SYSTEMS AND METHODS FOR CONTACTING EMERGENCY PERSONNEL VIA VOICE RECOGNITION

Information

  • Patent Application
  • 20170229125
  • Publication Number
    20170229125
  • Date Filed
    February 05, 2016
    8 years ago
  • Date Published
    August 10, 2017
    7 years ago
Abstract
Systems and methods for contacting emergency personnel via voice recognition are provided. Some methods include detecting and identifying, via voice recognition, a first predetermined phrase, determining whether a second predetermined phrase is detected and identified, via voice recognition, within a predetermined period of time after detection and identification of the first predetermined phrase, and when the second predetermined phrase is detected and identified within the predetermined period of time, contacting emergency personnel.
Description
FIELD

The present invention relates generally to systems and methods for contacting emergency personnel. More particularly, the present invention relates to systems and methods for contacting emergency personnel via voice recognition.


BACKGROUND

Systems and methods to prevent an intruder, such as a thief, from breaking into a monitored region, such as a home, in an unauthorized manner are known. However, it is possible that the intruder can force an authorized occupant of the monitored region, such as a home owner, to disarm a security system, thereby ending monitoring of the region or alerting emergency personnel that a previously activated security system alarm does not need further attention.


In view of the above, there is a continuing, ongoing need for improved systems and methods.





BRIEF DESCRIPTION OF THE DRAWINGS


FIG. 1 is a flow diagram of a method in accordance with disclosed embodiments;



FIG. 2 is a block diagram of a system in accordance with disclosed embodiments;



FIG. 3 is a screen shot of a screen displayed on a user interface device of a system in accordance with disclosed embodiments;



FIG. 4 is a screen shot of a screen displayed on a user interface device of a system in accordance with disclosed embodiments;



FIG. 5 is a screen shot of a screen displayed on a user interface device of a system in accordance with disclosed embodiments;



FIG. 6 is a screen shot of a screen displayed on a user interface device of a system in accordance with disclosed embodiments; and



FIG. 7 is a screen shot of a screen displayed on a user interface device of a system in accordance with disclosed embodiments.





DETAILED DESCRIPTION

While this invention is susceptible of an embodiment in many different forms, there are shown in the drawings and will be described herein in detail specific embodiments thereof with the understanding that the present disclosure is to be considered as an exemplification of the principles of the invention. It is not intended to limit the invention to the specific illustrated embodiments.


Embodiments disclosed herein can include systems and methods for contacting emergency personnel via voice recognition. For example, when an intruder has entered a monitored region, an authorized occupant of the secured region can take an action that is detected and identified by the security system as instructions to contact emergency personnel, such as police, but that fails to alert the intruder of the authorized occupant's request to contact emergency personnel.


In accordance with disclosed embodiments, systems and methods disclosed herein can include voice recognition. Accordingly, systems and methods can facilitate users contacting emergency personnel from anywhere within a monitored region and without making contact with a security system monitoring the region.


In some embodiments, systems and methods disclosed herein can detect and identify a first predetermined condition and, if the systems and methods disclosed herein detect and identify a second predetermined condition within a predetermined period of time after detection and identification of the first predetermined condition, then systems and methods disclosed herein can contact emergency personnel. However, if the systems and methods disclosed herein fail to detect and identify the second predetermined condition within the predetermined period of time after detecting and identifying the second predetermined condition, then the systems and methods disclosed herein can abstain from contacting emergency personnel. Because detection and identification of both predetermined conditions are required prior to detection of emergency personnel, the likelihood of a false alarm, such as contacting security personnel when not necessary, can be reduced.


According to disclosed embodiments, the first and second predetermined conditions can include systems and methods identifying and detecting, via voice recognition, first and second predetermined words or phrases. For example, the first predetermined condition can include the systems and methods disclosed herein identifying and detecting, via voice recognition, the phrase “Don't hurt me” said by an authorized occupant of a monitored region, and the second predetermined condition can include the systems and methods disclosed herein identifying and detecting, via voice recognition, the word “Please” said by an authorized occupant of the monitored region. In some embodiments, the systems and methods disclosed herein can identify and detect each of the first and second predetermined words or phrases said individually or within a larger phrase or sentence.


In some embodiments, users of the systems and methods disclosed herein, such as an authorized occupant of a monitored region, can configure the first and second predetermined conditions, for example, by identifying the first and second predetermined words or phrases. For example, systems and methods can be placed in a voice recognition mode for learning the predetermined conditions and predetermined words or phrases as disclosed herein before being placed in an armed or ready mode for monitoring the region. For effectiveness, it is preferred that the first and second predetermined words or phrases are not otherwise likely to be said together or within the predetermined period of time.


In some embodiments, after the systems and methods disclosed herein identify the first predetermined word or phrase, systems and methods disclosed herein can start a timer to continuously monitor for detection and identification of the second predetermined word or phrase. If the second predetermined word or phrase is detected and identified within a predetermined period of time, then systems and methods disclosed herein can contact emergency personnel, for example, by calling local police, without alerting an intruder of the contact. However, if the second predetermined word or phrase is not detected and identified within the second predetermined period of time, then systems and methods disclosed herein can abstain from contacting emergency personnel and continue monitoring the region.



FIG. 1 is a flow diagram of a method 100 in accordance with disclosed embodiments. As seen in FIG. 1, the method 100 can include a security system being placed in an armed mode as in 105 and determining whether a user needs to record or re-record words or phrases for subsequent detection by the security system as in 110. If not, then the method 100 can stay in the alarm mode as in 105.


However, if the method 100 determines that a user needs to record or re-record words or phrases as in 110, then the method 100 can include the security system being placed in a learning mode as in 115. Once in the learning mode, the method 100 can include receiving verbal user input and using voice recognition to identify, detect, and record first and second words or phrases for subsequent detection by the security system 120. After recording the identified and detected words or phrases as in 120, the method 100 can include the security system re-entering the armed mode as in 105.


When in the armed mode as in 105, the method 100 can include determining whether the security system has detected and identified a first predetermined condition as in 125. For example, the method 100 can determine whether the security system has detected and identified, via voice recognition, the previously recorded first word or phrase. If not, then, the method 100 can continue operation as in 105. However, when the method 100 determines that the security system has detected and identified the first predetermined condition as in 125, the method 100 can include setting and starting a clock for a predetermined period of time as in 130 and determining whether the security system has detected and identified a second predetermined condition as in 135. For example, the method 100 can determine whether the security system has detected and identified, via voice recognition, the previously recorded second word or phrase. If not, then the method 100 can include determining whether the predetermined period of time has expired as in 140. If so, then the method 100 can continue operation as in 105. However, if the method 100 determines that the predetermined period of time has not yet expired as in 140, then the method can continue determining whether the security system has detected and identified the second predetermined condition as in 135.


When the security system has detected and identified the second predetermined condition as in 135, the method 100 can include contacting emergency personnel as 145.


The method 100 of FIG. 1 and others in accordance with disclosed embodiments can be executed via a security system that includes a control panel local to a monitored region. In some embodiments, the security system can include one or more microphones dispersed throughout the monitored region for receiving verbal user input for subsequent voice recognition by the security system. For example, in some embodiments, the control panel can include a microphone in or on the control panel.



FIG. 2 is a block diagram of a system 200 in accordance with disclosed embodiments. For example, in some embodiments, the system 200 can include a control panel of a security system. However, in some embodiments, the system 200 can include a user's cellular telephone or other personal digital assistant that is in communication, either directly or indirectly, with a security system as disclosed herein.


As seen in FIG. 2, the system 200 can include can include a wired or wireless transceiver 210, a user interface device 220, a database device 230, and a microphone 240, each of which can be in bidirectional communication with control circuitry 250, one or more programmable processors 250a, and executable control software 250b as would be understood by one of ordinary skill in the art. The executable control software 250b can be stored on a transitory or non-transitory computer readable medium, including, but not limited to, local computer memory, RAM, optical storage media, magnetic storage media, flash memory, and the like. In some embodiments, the control circuitry 250, the programmable processor 250a, and the control software 250b can execute and control the methods describe above and herein.


In some embodiments, the system 200 can communicate with a remote monitoring station via the transceiver 210, and in some embodiments, the system 200 can communicate with emergency personnel via the transceiver 210. For example, in some embodiments, the system 200 can call police on a telephone network via the transceiver 210.


The user interface device 220 can include one or more user input mechanisms and one or more user output mechanisms. For example, in some embodiments, the user interface device 220 can display each of the exemplary screens shown in FIGS. 3-7 for communicating with a user.


When the system 200 is in an armed mode, the user interface device 220 can display the screen 300 shown in FIG. 3 that, for example, displays information and options for a user. However, when the user provides input indicative of a need to enter a learning mode or the system 200 identifies a need to enter a learning mode, the user interface device 220 can display the screen 400 shown FIG. 4 to solicit whether the user wishes to enable the security feature of contacting emergency personnel responsive to voice recognition as described above and herein and/or can display the screen 500 shown in FIG. 5 to determine whether the user needs to re-record previously recorded words or phrases for voice recognition thereof.


If the user provides affirmative input to the user interface device 220 displaying the screen 400 or the screen 500, then the user interface device 220 can subsequently and successively display the screen 600 shown in FIG. 6 and the screen 700 shown in FIG. 7 to detect, identify, and record or re-record first and second words or phrases said by the user for subsequent detection and identification by the security system. For example, the microphone 240 can receive the words or phrases said by the user, and the received words or phrases can be saved or recorded in the database device 230.


Although a few embodiments have been described in detail above, other modifications are possible. For example, the logic flows described above do not require the particular order described, or sequential order, to achieve desirable results. Other steps may be provided, or steps may be eliminated, from the described flows, and other components may be added to, or removed from, the described systems. Other embodiments may be within the scope of the invention.


From the foregoing, it will be observed that numerous variations and modifications may be effected without departing from the spirit and scope of the invention. It is to be understood that no limitation with respect to the specific system or method described herein is intended or should be inferred. It is, of course, intended to cover all such modifications as fall within the spirit and scope of the invention.

Claims
  • 1. A method comprising: a security system receiving user input to enable a voice recognition emergency contact feature:the security system storing a first recording of a first word or phrase;the security system storing a second recording of a second word or phrase;the security system detecting and identifying the first word or phrase by comparing audio taken from a region monitored by the security system to the first recording of the first word or phrase when the security system is in an armed mode;the security system determining whether the second word or phrase is detected and identified within a predetermined period of time after detection and identification of the first word or phrase by comparing the audio to the second recording of the second word or phrase; andthe security system contacting emergency personnel when the second word or phrase is detected and identified within the predetermined period of time.
  • 2-3. (canceled)
  • 4. The method of claim 1 wherein the security system detecting and identifying the first word phrase or the second word or phrase includes detecting and identifying the first word or phrase or the second word or phrase when said individually.
  • 5. The method of claim 1 wherein the security system detecting and identifying the first word or phrase or the second word or phrase includes detecting and identifying the first word or phrase or the second word or phrase when said within a larger phrase.
  • 6-7. (canceled)
  • 8. The method of claim 1 further comprising: when the second word or phrase is detected or identified after expiration of the predetermined period of time, abstaining from contacting the emergency personnel; andwhen the second word or phrase fails to be detected and identified, abstaining from contacting the emergency personnel.
  • 9-10. (canceled)
  • 11. A security system comprising: a transceiver; anda programmable processor,wherein the programmable processor receives user input to enable a voice recognition emergency contact feature,wherein the programmable processor stores a first recording of a first word or phrase,wherein the programmable processor stores a second recording of a second word or phrase,wherein the programmable processor detects and identifies the first word or phrase by comparing audio taken from a region monitored by the security system to the first recording of the first word or phrase when the security system is in an armed mode,wherein the programmable processor determines whether a second word or phrase is detected and identified within a predetermined period of time after detection and identification of the first word or phrase by comparing the audio to the second recording of the second word or phrase, andwherein, when the programmable processor detects and identifies the second word or phrase within the predetermined period of time, the programmable processor contacts emergency personnel, via the transceiver.
  • 12. The system of claim 11 further comprising: a microphone,wherein the programmable processor records the first word or phrase using the microphone.
  • 13. The system of claim 12, wherein the programmable processor records the second word or phrase using the microphone.
  • 14. The system of claim 11, wherein the programmable processor detecting and identifying the first word or phrase or the second word or phrase includes the programmable processor detecting and identifying the first word or phrase or the second word or phrase when said individually.
  • 15. The system of claim 11, wherein the programmable processor detecting and identifying the first word or phrase or the second word or phrase includes the programmable processor detecting and identifying the first word or phrase or the second word or phrase when said within a larger phrase.
  • 16-17. (canceled)
  • 18. The system of claim 11, wherein, when the programmable processor detects or identifies the second word or phrase after expiration of the predetermined period of time, the programmable processor abstains from contacting the emergency personnel, and, when the programmable processor fails to detect the second word or phrase, the programmable processor abstains from contacting the emergency personnel.
  • 19-20. (canceled)