The field relates to security systems and, more particularly, to methods of trigging security alerts.
Security systems are generally known. Such systems are typically used to protect people and assets within a secured area, such as a home or a business, from any of a number of different threats.
For example, a security system may be arranged to detect threats from unauthorized intruders entering the secured area. Alternatively, the security system may be used to detect environmental threats, such as fires, carbon monoxide, or natural gas leaks.
In many cases, a number of sensors may be distributed throughout the secured area. For example, fire detectors may be provided in hallways or near combustion sources. Similarly, limit switches may be provided on the doors and the windows of the secured area.
A control panel may monitor the status of each sensor. Upon activation of a sensor, the panel may send an alert to a central monitoring station. The central monitoring station may respond by alerting the police or the fire department.
While security systems work well, they may not be able to protect an occupant from an intruder who has entered a secured area without tripping a sensor. Accordingly, a need exists for better methods of protecting occupants.
While embodiments can take many different forms, specific embodiments thereof are shown in the drawings and will be described herein in detail with the understanding that the present disclosure is to be considered as an exemplification of the principles hereof as well as the best mode of practicing the same. No limitation to the specific embodiment illustrated is intended.
Also included within the secured area may be a control panel 18 that monitors each of the sensors. Upon activation of one of the sensors, the control panel may send an alarm message to a central monitoring station 20. The alarm message may be sent to the central monitoring station via an Internet connection, a general public radio system (GPRS), or any wired or wireless communication or cloud platform that supports a connection between the resources of the local security system and the central monitoring station. The central monitoring station may respond by dispatching the police or the fire department.
The control panel may contain a number of control resources, including one or more processor apparatuses (processors) 22, 24 executing one or more computer programs 26, 28 loaded from a non-transient computer readable medium (memory) 30. As used herein, reference to a step performed by a program is also reference to the processor that executed that step.
During operation of the security system, an alarm processor may monitor the status of each of the sensors. Upon detecting activation of one of the sensors, the alarm processor may compose an alarm message and send that alarm message to the central monitoring station. The alarm message may include an identifier of the security system (e.g., an address, an account number, etc.), an identifier of the sensor, a type of sensor, and a time. The central monitoring station may respond by dispatching the appropriate help (e.g., police, firemen, etc.).
The security system may be controlled via a user interface 32. The user interface may be incorporated into the control panel.
The user interface, in turn, may include a display 34 that shows a status of the security system. The display may also be a touch sensitive device that accepts inputs from an authorized user, or the user interface may include a separate keyboard 36 that receives inputs from the user.
During normal use, the authorized user may arm and disarm the security system through the user interface. In this regard, the user may enter a personal identification number (PIN) and activate one of a number of function keys on the interface. For example, the user may enter his/her identifier and activate an “arm” or “arm away” button to arm the security system. Alternatively, the user may enter his/her identifier followed by activation of the “disarm” button to disarm the system.
The user interface may also be implemented on a portable user device 38 (e.g., a smartphone) carried by the authorized user as one or more applications 26, 28 executing on one or more processors 22, 24 of the portable user device. In this regard, the portable user device may exchange wireless signals with the control panel via a transceiver 40 and a wireless access point 42 within the secured area under an appropriate communication protocol (e.g., IEEE 802.11). In this case, an interface processor within the control panel may download an interface screen to the portable user device that mimics the operation of the user interface 32 on the display screen and the keyboard of the portable user device. Using the interface screen on the portable user device, the user may enter his/her PIN and control the operation of the security system.
Alternatively, the portable user device may form a connection with the control panel remotely via the Internet. As above, the interface processor may authenticate the user via an entered PIN number and execute commands entered through the portable user device.
Alternatively or in addition, the portable user device 38 is provided with a panic alert mobile application 44 that executes in the background on one of the processor apparatuses of the portable mobile device. In this regard, the panic application monitors a voice of the authorized user for a verbal code indicating that the user has been threatened. Once the verbal code has been detected, the panic alert application may send a silent alarm or a panic alert to the central monitoring station through the control resources of the secured area.
In this regard, the verbal code is a string of words that would not normally be used in conversation by the user. The user, in fact, may save a number of respective voice strings in a memory of the portable device that each represents and would be appropriate for a particular threat situation.
In this regard, the use of codes based upon any of a number of word strings offers a number of advantages of prior methods. For example, if the authorized user is being held by an intruder at gunpoint, then the user would not be able to trigger a panic alarm through the user interface of his/her home security system.
Alternatively, if the intruder disables the security system, ambushes the user, and has the user at gunpoint, then the panic alert application may still operate to achieve its intended objectives. In this regard, the panic alert application may detect the malfunctioning or non-functioning security system and send an alert directly to the central monitoring station through a cellular or Internet interface normally available within the portable device.
In addition, operation of the panic alert application is not dependent upon who has possession of the portable electronic device. In this regard, the intruder could demand and receive the portable electronic device from the user before the user is able to verbally provide the appropriate code words. In this case, the programmed processor executing the panic alert application sends the alert to the central monitoring station while in the possession of the intruder.
In general, the panic alert application comprises a number of programs executing on the same or different processors. One of those programs is a word recognition processor that uses natural language processing to recognize any spoken words. Another processor is an authentication processor that authenticates the user. Still another may be a set-up processor that is activated by the user to record word strings for generating panic alarms. A monitoring processor may combine and coordinate other processors in order to detect and generate panic alerts.
In this regard, the set-up processor of the portable electronic device may be activated via the authorized user entering a PIN and a set up function through a user interface of the portable electronic device. The user may then verbally provide one or more word sequences through a microphone on the portable electronic device. The provided words may be processed by the word recognition processor and the authentication processor. In this regard, the word processor may identify the provided words before entry into the corresponding verbal code file. Examples of word codes could include “take everything except my mobile” or “hey, it's my friend Jack's mobile.” In addition, the authentication processor and an associated Fourier processor may process the verbal content of each word of the provided words to obtain a set of voice biometrics of each of the spoken words. Voice biometrics, in this case, include the frequency content obtained as a time profile in the expression of each word. This frequency profile is associated with the particular word spoken, is used as a unique signature of the user for that word, and can be later used to differentiate between the authorized user and some other person speaking that same word. As the user provides each word code during set-up, the recognized word and the word signature are saved by the set-up processor in a respective code word file of the portable electronic device.
During normal use, the monitoring processor operates in the background, consuming very little power as it monitors for code words. As each verbal expression is detected, the word processor identifies the word, and the authentication processor attempts to match the verbal metrics of the word recognized by the word processor with the verbal metrics of the authorized user speaking that same word.
By recognizing each word and matching the verbal metrics with each word, the monitoring processor is able to isolate words spoken by the authorized user from a conversation involving other persons proximate the portable electronic device. This avoids the possibility of false alarms caused by the random juxtaposition of words from many people engaging in normal conversation.
As the monitoring processor receives each word from the word recognition processor, the word is added to a code hypothesis string that is then compared with the contents of each code word file. Words spoken by the authorized user are added to the string. Words spoken by other persons are simply deleted. The most recent word spoken by the user is added to the front of the string. Older words may be deleted from the end based upon the time window used.
Whenever a match is found between a sequence of words spoken by the authorized user and a code file, a notification is sent to an alert processor. The alert processor may compose an alert message and transfer the alert to the central monitoring station through the alarm panel or directly to the central monitoring station if the control panel has been disabled. The central monitoring processor may respond by summoning the police.
In another embodiment, the system may include multiple portable electronic devices independently used by respective authorized users. In this case, the respective set-up processor may save separate word code files for each authorized user in each respective device or may save them in the memory of the control panel and download the word code files of each authorized user into the respective portable electronic device during startup. In each case, whenever the portable electronic device detects a match between a word code file and the spoken words of an authorized user, the device sends a panic alert to the central monitoring station. The alert may include an identification of the security system, an identifier of the portable electronic device, an identifier of the authorized user, and a time of the alert.
In another embodiment, the panic alert is sent to the mobile devices of family or friends of the authorized user. In this case, the alert may be forwarded by the central monitoring station. Alternatively, the alert may be forwarded directly from the portable electronic device of the authorized user.
In another embodiment, the panic alert mobile application is loaded onto any wearable device, sensor, or computer that has the ability to receive and process voice and to transmit wireless signals.
In another embodiment, the processor executing the panic alert mobile application reports a panic alert to the central monitoring station without any visual or audible indication emitted from the mobile device so that an intruder does not notice the communication.
In general, the system may include a panic alert mobile application of a security system that protects a secured geographic area executing on a portable electronic device of an authorized user, the panic alert mobile application retrieving a predetermined word sequence associated with the authorized user, the panic alert mobile application continuously monitoring spoken words of the authorized user, the panic alert mobile application detecting the predetermined word sequence in the spoken words of the authorized user, and the panic alert mobile application reporting a panic alert to a central monitoring station of the security system.
The system may include a central monitoring station that protects a secured area via a local security system, and a portable electronic device of an authorized user of the local security system, wherein the portable electronic device executes a panic alert mobile application of the local security system, and wherein the panic alert mobile application continuously monitors for spoken words of the authorized user, detects a predetermined word sequence in the spoken words, and reports a panic alert to the central monitoring station of the local security system in response to detecting the predetermined word sequence.
Alternatively, the system may include a security system that protects a secured area, a central monitoring station that receives alarm messages from the security system and a portable electronic device of at least one authorized user of the security system, wherein the portable electronic device executes a panic alert mobile application of the security system, and wherein a processor of the panic alert mobile application saves at least one word sequence from the at least one authorized user, continuously monitors for spoken words of the at least one authorized user, detects a first word sequence in the spoken words that matches the at least one word sequence, and reports a panic alert to the central monitoring station of the security system in response to detecting a match.
From the foregoing, it will be observed that numerous variations and modifications may be effected without departing from the spirit and scope hereof. It is to be understood that no limitation with respect to the specific apparatus illustrated herein is intended or should be inferred. It is, of course, intended to cover by the appended claims all such modifications as fall within the scope of the claims.
Number | Name | Date | Kind |
---|---|---|---|
4897862 | Nishihara et al. | Jan 1990 | A |
6496111 | Hosack | Dec 2002 | B1 |
7245204 | Ramos et al. | Jul 2007 | B2 |
7376565 | Gandhi et al. | May 2008 | B2 |
7884714 | Fein et al. | Feb 2011 | B2 |
8264346 | Petricoin et al. | Sep 2012 | B2 |
8461983 | McCauley | Jun 2013 | B2 |
9141150 | Trundle | Sep 2015 | B1 |
20080287109 | Marett et al. | Nov 2008 | A1 |
20110021172 | Ricordi | Jan 2011 | A1 |
20110144996 | Ma | Jun 2011 | A1 |
Number | Date | Country |
---|---|---|
298 08 958 | Aug 2000 | DE |
2 291 238 | Jan 1996 | GB |
2 298 067 | Aug 1996 | GB |
20-0446385 | Oct 2009 | KR |
WO 2005079178 | Sep 2005 | WO |
WO 2012141606 | Oct 2012 | WO |
Entry |
---|
Combined Search and Examination Report for corresponding GB patent application 1412025.7, dated Dec. 19, 2014. |
ICAP Patent Brokerage, Turn Your Mobile Phone Into a Panic Button. ICAP Patent Brokerage Announces for Auction a Patented Method to Add Important Personal Safety and Security Functionality to Mobile Phones, http://www.prnewswire.com/news-releases/turn-your-mobile-phone-into-a-panic-button-icap-patent-brokerage-announces-for-auction-a-patented-method-to-add-important-personal-safety-and-security-functionality-to-mobile-phones-159445175.html, Jun. 18, 2012. |
Number | Date | Country | |
---|---|---|---|
20150022347 A1 | Jan 2015 | US |