The application pertains to regional monitoring systems that provide audio and/or visual feedback to assist an individual in making an installation. More particularly, it pertains to such systems in which a cellular-type wireless telephone facilitates the process by providing audible or visual instructions to the individual.
Traditional security systems have been professionally installed and monitored. The installation process involves configuring wired and/or wireless security sensors that are installed in a building. Since all buildings are different, the installation process is difficult to standardize in a pre-configured kit so DIY (do-it-yourself) installation has been rarely used in the security industry.
Despite the above noted problems, there is a substantial do-it-yourself market that might respond to a product or kit that addresses the above issues.
While disclosed embodiments can take many different forms, specific embodiments thereof are shown in the drawings and will be described herein in detail with the understanding that the present disclosure is to be considered as an exemplification of the principles thereof as well as the best mode of practicing the same and is not intended to limit the application or claims to the specific embodiment illustrated.
Embodiments of the current invention use the capability of a standard mobile phone camera in conjunction with bar-coded devices to enable DIY installation and configuration of a security system. The bar codes are used to download an application to lead a home owner through the installation process and subsequently to capture the bar code serial numbers and device types as the system components are installed. For example, a “QR code” (abbreviation for Quick Response code) is a specific matrix bar code (or two-dimensional code) that is readable by dedicated QR bar code readers and camera telephones. The code consists of black modules arranged in a square pattern on a white background. The information encoded may be text, URL, or other data.
The configuration is loaded to the control panel via the mobile phone's communication capability (cellular or Wi-Fi) into the security panel (POTS, Wi-Fi, or cellular). The application is designed to assist during the installation, to configure, and then to guide the user through a test routine to ensure that installation was completed properly.
For example, in accordance with an aspect of a method, a bar-coded element on a system carton downloads the installation application to a local communication device, such as a cellular phone. The application gives step-by-step instructions to guide a user through the process. Alternately, it would be possible to link to a website that gives instructions on installation, but does not download an application to the phone in order to enable end-to-end configuration and testing.
The control panel barcode is scanned—indicating capability and characteristics thereof. Then, as each detector or sensor element is installed, a device bar code is scanned. For example, when instructed to install the front door contact of a security system, the contact bar code is scanned, and the contact type and serial number are scanned into the phone.
If a device is not installed (e.g., no glass break detectors) then the user enters “no device”. Following completion of the installation, the user uploads the configuration to the control panel, perhaps by Wi-Fi if the control panel is capable (determined during the first scan) or cellular communication. If connected via a cell phone, then the configuration could be downloaded directly to the panel, particularly for a self-monitoring system. If a central station is involved in the monitoring of the system, then the cellular communication would go via a redirection server so that the configuration information would go to the central station database as well as the local panel.
The application then places the panel into test mode, and the user is instructed to activate each sensor in a sequence that tests the quality of the installation.
If reporting of alarm events is to the mobile phone itself (for self-monitoring applications), then the event is returned to the phone through the entire end-to-end communication path. Reporting can also be to social networking or IM sites if required for self-monitoring.
For example,
The end user U is prompted to capture a bar code on each of the security devices or detectors 14 using a camera carried by the smart phone 24. All devices 14 have bar codes to identify the device type and a unique serial number. The user U then installs the devices, sensors, or detectors 14 in appropriate locations of a home or building to be monitored.
The configuration information for all detectors 14 is registered to the panel 12 from the smart phone 24 to the web service 28 and back to the panel 12 via wireless communication systems, such as Ethernet/GSM/GPRS. The system 10-1 is then ready to use in monitoring the region R. If the web service is local, e.g., in the control panel itself, then the communication could simply remain within the LAN, and communication would be over the local Wi-Fi network.
The devices 14 can be in wired or wireless communication with the control panel 12. Those of skill will understand that the control panel 12 provides monitoring functions to respond to inputs received from the detectors or devices 14 indicative of conditions in the monitored region R. The panel 12 can also be in wired or wireless communication with other monitoring units, including the server 28, all without limitation.
Final configuration information can be sent to the panel 12, as at 106. The panel 12 can respond, as at 108. The installed detectors 14 and the control panel 12 can then interact, as at 110.
In summary, a kit based monitoring or intrusion detecting system can be installed by end users in easy steps supported by visual or verbal prompts or instructions based on the capability of a standard mobile phone camera combined with bar-coded devices. As a result, a DIY installation and configuration of a residential or commercial security system can be successfully and efficiently carried out with reduced costs since a professional installer is not required to install the system.
The bar codes are used to download an application to lead a home owner through the installation process and subsequently to capture the bar code serial numbers and device types as the system components are installed. The configuration is loaded to the control panel via the mobile phone's communication capability (cellular or Wi-Fi) into the security panel (POTS, Wi-Fi, or cellular). The application is designed to assist during the installation, to configure, and then to guide the user through a test routine to ensure that installation has been completed properly.
By way of further example, the screen on the phone can provide a menu of questions and instructions to help the end-user with the installation. There may or may not be audible indications. In this regard, after scanning the panel, the user would get an instruction to scan the bar code on the first device. For example, the phone would say, “You have scanned a glass break detector. This needs to be mounted within 10 feet of the glass that you are protecting and facing the glass”. The phone could also say, “After you mount the device, please enter the description for the device”, and the cursor would then allow entry of “front door glass”. The screen would then prompt scanning of the second device by displaying “You have scanned a low temperature detector”.
It will be also understood that other machine readable coding configurations apart from bar codes come within the spirit and scope hereof. Also, the type of portable communications unit, such as the unit 24, is not a limitation hereof.
From the foregoing, it will be observed that numerous variations and modifications may be effected without departing from the spirit and scope of the invention. It is to be understood that no limitation with respect to the specific apparatus illustrated herein is intended or should be inferred. It is, of course, intended to cover by the appended claims all such modifications as fall within the scope of the claims. Further, logic flows depicted in the figures do not require the particular order shown or sequential order to achieve desirable results. Other steps may be provided, steps may be eliminated from the described flows, and other components may be added to or removed from the described embodiments.
This application claims the benefit of the filing date of U.S. Provisional Application Ser. No. 61/416,457 filed Nov. 23, 2010 and entitled “Self-Installed Security System”, which is hereby incorporated herein by reference.
Number | Name | Date | Kind |
---|---|---|---|
20040068478 | Stubbs | Apr 2004 | A1 |
20070250695 | Philyaw | Oct 2007 | A1 |
20090070436 | Dawes et al. | Mar 2009 | A1 |
20110015802 | Imes | Jan 2011 | A1 |
20110196755 | Landa | Aug 2011 | A1 |
Number | Date | Country | |
---|---|---|---|
20120124799 A1 | May 2012 | US |
Number | Date | Country | |
---|---|---|---|
61416457 | Nov 2010 | US |