This application relates to security systems and more particular to methods of protecting user outside of secure areas.
Systems are known to protect people and assets within secured areas. Such systems are typically based upon the use of one more wireless sensors that detect threats within the secured area.
Threats to people and assets may originate from any of number of different sources. For example, a fire may kill or injure occupants who have become trapped by a fire in a home. Similarly, carbon monoxide from a fire may kill people in their sleep.
Alternatively, an unauthorized intruder, such as a burglar, may present a threat to assets within the area. Intruders have also been known to injure or kill people living within the area.
In the case of intruders, sensors may be placed in different areas based upon the respective uses of those areas. For example, if people are present during some portions of a normal day and not at other times, then sensors may be placed along a periphery of the space to provide protection while the space is occupied while additional sensors may be placed within an interior of the space and used when the space is not occupied.
In most cases, threat detectors are connected to a local control panel. In the event of a threat detected via one of the sensors, the control panel may sound a local audible alarm. The control panel may also send a signal to a central monitoring station.
While conventional security systems work well, it is sometimes difficult to protect authorized users of the secured area outside the secured area. Accordingly, a need exists for better methods and apparatus for protecting people associated with secured areas.
While disclosed embodiments can take many different forms, specific embodiments thereof are shown in the drawings and will be described herein in detail with the understanding that the present disclosure is to be considered as an exemplification of the principles thereof as well as the best mode of practicing same, and is not intended to limit the application or claims to the specific embodiment illustrated.
Still other of the sensors may be environmental sensors. In this case, the sensors may be fire, smoke or toxic gas detectors.
The sensors may be monitored by a control panel 18, either located within the secured area as shown in
The security system may be armed and disarmed via a control panel 22. In order to arm or disarm the system, an authorized human user may enter a personal identification number (PIN) through a keyboard 26 along with a function key (e.g., arm, disarm, etc.). In response, a status of the security system is shown on a display 24.
Also included within the security system is a portable wireless device 28 carried by an authorized user of the security system. The portable device includes a locating device (e.g., a GPS device) 30 that periodically determines and reports the geographic location of the user to the control panel.
Present within the control panel, the user interface and the portable device may be one or more processor apparatus (processors) 32, 34, each operating under control of one or more computer programs 36, 38 loaded from a non-transitory computer readable medium (memory) 40. As used herein, reference to a step performed by a program is also reference to the processor that executed that step.
For example, an alarm processor within the control panel may monitor the sensors. Upon detecting activation of one of the sensors, the processor composes an alarm message for transmission to the central monitoring station. The message may include an identifier of the security system (e.g., an account number, address, etc.), an identifier of the sensor, an identifier of the type of sensor (e.g., fire, smoke, toxic gas, etc.) and a time.
Similarly, a status processor may establish an operating mode of the security system (e.g., armed, armed away, disarmed, etc.) based upon instructions received through the user interface. Once armed, the status processor enables the alarm processor to send alarm messages to the central monitoring station.
Under one illustrated embodiment, a travel monitoring process (and processor) operates in the background to provide additional protection to authorized human users in the event that the user must travel outside of the secured area. Under the embodiment, the travel processor may monitor the keyboard of the user interface for entry of a geographic identifier of a destination 42. The identifier may be an address or a local or regional identifier (e.g., a name of a city, a regional airport, etc.). In response to entry of a destination, the travel processor monitors the geographic activity of the authorized user with respect to the travel destination and notifies other authorized users through the user interface or at the intended destination upon detecting any suspicious activity.
The travel processor forms a communications connection with a location processor within the portable device. The location processor periodically retrieves geographic coordinates of the portable device and reports those coordinates to the travel processor. The travel processor compares the received coordinates of the portable device with the entered (saved) coordinates of the destination and upon detecting a difference generates an alert. The alert may be in the form of an audio message (e.g., a chime) that periodically repeats (e.g., every 10 seconds) until acknowledged by a user.
Under another illustrated embodiment, the generation of the alert may be conditioned upon a threshold value 42. In this regard, the threshold value may be a predetermined distance outside the area of the destination that the user must cross before an alert is generated.
Under the embodiment, the destination may be defined by a set of geographic coordinates that define a periphery of an area of the destination (e.g., a city, college campus, etc.). Adding the threshold value to the set of coordinates provides a buffer defined by using another set of coordinates 44 that, if crossed by the user, results in generation of the alert. The threshold (as with the travel destination) may be entered by an authorized user through the user interface.
Under another illustrated embodiment, the travel destination may be associated with a time frame including a beginning time and an ending time. Under this embodiment, alerts are not generated until after the start time and are not generated after the ending time.
Under another illustrated embodiment, the authorized user may enter a travel route 46 from the secured area to the travel destination. The travel route may also be associated with a threshold distance 48 on each side of the travel route. The distance on either side of the route defines a travel corridor between the secured area and travel destination. The threshold value from the travel route (i.e., the travel corridor) allows the user traveling in a car, for instance, to exit an expressway for gasoline without triggering an alert.
The system of
The system of
The system also provides protection while individuals are traveling. For example, the system provides a way to identify the location of individuals traveling along an intended path so that the individual reaches the intended destination safely and on time. If there is any deviation detected, alerts are raised that attract the attention of personal care takers and available emergency response teams. This feature is referred to as the “Special Escort Mode” of the security panel.
In general, many prior art systems operate on the concept that individuals will use the panic button when they are in a panic situation to summon help. But in many scenarios the control panel of a security panel may not be close by and it may not be possible for individuals to press any keys/buttons. The system of
The system of
The extended chime mode can be used by individuals who are staying away from home, such as driving age children staying in hotels or hostels. The panel can detect when the received GPS data has not changed for an inordinate amount of time. This could indicate that something is wrong. The detection of this situation may result in the issuance of an extended chime alert.
The system can be used in the case of a residential school to monitor the location of children staying within a campus of the school. Any deviations can result in an alert.
Alternatively, the geographic activity of the child can monitored via a GPS log maintained by a logging processor within the security system. Parents can view the GPS logs captured in the panel in order to monitor their children's locations when they are staying away from home. The GPS logs and alerts can be used for any diagnostic purpose.
The use of the special escort mode is shown in
The system can be used in any of a number of different situations. For example, the system can be used by people who travel using cab services or by individual who travel at night. The system can be used by individuals whose travel path extends through some remote areas where the crime rate is high.
In general, the system includes a security system that protect a secured geographic area, a geographic location outside of the secured area of an authorized human user of the security system saved in a memory of the security system and a processor of the security system that tracks activity of the authorized user by geographic location outside of the secured area and generates an alert upon detecting that a difference between the tracked geographic location of the authorized user and saved location exceeds a threshold value.
Alternatively, the system includes a security system that protect a secured geographic area, a portable wireless device carried by an authorized user of the secured area that periodically reports the user's geographic location to the security system, a geographic location of the user outside of the secured area saved in a memory of the security system and a processor of the security system that tracks the geographic activity and location of the user outside of the secured area and generates an alert upon detecting that a difference between the tracked geographic location and saved location exceeds a threshold value.
Alternatively, the system includes a security system having a plurality of threat sensors that protect a secured geographic area, a portable wireless device carried by an authorized user of the secured area having a global positioning device that periodically reports the user's geographic location to the security system, a set of geographic coordinates saved in a memory of the security system that defines a predefined area of the user outside of the secured area and a processor of the security system that tracks the geographic location of the user outside of the secured area and that generates an audible alert through a control panel of the security system upon detecting the portable device outside the predefined area.
From the foregoing, it will be observed that numerous variations and modifications may be effected without departing from the spirit and scope hereof. It is to be understood that no limitation with respect to the specific apparatus illustrated herein is intended or should be inferred. It is, of course, intended to cover by the appended claims all such modifications as fall within the scope of the claims. Further, logic flows depicted in the figures do not require the particular order shown, or sequential order, to achieve desirable results. Other steps may be provided, or steps may be eliminated, from the described flows, and other components may be add to, or removed from the described embodiments.