The present invention is described in detail below with reference to the attached drawings figures, wherein:
Embodiments of the present invention are directed to a residential security system and method for protecting a remote mobile object, such as an automobile, associated with the residential security system. The remote mobile object is generally described herein as an automobile, but may be or include any type of movable or removable remote object such as a motorized or unmotorized vehicle. The object can also be or include a boat, a piece of equipment such as an electrical or electronic object, even a piece or art such as a statue, or any other object being considered worth protecting from unauthorized removal. The remote object may be protected within a specified geographical zone and may include permissions for allowing one or more authorized drivers to access the remote object within the protected zone. The residential security system may be associated with multiple automobiles and multiple authorized users.
The sensors 30, 40, 50 may include any of a variety of types of sensors including motion detectors, smoke detectors, vibration detectors or any other types of detectors useful for protection of a residence. In the residence, the sensors 30, 40, 50 may be wirelessly connected or hardwired to the system central controls 100. Likewise, the automobile sensor 60 could be a motion sensor, vibration sensor, magnetic contacts, or other type of sensor capable of sensing an intrusion into the automobile. The automobile sensor 60 may incorporate a wireless detection and communication system so that it both detects intrusion and communicatively interacts with the residential security system.
A homeowner may enter commands and information through the user interface 208 using input devices such as a keyboard and pointing device, commonly referred to as a mouse, trackball or touch pad. The homeowner or individual responsible for maintaining settings of the residential security system is typically an adult resident, and will hereinafter be referenced as the system administrator. Other input devices may include a microphone, satellite dish, scanner, or the like. These and other input devices are often connected to the processing unit 202 through the user input interface 208 that is coupled to the system bus 220, but may be connected by other interface and bus structures, such as a parallel port or a universal serial bus (USB). A monitor or other type of display device and other peripherals may also be connected to the system bus 220 via an interface, such as the peripheral interface 212.
The remote notification controls 206 may operate so as to notify either a remote system administrator or a central monitoring center at a remote location of an intrusion. The central monitoring center may reside on any network accessible by the network interface module 210. Logical connections may be implemented to communicate with networked components. Logical connections for networking may include a local area network (LAN) or a wide area network (WAN), but may also include other networks. When used in a LAN networking environment, the system may be connected to the LAN through the network interface 210 or adapter. When used in a WAN networking environment, the security system central controls 100 typically include a modem, a network interface, or other means for establishing communications to a WAN, such as the Internet.
The remote notification controls 206 may also contact the system administrator through an appropriate network. The system administrator may thereafter be alerted by a page, a telephone call, an email, or may be equipped with an audible or vibrating device communicating directly with the central controls 100.
The alarm system 204 may include any appropriate alarm device such as an audible alarm or a visible alarm. For example, the alarm system 204 may sound a siren or other noise and may flash lights or provide another visible indicator of intrusion.
The automobile access unit 230 preferably includes communication tools such as a transceiver for communication with the remote sensor 60. The automobile access unit 230 may also notify the residential security system of the presence of the automobile in a protected zone. When an automobile is not located in a protected zone, the automobile access unit 230 may continue to monitor until it detects the sensing system 60 of the automobile within a protected zone. Monitoring may occur through regular polling of the sensing system 60 by the automobile access unit 230. The sensing of the automobile sensor 60 by the automobile access unit 230 triggers protection of the automobile by the residential security system. An authentication action may change a protective state of the security system. The authentication interaction may occur when the automobile is parked and may include any number of actions such as entering a pass code for communicating with the residential security system or swiping a token. Many other authentication actions are possible. As an example, if an automobile owner utilizing the residential security system parks his car outside his home and the access unit 230 recognizes the car, the disarming of the residential security system to allow the automobile owner's entry into the home serves as an authentication action that changes the protective state of the security system and thus triggers protection of the parked vehicle. The automobile access unit 230 may further be responsible for communication between the security system central controls 100 and the automobile sensing system 60.
The system memory 300 may include computer storage media in the form of volatile and/or nonvolatile memory such as read only memory (ROM) and random access memory (RAM). EEPROM or flash devices can also be used as storage devices. A basic input/output system (BIOS), containing the basic routines that help to transfer information between elements within the security system central controls 100, such as during start-up, is typically stored in ROM. RAM typically contains data and/or program modules that are immediately accessible to and/or presently being operated on by processing unit 202.
The memory 300 may include an operating system and program data, typically stored in RAM. Application programs stored in the memory 300 may be described in the general context of computer-executable instructions, such as program modules, being executed by a computer. Generally, program modules include routines, programs, objects, components, data structures, etc. that perform particular tasks or implement particular abstract data types. Moreover, those skilled in the art will appreciate that the invention may be practiced with other computer system configurations, including multiprocessor systems, microprocessor-based or programmable consumer electronics, minicomputers, mainframe computers, and the like.
The security system central controls 100 may also include other removable/non-removable, volatile/nonvolatile computer storage media. A hard disk drive may be provided that reads from or writes to non-removable, nonvolatile magnetic media, a magnetic disk drive that reads from or writes to a removable, nonvolatile magnetic disk, and an optical disk drive that reads from or writes to a removable, nonvolatile optical disk such as a CD ROM or other optical media. Other removable/non-removable, volatile/nonvolatile computer storage media that can be used in the exemplary operating environment include, but are not limited to, magnetic tape cassettes, flash memory cards, digital versatile disks, digital video tape, solid state RAM, solid state ROM, and the like. The hard disk drive is typically connected to the system bus 220 through a non-removable memory interface. The magnetic disk drive and optical disk drive are typically connected to the system bus by a removable memory interface.
The illustrated security system central controls 100 are merely an example of a suitable environment for the system of the invention and not intended to suggest any limitation as to the scope of use or functionality of the invention. Neither should the security system controls 100 be interpreted as having any dependency or requirement relating to any one or combination of components illustrated.
The protective state components 302 may be activated by a home owner, head of the household, system administrator, or other authorized user through the user interface 208 as illustrated in
Typically, in order to switch protective states, an authorized user will perform an authentication action. For example, to switch from armed occupied to armed unoccupied, the user may enter a code on a user interface keyboard, provide a thumbprint, a voice authentication or other authentication action.
Protective zone controls 310 may include time controls 312, distance controls 314, and zone coordinate controls 316. Time controls 312 may operate to change the state of the security system at a pre-set time. Time controls 312 may also be implemented to permit a pre-determined specified time for automobile access. Distance controls 314 may be used to set a distance around the residence as protected. Zone coordinate controls 316 may be implemented to define protected zones more precisely than simply in terms of distance. For example, if an automobile is located a block north of the residence, it may be protected by the residential security system. If the automobile is located a block south of the residence, the user may opt not to protect the automobile. The zone can be adjusted at the user's option.
Permission controls 318 may include a set of authorizations 320 for different users. This set of authorizations may include multiple users such as user 1, user 2, user 3, and user 4 as shown. Each user may have different permissions with respect to entering a given zone or with respect to entering an automobile. This system facilitates parental control over a child's automobile use. Parents may authorize children to use only a particular automobile during particular hours. The system administrator may set the automobile permissions through the user interface 208 as described above. Other authorized users may perform authentication actions, but typically only the system administrator or parent will be capable of setting permissions.
A discrete automobile control module 330 may be provided. The automobile control module 330 communicates with the automobile access unit 230 described above and is capable of directing monitoring activities as dependent upon zones, permissions and states as described above. The automobile control module 330 may further direct alarm and notification activities related to the automobile. The sensing of the automobile sensor 60 by the automobile access unit 230 triggers protection of the automobile by the residential security system. Furthermore, an authentication action may change a protective state of the security system. The authentication interaction may occur when the automobile is parked and may include any number of actions such as entering a pass code for communicating with the residential security system or swiping a token. Many other authentication actions are possible. Furthermore, while the automobile control module 330 is shown as a discrete unit, its functions may be fully incorporated into other displayed program modules. For example, the automobile control module 330 may allow a system administrator to set automobile permissions. However, the automobile control module 330 may have separately programmable permission, zone, and distance controls. Alternatively, these functions may be integrated with the existing permission, zone, and distance controls described above.
Thus, through the described security system controls 100, the residential security system can be controlled and the automobile security can be controlled from the residential security system.
If the user does have permission to take the automobile in S410, the time controls expire the exit timer in S412. The zone controls and/or the automobile access module 330 may determine in S414 whether the automobile has moved. If the automobile has not moved, the monitoring state of S400 repeats. If the automobile has been moved by a user having permission, no action is taken in S418 and the process ends in S422. After expiration of the timer, the residential security system will continue to poll the remote sensing component 60, but will not generate an alarm if the remote sensing component 60 fails to respond to polls.
Although
Thus, when the security system is in an armed occupied state, activity within the house is not reported, but the system may create an alarm if the automobile sensor 60 does not respond to inquiries from the residential security system. Activity related to the car when the car is within a protected zone will create an alarm that will notify either a homeowner or system administrator, central security, or both parties.
When the residential security system is in an armed unoccupied state, the residential security system can monitor the automobile sensor 60 and allow use by an authorized user within a selected time period without triggering an alarm.
While particular embodiments of the invention have been illustrated and described in detail herein, it should be understood that various changes and modifications might be made to the invention without departing from the scope and intent of the invention.
From the foregoing it will be seen that this invention is one well adapted to attain all the ends and objects set forth above, together with other advantages, which are obvious and inherent to the system and method. It will be understood that certain features and sub-combinations are of utility and may be employed without reference to other features and sub-combinations. This is contemplated and within the scope of the appended claims.