This application is based on the Provisional specification filed in relation to New Zealand Patent Application No. 753100, the entire contents of which are incorporated herein by reference.
The present disclosure relates to security technologies, and more particularly security installations in which alarm notifications are issued to user devices and methods for managing same.
Physical security systems are widely known for detecting alarm conditions at a site and issuing alerts to monitoring stations or to authorized users. Advancements in communications technology and increasing levels of connectivity means that such alerts can be delivered with a relatively high degree of certainty of being received by the intended recipients.
However there remains room for improvement, particularly with regard to ease and clarity of establishing responsibility for actioning a response to such alerts and providing complete and accurate recording-keeping of activity associated with an alarm event.
Further, in many instances sites having such security systems will also have other site management systems in place, for example providing access control. The effectiveness of a response will be influenced by the ability of a responder to navigate such site management systems, balanced against a desire to avoid compromising the integrity of the site's security.
Aspects of the technology of the present disclosure are directed to overcoming one or more of the problems discussed above. It is an object of the present invention to address one or more of the foregoing problems or at least to provide the public with a useful choice.
Further aspects and advantages of the present disclosure will become apparent from the ensuing description which is given by way of example only.
According to one aspect of the present technology there is provided a security system including:
an on-site security system including:
a security management service located remotely from the on-site security system, configured to communicate with the site control unit and at least one authorised user associated with the on-site security system.
According to one aspect of the present technology there is provided a security system including:
an on-site security system including:
a security management service located remotely from the on-site security system and configured to communicate with the site control unit and at least one authorised user associated with the on-site security system, the security management service including one or more processors and one or more non-transitory computer-readable media that collectively store instructions that when executed by the one or more processors cause the service to perform operations including:
issuing an alarm notification to the at least one authorised user, the alarm notification identifying at least: the alarm condition sensor triggering issuance of the alarm notification, a location of the alarm condition sensor, and a time of the alarm condition sensor being triggered;
monitoring for acknowledgement of the alarm notification from the authorised user; and
issuing a response request to at least one security responder in the absence of an acknowledgement.
A computer-implemented method of managing an alarm event using a security system including an on-site security system including one or more alarm condition sensors and at least one site control unit configured to communicate with the alarm condition sensors, and a security management service located remotely from the on-site security system and configured to communicate with the site control unit and at least one authorised user associated with the on-site security system, the method including: issuing an alarm notification to at least one authorised user, the alarm notification identifying at least: a sensor triggering issuance of the alarm notification, a location of the sensor, and a time of the sensor being triggered; monitoring for acknowledgement of the alarm notification from the authorised user; and issuing a response request to at least one security responder in the absence of an acknowledgement, wherein the response request directs the at least one security responder to attend a site location associated with the on-site security system.
According to one aspect of the present technology there is provided at least one user interface for communication with the security management service to perform one or more of: establishing one or more user profiles, editing privileges of each user profile regarding the on-site security system, issuing notifications regarding events within the security system, viewing details of the events, claiming responsibility for the events, providing updates on the events, enabling requests for external services to be made, and reporting.
According to one aspect of the present technology there is provided a user device configured to provide the at least one user interface.
According to one aspect of the present technology there is provided a method of notifying at least one user of an alarm event, the method including:
issuing an alarm notification to at least one authorised user, the alarm notification identifying at least: a sensor triggering issuance of the alarm notification, a location of the sensor, and a time of the sensor being triggered,
wherein the alarm notification further includes an indication of a likelihood of the alarm notification relating to a false alarm event.
According to one aspect of the present technology there is provided a method of managing an alarm event, the method including:
issuing an alarm notification to at least one authorised user, the alarm notification identifying at least: a sensor triggering issuance of the alarm notification, a location of the sensor, and a time of the sensor being triggered;
receiving acknowledgement of the alarm notification from the authorised user, the acknowledgment identifying the individual making the acknowledgement, and a time of the acknowledgment; and
issuing a response request to at least one security responder.
According to one aspect of the present technology there is provided a method of managing an alarm event, the method including:
issuing an alarm notification to at least one authorised user, the alarm notification identifying at least: a sensor triggering issuance of the alarm notification, a location of the sensor, and a time of the sensor being triggered;
monitoring for acknowledgement of the alarm notification from the authorised user; and
issuing a response request to at least one security responder in the absence of an acknowledgement.
According to one aspect of the present technology there is provided a method for access control, including:
receiving an arrival notification from a security responder advising arrival at a location having an access control system following issuance of a response request resulting from generation of an alarm notification;
deactivating at least a portion of the access control system;
receiving a departure notification from the security responder advising intended departure from the location; and
activating the access control system.
In examples, the location may include a security alarm system. The location may be referred to herein as a site-location. On receiving the arrival notification, at least a portion of the security alarm system may be deactivated. Similarly, on receiving the departure notification the security alarm system may be activated. In examples, the security alarm system may be activated automatically in the absence of a departure notification an on at least one predetermined condition being met—for example on determining that the security responder has exited the site (such as using geolocation tracking), or on a predetermined period of time expiring. It is also contemplated that such control may be provided in examples in which the location does not implement an access control system—i.e. only a security alarm system is present.
According to one aspect of the present technology there is provided a method for access control, including:
receiving an arrival notification from a security responder advising arrival at a location implementing an access control system following issuance of a response request resulting from generation of an alarm notification;
activating access control permissions of a device of the security responder, the access control permissions allowing at least partial control of the access control system;
receiving a departure notification from the security responder advising intended departure from the location; and
disabling the access control permissions of the device of the security responder.
In examples, the location may include a security alarm system. On receiving the arrival notification, security alarm permissions of the device of the security responder may be activated, allowing at least partial control of the security alarm system. Similarly, on receiving the departure notification the security alarm permissions may be deactivated. In examples, the security alarm permissions may be automatically deactivated in the absence of a departure notification. It is also contemplated that such control may be provided in examples in which the location does not implement an access control system—i.e. only a security alarm system is present.
In examples, issuing a response request to at least one security responder may include selecting between a plurality of potential security responders based on one or more characteristics. In examples the one or more characteristics may include: an indication of availability, price, an indicator of likely response time, a customer satisfaction rating, and one or more performance metrics based on responses to prior events.
According to one aspect of the present technology there is provided a method of managing an alarm event, the method including:
determining a location of at least one sensor triggering issuance of an alarm notification within a site in which the sensor is installed; and
communicating an indication of the location to a security responder who has been requested to attend the site in response to the alarm notification.
The location of the at least one sensor within the site location may be referred to herein as an in-site location.
According to one aspect of the present technology there is provided a method of generating an incident report, the method including:
issuing an alarm notification to at least one authorised user, the alarm notification identifying at least: a sensor triggering issuance of the alarm notification, a location of the sensor, and a time of the sensor being triggered;
receiving acknowledgement of the alarm notification from the authorised user, the acknowledgment identifying the individual making the acknowledgement, and a time of the acknowledgment;
issuing a response request to at least one security responder;
receiving at least one notification of security responder activity, including details of at least: time of acknowledging the response request, time of arrival at a location associated with the alarm notification, and time of departing the location; and
generating an incident report, including a sequential record of the issuance of the alarm notification, the acknowledgement of the alarm notification, the issuance of the response request, and the at least one notification of security responder activity.
A method for attending to payment of an external provider's services, including:
receiving a request for an external provider's services;
recording external provider activity, including a confirmation of the external provider initiating the service, and a confirmation of the external provider concluding the service;
receiving a request for payment from the external provider;
verifying the request for payment through the recorded external provider activity; and
charging the customer.
A method for attending to payment of security services, including:
receiving a request for a security responder to attend a customer's site having an associated alarm notification;
recording security responder activity, including a confirmation of the security responder attending the site, and a confirmation of the security responder exiting the site;
receiving a request for payment from a security provider associated with the security responder;
verifying the request for payment through the recorded security responder activity; and charging the customer.
The above and other features will become apparent from the following description and the attached drawings.
Further aspects of the present disclosure will become apparent from the following description which is given by way of example only and with reference to the accompanying drawings in which:
The instructions 1110 may include any set of instructions suitable for execution by the processors 1106. For example, the instructions 1110 may be stored as computer code on the computer-readable medium. The instructions may be stored in any suitable computer language or format. Data 1112 may be retrieved, stored or modified by processors 1106 in accordance with the instructions 1110. The data 1112 may also be formatted in any suitable computer readable format. Again, while the data is illustrated as being contained at a single location, it should be appreciated that this is not intended to be limiting—the data may be stored in multiple memories or locations. The data 1112 may include databases 1114 storing data relating to operation of the on-site security system 1100, for example access privileges, alarm protocols, and historical information relating to events within the system 1100.
The control unit 1102 may include a first communications module 1116 configured to communicate using a first type of communications (for example, via a broadband connection—whether via a WiFi connection and/or ethernet connection), and a second communications module 1118 configured to communicate using a second type of communications (for example, via a cellular network connection).
The on-site security system 1100 includes one or more alarm condition sensors 1120 configured to communicate with the control unit 1102 to provide data that may be used to detect occurrence of a security event. Examples of such alarm condition sensors 1120 may include: motion detectors for detecting motion within an area (e.g. PIR motion detectors), door/window detectors for detecting opening and/or closing of a door/window (e.g. reed switches), smoke and/or gas and/or heat detectors, video cameras (which may also provide motion detection capabilities, and image recognition capabilities) and associated recording capabilities (for example, a network video recorder), and security fences with tamper and/or attempted breach detection capabilities (for example via sensing of electrical fence characteristics, vibration sensors, and/or tension sensors).
The on-site security system 1100 further includes one or more access control devices 1130 configured to control access to areas within the site, and in communication with the control unit 1102. Examples of such access control devices 1130 may include: readers 1132 configured to read devices providing access privileges (e.g. card and/or Bluetooth/NFC enabled devices), biometric readers (e.g. via finger, iris, or facial recognition), keypads, request to exit devices (e.g. push buttons), and electronic locks (e.g. mortise or magnetic) controlled by same.
The on-site security system 1100 further includes one or more on-site response devices 1140 controllable by the control unit 1102 to be activated in response to determination of a security event being in progress. Examples of such on-site response devices 1140 may include devices to act as a deterrent to an intruder (or draw attention to the presence of an intruder), such as a siren, a strobe, or a floodlight.
Returning to
It is envisaged that the security management service 1200 may control the control unit 1102 and facilitate communications with various parties, including individuals associated with the site in which the on-site security system 1100 is installed (the owner/operator of the site will be referred to herein as the “customer”), security response providers (for example, contracted security services), and potentially emergency response services. However, the control unit 1102 may be configured to operate in an off-line mode in the absence of a connection to the security management service 1200. For example, the control unit 1102 may maintain a local record of alarm condition and access control protocols, and record incidents occurring within the on-site security system 1100, until a connection can be re-established, and updates made.
In this exemplary embodiment, the security management service 1200 is illustrated as being implemented in a server—for example one or more dedicated server devices, or a cloud-based server architecture. By way of example, cloud servers implementing the data management service 1200 may have processing facilities represented by processors 1202, memory 1204, and other components typically present in such computing environments. In the exemplary embodiment illustrated the memory 1204 stores information accessible by processors 1202, the information including instructions 1206 that may be executed by the processors 1202 and data 1208 that may be retrieved, manipulated or stored by the processors 1202. The memory 1204 may be of any suitable means known in the art, capable of storing information in a manner accessible by the processors, including a computer-readable medium, or other medium that stores data that may be read with the aid of an electronic device. The processors 1202 may be any suitable device known to a person skilled in the art. Although the processors 1202 and memory 1204 are illustrated as being within a single unit, it should be appreciated that this is not intended to be limiting, and that the functionality of each as herein described may be performed by multiple processors and memories, that may or may not be remote from each other. The instructions 1206 may include any set of instructions suitable for execution by the processors 1202. For example, the instructions 1206 may be stored as computer code on the computer-readable medium. The instructions may be stored in any suitable computer language or format. Data 1208 may be retrieved, stored or modified by processors 1202 in accordance with the instructions 1206. The data 1208 may also be formatted in any suitable computer readable format. Again, while the data 1208 is illustrated as being contained at a single location, it should be appreciated that this is not intended to be limiting—the data may be stored in multiple memories or locations. The data 1208 may include databases 1210 storing data associated with components and dataflows within the wider system 1000. It should be appreciated that in exemplary embodiments the functionality of the security management service 1200 described herein may be realized in a local application, or a combination of local and remote applications.
In exemplary embodiments, the security management service 1200 is configured to communicate with user devices, for example mobile devices such as customer smartphones 1400 of customers of the security service, and responder smartphones 1402 of one or more security response providers. For example, smartphones 1400 and 1402 may operate an application capable of interfacing with the security management service 1200. In examples, smartphones 1400 and 1402 may be provided with credentials which may be read by reader 1132 to communicate with the control unit 1102, even in the absence of communications via the broadband connection or the cellular network connection. Functions of the security management service 1200 may also be accessed via a user workstation 1404—for example, via a web-application accessed through a web browser.
In examples, the security management service 1200 may communicate directly with emergency response services, more particular police. It should be appreciated that aspects of the present technology described herein with regard to use by, or interaction with, security responders may also be applicable for use with emergency services. In examples, additional layers of user confirmation may be required before communicating with emergency response services (for example, an additional confirmation step requiring positive selection by a user) to assist with reducing the likelihood of such services being called to a false alarm.
The security management service 1200 may maintain a plurality of user profiles for each customer and/or installation, each user profile containing information pertaining to individuals and their associated permissions and roles within the system 1000. For example, a user profile may include contact information, access credentials, system privileges, and devices 1400 registered as being associated with the individual.
For each zone section 4002 in which at least one sub-zone remains disarmed, a zone arm button 4014 is provided, selection of which arms all sub-zones of the zone section 4002. Conversely, for each zone section 4002 in which at least one sub-zone is armed, a zone disarm button 4016 is provided, selection of which disarms all sub-zones of the zone section 4002. In this example, on selection of the zone arm button 4014 of the second zone section 4002-2, the status indicator 4004 of the second zone 4002-2 is updated to an “armed” status and a confirmation banner 4012 displayed (as shown in
In examples, the security management service 1200 may issue notification to one or more authorized users of armed or disarmed status under predetermined conditions. For example, a notification may be issued if the system 1100 has not been armed (or is disarmed) at predetermined times and/or days. For example, the security management service 1200 may issue a notification the site is not armed or has been disarmed outside of business hours.
When a security system 1100 is armed and an alarm condition is detected, the control unit 1102 communicates the alarm condition to the security management service 1200. The security management service 1200 delivers an alarm notification to designated users. In examples, individual customer users may be able to selectively designate themselves as being available or unavailable to attend to alarm notifications, in which case the alarm notification is only delivered to available users (noting that the security management service 1200 may issue a warning when all designated users attempt to record themselves as being unavailable during a time period). The alarm notification may be issued directly via the app operating on a customer smartphone 1400, or may be accompanied with another form of communication (such as a SMS message, email, or call to the users) to draw their attention to the notification. On accessing the app each user is presented with an event stream user interface 5000, for example as illustrated in
For unclaimed alarm events 5002, the user may select a claim button 5006 to assume responsibility for responding to the alarm event(s) 5002. A user who has claimed an alarm event may be referred to herein as a “command user”. Referring to
In examples, the security management service 1200 may deliver video from the video camera(s) 1128 for viewing within the app to assist with decision making.
In examples, the security management service 1200 may be configured to determine a likelihood of the alarm event being false—i.e. not relating to an actual security issue—and indicate this likelihood in the app. For completeness, it should be appreciated that this may be expressed in the inverse form—i.e. a likelihood of being true. For example, the alarm event(s) 5002 may have an associated visual indication of such a condition—i.e. the alarm event 5002 may be flagged in the interface 5000. Selection of such a flag may provide additional information for the user's consideration. In exemplary embodiments the flag may be expressed as a probability, for example: a percentage likelihood, or on a scale of low to high likelihood.
In examples, historical events within the system 1000 may be used in the determination. As an example, an alarm notification issued in response to a particular alarm condition sensor 1120 being triggered may include a flag that previous recent triggers of that sensor 1120 proved to be false.
In examples, the presence or absence of alarm notifications from other alarm condition sensors 1120 may be used in the determination. For example, if an alarm notification has issued following triggering of an alarm condition sensor 1120 from a location in which other alarm notifications would be expected (e.g. a PIR motion detector 1122 in an area where an intruder would have been expected to pass other PIR motion detectors 1122), this may be used to determine a higher likelihood of the alarm notification being false. Conversely, multiple sensor triggers may be used to determine a higher likelihood that the alarm notification is not false.
In examples, data from other alarm condition sensor 1120 may be used in the determination. According to one aspect of this, where an alarm condition sensor 1120 has been triggered, video from the video camera(s) 1128 may be analyzed to, for example: a) identify the presence of one or more persons at the site, b) determine whether an individual is a known staff member or otherwise authorized personnel (for example, through automated facial recognition and comparisons made to stored images of staff with permissions for the zone which is the source of the alarm trigger), c) perform behavior analysis to detect unusual or suspicious actions, or d) identify that the source of the trigger is likely non-human (for example a bird, rodent, or other animals).
In examples, environmental data may be used in the determination. For example, the security management service 1200 may be in communication with a weather monitoring service, and current weather conditions may be factored into the determination—such as electrical storms increasing a likelihood of false triggering of alarm condition sensors 1120.
It is envisaged that accurate prediction of the likelihood of an alarm event being false (i.e. having a low incidence of false positives) may allow for alarm notifications to be reliably issued directly to security providers, or emergency responders, or to customers.
The app may also provide means for customer users to message each other to provide additional information—for example an acknowledgement that they have accidentally triggered an alarm. Such messages may also be displayed within the interface 5000
In the event that the command user claiming the alarm incident is in a position to sign off on the alarm notification being attended to without escalating the event further, they may select an option to close the alarm event which indicates the nature of the event: for example, due to maintenance, or a false alarm.
This may be captured in an event report 6000, shown in
In some cases, it may be desirable to escalate the event—for example by having security response personnel attend the site to investigate the cause of the alarm event and secure the site. It is envisaged that aspects of the present technology may be particularly suited to cases in which the security response is provided by a contracted security service, allowing the customer's personnel to triage alarm notifications and determine whether escalation of the event is justified.
In examples, the security management service 1200 may allow for selection between a plurality of potential security responders, whether automatically based on predefined criteria or on consideration by a command user. In examples, potential security responders may have previously indicated their current availability to the security management service 1200, for example via responder smartphones 1402. In examples, the security management service 1200 may issue an availability query to listed potential security responders, and record them as being currently available on receiving an affirmative response. In examples, the security management service 1200 may automatically designate the security responder as being unavailable while they are registered as attending to a request to attend a different site.
In examples, the security management service 1200 may present one or more characteristics of each available potential security responder for consideration by the command user. Such characteristics may include, for example, one or more of: price (whether according to a fee schedule or based on previous events recorded with the security management service 1200), an indicator of likely response time, customer satisfaction rating (whether via the security management service 1200 or external sources of business ratings), performance metrics based on responses to prior events (for example: response times, time on-site, compliance with protocols such as reporting). In examples, the characteristics may be provided in a form relative to other security responders, such as a ranking. For completeness, it should be appreciated that one or more of the characteristics will be of the security service to which an individual security responder belongs, while others will be of the individual—for example, the indicator of likely response time).
In examples, the security management service 1200 may project the arrival time of potential security responders as a factor for selection. For example, one potential security responder may be closer geographically to the site, but likely slower to arrive than another due to factors such as roading and traffic conditions. Such capabilities may be provided through external predictive travel times services. However, in examples the location of the potential security responders may be used as the indicator of likely response time.
In examples where the security management service 1200 is issuing an automated request, the predefined criteria on which a selection is made may be specified by the customer. Such criteria may include the characteristics discussed above, along with others (for example, preferred security service).
On acceptance of the security responder's acceptance of the request in step 7008 of the process 7000, the security management service 1200 awaits confirmation of the responder's arrival at the site. In examples, the security management service 1200 may track the location of the security responder (for example using GPS or alternative mobile phone tracking techniques). The security management service 1200 may provide an indication of the security responder's location to the customer (for example, on a map and/or an estimated time of arrival based on location).
Returning to
Alternatively, the access control devices 1130 may be re-armed based on the geo-coordinates or movements of the responder, from which it may be reliably inferred that the responder has left the site. Such a re-arming may be performed automatically, or on approval by the command user.
In examples, the security management service 1200 directs the security responder to the site—for example, providing at least an address of the site. Further information may also be provided. For example, the security management service 1200 may provide geo-coordinates of most recently triggered alarm condition sensors 1120 to enable the security responder to directly attend that location. In an example the security responder may be provided with a map of the site. Animations or other visual indications may be used to indicate the location of at least the latest alarm condition sensor 1120 to be triggered on the site map. In examples, the map may visualize a progression of alarm condition sensors 1120 being triggered to assist with tracking progress of an intruder.
In examples, the security responder may enter updates as to the current status of the investigation to the security management service 1200 via the responder's smartphone 1402. In examples, the security responder may provide such information to a system of the security provider. The security management service 1200 may interface with the security provider system (for example, using an API) to obtain this information indirectly. Such updates may include, for example: text-based notes, voice clips, images and/or video. Where the security responder is carrying a body camera, video from the body camera may be accessible via the security management service 1200. In examples, such details may be provided to the security management service 1200 after the site inspection has been completed—however it is envisaged that the updates may be displayed to the customer users in real-time (or at least near real-time) as they are received in order to inform the customer of the current status of the incident.
In examples, the command user may be provided with selectable options for ongoing services from the security provider or individual security responder—for example, posting a guard following attendance to the site, to act as a deterrent to further intruder activity.
In examples, the security management service 1200 may transmit a notification of the alarm event to a wider group of customer personnel beyond those who are authorized to claim alarm events. Such a notification may alert the customer personnel to the occurrence of a potential intruder event. For example, the notification may be transmitted to personnel who are believed to be on-site, or due to arrive at the site, allowing them to take steps to secure their safety. In examples, the notification may be delivered in a form such as a SMS message, email, or call—although it is also contemplated that the notification may be issued directly via the app on a customer smartphone 1400. In examples, a notification of an alarm event may be sent to customers of other sites as a warning that there are intruders operating in the area, allowing for proactive defensive actions to be taken such as dispatch of security responders or issuing of alerts to people working on the other sites. Such notifications may include images of intruders captured at the original site where the alarm event first occurred.
In examples, the security management service 1200 may provide a safety escort request function via the app. It is envisaged that privileges for individual users maintained by the security management service 1200 may include authorization to request a safety escort. As described with reference to selection of a security responder, the user may be able to select between a plurality of potential safety escorts based on characteristics such as likely arrival time, and price. Once the safety escort is requested, the current location of the safety escort may be tracked and provided to the requesting user. The requesting user may confirm arrival of the safety escort, and conclusion of the escort service, via their smartphone 1400.
As described above, the security management service 1200 may record and display events occurring within the system 1000 in a live feed, providing a dynamic report of alarm events, customer actions, and service provider actions (such as security responders and/or safety escort services) as they occur.
On conclusion of the event (for example, on confirmation by the command user) the security management service 1200 may provide reports on the event. Such reports may focus on specific aspects of the event (for example, response times of customer users or security responders), however it is also envisaged that reports may capture all events from the various aspects of the system 1000—for example as shown in
In examples, the security management service 1200 may provide a payment request service—for example, by use of security response services or safety escort services.
For a firmware and/or software (also known as a computer program) implementation, the techniques of the present disclosure may be implemented as instructions (for example, procedures, functions, and so on) that perform the functions described. It should be appreciated that the present disclosure is not described with reference to any particular programming languages, and that a variety of programming languages could be used to implement the present invention. The firmware and/or software codes may be stored in a memory, or embodied in any other processor readable medium, and executed by a processor or processors. The memory may be implemented within the processor or external to the processor. A general purpose processor may be a microprocessor, but in the alternative, the processor may be any processor, controller, microcontroller, or state machine. A processor may also be implemented as a combination of computing devices, for example, a combination of a digital signal processor (DSP) and a microprocessor, a plurality of microprocessors, one or more microprocessors in conjunction with a DSP core, or any other such configuration. The processors may function in conjunction with servers, whether cloud based or dedicated, and network connections as known in the art.
In various embodiments, one or more cloud computing environments may be used to create, and/or deploy, and/or operate at least part of the software system that can be any form of cloud computing environment, for example: a public cloud, a private cloud, a virtual private network (VPN), a subnet, a Virtual Private Cloud (VPC), or any other cloud-based infrastructure known in the art. It should be appreciated that a service may utilize, and interface with, multiple cloud computing environments.
The steps of a method, process, or algorithm described in connection with the present disclosure may be embodied directly in hardware, in a software module executed by one or more processors, or in a combination of the two. The various steps or acts in a method or process may be performed in the order shown, or may be performed in another order. Additionally, one or more process or method steps may be omitted or one or more process or method steps may be added to the methods and processes. An additional step, block, or action may be added in the beginning, end, or intervening existing elements of the methods and processes.
The illustrated embodiments of the disclosure will be best understood by reference to the figures. The foregoing description is intended only by way of example and simply illustrates certain selected exemplary embodiments of the disclosure. It should be noted that the flowchart and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of systems, apparatuses, methods and computer program products according to various embodiments of the disclosure. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of code, which includes at least one executable instruction for implementing the specified logical function(s). It should also be noted that, in some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams and/or flowchart illustration, and combinations of blocks in the block diagrams and/or flowchart illustration, can be implemented by special purpose hardware-based systems that perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.
The entire disclosures of all applications, patents and publications cited above and below, if any, are herein incorporated by reference. Reference to any prior art in this specification is not, and should not be taken as, an acknowledgement or any form of suggestion that that prior art forms part of the common general knowledge in the field of endeavour in any country in the world.
The invention(s) of the present disclosure may also be said broadly to consist in the parts, elements and features referred to or indicated in the specification of the application, individually or collectively, in any or all combinations of two or more of said parts, elements or features. Where in the foregoing description reference has been made to integers or components having known equivalents thereof, those integers are herein incorporated as if individually set forth.
Furthermore, the described features, structures, or characteristics may be combined in any suitable manner in at least one embodiment. In the foregoing description, numerous specific details are provided to give a thorough understanding of the exemplary embodiments. One skilled in the relevant art may well recognize, however, that embodiments of the disclosure can be practiced without at least one of the specific details thereof, or can be practiced with other methods, components, materials, et cetera. In other instances, well-known structures, materials, or operations are not shown or described in detail to avoid obscuring aspects of the invention.
Throughout this specification, the word “comprise” or “include”, or variations thereof such as “comprises”, “includes”, “comprising” or “including” will be understood to imply the inclusion of a stated element, integer or step, or group of elements integers or steps, but not the exclusion of any other element, integer or step, or group of elements, integers or steps, that is to say, in the sense of “including, but not limited to”.
Aspects of the present disclosure have been described by way of example only and it should be appreciated that modifications and additions may be made thereto without departing from the scope thereof.
Number | Date | Country | Kind |
---|---|---|---|
753100 | May 2019 | NZ | national |
Filing Document | Filing Date | Country | Kind |
---|---|---|---|
PCT/NZ2020/050041 | 5/4/2020 | WO | 00 |