Fitting and installing security or intrusion detection devices such as window or door sensors may be challenging due to the wide variety of different door and window configurations, sizes, and positions available. A door or window sensor may comprise two pieces in alignment, with one piece adaptable to be affixed to a door or a window element, and the other piece adaptable to be affixed to a frame element. When the two pieces are separated from each other, for example upon opening of a door or a window, an alarm may be tripped. In many instances, such as misalignment, e.g., a recession, in the door or window frame, the two pieces might not align and may lead to sensing issues. Such misalignment may occur in several planes and might cause false alarms, incorrect status indications, or leave a perimeter unguarded.
The following summary presents a simplified summary of certain features. The summary is not an extensive overview and is not intended to identify key or critical elements.
Systems, apparatuses, and methods are described for a sensor arrangement. In particular, one or more aspects relate to a sensor arrangement (e.g., a sensor kit) for enabling customized installation and proper placement, orientation and operation of a security or intrusion detection system via movable components, such as spacers. The components may be of variable sizes or heights (e.g., different thicknesses) and may be selected, mixed and matched as needed or desired. One advantage that may be achieved with the sensor arrangement is the alignment of a transmitter or a receiving device, e.g., a magnetic device, with respect to a transmitter or receiving device despite misalignment of the components due to, for example, uneven surfaces of a door or a window (e.g., on which a magnetic component may be mounted), or a respective frame (e.g., on which the magnetic sensor may be mounted). The variations in configurations of mounting surfaces, such as door and window assemblies, may be accommodated.
These and other features and advantages are described in greater detail below.
Some features are shown by way of example, and not by limitation, in the accompanying drawings. In the drawings, like numerals reference similar elements.
The accompanying drawings, which form a part hereof, show examples of the disclosure. It is to be understood that the examples shown in the drawings and/or discussed herein are non-exclusive and that there are other examples of how the disclosure may be practiced.
The communication links 101 may originate from the local office 103 and may comprise components not shown, such as splitters, filters, amplifiers, etc., to help convey signals clearly. The communication links 101 may be coupled to one or more wireless access points 127 configured to communicate with one or more mobile devices 125 via one or more wireless networks. The mobile devices 125 may comprise smart phones, tablets or laptop computers with wireless transceivers, tablets or laptop computers communicatively coupled to other devices with wireless transceivers, and/or any other type of device configured to communicate via a wireless network.
The local office 103 may comprise an interface 104. The interface 104 may comprise one or more computing devices configured to send information downstream to, and to receive information upstream from, devices communicating with the local office 103 via the communications links 101. The interface 104 may be configured to manage communications among those devices, to manage communications between those devices and backend devices such as servers 105-107, and/or to manage communications between those devices and one or more external networks 109. The interface 104 may, for example, comprise one or more routers, one or more base stations, one or more optical line terminals (OLTs), one or more termination systems (e.g., a modular cable modem termination system (M-CMTS) or an integrated cable modem termination system (I-CMTS)), one or more digital subscriber line access modules (DSLAMs), and/or any other computing device(s). The local office 103 may comprise one or more network interfaces 108 that comprise circuitry needed to communicate via the external networks 109. The external networks 109 may comprise networks of Internet devices, telephone networks, wireless networks, wired networks, fiber optic networks, and/or any other desired network. The local office 103 may also or alternatively communicate with the mobile devices 125 via the interface 108 and one or more of the external networks 109, e.g., via one or more of the wireless access points 127.
The push notification server 105 may be configured to generate push notifications to deliver information to devices in the premises 102 and/or to the mobile devices 125. The content server 106 may be configured to provide content to devices in the premises 102 and/or to the mobile devices 125. This content may comprise, for example, video, audio, text, web pages, images, files, etc. The content server 106 (or, alternatively, an authentication server) may comprise software to validate user identities and entitlements, to locate and retrieve requested content, and/or to initiate delivery of the content. The application server 107 (e.g., which may be and/or include a control panel device) may be configured to offer any desired service. For example, an application server may be responsible for receiving and transmitting communications related to a security system in accordance with the present disclosure. The application server 107 may support security processes that rely on one or more sensors to monitor conditions in premises 102 (e.g., registering sensors, detecting alarm events, reacting to alarm events, and communicating alarm events over one or more networks). For example, the application server 107 may assess the need to instigate an alarm from the information provided by sensors. Data regarding the monitored conditions may be communicated over a network to the content server 106. Although shown separately, the push server 105, the content server 106, and the application server 107, and/or other server(s) may be combined. The servers 105, 106, and 107, and/or other servers, may be computing devices and may comprise memory storing data and also storing computer executable instructions that, when executed by one or more processors, cause the server(s) to perform steps described herein.
An example premises 102a may comprise an interface 120. The interface 120 may comprise circuitry used to communicate via the communication links 101. The interface 120 may comprise a modem 110, which may comprise transmitters and receivers used to communicate via the communication links 101 with the local office 103. The modem 110 may comprise, for example, a coaxial cable modem (for coaxial cable lines of the communication links 101), a fiber interface node (for fiber optic lines of the communication links 101), twisted-pair telephone modem, a wireless transceiver, and/or any other desired modem device. One modem is shown in
The gateway 111 may also comprise one or more local network interfaces to communicate, via one or more local networks, with devices in the premises 102a. Such devices may comprise, e.g., display devices 112 (e.g., televisions), other devices 113 (e.g., a DVR or STB), personal computers 114, laptop computers 115, wireless devices 116 (e.g., wireless routers, wireless laptops, notebooks, tablets and netbooks, cordless phones (e.g., Digital Enhanced Cordless Telephone—DECT phones), mobile phones, mobile televisions, personal digital assistants (PDA)), landline phones 117 (e.g., Voice over Internet Protocol—VoIP phones), and any other desired devices. Example types of local networks comprise Multimedia Over Coax Alliance (MoCA) networks, Ethernet networks, networks communicating via Universal Serial Bus (USB) interfaces, wireless networks (e.g., IEEE 802.11, IEEE 802.15, Bluetooth), networks communicating via in-premises power lines, and others. The lines connecting the interface 120 with the other devices in the premises 102a may represent wired or wireless connections, as may be appropriate for the type of local network used. One or more of the devices at the premises 102a may be configured to provide wireless communications channels (e.g., IEEE 802.11 channels) to communicate with one or more of the mobile devices 125, which may be on- or off-premises.
The mobile devices 125, one or more of the devices in the premises 102a, and/or other devices may receive, store, output, and/or otherwise use assets. An asset may comprise a video, a game, one or more images, software, audio, text, webpage(s), and/or other content.
Although
Various features described herein offer improved and wider range of sensor arrangement possibilities. For example, the sensor arrangement may include two main parts (e.g., a magnetic sensor and a magnetic component) and optional subparts (e.g., spacers).
The magnetic sensor may operate as a Hall-effect sensor 312 or other magnetically operated sensor. For example, as depicted in
The magnetic component may include more than one spacer attached thereto (e.g., two spacers). An example magnetic component 500 is depicted in
The magnetic component 500 and the magnetic sensor 600 may have a maximum distance rating, in which the components must be within a maximum distance from each other for reliable operation.
As shown in
The device housing 505 may include a magnet 506 adjustably disposed in the device housing 505. For example, the position of magnet 506 may be adjusted in a space within the housing to achieve desired or optimal operating conditions. For example, the position of the magnet 506 may be adjustable to fit within various height spaces or sockets within the housing.
The device housing 505 may be secured on or above the first spacer 507. In some embodiments, the device housing 505 may be secured on or above the second spacer 508. In some embodiments, the first spacer 507 may be disposed between the device housing 505 and the second spacer 508.
The device housing 505, the first spacer 507, and the second spacer 508 may slide or snap together to form the magnetic component 500. For example,
The sensor arrangement may be installed to detect the opening of a door or window. When the door or window is closed, the magnetic sensor and corresponding magnetic component are aligned in close proximity another (e.g., within or less than a threshold distance) to one another, forming a closed circuit. Opening a door or window breaks the circuit and may trigger an alarm.
The magnetic component 500 may be positioned on a first member (e.g., door, window, etc.) and the magnetic sensor 600 may be positioned on a second member (e.g., door frame, window frame, etc.), such that the magnetic sensor 600 is positioned adjacent to (e.g., aligned with and next to, above, or below) the side of the magnetic component 500. For instance, the magnetic component 500 may be positioned on a moveable member such as a door or a window (e.g.,
The sensor arrangement in
The magnetic sensor may operate as a Hall-effect sensor 602 or magnetically operated sensor. For example, as depicted in
Additionally or alternatively, although
Additionally or alternatively, although
As shown in
The magnetic sensor 600 may detect alignment of the magnetic component 500 in a lateral direction and in a vertical direction relative to a housing. As shown in
Operation of the sensor arrangement will be further explained below with reference to
In step 810, the security management computing device (which can be a remote application server 107, or any other shared or stand alone computing device) may request information about a door or window and corresponding frame assembly on which the sensor arrangement (e.g., including a magnetic component and a magnetic sensor) is being installed. The security management computing device may be in communication with a user computing device (e.g., a user mobile device) and configured to monitor the magnetic sensor. For example, the security management computing device may request a user of the user device to measure a height of a door or window misalignment with respect to a corresponding frame. For instance, the security management computing device may request information regarding a distance or a height of a recess formed between a door portion and a frame portion when the door is in a closed position (e.g., space 304 in
In step 815, the security management computing device may assist or guide the user of the user device in selecting a combination of spacers for aligning a magnet (e.g., housed in the magnetic component) and the magnetic sensor. For example, the security management computing device may recommend one or more possible combinations of spacers that would be compatible with or cure the misalignment measured in step 810. As discussed above, there may be any number of spacers in the sensor arrangement, and the spacers might be provided with a plurality of different heights, for example, to allow more flexibility in mixing or matching to achieve alignment.
Based on a selected combination of spacers of the one or more possible combinations, the security management computing device may further assist or guide the user of the user device in installing and aligning the respective components of the sensor arrangement (e.g., installing the magnetic component on the door or window portion, installing the magnetic sensor on the corresponding frame portion, and aligning the magnetic component with the magnetic sensor). For example, the user device may display and/or otherwise present one or more graphical user interfaces that may include text, images, and/or other information guiding the user of the user device (e.g., via a mobile phone application) of the foregoing installing and aligning steps (e.g., presenting each step in a step-by-step or intuitive manner).
The magnetic component and the magnetic sensor may include a surface (e.g., a base surface thereof) with an adhesive portion which may be a peel-and-stick type adhesive for affixing the magnetic component and the magnetic sensor on various surfaces and at various positions.
An LED (light-emitting diode) or other indicator (e.g., light-emitting component 617) may provide a state of the alignment. For instance, the security management computing device may provide feedback via the LED indicator to indicate that a magnetic is aligned with the magnetic sensor. The LED (e.g., located on the magnetic sensor) may blink or flash when the magnet is misaligned, and remain steady when the magnet is aligned. There may be a signal strength range for acceptable alignment. The LED may include a fast flash (e.g., indicating alignment is suboptimal or even lost), a slow flash (e.g., indicating alignment is near optimal but not yet within an acceptable range), and/or a steady light (e.g., indicating acceptable alignment). It will be appreciated that other and/or different indications may also be provided, including other visual indications, or sound indications.
In step 820, during or after installation, the security management computing device may receive a sensor measurement from the magnetic sensor. For example, the security management computing device may receive a measurement (e.g., a numerical or other output value) of the uniformity, magnitude, or intensity of the magnetic field sensed by the magnetic sensor during the alignment process. For instance, the uniformity, magnitude, or intensity of the magnetic field sensed by the magnetic sensor may vary depending on the position or placement of the magnet with respect to the magnetic sensor.
In step 825, the security management computing device may compare the sensor measurement to a predetermined threshold value. The threshold value may be set by a user, a distributor, a manufacturer of the device, or other individual in control of the device.
In step 830, the security management computing device may determine whether proper installation has been achieved. This may occur, for example, if the sensor measurement satisfies a predetermined threshold. For instance, the sensor measurement may satisfy the predetermined threshold when a conductivity, signal strength, magnetic strength, or the like, equals or exceeds the predetermined threshold).
In step 830, the security management computing device may send an alert message indicative of an alert condition to the user device, so that quick and reliable installation is facilitated. For example, if alignment is successful (e.g., the sensor measurement satisfies a predetermined threshold), the process may proceed to step 835. In step 835, the security management computing device may send verification of proper installation to the user device and the process in
Although examples are described above, features and/or steps of those examples may be combined, divided, omitted, rearranged, revised, and/or augmented in any desired manner. Various alterations, modifications, and improvements will readily occur to those skilled in the art. Such alterations, modifications, and improvements are intended to be part of this description, though not expressly stated herein, and are intended to be within the spirit and scope of the disclosure. Accordingly, the foregoing description is by way of example only, and is not limiting.
Number | Name | Date | Kind |
---|---|---|---|
9589446 | Dey | Mar 2017 | B1 |
10527589 | Kolb | Jan 2020 | B2 |
11275059 | Kolb | Mar 2022 | B2 |
20080201097 | Stromberg | Aug 2008 | A1 |
20100193398 | Marsh | Aug 2010 | A1 |
20120012742 | Ren | Jan 2012 | A1 |
20170067859 | Kolb | Mar 2017 | A1 |
20170098356 | Dai | Apr 2017 | A1 |
20180365943 | DiPoala | Dec 2018 | A1 |
20200103376 | Kolb | Apr 2020 | A1 |
20210383662 | Gruber | Dec 2021 | A1 |
20220155261 | Kolb | May 2022 | A1 |
Number | Date | Country | |
---|---|---|---|
20220375319 A1 | Nov 2022 | US |