemplary embodiments may be applied to any processor-controlled device utilizing power line technologies, in which signals are communicated via electrical wiring. Indeed, exemplary embodiments may be applied regardless of physical componentry, physical configuration, or communications standard(s).
Exemplary embodiments may utilize any processing component, configuration, or system. Any processor could be multiple processors, which could include distributed processors or parallel processors in a single machine or multiple machines. The processor can be used in supporting a virtual processing environment. The processor could include a state machine, application specific integrated circuit (ASIC), and/or a programmable gate array (PGA) including a Field PGA. When any of the processors execute instructions to perform “operations”, this could include the processor performing the operations directly and/or facilitating, directing, or cooperating with another device or component to perform the operations.
Exemplary embodiments, though, may release according to the priority 72. This disclosure previously explained how each different event 40, and thus its associated video data 28, may be associated with the corresponding priority 72. So, even though the event 40 may have the “benign” priority 72 and be delayed for queuing, there may still be a hierarchy according to the different priorities 72. For example, if the alarm events 44 have the highest priorities 72 (such as “1” and “2” on a numeric scale), other events 40 may have lesser priorities 72 (such as “3” through “10”). The video queue 150 may thus continually rearrange the video queue 150 according to the priority 72 retrieved from the electronic database 112 of events. The video data 28 associated with the lowest priority 72 event 40 (e.g., “10”) may thus be shuffled or demoted to a bottom position in the video queue 150. Other video data 28 may be promoted to upper positions in the video queue 150 according to their corresponding priority 72. The controller application 122 may thus release the video data 28 according to its corresponding priority 72.
Exemplary embodiments may further implement a video clip time 170. The electronic database 112 of events may have even more database entries that associate each event 40 to its corresponding video clip time 170. The video clip time 170 may be a permissible amount in time (perhaps seconds or even minutes) associated with the video data 28 that is collected and sent for the corresponding event 40. For example, the important or urgent alarm events 44 may be permitted a longer time for the video data 28. That is, if a fire or intrusion is detected, the security controller 34 may be permitted to send a longer time of the video data 28 to ensure the emergency is fully documented. Events with higher priority 72, in other words, may be permitted longer times for the video data 28. Events 40 with lower priority 72 may be trimmed in length to ensure the maximum permissible video clip time 170. Once the time length of the video data 28 attains the permissible video clip time 170 for the corresponding event identifier 110, the security controller 34 may edit or stop further collection of the video data 28. The video clip time 170 may thus be another scheme for conserving network resources (especially for the video data 28 sent into the cellular network 96). Exemplary embodiments may thus determine the event identifier 110 and then query for the permissible video clip time 170.
The flowchart continues with
Exemplary embodiments may be applied to any signaling standard. As those of ordinary skill in the art recognize,
Exemplary embodiments may be physically embodied on or in a computer-readable memory device or other storage media/medium. This computer-readable medium, for example, may include CD-ROM, DVD, tape, cassette, floppy disk, optical disk, memory card, memory drive, and large-capacity disks. This computer-readable medium, or media, could be distributed to end-subscribers, licensees, and assignees. A computer program product comprises processor-executable instructions for alarm reporting, as the above paragraphs explained.
While the exemplary embodiments have been described with respect to various features, aspects, and embodiments, those skilled and unskilled in the art will recognize the exemplary embodiments are not so limited. Other variations, modifications, and alternative embodiments may be made without departing from the spirit and scope of the exemplary embodiments.
Number | Name | Date | Kind |
---|---|---|---|
4259548 | Fahey et al. | Mar 1981 | A |
6038289 | Sands | Mar 2000 | A |
6067346 | Akhteruzzaman et al. | May 2000 | A |
6271752 | Vaios | Aug 2001 | B1 |
6356058 | Maio | Mar 2002 | B1 |
6400265 | Saylor et al. | Jun 2002 | B1 |
6504479 | Lemons | Jan 2003 | B1 |
6636489 | Fingerhut | Oct 2003 | B1 |
6658091 | Naidoo et al. | Dec 2003 | B1 |
6693530 | Dowens et al. | Feb 2004 | B1 |
6741171 | Palka et al. | May 2004 | B2 |
6778085 | Faulkner | Aug 2004 | B2 |
6829478 | Layton et al. | Dec 2004 | B1 |
6884826 | Le-Khac et al. | Apr 2005 | B2 |
6914896 | Tomalewicz | Jul 2005 | B1 |
6970183 | Monroe | Nov 2005 | B1 |
6975220 | Foodman et al. | Dec 2005 | B1 |
6977585 | Falk et al. | Dec 2005 | B2 |
7015806 | Naidoo et al. | Mar 2006 | B2 |
7020796 | Ennis et al. | Mar 2006 | B1 |
7035650 | Moskowitz et al. | Apr 2006 | B1 |
7113090 | Saylor et al. | Sep 2006 | B1 |
7239689 | Diomelli | Jul 2007 | B2 |
7248161 | Spoltore et al. | Jul 2007 | B2 |
7249370 | Kodama | Jul 2007 | B2 |
7295119 | Rappaport et al. | Nov 2007 | B2 |
7323980 | Faulkner et al. | Jan 2008 | B2 |
7409045 | Naidoo | Aug 2008 | B2 |
7492253 | Ollis et al. | Feb 2009 | B2 |
7515041 | Eisold et al. | Apr 2009 | B2 |
7633385 | Cohn et al. | Dec 2009 | B2 |
7679507 | Babich et al. | Mar 2010 | B2 |
7688203 | Rockefeller et al. | Mar 2010 | B2 |
7724131 | Chen | May 2010 | B2 |
7768414 | Abel et al. | Aug 2010 | B2 |
7772971 | Hillenburg et al. | Aug 2010 | B1 |
7779141 | Hashimoto et al. | Aug 2010 | B2 |
7853261 | Lewis et al. | Dec 2010 | B1 |
7855635 | Cohn et al. | Dec 2010 | B2 |
7920580 | Bedingfield, Sr. | Apr 2011 | B2 |
7920843 | Martin et al. | Apr 2011 | B2 |
7952609 | Simerly et al. | May 2011 | B2 |
8284254 | Romanowich et al. | Oct 2012 | B2 |
8373538 | Hildner et al. | Feb 2013 | B1 |
8391826 | McKenna et al. | Mar 2013 | B2 |
8401514 | Ebdon et al. | Mar 2013 | B2 |
8405499 | Hicks, III | Mar 2013 | B2 |
8471910 | Cleary et al. | Jun 2013 | B2 |
8520068 | Naidoo et al. | Aug 2013 | B2 |
8581991 | Clemente | Nov 2013 | B1 |
8626210 | Hicks, III | Jan 2014 | B2 |
8649758 | Sennett et al. | Feb 2014 | B2 |
8674823 | Contario et al. | Mar 2014 | B1 |
8692665 | Hicks, III | Apr 2014 | B2 |
8780199 | Mimar | Jul 2014 | B2 |
8831970 | Weik et al. | Sep 2014 | B2 |
8847749 | Hicks, III | Sep 2014 | B2 |
8884772 | Zhang | Nov 2014 | B1 |
8902740 | Hicks, III | Dec 2014 | B2 |
8937658 | Hicks, III | Jan 2015 | B2 |
8970365 | Wedig et al. | Mar 2015 | B2 |
9060116 | Kim | Jun 2015 | B2 |
9135806 | Hicks | Sep 2015 | B2 |
9246740 | Hicks | Jan 2016 | B2 |
9318005 | Hicks | Apr 2016 | B2 |
20020175995 | Sleeckx | Nov 2002 | A1 |
20020193107 | Nascimento | Dec 2002 | A1 |
20030025599 | Monroe | Feb 2003 | A1 |
20030062997 | Naidoo | Apr 2003 | A1 |
20030179712 | Kobayashi et al. | Sep 2003 | A1 |
20030227220 | Biskup et al. | Dec 2003 | A1 |
20040028391 | Black et al. | Feb 2004 | A1 |
20040086088 | Naidoo et al. | May 2004 | A1 |
20040086091 | Naidoo et al. | May 2004 | A1 |
20040086093 | Schranz | May 2004 | A1 |
20040113770 | Falk | Jun 2004 | A1 |
20040137959 | Salzhauer | Jul 2004 | A1 |
20040177136 | Chen et al. | Sep 2004 | A1 |
20040196833 | Dahan et al. | Oct 2004 | A1 |
20040233983 | Crawford et al. | Nov 2004 | A1 |
20050066033 | Cheston et al. | Mar 2005 | A1 |
20050068175 | Faulkner et al. | Mar 2005 | A1 |
20050174229 | Feldkamp | Aug 2005 | A1 |
20060002721 | Sasaki | Jan 2006 | A1 |
20060028488 | Gabay et al. | Feb 2006 | A1 |
20060055529 | Ratiu et al. | Mar 2006 | A1 |
20060064505 | Lee et al. | Mar 2006 | A1 |
20060067484 | Elliot et al. | Mar 2006 | A1 |
20060154642 | Scannell, Jr. | Jul 2006 | A1 |
20060170778 | Ely | Aug 2006 | A1 |
20060239250 | Elliot et al. | Oct 2006 | A1 |
20060271695 | Lavian | Nov 2006 | A1 |
20070049259 | Onishi et al. | Mar 2007 | A1 |
20070104218 | Hassan et al. | May 2007 | A1 |
20070115930 | Reynolds et al. | May 2007 | A1 |
20070124782 | Hiral et al. | May 2007 | A1 |
20070139192 | Wimberly et al. | Jun 2007 | A1 |
20070226344 | Sparrell et al. | Sep 2007 | A1 |
20070247187 | Webber et al. | Oct 2007 | A1 |
20070279214 | Buehler | Dec 2007 | A1 |
20070290830 | Gurley | Dec 2007 | A1 |
20080055423 | Ying | Mar 2008 | A1 |
20080061923 | Simon et al. | Mar 2008 | A1 |
20080090546 | Dickenson et al. | Apr 2008 | A1 |
20080167068 | Mosleh et al. | Jul 2008 | A1 |
20080191857 | Mojaver | Aug 2008 | A1 |
20080225120 | Stuecker | Sep 2008 | A1 |
20080261515 | Cohn et al. | Oct 2008 | A1 |
20080279345 | Zellner et al. | Nov 2008 | A1 |
20080311878 | Martin et al. | Dec 2008 | A1 |
20080311879 | Martin et al. | Dec 2008 | A1 |
20090006525 | Moore | Jan 2009 | A1 |
20090010493 | Gornick | Jan 2009 | A1 |
20090017751 | Blum | Jan 2009 | A1 |
20090047016 | Bernard et al. | Feb 2009 | A1 |
20090058630 | Friar et al. | Mar 2009 | A1 |
20090060530 | Biegert et al. | Mar 2009 | A1 |
20090109898 | Adams et al. | Apr 2009 | A1 |
20090191858 | Calisti et al. | Jul 2009 | A1 |
20090267754 | Nguyen et al. | Oct 2009 | A1 |
20090274104 | Addy | Nov 2009 | A1 |
20090276713 | Eddy | Nov 2009 | A1 |
20090285369 | Kandala | Nov 2009 | A1 |
20090315699 | Satish et al. | Dec 2009 | A1 |
20090323904 | Shapiro et al. | Dec 2009 | A1 |
20100071024 | Eyada | Mar 2010 | A1 |
20100073856 | Huang et al. | Mar 2010 | A1 |
20100145161 | Niyato et al. | Jun 2010 | A1 |
20100279664 | Chalk | Nov 2010 | A1 |
20100281312 | Cohn et al. | Nov 2010 | A1 |
20100302025 | Script | Dec 2010 | A1 |
20100302938 | So | Dec 2010 | A1 |
20110003577 | Rogalski et al. | Jan 2011 | A1 |
20110032109 | Fox | Feb 2011 | A1 |
20110044210 | Yokota | Feb 2011 | A1 |
20110058034 | Grass | Mar 2011 | A1 |
20110090334 | Hicks, III | Apr 2011 | A1 |
20110113142 | Rangegowda et al. | May 2011 | A1 |
20110183643 | Martin et al. | Jul 2011 | A1 |
20110197246 | Stancato et al. | Aug 2011 | A1 |
20110211440 | Arsenault et al. | Sep 2011 | A1 |
20110244854 | Hansson et al. | Oct 2011 | A1 |
20110254681 | Perkinson | Oct 2011 | A1 |
20110317622 | Arsenault | Dec 2011 | A1 |
20120084857 | Hubner | Apr 2012 | A1 |
20120099253 | Tang | Apr 2012 | A1 |
20120099256 | Fawcett | Apr 2012 | A1 |
20120163380 | Kolbe et al. | Jun 2012 | A1 |
20120190386 | Anderson | Jul 2012 | A1 |
20120278453 | Baum | Nov 2012 | A1 |
20120314597 | Singh et al. | Dec 2012 | A1 |
20130027561 | Lee | Jan 2013 | A1 |
20130099919 | Cai et al. | Apr 2013 | A1 |
20130103309 | Cai et al. | Apr 2013 | A1 |
20130120132 | Hicks, III | May 2013 | A1 |
20130120138 | Hicks, III | May 2013 | A1 |
20130121239 | Hicks, III | May 2013 | A1 |
20130135993 | Morrill et al. | May 2013 | A1 |
20130155245 | Slamka | Jun 2013 | A1 |
20130170489 | Hicks, III | Jul 2013 | A1 |
20130214925 | Weiss | Aug 2013 | A1 |
20130235209 | Lee et al. | Sep 2013 | A1 |
20130273875 | Martin et al. | Oct 2013 | A1 |
20140095164 | Sone et al. | Apr 2014 | A1 |
20140167969 | Wedig | Jun 2014 | A1 |
20140253326 | Cho et al. | Sep 2014 | A1 |
20150054645 | Hicks, III | Feb 2015 | A1 |
20150056946 | Leggett et al. | Feb 2015 | A1 |
20150085130 | Hicks, III | Mar 2015 | A1 |
20150097683 | Sloo et al. | Apr 2015 | A1 |
20150137967 | Wedig et al. | May 2015 | A1 |
20150364029 | Hicks, III | Dec 2015 | A1 |
20160284205 | Hicks, III | Jun 2016 | A1 |
20160196734 | Hicks, III | Jul 2016 | A1 |
20160225239 | Hicks, III | Aug 2016 | A1 |
20170076562 | Hicks, III | Mar 2017 | A1 |
20170132890 | Hicks, III | May 2017 | A1 |
20170140620 | Hicks, III | May 2017 | A1 |
Number | Date | Country |
---|---|---|
2014216663 | Nov 2014 | JP |
20070105430 | Oct 2007 | KR |
Entry |
---|
U.S. Appl. No. 14/854,294, Hicks, III, John Alson. |
Aedo, Ignacio, et al., “Personalized Alert Notifications and Evacuation Routes in Indoor Environments,” Sensors 12.6 (2012): 7804-7827, 24 pages. |
Number | Date | Country | |
---|---|---|---|
20170140620 A1 | May 2017 | US |