Exemplary embodiments of the present disclosure relate in general to programmable computers, and more particularly to computer systems and computer-implemented methods operable to control on-demand user access to smart alerts generated by a building-safety control system.
Data communication networks transmit digital data from one computer to another computer using a variety of communications channels and protocols. The physical connections between networked computing devices are established using cable media and/or wireless media. The best-known data communication network is actually a network of networks called an internetwork, or simply the Internet. The Internet is the world’s largest network and uses a transmission control protocol/internet protocol (TCP/IP) as its protocol suite, along with using IP as its addressing protocol.
Computers or processors can utilize a data communications network to communicate with or otherwise control other devices or systems on the communications network. For example, so-called building-safety control systems have been developed to facilitate the protection and/or evacuation of a building’s population in emergencies, including fires and earthquakes, as well as less critical events such as power failures. A known building-safety system configuration can include a processor-based controller coupled through a communications network to a variety of smart devices or smart systems of a building, a home, or selected rooms within a building or a home.
For buildings such as rental properties, hotels or office buildings, it can be useful to provide certain users (e.g., hotel guests, short-term renters) with a temporary and controllable way to receive alerts from the relevant building-safety control system. Known methods of providing users with temporary access to alerts from a building-safety control system require interaction between the user and a representative of the building’s owner or manager, as well as the exchange of user information (e.g., the user’s email address) between the user and a representative of the building’s owner or manager.
It would be beneficial to provide a computer system and/or a computer-implemented method that provides users with temporary access to alerts from a building-safety control system without requiring interaction between the user and a representative of the building’s owner or manager, and without requiring the exchange of user information (e.g., the user’s email address) between the user and a representative of the building’s owner or manager.
According to an embodiment, an access controller of a communications network includes a processor operable to send a smart-device access request to a network server of the communications network. The processor is further operable to receive a smart-device access advertisement based at least in part on: the network server receiving the smart-device access request; and a determination by the network server that the processor is within an access area. The processor is further operable to use the smart-device access advertisement to establish access between the processor and a smart-device of the communications network. Subsequent to establishing the access between the processor and the smart-device, the processor is operable to communicate with the smart-device whether or not the processor is within the access area.
In addition to one or more of the features described above, or as an alternative to any of the foregoing embodiments, the determination by the network server that the processor is within the access area is based at least in part on a determination that the smart-device is registered with the network server.
In addition to one or more of the features described above, or as an alternative to any of the foregoing embodiments, the determination by the network server that the processor is within the access area is based at least in part on the processor providing the network server with information of a router that is within the access area.
In addition to one or more of the features described above, or as an alternative to any of the foregoing embodiments, the smart-device communicates with the network server through the router.
In addition to one or more of the features described above, or as an alternative to any of the foregoing embodiments, the smart-device includes a smoke detector; the processor is housed in mobile smartphone; and subsequent to establishing the access between the processor and the smoke detector, the processor receives alerts from the smoke detector.
In addition to one or more of the features described above, or as an alternative to any of the foregoing embodiments, the smart-device includes an indoor air quality detector; the processor is housed in mobile smartphone; and subsequent to establishing the access between the processor and the indoor air quality detector, the processor receives alerts from the indoor air quality detector.
In addition to one or more of the features described above, or as an alternative to any of the foregoing embodiments, the smart-device access advertisement is capable of establishing access between the processor and an additional smart-device of the communications network.
In addition to one or more of the features described above, or as an alternative to any of the foregoing embodiments, the access between the processor and the additional smart-device of the communications network requires that the network server receives additional authorization.
In addition to one or more of the features described above, or as an alternative to any of the foregoing embodiments, the network server includes a cloud server.
In addition to one or more of the features described above, or as an alternative to any of the foregoing embodiments, the processor is incorporated within a mobile smartphone; the network server includes a cloud server; the smart-device includes a smoke detector or an indoor air quality detector; and the access area includes a building or a predetermined region within the building.
According to another embodiment, a computer-implemented method of operating an access controller of a communications network, where the method includes using a processor to send a smart-device access request to a network server of the communications network. The processor is further used to receive a smart-device access advertisement based at least in part on: the network server receiving the smart-device access request; and a determination by the network server that the processor is within an access area. The processor further uses the smart-device access advertisement to establish access between the processor and a smart-device of the communications network. Subsequent to establishing the access between the processor and the smart-device, the processor communicates with the smart-device whether or not the processor is within the access area.
In addition to one or more of the features described above, or as an alternative to any of the foregoing embodiments, the determination by the network server that the processor is within the access area is based at least in part on a determination that the smart-device is registered with the network server.
In addition to one or more of the features described above, or as an alternative to any of the foregoing embodiments, the determination by the network server that the processor is within the access area is based at least in part on the processor providing the network server with information of a router that is within the access area.
In addition to one or more of the features described above, or as an alternative to any of the foregoing embodiments, the smart-device communicates with the network server through the router.
In addition to one or more of the features described above, or as an alternative to any of the foregoing embodiments, the smart-device includes a smoke detector; the processor is housed in mobile smartphone; and subsequent to establishing the access between the processor and the smoke detector, the processor receives alerts from the smoke detector.
In addition to one or more of the features described above, or as an alternative to any of the foregoing embodiments, the smart-device includes an indoor air quality detector; the processor is housed in mobile smartphone; and subsequent to establishing the access between the processor and the indoor air quality detector, the processor receives alerts from the indoor air quality detector.
In addition to one or more of the features described above, or as an alternative to any of the foregoing embodiments, the smart-device access advertisement is capable of establishing access between the processor and an additional smart-device of the communications network.
In addition to one or more of the features described above, or as an alternative to any of the foregoing embodiments, the access between the processor and the additional smart-device of the communications network requires that the network server receives additional authorization.
In addition to one or more of the features described above, or as an alternative to any of the foregoing embodiments, the network server includes a cloud server.
In addition to one or more of the features described above, or as an alternative to any of the foregoing embodiments, the communications network includes a building-safety control (BSC) system; the processor is incorporated within a mobile smartphone; the network server includes a cloud server; the smart-device includes a smoke detector or an indoor air quality detector; and the access area includes a building or a predetermined region within the building.
The following descriptions should not be considered limiting in any way. With reference to the accompanying drawings, like elements are numbered alike:
A detailed description of one or more embodiments of the disclosed systems and methods are presented herein by way of exemplification and not limitation with reference to the Figures.
Embodiments of the present disclosure provide computer systems and computer-implemented methods operable to control on-demand user access to smart alerts generated by a building-safety control system. In embodiments of the disclosure, the on-demand user access is operable to provide a user with access to the smart alerts of an access area by confirming that the user is likely in the access area before providing the user with access to the alerts.
With reference now to
In embodiments of the disclosure, the sensor network 130 can include, for example, electronic heat and smoke sensors; the rechargeable battery system can include a plurality of battery units/sets; and the smart devices 1-32 can include, for example, processor-controlled safety devices (e.g., sprinkler systems, smoke alarms, and the like) and processor-controlled general building systems (e.g., ventilating systems, elevator systems, and the like). The BSC system 100 is operable to monitor the smart sensor network 130; detect a potential building emergency based on the smart sensor network 130; and initiate a variety of responses to the detected building emergency, including, for example, activating audible alarms, automatically notifying local fire departments, activating building sprinkler systems, shutting down ventilating systems, shutting down elevators, and the like.
The various processor-based operations of the BSC system 100 described herein can be allocated in any manner among the devices and systems that make up the BSC system 100. For example, the cloud server 170 is in wired or wireless electronic communication with one or all of remote network server 160, cell tower network 150, antenna system 112, the bus 110, the host 120, the sensor network 130, the rechargeable battery system 140, and devices 1-32. Cloud server 170 can supplement, support, or replace some or all of the functionality of remote network server 160, cell tower network 150, antenna system 112, the bus 110, the host 120, the sensor network 130, the rechargeable battery system 140, and devices 1-32. Additionally, some or all of the functionality of remote network server 160, cell tower network 150, antenna system 112, the bus 110, the host 120, the sensor network 130, the rechargeable battery system 140, and devices 1-32 can be implemented as a node of the cloud server 170.
The methodology 200 begins at block 202 then moves to block 204 where the servers 170, 160 are loaded with identifying information of the device 32, the access area 180, a router 302 (shown in
From block 204, the methodology 200 moves to decision block 206 and determines whether or not a processor of the smartphone 190 (hereinafter, processor 190) sent a smart-device access request to the servers 170, 160. If the answer to the inquiry at decision block 206 is no, the methodology 200 returns to the input to decision block 206 to continue evaluating whether the processor 190 has sent a smart-device access request to the servers 170, 160. If the answer to the inquiry at decision block 206 is yes, the methodology 200 moves to decision block 208 to determine whether the processor 190 is in the access area 180. Any suitable method can be used to make the determination at decision block 208. In some embodiments, the determination at decision block 208 is made by determining whether or not the processor 190 is communicating through the router 308. In some embodiments, the determination is made based on the processor 190 providing the servers 170, 160 with some or all of the identifying information that was used to register the access area 180 as an area where on-demand user access to smart alerts generated by the BSC system 100 will be implemented. If the answer to the inquiry at decision block 208 is no, the methodology 200 returns to the input to decision block 206 to continue evaluating whether the processor 190 has sent a smart-device access request to the servers 170, 160. If the answer to the inquiry at decision block 208 is yes, the methodology 200 moves to block 210 where the servers 170, 160 either transmits or authorizes the transmission of (e.g., through the smart device 32) a smart-device access advertisement to the processor 190. In some embodiments, the smart-device access advertisement can be implemented as a Bluetooth low energy (BLE) advertisement that defines two transmissions types, namely data and advertising transmissions. All peripheral devices, at least initially, begin in advertising mode. Advertising allows devices to broadcast information defining their intentions. In embodiments, the smart-device access advertisement broadcasts its intention to provide the processor 190 with access to the smart device 32, along with instructions on how to initiate that access.
At block 212, the processor 190 uses the smart-device access advertisement to establish communication between the processor 190 and the smart-device 32 that is within the access area 180. At block 214, once the communications authorized at block 212 have been established, the processor 190 is operable to communicate with the smart-device 32 whether or not the processor 190 is within the access area 180. The methodology 200 ends at block 216.
Guest-A is renting the access area 180A for a week and arrives in the access area 180A with a smartphone (or processor) 190 that includes an App 192 operable to control on-demand user access to smart alerts generated by the smoke alarm 32A using the BSC system 100A. In some embodiments, the processor 190 and the App 192 can implement the methodology 200 shown in
The methodology 400 will now be described with reference to S1 through S6 shown in
At S1, Guest-A uses the smartphone/processor 190 and the App 192 to request access to alerts at the access area 180A. At S2, the processor 190 and App 192 scans the router 302 (with or without connecting to it) and extracts identifying information (e.g., SSID (service set identifier), MAC address (media access control address), and the like) of the router 302. At S3, the processor 190 and App 192 send a request to the cloud server 170 for it to enable BLE advertisements from the smoke detector 32A that the cloud server 170 knows is associated with the router 302 and is at the access area 180A. At S4, the cloud server 170 validates the request received at S3, and sends a request through the router 302 to the smoke detector 32A to enable and/or initiate the transmission of BLE advertisements from the smoke detector 32A. In some embodiments, the BLE advertisements are transmitted by the cloud server 170. At S5, the processor 190 and the App 192 scan the BLE advertisement and confirms Guest-A’s presence at the Access Area 180A. At S6, the processor 190 and the App 192 confirm Guest-A’s presence at the Access Area 180A to the cloud server 170. After S6, the smartphone 190 and the App 192 receive access to safety alerts from the smoke detector 32A even when the smartphone 190 is no longer within the access area 180A.
In embodiments, various limits can be placed on the access provided through the BLE advertisement generated by S1-S6. For example, in some embodiments, the access provided through the BLE advertisement can be operable to automatically expire after a predetermined time that corresponds to the duration of Guest-A’s stay at the access area 180A. In some embodiments, the access provided through the BLE advertisement can be limited to selected basic types of the smart devices 1-32, and access to more sophisticated types of the smart devices 1-32 can require additional authorization (e.g., building owner authorization), Guest-A authentication information, Guest-A status information (e.g., Guest-A is in a preferred customer program), and the like.
Exemplary computer 502 includes processor cores 504, main memory (“memory”) 510, and input/output component(s) 512, which are in communication via bus 503. Processor cores 504 includes cache memory (“cache”) 506 and controls 508, which include branch prediction structures and associated search, hit, detect and update logic, which will be described in more detail below. Cache 506 can include multiple cache levels (not depicted) that are on or off-chip from processor 504. Memory 510 can include various data stored therein, e.g., instructions, software, routines, etc., which, e.g., can be transferred to/from cache 506 by controls 508 for execution by processor 504. Input/output component(s) 512 can include one or more components that facilitate local and/or remote input/output operations to/from computer 502, such as a display, keyboard, modem, network adapter, etc. (not depicted).
Embodiments of the disclosure described herein can be a system, a method, and/or a computer program product at any possible technical detail level of integration. The computer program product may include a computer readable storage medium (or media) having computer readable program instructions thereon for causing a controller or processor to carry out aspects of the embodiments of the disclosure.
The computer readable storage medium can be a tangible device that can retain and store instructions for use by an instruction execution device. The computer readable storage medium may be, for example, but is not limited to, an electronic storage device, a magnetic storage device, an optical storage device, an electromagnetic storage device, a semiconductor storage device, or any suitable combination of the foregoing. A non-exhaustive list of more specific examples of the computer readable storage medium includes the following: a portable computer diskette, a hard disk, a random access memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or Flash memory), a static random access memory (SRAM), a portable compact disc read-only memory (CD-ROM), a digital versatile disk (DVD), a memory stick, a floppy disk, a mechanically encoded device such as punch-cards or raised structures in a groove having instructions recorded thereon, and any suitable combination of the foregoing. A computer readable storage medium, as used herein, is not to be construed as being transitory signals per se, such as radio waves or other freely propagating electromagnetic waves, electromagnetic waves propagating through a waveguide or other transmission media (e.g., light pulses passing through a fiber-optic cable), or electrical signals transmitted through a wire.
For the sake of brevity, conventional techniques related to making and using the disclosed embodiments may or may not be described in detail herein. In particular, various aspects of computing systems and specific computer programs to implement the various technical features described herein are well known. Accordingly, in the interest of brevity, many conventional implementation details are only mentioned briefly or are omitted entirely without providing the well-known system and/or process details.
Many of the function units of the systems described in this specification have been labeled or described as modules. Embodiments of the disclosure apply to a wide variety of module implementations. For example, a module can be implemented as a hardware circuit including custom VLSI circuits or gate arrays, off-the-shelf semiconductors such as logic chips, transistors, or other discrete components. A module can also be implemented in programmable hardware devices such as field programmable gate arrays, programmable array logic, programmable logic devices or the like. Modules can also be implemented in software for execution by various types of processors. An identified module of executable code can, for instance, include one or more physical or logical blocks of computer instructions which can, for instance, be organized as an object, procedure, or function. Nevertheless, the executables of an identified module need not be physically located together but can include disparate instructions stored in different locations which, when joined logically together, function as the module and achieve the stated purpose for the module.
The various components, modules, sub-function, and the like of the systems illustrated herein are depicted separately for ease of illustration and explanation. In embodiments of the disclosure, the operations performed by the various components, modules, sub-functions, and the like can be distributed differently than shown without departing from the scope of the various embodiments described herein unless it is specifically stated otherwise.
For convenience, some of the technical operations described herein are conveyed using informal expressions. For example, a processor that has data stored in its cache memory can be described as the processor “knowing” the data. Similarly, a user sending a load-data command to a processor can be described as the user “telling” the processor to load data. It is understood that any such informal expressions in this detailed description should be read to cover, and a person skilled in the relevant art would understand such informal expressions to cover, the formal and technical description represented by the informal expression.
The terms “about,” “substantially,” “approximately,” and variations thereof, are intended to include the degree of error associated with measurement of the particular quantity based upon the equipment available at the time of filing the application. For example, “about” can include a range of ± 8% or 5%, or 2% of a given value.
The terminology used herein is for the purpose of describing particular embodiments only and is not intended to be limiting of the present disclosure. As used herein, the singular forms “a”, “an” and “the” are intended to include the plural forms as well, unless the context clearly indicates otherwise. It will be further understood that the terms “comprises” and/or “comprising,” when used in this specification, specify the presence of stated features, integers, steps, operations, elements, and/or components, but do not preclude the presence or addition of one or more other features, integers, steps, operations, element components, and/or groups thereof.
While the present disclosure has been described with reference to an exemplary embodiment or embodiments, it will be understood by those skilled in the art that various changes may be made and equivalents may be substituted for elements thereof without departing from the scope of the present disclosure. In addition, many modifications may be made to adapt a particular situation or material to the teachings of the present disclosure without departing from the essential scope thereof. Therefore, it is intended that the present disclosure not be limited to the particular embodiment disclosed as the best mode contemplated for carrying out this present disclosure, but that the present disclosure will include all embodiments falling within the scope of the claims.
This application claims the benefit of U.S. Provisional Application No. 63/342,334 filed May 16, 2022, the disclosure of which is incorporated herein by reference in its entirety.
Number | Date | Country | |
---|---|---|---|
63342334 | May 2022 | US |