The application pertains to regional monitoring systems which provide audio, and/or visual feedback to assist an individual in making an installation. More particularly, it pertains to such systems where a cellular-type wireless telephone facilitates the process by providing audible or visual instructions to the individual.
Traditional security systems have been professionally installed and monitored. The installation process involves configuring wired and/or wireless security sensors that are installed in a building. Since all buildings are different, the installation process is difficult to standardize in a pre-configured kit, so DIY (do-it-yourself) installation has been rarely used in the security industry.
Despite the above noted problems, there is a substantial do-it-yourself market which might respond to a product, or kit which addresses the above issues.
While disclosed embodiments can take many different forms, specific embodiments thereof are shown in the drawings and will be described herein in detail with the understanding that the present disclosure is to be considered as an exemplification of the principles thereof as well as the best mode of practicing same, and is not intended to limit the application or claims to the specific embodiment illustrated.
Embodiments of the current invention use the capability of a standard mobile phone camera in conjunction with bar-coded devices to enable DIY installation and configuration of a security system. The bar codes are used to down-load an application to lead a home owner through the installation process, and subsequently to capture the bar-code serial numbers and device types as the system components are installed. For example, a “QR code” (abbreviation for Quick Response code) is a specific matrix barcode (or two-dimensional code) that is readable by dedicated QR barcode readers and camera telephones. The code consists of black modules arranged in a square pattern on a white background. The information encoded may be text, URL, or other data.
The configuration is loaded to the control panel via the mobile phone's communication capability (cellular or Wi-Fi) into the security panel (POTs, Wi-Fi or cellular). The application is designed to assist during the installation, to configure and then to guide the user through a test routine to ensure that installation was completed properly.
For example, in accordance with an aspect of a method, a barcoded element on a system carton downloads the installation application to a local communication device, such as a cellular phone. The application gives step-by-step instructions to guide a user through the process. Alternately, it would be possible to link to a web-site that gives instructions on installation, but does not down-load an application to the phone in order to enable end-to-end configuration and testing.
The control panel barcode is scanned—indicating capability and characteristics thereof. Then as each detector, or sensor element, is installed, a device barcode is scanned. For example, when instructed to install the front door contact of a security system, the contact barcode is scanned and the contact type and serial number are scanned into the phone.
If a device is not installed (e.g. no glass break detectors) then the user enters “no device”. Following completion of the installation, the user uploads the configuration to the control panel, perhaps by w-fi if the control panel is capable (determined during the first scan), or cellular communications. If connected via a cell phone, the configuration could be downloaded directly to the panel, particularly for a self-monitoring system. If a central station is involved in the monitoring of the system, then the cellular communication would go via a redirection server so that the configuration information would go to the central station database as well as the local panel.
The application then places the panel into test mode and the user is instructed to activate each sensor in a sequence which tests the quality of the installation.
If reporting of alarm events is to the mobile phone itself (for self-monitoring applications) then the event is returned to the phone through the entire end-to-end communication path. Reporting can also be to social networking or IM sites if required for self monitoring.
For example,
The end user U is prompted to capture a bar code on each of the security devices, or detectors 14 using a camera carried by the smart phone 24. All devices 14 have bar codes to identify the device type and a unique serial number. The user U then installs the devices, sensors, or detectors 14 in appropriate locations of a home or building to be monitored.
The configuration information for all detectors 14 is registered to the panel 12 from the smart phone 24 to the web service 28 and back to panel 12 via wireless communications systems, such as Ethernet/GSM/GPRS. The system 10-1 is then ready to use in monitoring the region R. If the web-server is local, e.g. in the control panel itself, then the communication could simply remain within the LAN and communication would be over the local wi-fi network.
The devices 14 can be in wired or wireless communication with the control panel 12. Those of skill will understand that the control panel 12 provides monitoring functions to respond to inputs received from the detectors or devices 14 indicative of conditions in the monitored region R. Panel 12 can also be in wired or wireless communication with other monitoring units, including the server 28 all without limitation.
Final configuration information can be sent to the panel 12 as at 106. The panel 12 can respond, as at 108. The installed detectors 14 and control panel 12 can then interact, as at 110.
In summary, a kit based monitoring, or intrusion detecting system, can be installed by end users in easy steps supported by visual, or, verbal prompts, or instructions based on the capability of a standard mobile phone camera combined with bar-coded devices. As a result, a DIY installation and configuration of a residential or commercial security system can be successfully and efficiently carried out with reduced costs since a professional installer is not required to install the system.
The bar codes are used to down-load an application to lead a home owner through the installation process, and subsequently to capture the bar-code serial numbers and device types as the system components are installed. The configuration is loaded to the control panel via the mobile phone's communication capability (cellular or Wi-Fi) into the security panel (POTs, Wi-Fi or cellular). The application is designed to assist during the installation, to configure and then to guide the user through a test routine to ensure that installation has been completed properly.
By way of further example, the screen on the phone can provide a menu of questions and instructions to help the end-user with the installation. There may or may not be audible indications. In this regard, after scanning the panel, the user would get an instruction to scan the barcode on the first device—the phone would then say “you have scanned a glass break detector, this needs to be mounted within 10 feet of the glass that you are protecting, and facing the glass”, etc. After you mount the device please enter the description for the device (cursor would then allow entry of “front door glass”). The screen would then prompt scanning of the second device “you have scanned a low temperature detector”, etc.
It will be also understood that other machine readable coding configurations, apart from bar codes, come within the spirit and scope hereof. Also, the type of portable communications unit, such as unit 24 is not a limitation hereof.
From the foregoing, it will be observed that numerous variations and modifications may be effected without departing from the spirit and scope of the invention. It is to be understood that no limitation with respect to the specific apparatus illustrated herein is intended or should be inferred. It is, of course, intended to cover by the appended claims all such modifications as fall within the scope of the claims. Further, logic flows depicted in the figures do not require the particular order shown, or sequential order, to achieve desirable results. Other steps may be provided, or steps may be eliminated, from the described flows, and other components may be add to, or removed from the described embodiments.
This application claims the benefit of the filing date of U.S. Provisional Application Ser. No. 61/416,457 filed Nov. 23, 2010 entitled, Self-Installed Security System which is hereby incorporated herein by reference.
Number | Date | Country | |
---|---|---|---|
61416457 | Nov 2010 | US |