The invention pertains to monitoring systems. More particularly, the invention pertains to such systems that can monitor selected conditions in a region and can take into account local wireless traffic not part of a respective monitoring system in making a determination as to an existence of one or more predetermined conditions.
Known security monitoring systems currently make decisions based on inputs from security related detectors distributed around a building. These might include motion detectors, pressure mats, door contacts, and the like, all without limitation. Other types of signals emitted by non-system devices might contain other types of information that could be used, if accessible, advantageously by a local monitoring system.
While disclosed embodiments can take many different forms, specific embodiments thereof are shown in the drawings and will be described herein in detail with the understanding that the present disclosure is to be considered as an exemplification of the principles thereof as well as the best mode of practicing the same and is not intended to limit the application or claims to the specific embodiment illustrated.
Many commercial buildings and residences contain one or more monitoring systems. Increasingly, such commercial buildings and residences include additional devices or detectors that include sensors that are not part of a security system. For example, such sensors that are not part of the security system can include a motion detector in a thermostat, a camera system in a gaming console, cameras and microphones in computers, telephones, external lighting, temperature sensors, and weather stations, all without limitation.
Such systems based on existing conditions are usually capable of energizing various types of actuators to unlock or close doors or to energize camera recording systems.
Embodiments hereof improve aspects of the operation of such systems by fusing inputs from a variety of additional sensors that may not directly be part of the security system. These additional detected inputs could improve security system determinations by providing additional inputs that can be included in a decision making process.
In accordance with the above, the reliability of a detected alarm can be improved, thereby reducing false alarms. For example, information gathered from other sensors in a building or region being monitored, such as recent historical data along with readings for several seconds after an alarm determination has been made, can be taken into account before making a decision to call first responders. In this regard, such secondary measurements or information could be “weighted” and combined to make a final decision.
In one aspect, since security systems are “always on” by nature to provide 24/7 coverage, security system processing could initiate activity on other non-security networks. To improve the QOS/reliability of wi-fi alarm messages, an alarm trigger could be used to turn off wi-fi activity from other devices in a region of interest. For example, a dongle in a USB port of a router can shut off all other traffic except streaming video from security cameras.
In another aspect, signals from non-system sources can be used as a basis for actuating security system devices, which can normally be in a low energy default state to extend useful battery life. For example, to improve battery lifetime of wireless devices, higher current battery powered devices, such as wireless cameras, can be placed into a very low current state until awakened by a signal from a device that is continuously powered.
The above requires an underlying wireless network with always-on nodes to collect and reformat messages into a protocol for synchronized “paging” of mostly-off devices. For example, a USB Tx/Rx plugged into a gaming system can detect/see human activity and, in response thereto, wake up or energize wireless cameras in other parts of a home.
Additional embodiments, without limitation, include providing control of actuators by a variety of sensors that may or may not be part of an actuation system. In this regard, a CO detector that has gone into alarm can be used to turn on air conditioning and an associated fan to rapidly refresh air in an area. Coverings, such as blinds or drapes, can be closed if a room is becoming too warm due to sunlight. Alternately, in winter, if a furnace is running, then criteria could be incorporated to automatically close the coverings to reduce heating expenses, or windows can also be locked in such conditions.
In another aspect, wirelessly controlled doors, such as z-wave operated doors, can be unlocked in an alarm event. This could prevent axe damage from first responders.
The system 12 can also be in wired or wireless communications with a plurality of actuators, including door control, locking, and unlocking systems 18 for doors, such as a door D, or window locking, unlocking, opening, or closing systems 18a for windows W. Other types of actuators could include fans, pumps, or the like, all without limitation.
It will also be understood that other types of monitoring systems, such as heating ventilating air conditioning systems (HVAC) 20 (with one or more wireless thermostats 20a), lighting control systems 22 (with one or more wireless illumination sensors 22a), or video security imaging systems 24 (with cameras 24a), could also be used in the region R along with an entertainment system 26.
The monitoring system 12 can include a wireless RF transceiver 30 for wireless communications 30a with members of the various pluralities 14, 16, 18 that are part of the monitoring system 12. The transceiver 30 can also communicate directly 30b or via the Internet I with Internet-enabled members of the pluralities 14, 16, 18, 18a.
Other types of systems, such as the systems 20, 22, 24, 26, without limitation, in or in the vicinity of the region R are not part of the monitoring system 12. All such systems 20, 22, 24, 26 might emit wireless signals, such as 30b, detectable by the transceiver 30. Similarly, related wireless control units 20a, 22a could also emit detectable signals 30b.
The monitoring system 12 can also include control circuits 32a coupled to the transceiver 30. The control circuits 32a can be implemented, at least in part, by one or more programmable processors 32b along with executable instructions 32c. A manually operable control panel and a visual display 32d can be coupled to the control circuits 32a via a wired or wireless interface.
In summary, wired or wireless signals from those members of the pluralities 14, 16, 18 that are not part of the system 12 as well as other systems, such as 20, 22, 24, 26, and their respective wireless control units, such as 20a, 22a, can be detected by the system 12. These signals can be incorporated, as discussed above, into making alarm determinations, activating devices in a non-active state, or energizing actuators to open or close doors or windows, operate fans, turn lights on or off, enable video cameras, or the like without being part of the system 12.
In yet another aspect, units that are not part of a local system, such as the system 12, can be physically displaced from the system 12. They can include Internet-enabled sources S or cellular-type units P that can communicate via a local cell system C. In this regard, user activity in one location can, via the Internet or cellular systems, such as the system C, trigger events in a different system. For example, locking an office door at work can be communicated to a home security system, such as the system 12, to turn on heat or lights or report security system/video status back to a mobile phone, such as one of the cellular-type units P. Hence, remote as well as local event actions can be responded to by the local system, such as the system 12.
From the foregoing, it will be observed that numerous variations and modifications may be effected without departing from the spirit and scope hereof. It is to be understood that no limitation with respect to the specific apparatus illustrated herein is intended or should be inferred. It is, of course, intended to cover by the appended claims all such modifications as fall within the scope of the claims
This application is a continuation of and claims the benefit of the filing date of U.S. application Ser. No. 14/293,517 filed Jun. 2, 2014, now U.S. Pat. No. 9,536,406.
Number | Name | Date | Kind |
---|---|---|---|
8955022 | Poder et al. | Feb 2015 | B2 |
9007222 | Mittleman et al. | Apr 2015 | B2 |
9536406 | Sheflin | Jan 2017 | B2 |
20060267756 | Kates | Nov 2006 | A1 |
20090051528 | Graichen | Feb 2009 | A1 |
20130049978 | Piel et al. | Feb 2013 | A1 |
20140266674 | Nye et al. | Sep 2014 | A1 |
Number | Date | Country |
---|---|---|
WO 2013134892 | Sep 2013 | WO |
Entry |
---|
Extended European Search Report, dated Nov. 9, 2015, corresponding to European Application No. EP 15 16 7233. |
Number | Date | Country | |
---|---|---|---|
20170084148 A1 | Mar 2017 | US |
Number | Date | Country | |
---|---|---|---|
Parent | 14293517 | Jun 2014 | US |
Child | 15368901 | US |