WO1995023391A1 - System for the protection of people and/or property - Google Patents

System for the protection of people and/or property Download PDF

Info

Publication number
WO1995023391A1
WO1995023391A1 PCT/AU1994/000091 AU9400091W WO9523391A1 WO 1995023391 A1 WO1995023391 A1 WO 1995023391A1 AU 9400091 W AU9400091 W AU 9400091W WO 9523391 A1 WO9523391 A1 WO 9523391A1
Authority
WO
WIPO (PCT)
Prior art keywords
remote location
person
control
control means
premises
Prior art date
Application number
PCT/AU1994/000091
Other languages
French (fr)
Inventor
Nick Robert Spadaro
Original Assignee
Telealarm Communications Pty. Ltd.
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Telealarm Communications Pty. Ltd. filed Critical Telealarm Communications Pty. Ltd.
Priority to AU61779/94A priority Critical patent/AU6177994A/en
Priority to PCT/AU1994/000091 priority patent/WO1995023391A1/en
Publication of WO1995023391A1 publication Critical patent/WO1995023391A1/en

Links

Classifications

    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B25/00Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems
    • G08B25/01Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems characterised by the transmission medium
    • G08B25/012Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems characterised by the transmission medium using recorded signals, e.g. speech

Definitions

  • This invention relates to systems and to methods for the protection of people and/or property, wherein information is transmitted to a remote location.
  • a home or an office may be fitted with sensors which are connected to an alarm system comprising a siren or strobe light which can be actuated to alert others to an intrusion of the home or office by a burglar, for example.
  • an alarm system may be connected to a central receiving station at the premises of a security agency.
  • the information supplied to such an agency by the alarm system is often insufficient to enable speedy or immediate identification of the home or office being burgled and valuable time is often lost in obtaining the necessary identifying information.
  • alarm switches in communication with a third party or a central receiving station.
  • the alarm switch is usually mounted on a wall next to a person's bed, for example, and can be activated by the person if that person is attacked by an intruder or if a break-in is in progress.
  • the time delay between the person operating the switch and assistance being provided by the third party or by the central receiving station can be considerable and therefore often futile.
  • a system for the protection of person(s) and/or property comprising: sensing means for detection oi a specific event; and control means for transmitting a predetermined message to a remote location by way of a telecommunications network in response to activation of said sensing means, and including means to receive control signals by way of the telecommunications network rom the remote location, and means for controlling operation of the system in response to said control signals, whereby a response agency may intervene to protect the person(s) and/or property.
  • the invention can operate as an intercom system whereby a person being the occupier of the property may effect remote communicate with another person seeking entry to the property, and control means selectively operable by the occupier to enable voice communication via the intercom system and via a communications link to the property to another person when the occupier is not at the property.
  • the term "response agency” includes the owner or occupier of a premises, the police, security agencies, neighbours, friends and/or relatives of the owner or occupant of the premises.
  • the term "specific event” refers to an intrusion into or onto a premises, for example, a burglary or an attack upon a person or persons on that property and can include a person simply visiting the premises and who rings a doorbell, for example, or who accesses an external intercom.
  • predetermined message refers to a pre-recorded voice message, a fax message or a code which is capable of being read by a computer. It is important that the information transmitted to the response agency be sufficient to identify the location at which the specific event has occurred, or is occurring, so that the response agency may intervene swiftly.
  • the sensing means may comprise a motion detector, a heat sensor or a device emitting an infrared beam which in the appropriate circumstances will actuate the system. Further, the sensing means may comprise a pressure mat which emits a signal when subjected to an increase in pressure such as when a person stands on the pressure mat. The sensing means may transmit its signal by radio or it may be wire connected to the system. To enable effective protection of a person at the property, a hand-held transmitter or a transmitter worn by the person, such as in the manner of a pendant, may comprise on of the sensors, the transmitter being actuable by the person in the event of, for example, an assault or medical emergency.
  • Thc system may comprise a control means in the form of a microprocessor which is connected directly to a telephone line and in communication with a number of sensors.
  • the sensors comprise reed switches, motion detectors, pressure mats, heat detectors and a device which emits a beam of infrared light which is received by a collector and which emits a signal if the beam is obstructed.
  • the reed switches are, for example, attached to windows or to doors and will send a signal to the microprocessor to trigger an alarm if a window or door is opened or smashed.
  • the other sensors will send a signal to the microprocessor when either motion is detected, body heat given off by an intruder is detected or the beam of infrared light is obstructed, as the case may be.
  • the microprocessor may be connected to or in communication with other conventional alarm devices such as strobe lights or a siren.
  • the control means may include a tape recorder or solid state message recording device, by means of which a message is stored, the control means being pre-programmed so that when a specific event occurs, such as a door being opened or a motion detector sensing motion within or on the premises, a preselected telephone number of a telephone at a remote location is dialled under the control of the microprocessor. When the remote telephone is answered, the pre-recorded message is played advising the person answering the telephone that a specific event has occurred.
  • the control means can be powered from an AC mains supply or can be powered by an internal DC electrical source or be fitted with a backup supply source such as DC batteries or a solar cell.
  • the control means may also be coupled to a microphone which will enable the person at the remote location to listen to an event which may be occurring. Indeed, any number of microphones may be disposed about the premises, both inside and outside a dwelling or other building on the premises.
  • the control means may include a keypad which is accessible to the owner or occupant of the premises whereby the system may be made to operate in a selected one of its various modes of operation.
  • the system may be deactivated when the house is to be occupied, the system may be activated when the premises are to be unoccupied for a period of time, or various sensing means may be deactivated while others are maintained in their activated condition.
  • the sensors on the ground floor may be activated during the night when the occupants are asleep while the sensors on the first floor may be deactivated. This allows the occupants on the first floor to move about the first floor during the night without triggering an alarm.
  • the microprocessor can be connected to a remote control unit which can be operated from a remote location by way of a keypad on the remote control unit to switch the system on or off or to alter the programming of the system from the remote location. This is achieved by way of the person at the remote location telephoning the microprocessor and keying a particular code whereby tone signals are sent to the microprocessor from the remote control unit through the telephone mouthpiece to control the microprocessor.
  • the microprocessor may be programmable or it may contain one or more PROM or EPROM memory chips if a predetermined program is to be used. Further, the microprocessor may be adapted to receive programming cards which each define a specific mode of operation. This will avoid a potential difficulty in the case of a person who is not technically competent in that that person will be able to alter the mode of operation of the system simply by inserting a particular selected card into the microprocessor, rather than having to alter the mode of operation by keying specified codes into the microprocessor via its keypad.
  • an intercom unit is mounted adjacent an entrance door or at an entrance to the premises, for example mounted on a wall next to an entrance gate, and is connected directly to the microprocessor so that when a visitor to the premises accesses the intercom when the premises is unoccupied, the microprocessor will automatically dial the preselected telephone number at the remote location. The visitor will then be connected directly with the person at the remote location and will be able to converse with that person at the remote location in usual fashion. Consequently, the visitor will be unaware that the premises is unoccupied.
  • the microprocessor will emit an identifying signal as soon as the telephone at the remote location is answered to forewarn the person answering the telephone that the particular telephone call relates to a visitor tc -is or her premises accessing the intercom.
  • This forewarning signal may be a tone signal or a predetermined voice message, for example.
  • the microprocessor can also be connected to an electrically or electronically releasable latch or lock on an entrance door or gate of the premises so that the person at the remote location can, by telephoning the microprocessor and keying a particular code into the remote control unit, unlock the door or gate from the remote location.
  • This can be particularly advantageous if, for example, another occupant of the premises does not have his or her keys and wishes to gain access. That person can simply contact the person at the remote location by way of the intercom to gain access.
  • the remote control can be used to control other aspects of the system from the remote location.
  • the remote control can be used to reset the system if, for example, an alarm has been triggered accidentally, to switch off particular components of the system, for example a siren or a strobe light, to communicate with a microphone or microphones disposed around the premises so that the person at the remote location can listen to determine if an event or disturbance is occurring at the premises or, if desired, the person at the remote location can activate or deactivate domestic lighting or other appliances at the premises from the remote location.
  • intercom can be arranged such that it is in communication with other intercom units disposed about the premises so that they can, in combination, function as a conventional intercom system.
  • pressure pads may be disposed at any desired location around the premises so that if a potential burglar or intruder is loitering outside the premises, the occupant of the premises will be alerted or, if the premises is unoccupied, the predetermined message will sent to the owner of the premises at the remote location warning him or her that a burglary or damage to the property may be imminent.
  • a pressure pad may be positioned under the bed of a person occupying the premises so that if that person vacates his or her bed at any time during the night, the pressure pad will sense the decrease in weight and will automatically deactivate the system. This avoids the necessity for the system to be manually deactivated by the keying of a particular code into the microprocessor, for example. When the person retu ⁇ is to the bed, the system will then be automatically activated by the increase in weight exerted on the pressure pad.
  • Figure 1 is a diagrammatic representation of a system constructed in accordance with the invention.
  • Figures 2 and 3 join on line A-A to form a circuit diagram of a radio receiver, level converter and serial decoder forming part of a control device of the system of Figure 1;
  • Figures 4 and 5 join on line B-B to form a circuit diagram of an audio processor incorporated into the control device of Figure 1;
  • Figures 6 and 7 join on line C-C to form a circuit diagram of a control unit incorporated into the control device of Figure 1;
  • Figures 8 and 9 join on line D-D to form a circuit diagram of a user interface incorporated into the control device from Figure 1;
  • Figures 10 and 11 join on the line to form a circuit diagram of a DTMF dialler and decoder and line isolation device incorporated into the system of Figure 1;
  • Figures 12 to 16 are flow chart diagrams illustrating the operation of the control device under programmed control.
  • the system 10 of the invention comprises a control device 12 including a UHF receiver 14, serial decoder 16, a central control unit 18, a user interface 20, an audio processor 22, a speaker phone controller 24 and a telephone line interface or isolator 26.
  • the receiver 14 receives encoded radio signals from various control devices. In particular it can receive control signals from a UHF radio transmitter 28 coupled to a panic button 30 and from UHF transmitters associated with various - 7 - intrusion or similar detectors; in this case one such transmitter 32 is shown with its associated movement detector 34.
  • the interface 26 provides a connection to a public subscriber telephone network 36 to enable communication between the system and response agencies, such as a police station 38 and the residence of a friend, neighbour, security agency or the other party 40.
  • the panic button 30 when the panic button 30 is operated or intrusion is detected by detector 34, encoded radio signals are directed from the transmitter 28 or 32 to the receiver 14, these being decoded by the decoder 16 and addressed to the unit 18.
  • the unit 18 is able to dial out on the network 36 via the speaker phone controller 24 and interface 26 to direct calls selectively to the police or to one or more other parties 40. These calls are in the nature of emergency calls and comprise voice signals generated from the audio processor 22. A different message may be selected by unit 18 depending on whether the outgoing call is to be directed to the police or to another party 40.
  • the user interface 20 permits a user to set up the system in various ways described later.
  • the panic button 30 may be a conventional switch or the like positioned, say, in the interior of a building to be protected at a location enabling access thereto by an occupier of the building.
  • This may of conventional form, as may be sensors 34 which, in this case, comprise internal sensors and external sensors.
  • the internal sensors are responsive to intrusion within a building to be protected and the external sensors are responsible to intrusive activities exterior of the building.
  • the internal sensors may comprise motion detectors in the building for detecting motion of persons or reed switches or the like, or pressure mats, able to detect displacement of objects or movement of objects such as persons in the building.
  • the external sensors are positioned *rr example to detect intrusion onto the surrounds of the property such as through gates, o er fences or the like or attempted intrusion into the building by opening windows, doors or the like.
  • these external sensors may be of conventional form such as reed switches, pressure mats, infrared or ultrasonic detectors.
  • Figures 2 and 3 show the receiver 14, together with a level conversion device incorporated therein as well as the serial decoder 16.
  • the receiver 14 is of conventional form, such as a 304 MHz regenerative receiver to receive pulse wave modulated signals.
  • signals from each of the sensors 34 or panic button 30 may be encoded in the transmitters 28 or 32 in a unique fashion enabling identification of which sensor or panic button had been operated, on the basis of a unique code transmitted when actuation occurs.
  • Output from the receiver 14 occurs via the aforementioned level conversion device which is a Schmidt trigger device of conventional form able to provide output signals of proper form for operation of the remainder of the circuitry. Output so produced is passed to the serial decoder 16, which comprises a micro-controller device Ul.
  • This is associated with a set of dip switches SI which defines a pre-set code, established for reference by the micrc—controller.
  • a further code is transmitted by the transmitters 28 or 32, which code identifies the system 10 itself.
  • the code transmitted by the transmitters 28, 32 to identify the particular system is reproduced by the settings of the dip switches SI, and the micro-controller compares this reproduced reference code with incoming detected code to enable any code belonging to other systems to be disregarded.
  • SCLK, SDATA and 'VALID-TRANS are coupled to the unit 18 for, respectively clocking data out of the decoder, communicating data as to which sensor 34 or panic button has operated, and communicating data as to whether any of the sensors 34 or the panic button 32 has been operated.
  • the circuitry of the audio processor 22 is shown as including a voice record and play back chip ISD1016. This communicates with the unit 18 via a bus DJ0...7J.
  • the chip is capable of storing in digital form voice messages directed thereto from a microphone coupled to the MIKE line shown.
  • Other control inputs to the chip include *VCECS, VCEPD and *REC, these being respectively a chip select input, a power down select input and an input for enabling the chip in either record or playback mode.
  • VOICE-EN being a control from the micro-controller to enable voice to be directed to the PSTN
  • VOICE-PB to enable a speaker amplifier 46 for reproducing at the unit 12 sound from the chip ISD1016, and SP-PHONE
  • an audio line from the speaker phone controller 24 LINE-PB enables playback of sound from the PSTN to the system *AMP-CS for switching on and off the speaker amplifier.
  • the devices U4A, U4B, U4C, U4D, U5A, U5B, U5C, U5D are electronic switches for controlling signal paths in the audio processor.
  • a connector PI is shown coupled to a line EXT-IN, to enable connection of an external microphone which may be positioned in a different room to the device 12.
  • a line EXT-CS to enable listening to the aforementioned further microphone and intercom lines ICOM-INT-PB and ICOM-UNE the first of which may go to an external intercom 50 ( Figure 1) and the second of which is to enable police to listen to sounds from the external microphone via the PSTN.
  • ICOM-POWER is a control for power down of the unit.
  • ICOM-MIKE enables communication between the intercom and the PSTN 36.
  • SP-PHONE-O is a control for external communications to the PSTN, while ICOM-EXT-PB is to enable interconnection of the microphone through to the external intercom.
  • FIG. 8 shows the user interface 20. This comprises a key pad 50 comprised of sixteen switches SW1 ... SW16 which are operable manually by a user.
  • the user interface also includes eight light emitting diodes LEDl ...LED8.
  • Figure 9 shows a driver U17 which receives, on a bus ADJ0...7' from the micro- controller unit, data for controlling the display of the leds.
  • the *INDCS input to U17 also is coupled to the micro-controller for strobing data lines ADJ0...7J.
  • COL,O...3j provide row and column information identifying which key is pressed in the keyboard and the *KEY PRESS line indicates back to the control unit 18 that any key has been pressed.
  • a buzzer circuit 60 is also shown, this having a *CALL input which causes the buzzer to operate when the intercom is operated. Th buzzer is also operated when a key is depressed.
  • the individual switches SW1...SW16 have functions indicated in Figure 8, as have the LEDS.
  • FIGS 10 and 11 show components of the speaker phone controller 24 and interface 26.
  • the controller 24 includes a conventional DTMF dialler U22 effective to generate tone dial data for establishing an external call from the system.
  • a DTMF decoder is provided in U22 and is interconnected with the micro-controller unit 18 by databuses as shown.
  • a speech processor MC34118 is provided for controlling speech functions.
  • the isolator 26 is coupled to interconnect the dialler and the decoder U22 with the public subscriber telephone network 36 .
  • This is of conventional form, providing two outputs 80 and 82 one for interconnection to the public subscriber telephone network
  • FIGS. 6 and 7 show the micro-controller unit 18. This includes a power supply - 11 -
  • micro-controller U14 provides connections with various other components as described.
  • a program storage device U13 is utilised to provide interconnection as between the micro-controller U14 and various ones of the other components.
  • Input/output port devices U15, U16 are also provided.
  • the 'KEYPRESS, 'VAIID- TRANS, 'CALL, and *RING connections at the lower left of Figure 6 provide wake-up prompts for setting the micro-controller in operative state when various external stimuli arise.
  • an alarm interface 72 which provides for connection to a siren alarm to be operated by the system, for example if connection to the public subscriber telephone network is cut.
  • the interconnection as between unit 18 and the intercom 50 is such that, by appropriate input of data from interface 20, a user may program the control device so that, when a caller uses the intercom 50 to communicate to the device the call is routed through the controller to the speaker phone controller 24 and isolator 26 to be put out on the public subscriber telephone network to call up a pre-selected telephone number.
  • the owner of premises m?v when absent from the premises, answer an intercom call at the premises without it being known to the external caller on the intercom that the owner is not on the premises.
  • the panic button is in the form of a small hand held device which will allow remote operation of the alarm system by triggering the alarm.
  • the device may preferably be of a size and shape which can be worn by a user in the form of a pendant or the like.
  • Two buttons are provided on the device which must be pressed simultaneously to activate the alarm, thus avoiding the possibility of accidental activation. Upon pressing the buttons a unique identification code is transmitted to the central processing unit.
  • An adequate set up arrangement may comprise: - 12 -
  • a phone number to store by pressing the corresponding key on the keypad It can either be a police telephone number or a security telephone number.
  • a telephone number Enter a telephone number by pressing the digits on the keypad.
  • the telephone number can not be more than 12 digits.
  • the user is able to listen to the voice messages stored for checking purposes, the message being played back via the alarm system speaker. To play back a voice message, the user must follow these steps.
  • Each sensor is as described assigned a unique identification number to allow the alarm to identify the source of the alarm trigger.
  • the alarm system is designed so that only one number has to be selected and programmed into the various devices. These steps must be followed for the correct functioning of the alarm system. - 13 -
  • the base address can be any number from 0 to 31.
  • Switch 6 to 8 should be set to ON, ON and OFF respectively.
  • the control which the answering party, such as a security company, has over the operation arises from depressing of keys such as on a telephone at the answering party's station.
  • a typical scheme might be to employ the keypad of a telephone, assigning functions as follows:
  • FIGs 12 to 16 are flow chart diagrams outlining the operation of the central control unit 18 under software control of a stored computer program performed by the microprocessor.
  • a flow chart 100 illustrating a procedure for controlling the alarm system by way of buttons provided on a control panel thereof.
  • the user With the alarm system in one of its plurality of operation modes at step 102, the user is required to enter a personal identification number (pin number) at step 104 in order to enable control of the system from the button panel.
  • the pin number may be set in the alarm system at the time of manufacture, or may be altered by the user either by a programming procedure involving the microprocessor or by altering a set of switches (not shown) provided with the circuitry.
  • step 106 By entering the correct pin number, the procedure is direct to step 106, wherein if a setup button on the control panel is pressed the user may record a new voice message or enter a new telephone number for storage. If the "record" button is pressed (step 108) then a new voice message can be recorded at step 110, as described hereinbefore. After recording the new message the control procedure returns to the current operation mode at step 102. Alternatively, if one of the three programmable telephone buttons is pressed (step 112) then the user is able to enter a new telephone number for storage at step 114, also as described hereinbefore.
  • Step 116 of the flow chart procedure 100 checks to see if the "standby" mode button on the control panel has been pressed, in which case the alarm system enters the standby mode (step 118) in which signals from the sensors are disregarded. If the
  • step 120 the external mode of the alarm system is activated (step 122) in which the alarm system is controlled in accordance with flow chart 150 shown in Figure 13.
  • step 124 the alarm system enters the internal mode (step 126), which is controlled in accordance with the procedure illustrated in flow chart 200 shown in Figure 14.
  • step 1228 control passes to the intercom mode (step 130) in accordance with the procedure illustrated in flow chart 250 shown in
  • step 132 directs the control procedure to step
  • FIG. 13 the flow chart diagram 150 which is shown therein illustrates the control procedure undertaken during the "external" mode of the alarm system.
  • the central control unit 18 awaits a signal from one or more of the sensors 34 at step 152, and if a signal is received, the coded signal is identified at step 154 to ensure the signal received is from one of the designated sensors (ie. to ensure the sensor is coded with the same base address as the central control unit.
  • the particular sensor is then identified at step 156 and a selected telephone number is dialled by way of the DTMF processor at step 158.
  • step 160 determines whether three telephone numbers have been dialled without answer. If there has been no answer from the three telephone numbers dialled then the alarm siren is activated (step 166) and the current operational mode continues to operate. Otherwise, the next of the series of telephone numbers is selected at step 164 and dialled at step 158.
  • the prerecorded message is played over the telephone (step 168), after which the alarm siren is activated (step 170) provision is then made for control of various functions of the alarm system remotely from the premises of the telephone number dialled.
  • control signals are conveniently DTMF tone codes which are generated by push button telephones, with different tones corresponding to different digits on the telephone keypad. If a DTMF code is received by way of the telephone line at the central control unit, then control passes to the procedure illustrated in flow chart 300 of Figure 16.
  • the flow chart diagram 200 shown in Figure 14 illustrates the procedure undertaken whilst the alarm system is in "internal" mode, and operates in a manner similar to that of flow chart 150, without activation of the alarm siren.
  • a selected telephone number is dialled (step 206) in the event that a radio signal is received (step 202) which is identified as a signal originating from the panic button (step 204), as discussed above.
  • the procedure passes to flow chart 300 to await receipt of a control signal from the remote location.
  • a flow chart 250 of the procedure for the "intercom" mode is shown, beginning at step 252 which detects the activation of an intercom button.
  • the intercom button may be in the form of a doorbell type button positioned at the entrance to the premises, in conventional form.
  • a selected telephone number is dialled (step 254), which may correspond to, for example, a mobile telephone of the occupier of the premises.
  • a brief tone or message is issued from the central control unit 18 to alert the listener that the alarm system has dialled the telephone, rather than being an ordinary telephone call.
  • Two communication as between the remote telephone and a speaker and microphone positioned at the entrance to the premises is then activated at step 260, to enable the occupier of the premises to carry on a conversation as if he or she were within the premises, rather than at a remote location.
  • a limited number of functions may also be controlled in the intercom mode, from the remote location, such as unlocking a door or gate (step 268) or resetting operation of the alarm system (step 272).
  • Flow chart 300 illustrated in Figure 16 shows the functions which can be controlled remotely whilst the alarm system is in the internal or external mode, by way of DTMF tone codes.
  • Any DTMF tones received at the central control unit 18 are decoded at step 302. If a first code is received (step 304), then the control unit is effective to repeat the pre-recorded message (step 306) over the telephone line to the remote location.
  • a second code (step 308) causes the control unit to activate the microphones at the premises (step 310) to enable persons at the remote location to listen any activities taking place at the premises.
  • a third code (step 312) effects two way communications between the remote location and the premises by way of the abovementioned microphones and speakers which are similarly provided.
  • a fourth code activates the alarm siren at step 318, although this function may not be controllable in the case of operation in the internal mode.
  • a fifth code step 320 causes the alarm system to reset operation at step 322 and return to the current operational mode (step 102).
  • all components other than the microprocessor unit are preferably provided with their own independent powe supplies, eg solar cells and/or long life batteries or the like.
  • the LEDs used to display information may be replaced by liquid crystal display devices.

Abstract

A protection system particularly suited for use in buildings such as residential properties. The system receives inputs from sensors such as a smoke/heat sensor, motion detector, pressure mat, door/window sensor, doorbell/intercom button, and establishes a telecommunications link to a predetermined telephone number at a remote location in response to a particular input. The telecommunications link can then be utilised to deliver a pre-recorded message to the remote location in accordance with the particular sensor activated. For exemple, if a smoke sensor is activated the system may dial a local fire station and replay a message indicating the possibility of a fire at the premises at which the system is installed. If the intercom button is activated, the system may establish a telecommunications link with the occupier of the premises at a remote location so as to place him/her in communication with the intercom. Means are also provided to enable a person at the remote location to control various functions of the system so as to, for example, effect unlocking of a door, activation of one or two communications, or activation of a siren.

Description

SYSTEM FOR THE PROTECTION OF PEOPLE AND/OR PROPERTY
This invention relates to systems and to methods for the protection of people and/or property, wherein information is transmitted to a remote location.
Regrettably there is a continuing need for the provision of protection for people and property. Recently there has been an increase in attacks on people living at home and on their property.
Apparatus and methods have been previously proposed in which a home or an office may be fitted with sensors which are connected to an alarm system comprising a siren or strobe light which can be actuated to alert others to an intrusion of the home or office by a burglar, for example. Alternatively or in addition, such an alarm system may be connected to a central receiving station at the premises of a security agency. Unfortunately, the information supplied to such an agency by the alarm system is often insufficient to enable speedy or immediate identification of the home or office being burgled and valuable time is often lost in obtaining the necessary identifying information.
Other previously proposed apparatus include alarm switches in communication with a third party or a central receiving station. The alarm switch is usually mounted on a wall next to a person's bed, for example, and can be activated by the person if that person is attacked by an intruder or if a break-in is in progress. However, the time delay between the person operating the switch and assistance being provided by the third party or by the central receiving station can be considerable and therefore often futile.
According to the present invention there is provided a system for the protection of person(s) and/or property, comprising: sensing means for detection oi a specific event; and control means for transmitting a predetermined message to a remote location by way of a telecommunications network in response to activation of said sensing means, and including means to receive control signals by way of the telecommunications network rom the remote location, and means for controlling operation of the system in response to said control signals, whereby a response agency may intervene to protect the person(s) and/or property.
In one form, the invention can operate as an intercom system whereby a person being the occupier of the property may effect remote communicate with another person seeking entry to the property, and control means selectively operable by the occupier to enable voice communication via the intercom system and via a communications link to the property to another person when the occupier is not at the property.
In this specification, the term "response agency" includes the owner or occupier of a premises, the police, security agencies, neighbours, friends and/or relatives of the owner or occupant of the premises. Further, in this specification the term "specific event" refers to an intrusion into or onto a premises, for example, a burglary or an attack upon a person or persons on that property and can include a person simply visiting the premises and who rings a doorbell, for example, or who accesses an external intercom.
Furthermore, in this specification the term "predetermined message" refers to a pre-recorded voice message, a fax message or a code which is capable of being read by a computer. It is important that the information transmitted to the response agency be sufficient to identify the location at which the specific event has occurred, or is occurring, so that the response agency may intervene swiftly.
The sensing means may comprise a motion detector, a heat sensor or a device emitting an infrared beam which in the appropriate circumstances will actuate the system. Further, the sensing means may comprise a pressure mat which emits a signal when subjected to an increase in pressure such as when a person stands on the pressure mat. The sensing means may transmit its signal by radio or it may be wire connected to the system. To enable effective protection of a person at the property, a hand-held transmitter or a transmitter worn by the person, such as in the manner of a pendant, may comprise on of the sensors, the transmitter being actuable by the person in the event of, for example, an assault or medical emergency. Thc system may comprise a control means in the form of a microprocessor which is connected directly to a telephone line and in communication with a number of sensors. In this example the sensors comprise reed switches, motion detectors, pressure mats, heat detectors and a device which emits a beam of infrared light which is received by a collector and which emits a signal if the beam is obstructed. The reed switches are, for example, attached to windows or to doors and will send a signal to the microprocessor to trigger an alarm if a window or door is opened or smashed. In a similar fashion, the other sensors will send a signal to the microprocessor when either motion is detected, body heat given off by an intruder is detected or the beam of infrared light is obstructed, as the case may be. Further the microprocessor may be connected to or in communication with other conventional alarm devices such as strobe lights or a siren.
The control means may include a tape recorder or solid state message recording device, by means of which a message is stored, the control means being pre-programmed so that when a specific event occurs, such as a door being opened or a motion detector sensing motion within or on the premises, a preselected telephone number of a telephone at a remote location is dialled under the control of the microprocessor. When the remote telephone is answered, the pre-recorded message is played advising the person answering the telephone that a specific event has occurred. The control means can be powered from an AC mains supply or can be powered by an internal DC electrical source or be fitted with a backup supply source such as DC batteries or a solar cell. The control means may also be coupled to a microphone which will enable the person at the remote location to listen to an event which may be occurring. Indeed, any number of microphones may be disposed about the premises, both inside and outside a dwelling or other building on the premises.
The control means may include a keypad which is accessible to the owner or occupant of the premises whereby the system may be made to operate in a selected one of its various modes of operation. For example, the system may be deactivated when the house is to be occupied, the system may be activated when the premises are to be unoccupied for a period of time, or various sensing means may be deactivated while others are maintained in their activated condition. For example, in a double-storey residence in which the bedrooms are upstairs, the sensors on the ground floor may be activated during the night when the occupants are asleep while the sensors on the first floor may be deactivated. This allows the occupants on the first floor to move about the first floor during the night without triggering an alarm.
In one form of the invention, the microprocessor can be connected to a remote control unit which can be operated from a remote location by way of a keypad on the remote control unit to switch the system on or off or to alter the programming of the system from the remote location. This is achieved by way of the person at the remote location telephoning the microprocessor and keying a particular code whereby tone signals are sent to the microprocessor from the remote control unit through the telephone mouthpiece to control the microprocessor.
As mentioned above, the microprocessor may be programmable or it may contain one or more PROM or EPROM memory chips if a predetermined program is to be used. Further, the microprocessor may be adapted to receive programming cards which each define a specific mode of operation. This will avoid a potential difficulty in the case of a person who is not technically competent in that that person will be able to alter the mode of operation of the system simply by inserting a particular selected card into the microprocessor, rather than having to alter the mode of operation by keying specified codes into the microprocessor via its keypad.
In another form of the invention, an intercom unit is mounted adjacent an entrance door or at an entrance to the premises, for example mounted on a wall next to an entrance gate, and is connected directly to the microprocessor so that when a visitor to the premises accesses the intercom when the premises is unoccupied, the microprocessor will automatically dial the preselected telephone number at the remote location. The visitor will then be connected directly with the person at the remote location and will be able to converse with that person at the remote location in usual fashion. Consequently, the visitor will be unaware that the premises is unoccupied. In such a case, the microprocessor will emit an identifying signal as soon as the telephone at the remote location is answered to forewarn the person answering the telephone that the particular telephone call relates to a visitor tc -is or her premises accessing the intercom. This forewarning signal may be a tone signal or a predetermined voice message, for example.
The microprocessor can also be connected to an electrically or electronically releasable latch or lock on an entrance door or gate of the premises so that the person at the remote location can, by telephoning the microprocessor and keying a particular code into the remote control unit, unlock the door or gate from the remote location. This can be particularly advantageous if, for example, another occupant of the premises does not have his or her keys and wishes to gain access. That person can simply contact the person at the remote location by way of the intercom to gain access.
Further, the remote control can be used to control other aspects of the system from the remote location. The remote control can be used to reset the system if, for example, an alarm has been triggered accidentally, to switch off particular components of the system, for example a siren or a strobe light, to communicate with a microphone or microphones disposed around the premises so that the person at the remote location can listen to determine if an event or disturbance is occurring at the premises or, if desired, the person at the remote location can activate or deactivate domestic lighting or other appliances at the premises from the remote location.
In addition, the intercom can be arranged such that it is in communication with other intercom units disposed about the premises so that they can, in combination, function as a conventional intercom system.
In another form of the present invention, pressure pads may be disposed at any desired location around the premises so that if a potential burglar or intruder is loitering outside the premises, the occupant of the premises will be alerted or, if the premises is unoccupied, the predetermined message will sent to the owner of the premises at the remote location warning him or her that a burglary or damage to the property may be imminent.
In a yet further development of the present invention, a pressure pad may be positioned under the bed of a person occupying the premises so that if that person vacates his or her bed at any time during the night, the pressure pad will sense the decrease in weight and will automatically deactivate the system. This avoids the necessity for the system to be manually deactivated by the keying of a particular code into the microprocessor, for example. When the person retuπis to the bed, the system will then be automatically activated by the increase in weight exerted on the pressure pad.
The invention is further described by way of example only with reference to the accompanying drawings in which:
Figure 1 is a diagrammatic representation of a system constructed in accordance with the invention;
Figures 2 and 3 join on line A-A to form a circuit diagram of a radio receiver, level converter and serial decoder forming part of a control device of the system of Figure 1;
Figures 4 and 5 join on line B-B to form a circuit diagram of an audio processor incorporated into the control device of Figure 1;
Figures 6 and 7 join on line C-C to form a circuit diagram of a control unit incorporated into the control device of Figure 1; Figures 8 and 9 join on line D-D to form a circuit diagram of a user interface incorporated into the control device from Figure 1;
Figures 10 and 11 join on the line to form a circuit diagram of a DTMF dialler and decoder and line isolation device incorporated into the system of Figure 1; and
Figures 12 to 16 are flow chart diagrams illustrating the operation of the control device under programmed control.
Referring now to Figure 1, the system 10 of the invention comprises a control device 12 including a UHF receiver 14, serial decoder 16, a central control unit 18, a user interface 20, an audio processor 22, a speaker phone controller 24 and a telephone line interface or isolator 26. The receiver 14 receives encoded radio signals from various control devices. In particular it can receive control signals from a UHF radio transmitter 28 coupled to a panic button 30 and from UHF transmitters associated with various - 7 - intrusion or similar detectors; in this case one such transmitter 32 is shown with its associated movement detector 34. The interface 26 provides a connection to a public subscriber telephone network 36 to enable communication between the system and response agencies, such as a police station 38 and the residence of a friend, neighbour, security agency or the other party 40.
Generally, when the panic button 30 is operated or intrusion is detected by detector 34, encoded radio signals are directed from the transmitter 28 or 32 to the receiver 14, these being decoded by the decoder 16 and addressed to the unit 18. The unit 18 is able to dial out on the network 36 via the speaker phone controller 24 and interface 26 to direct calls selectively to the police or to one or more other parties 40. These calls are in the nature of emergency calls and comprise voice signals generated from the audio processor 22. A different message may be selected by unit 18 depending on whether the outgoing call is to be directed to the police or to another party 40.
The user interface 20 permits a user to set up the system in various ways described later.
The panic button 30 may be a conventional switch or the like positioned, say, in the interior of a building to be protected at a location enabling access thereto by an occupier of the building. This may of conventional form, as may be sensors 34 which, in this case, comprise internal sensors and external sensors. The internal sensors are responsive to intrusion within a building to be protected and the external sensors are responsible to intrusive activities exterior of the building. Thus, the internal sensors may comprise motion detectors in the building for detecting motion of persons or reed switches or the like, or pressure mats, able to detect displacement of objects or movement of objects such as persons in the building. The external sensors are positioned *rr example to detect intrusion onto the surrounds of the property such as through gates, o er fences or the like or attempted intrusion into the building by opening windows, doors or the like. In any event, these external sensors may be of conventional form such as reed switches, pressure mats, infrared or ultrasonic detectors. Figures 2 and 3 show the receiver 14, together with a level conversion device incorporated therein as well as the serial decoder 16. The receiver 14 is of conventional form, such as a 304 MHz regenerative receiver to receive pulse wave modulated signals. In that regard, signals from each of the sensors 34 or panic button 30 may be encoded in the transmitters 28 or 32 in a unique fashion enabling identification of which sensor or panic button had been operated, on the basis of a unique code transmitted when actuation occurs. Output from the receiver 14 occurs via the aforementioned level conversion device which is a Schmidt trigger device of conventional form able to provide output signals of proper form for operation of the remainder of the circuitry. Output so produced is passed to the serial decoder 16, which comprises a micro-controller device Ul. This is associated with a set of dip switches SI which defines a pre-set code, established for reference by the micrc—controller.In addition to the code mentioned identifying each sensor 34 or the panic button 30, a further code is transmitted by the transmitters 28 or 32, which code identifies the system 10 itself. Thus, if a number of systems 10 are in operation in nearby proximity, it is possible to identify whether sensors or panic buttons associated with the particular system in question have been operated, rather than ones associated with any such nearby system. Thus, the code transmitted by the transmitters 28, 32 to identify the particular system is reproduced by the settings of the dip switches SI, and the micro-controller compares this reproduced reference code with incoming detected code to enable any code belonging to other systems to be disregarded.
Three lines are shown coupled to the micro-controller Ul, these being denoted
SCLK, SDATA and 'VALID-TRANS. These are coupled to the unit 18 for, respectively clocking data out of the decoder, communicating data as to which sensor 34 or panic button has operated, and communicating data as to whether any of the sensors 34 or the panic button 32 has been operated.
Turning now to Figures 4 and 5, the circuitry of the audio processor 22 is shown as including a voice record and play back chip ISD1016. This communicates with the unit 18 via a bus DJ0...7J. The chip is capable of storing in digital form voice messages directed thereto from a microphone coupled to the MIKE line shown. Other control inputs to the chip include *VCECS, VCEPD and *REC, these being respectively a chip select input, a power down select input and an input for enabling the chip in either record or playback mode.
Also shown in Figures 4 and 5 are various other control or data transfer lines including VOICE-EN being a control from the micro-controller to enable voice to be directed to the PSTN, VOICE-PB to enable a speaker amplifier 46 for reproducing at the unit 12 sound from the chip ISD1016, and SP-PHONE, an audio line from the speaker phone controller 24. LINE-PB enables playback of sound from the PSTN to the system *AMP-CS for switching on and off the speaker amplifier.
The devices U4A, U4B, U4C, U4D, U5A, U5B, U5C, U5D are electronic switches for controlling signal paths in the audio processor.
A connector PI is shown coupled to a line EXT-IN, to enable connection of an external microphone which may be positioned in a different room to the device 12.
Also shown is a line EXT-CS, to enable listening to the aforementioned further microphone and intercom lines ICOM-INT-PB and ICOM-UNE the first of which may go to an external intercom 50 (Figure 1) and the second of which is to enable police to listen to sounds from the external microphone via the PSTN. ICOM-POWER is a control for power down of the unit. ICOM-MIKE enables communication between the intercom and the PSTN 36. SP-PHONE-O is a control for external communications to the PSTN, while ICOM-EXT-PB is to enable interconnection of the microphone through to the external intercom.
Other control signals appear on line *EOM, which is an end of message signal from the ISD1016 used by the micro-controller. Tht RECORD line shown is coupled to the interface 26 to connect the external microphone to direct voice signal from it through the speaker phone controller 34 to PSTN 36, while line ICOM enables connection between the intercom and the PSTN. Figures 8 and 9 show the user interface 20. This comprises a key pad 50 comprised of sixteen switches SW1 ... SW16 which are operable manually by a user. The user interface also includes eight light emitting diodes LEDl ...LED8. In addition to these, Figure 9 shows a driver U17 which receives, on a bus ADJ0...7' from the micro- controller unit, data for controlling the display of the leds. The *INDCS input to U17 also is coupled to the micro-controller for strobing data lines ADJ0...7J. Two lines ROW|0...3| COL,O...3j provide row and column information identifying which key is pressed in the keyboard and the *KEY PRESS line indicates back to the control unit 18 that any key has been pressed.
A buzzer circuit 60 is also shown, this having a *CALL input which causes the buzzer to operate when the intercom is operated. Th buzzer is also operated when a key is depressed.
The individual switches SW1...SW16 have functions indicated in Figure 8, as have the LEDS.
Figures 10 and 11 show components of the speaker phone controller 24 and interface 26.
The controller 24 includes a conventional DTMF dialler U22 effective to generate tone dial data for establishing an external call from the system. A DTMF decoder is provided in U22 and is interconnected with the micro-controller unit 18 by databuses as shown. A speech processor MC34118 is provided for controlling speech functions.
The isolator 26 is coupled to interconnect the dialler and the decoder U22 with the public subscriber telephone network 36 . This is of conventional form, providing two outputs 80 and 82 one for interconnection to the public subscriber telephone network
(80), and the other to provide the interconnection to a normal telephone which a user may wish to utilise (82).
Figures 6 and 7 show the micro-controller unit 18. This includes a power supply - 11 -
70 and a micro-controller U14. U14 provides connections with various other components as described. A program storage device U13 is utilised to provide interconnection as between the micro-controller U14 and various ones of the other components. Input/output port devices U15, U16 are also provided. The 'KEYPRESS, 'VAIID- TRANS, 'CALL, and *RING connections at the lower left of Figure 6 provide wake-up prompts for setting the micro-controller in operative state when various external stimuli arise. At the bottom right of Figure 7 is shown an alarm interface 72 which provides for connection to a siren alarm to be operated by the system, for example if connection to the public subscriber telephone network is cut.
Although not specifically described in the circuitry above, the interconnection as between unit 18 and the intercom 50 is such that, by appropriate input of data from interface 20, a user may program the control device so that, when a caller uses the intercom 50 to communicate to the device the call is routed through the controller to the speaker phone controller 24 and isolator 26 to be put out on the public subscriber telephone network to call up a pre-selected telephone number. In this way, the owner of premises m?v, when absent from the premises, answer an intercom call at the premises without it being known to the external caller on the intercom that the owner is not on the premises.
In a particular form, the panic button is in the form of a small hand held device which will allow remote operation of the alarm system by triggering the alarm. The device may preferably be of a size and shape which can be worn by a user in the form of a pendant or the like. Two buttons are provided on the device which must be pressed simultaneously to activate the alarm, thus avoiding the possibility of accidental activation. Upon pressing the buttons a unique identification code is transmitted to the central processing unit.
In the particular form described, on powering up of the system it is necessary to set up the system for it to function as required. This requires the user to record a voice message and to enter a valid telephone number. An adequate set up arrangement may comprise: - 12 -
1. Press the record button on the keypad. This will record a voice.
2. Select the message to be recorded by pressing the corresponding key on the keypad. It can either be a voice to be played to the police or a voice to be played to the security authorities. 3. Wait for the record lamp to start flashing.
4. Speak into the console.
5. After 10 seconds, the system will stop recording.
6. Press the playback button on the keypad.
7. Select the voice to playback by pressing the corresponding key on the keypad. 8. Re-record the voice again if unsatisfied.
9. Press the store button on the keypad. This will allow the user to enter a telephone number.
10. Select a phone number to store by pressing the corresponding key on the keypad. It can either be a police telephone number or a security telephone number. 11. Enter a telephone number by pressing the digits on the keypad. The telephone number can not be more than 12 digits.
12. Press store to finish entering the phone number.
13. Press the SETUP button on the keypad to finish setting up the system.
The user is able to listen to the voice messages stored for checking purposes, the message being played back via the alarm system speaker. To play back a voice message, the user must follow these steps.
1. If the alarm is not in the setup mode, press the SETUP button on the keypad to put the system in the setup mode. 2. Press the playback button on the keypad.
3. Select the voice message to playback by pressing the appropriate key on the keypad.
Each sensor is as described assigned a unique identification number to allow the alarm to identify the source of the alarm trigger. The alarm system is designed so that only one number has to be selected and programmed into the various devices. These steps must be followed for the correct functioning of the alarm system. - 13 -
1. Select a base address. The base address can be any number from 0 to 31.
2. Set the switches in the panic button in binary form corresponding to the base address.
3. Set switch 1 to switch 5 in the external sensor to the base address. Switches 6 to 8 should be set to ON.
4. Set switch 1 to switch 5 in the internal sensors to the base addresses. Switch 6 to 8 should be set to ON, ON and OFF respectively.
5. Set switch 1 to switch 5 in alarm control unit according to table 1. Switch 6 to 8 should be set to ON.
The control which the answering party, such as a security company, has over the operation arises from depressing of keys such as on a telephone at the answering party's station. A typical scheme might be to employ the keypad of a telephone, assigning functions as follows:
Key Function
1 Replay the voice message again
This will allow the answering party to listen to the voice message again.
2 Put the alarm into one way communication mode This will allow the answering party to listen to sound being picked up by the alarm microphone.
3. Put the alarm into two way communication mode
This will allow the answering party to send voice message to the alarm system, and allow the answering party to listen to the sounds being picked up by the alarm microphone.
4. Actuate alarm at premises
This allows remote operation of an alarm at the premises (ie from the remote telephone a siren and/or flashing light may be actuated at the premises to be protected). 5. Hang up the telephone line and reset operation of the alarm system. This will disconnect the answering party from the alarm system. - 14 -
Figures 12 to 16 are flow chart diagrams outlining the operation of the central control unit 18 under software control of a stored computer program performed by the microprocessor. Referring to Figure 12, there is shown a flow chart 100 illustrating a procedure for controlling the alarm system by way of buttons provided on a control panel thereof. With the alarm system in one of its plurality of operation modes at step 102, the user is required to enter a personal identification number (pin number) at step 104 in order to enable control of the system from the button panel. The pin number may be set in the alarm system at the time of manufacture, or may be altered by the user either by a programming procedure involving the microprocessor or by altering a set of switches (not shown) provided with the circuitry. By entering the correct pin number, the procedure is direct to step 106, wherein if a setup button on the control panel is pressed the user may record a new voice message or enter a new telephone number for storage. If the "record" button is pressed (step 108) then a new voice message can be recorded at step 110, as described hereinbefore. After recording the new message the control procedure returns to the current operation mode at step 102. Alternatively, if one of the three programmable telephone buttons is pressed (step 112) then the user is able to enter a new telephone number for storage at step 114, also as described hereinbefore.
Step 116 of the flow chart procedure 100 checks to see if the "standby" mode button on the control panel has been pressed, in which case the alarm system enters the standby mode (step 118) in which signals from the sensors are disregarded. If the
"external" mode button is pressed (step 120) then the external mode of the alarm system is activated (step 122) in which the alarm system is controlled in accordance with flow chart 150 shown in Figure 13. Similarly, if the "internal" mode button is pressed (step 124), the alarm system enters the internal mode (step 126), which is controlled in accordance with the procedure illustrated in flow chart 200 shown in Figure 14. Finally, if the "intercom" mode button is pressed (step 128), then control passes to the intercom mode (step 130) in accordance with the procedure illustrated in flow chart 250 shown in
Figure 15. If more than two second delay passes after pressing of the setup button (step 106) before another button is pressed, then step 132 directs the control procedure to step
134 wherein any existing alarm condition is cancelled, and operation continues under the current operational mode at step 102. Turning now to Figure 13, the flow chart diagram 150 which is shown therein illustrates the control procedure undertaken during the "external" mode of the alarm system. The central control unit 18 awaits a signal from one or more of the sensors 34 at step 152, and if a signal is received, the coded signal is identified at step 154 to ensure the signal received is from one of the designated sensors (ie. to ensure the sensor is coded with the same base address as the central control unit. The particular sensor is then identified at step 156 and a selected telephone number is dialled by way of the DTMF processor at step 158. Provision is made for a plurality of telephone numbers to be stored by the central control unit, as described above, so that different telephone numbers may be selected depending upon the operational mode of the alarm system and/or the identity of the sensor which is activated. For example, if a door sensor is activated and identified at step 156 as such, the selected telephone number may be that of a security company. Alternatively, if the identified sensor corresponds to a smoke alarm, the telephone number selected may be that of a fire brigade station. Furthermore, a plurality of telephone numbers may be provided to be sequentially dialled in the event of no answer at the first telephone number thereof, also as described above. In this way, if no answer at the selected telephone number is received within a predetermined time interval (for example, one minute) then the procedure is directed from step 160 to step 162, which determines whether three telephone numbers have been dialled without answer. If there has been no answer from the three telephone numbers dialled then the alarm siren is activated (step 166) and the current operational mode continues to operate. Otherwise, the next of the series of telephone numbers is selected at step 164 and dialled at step 158. When an answer is received at the premises of one of the selected telephone numbers, the prerecorded message is played over the telephone (step 168), after which the alarm siren is activated (step 170) provision is then made for control of various functions of the alarm system remotely from the premises of the telephone number dialled. The control signals are conveniently DTMF tone codes which are generated by push button telephones, with different tones corresponding to different digits on the telephone keypad. If a DTMF code is received by way of the telephone line at the central control unit, then control passes to the procedure illustrated in flow chart 300 of Figure 16.
The flow chart diagram 200 shown in Figure 14 illustrates the procedure undertaken whilst the alarm system is in "internal" mode, and operates in a manner similar to that of flow chart 150, without activation of the alarm siren. A selected telephone number is dialled (step 206) in the event that a radio signal is received (step 202) which is identified as a signal originating from the panic button (step 204), as discussed above. After replay of the pre-recorded message (step 212) the procedure passes to flow chart 300 to await receipt of a control signal from the remote location.
Referring to Figure 15, a flow chart 250 of the procedure for the "intercom" mode is shown, beginning at step 252 which detects the activation of an intercom button. The intercom button may be in the form of a doorbell type button positioned at the entrance to the premises, in conventional form. Upon sensing of activation of the intercom button, a selected telephone number is dialled (step 254), which may correspond to, for example, a mobile telephone of the occupier of the premises. Upon receiving an answer at the other end of the telephone line (step 256) a brief tone or message is issued from the central control unit 18 to alert the listener that the alarm system has dialled the telephone, rather than being an ordinary telephone call. Two communication as between the remote telephone and a speaker and microphone positioned at the entrance to the premises is then activated at step 260, to enable the occupier of the premises to carry on a conversation as if he or she were within the premises, rather than at a remote location. A limited number of functions may also be controlled in the intercom mode, from the remote location, such as unlocking a door or gate (step 268) or resetting operation of the alarm system (step 272).
Flow chart 300 illustrated in Figure 16 shows the functions which can be controlled remotely whilst the alarm system is in the internal or external mode, by way of DTMF tone codes. Any DTMF tones received at the central control unit 18 are decoded at step 302. If a first code is received (step 304), then the control unit is effective to repeat the pre-recorded message (step 306) over the telephone line to the remote location. A second code (step 308) causes the control unit to activate the microphones at the premises (step 310) to enable persons at the remote location to listen any activities taking place at the premises. A third code (step 312) effects two way communications between the remote location and the premises by way of the abovementioned microphones and speakers which are similarly provided. Reception of a fourth code (step 316) activates the alarm siren at step 318, although this function may not be controllable in the case of operation in the internal mode. Finally, a fifth code step 320) causes the alarm system to reset operation at step 322 and return to the current operational mode (step 102).
In the described system all components other than the microprocessor unit are preferably provided with their own independent powe supplies, eg solar cells and/or long life batteries or the like.
In the described system, the LEDs used to display information may be replaced by liquid crystal display devices.
The present invention has been described by way of example only and modifications are possible within the scope of the invention.

Claims

1. A system for the protection of person(s) and/or property, comprising: sensing means for detection of a specific event; and control means for transmitting a predetermined message to a remote location by way of a telecommunications network in response to activation of said sensing means, and including means to receive control signals by way of the telecommunications network from the remote location, and means for controlling operation of the system in response to said control signals, whereby a response agency may intervene to protect the person(s) and/or property.
2. A system as claimed in claim 1, wherein the sensing means includes a radio frequency transmitting means which can be carried by an occupier of the property and actuable by the occupier to cause the control means to transmit said message.
3. A system as claimed in claim 1, wherein the control means is responsive to a said control signal issued from the remote location to cause retransmission of said predetermined message.
4. A system as claimed in claim 1, wherein the system includes a microphone and the control means is responsive to said control signal issued from the remote location to cause the microphone to be coupled via the network to enable sounds in the vicinity of the microphone to be reproduced at the remote location.
5. A system as claimed in claim 4, wherein the control means is provided with a sound transducer for causing reproduction of voice signals as sound and the control means is responsive to a said control signal to enable two way voice communication via said link between personnel at the remote location and a person in the vicinity of the sound transducer and microphone.
6. A system as claimed in claim 1, wherein the sensing means includes a means, such as a door bell button, actuable by a person representing access to the property.
7. A system as claimed in claim 1, wherein the sensing means comprises a motion sensor, heat detector, pressure mat or switch device actuable pursuant to opening a door, window or other moveable part of a building or its surrounds.
8. A system as claimed in any preceding claim wherein the predetermined message comprises a pre-recorded voice message.
9. A system as claimed in claim 8, wherein the control means, in use, transmits said message to the remote location by dialling a telephone number of the remote location, and wherein the control means is programmable with a plurality of remote location telephone numbers for sequential dialling thereof in the event that a telecommunications connection cannot be established to a first of said telephone numbers.
10. A system as claimed in claim 1 for protection of a person occupying a property comprising a building wherein there are a plurality of said sensing means including external sensing means for detecting intrusion into the building from the exterior of the building by unauthorised means, and internal sensing means for detecting intrusion within the building, the control means being operable by the person whereby when the person is in the building the intrusion sensors are enabled but the internal sensors are disabled.
11. A system as claimed in claim 1, wherein said sensors communicate with the control means by way of radio frequency signals.
12. A system as claimed in any one of claims 1 to 5 wherein the control signals issued from the remote location are in the form of DTMF tones which are decoded by the control means.
PCT/AU1994/000091 1994-02-25 1994-02-25 System for the protection of people and/or property WO1995023391A1 (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
AU61779/94A AU6177994A (en) 1994-02-25 1994-02-25 System for the protection of people and/or property
PCT/AU1994/000091 WO1995023391A1 (en) 1994-02-25 1994-02-25 System for the protection of people and/or property

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/AU1994/000091 WO1995023391A1 (en) 1994-02-25 1994-02-25 System for the protection of people and/or property

Publications (1)

Publication Number Publication Date
WO1995023391A1 true WO1995023391A1 (en) 1995-08-31

Family

ID=3764142

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/AU1994/000091 WO1995023391A1 (en) 1994-02-25 1994-02-25 System for the protection of people and/or property

Country Status (2)

Country Link
AU (1) AU6177994A (en)
WO (1) WO1995023391A1 (en)

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
ES2126525A1 (en) * 1997-06-17 1999-03-16 Del Campo Y Carreno Fernandez Domestic-automation and security system using remote control
NL1007957C2 (en) * 1998-01-05 1999-07-06 Hessel Van Der Meulen Automatic alarm system sends pre-recorded messages via public telephone network
EP0940790A2 (en) * 1998-03-05 1999-09-08 Gebr. Merten Gmbh & Co.KG Surveillance device
EP0955219A2 (en) * 1998-05-08 1999-11-10 E-Tronic-Handelsges.m.b.H. Device for remote transmission of condition data of an object
WO2002096084A1 (en) * 2001-05-23 2002-11-28 Hak Man Chan Automatic telephone dialler
FR2852722A1 (en) * 2003-03-18 2004-09-24 Fleet Technology Vehicles or offices monitoring method, involves central station determining identity and phone number of caller without billable connection being established
GB2365186B (en) * 2000-07-19 2005-04-20 Bounthavy Luangkhoth The mobile telephone alarm security systems
WO2007012831A1 (en) * 2005-07-29 2007-02-01 British Telecommunications Public Limited Company Authentication apparatus

Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4155042A (en) * 1977-10-31 1979-05-15 Permut Alan R Disaster alert system
EP0077668A1 (en) * 1981-10-19 1983-04-27 SUNDERLAND & SOUTH SHIELDS WATER COMPANY A combined communication, security and alarm radio system
AU1129088A (en) * 1987-03-20 1988-09-22 Mori, K. A fire alarm system
US4794368A (en) * 1987-01-21 1988-12-27 Electronic Security Products Of California Programmable automobile alarm system having vocal alarm and reporting features
AU1046388A (en) * 1987-11-13 1989-06-01 Sang-Rok Kim Telephone alerting system
AU8664091A (en) * 1990-10-04 1992-04-28 Nordic Technology A.S. Home alarm device
AU2022692A (en) * 1991-06-12 1993-01-12 Jan Ruus Alarm installation
AU8821691A (en) * 1991-07-10 1993-01-14 Bloomfield Research And Development Corporation Mobile monitoring device
AU2982892A (en) * 1991-12-06 1993-06-10 Gwynne Lewis Parry Security system
AU4499193A (en) * 1992-08-28 1994-03-03 Nick Robert Spadaro System and method for the protection of people and/or property

Patent Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4155042A (en) * 1977-10-31 1979-05-15 Permut Alan R Disaster alert system
EP0077668A1 (en) * 1981-10-19 1983-04-27 SUNDERLAND & SOUTH SHIELDS WATER COMPANY A combined communication, security and alarm radio system
US4794368A (en) * 1987-01-21 1988-12-27 Electronic Security Products Of California Programmable automobile alarm system having vocal alarm and reporting features
AU1129088A (en) * 1987-03-20 1988-09-22 Mori, K. A fire alarm system
AU1046388A (en) * 1987-11-13 1989-06-01 Sang-Rok Kim Telephone alerting system
AU8664091A (en) * 1990-10-04 1992-04-28 Nordic Technology A.S. Home alarm device
AU2022692A (en) * 1991-06-12 1993-01-12 Jan Ruus Alarm installation
AU8821691A (en) * 1991-07-10 1993-01-14 Bloomfield Research And Development Corporation Mobile monitoring device
AU2982892A (en) * 1991-12-06 1993-06-10 Gwynne Lewis Parry Security system
AU4499193A (en) * 1992-08-28 1994-03-03 Nick Robert Spadaro System and method for the protection of people and/or property

Cited By (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
ES2126525A1 (en) * 1997-06-17 1999-03-16 Del Campo Y Carreno Fernandez Domestic-automation and security system using remote control
NL1007957C2 (en) * 1998-01-05 1999-07-06 Hessel Van Der Meulen Automatic alarm system sends pre-recorded messages via public telephone network
EP0940790A2 (en) * 1998-03-05 1999-09-08 Gebr. Merten Gmbh & Co.KG Surveillance device
EP0940790A3 (en) * 1998-03-05 2000-06-28 Gebr. Merten Gmbh & Co.KG Surveillance device
EP0955219A2 (en) * 1998-05-08 1999-11-10 E-Tronic-Handelsges.m.b.H. Device for remote transmission of condition data of an object
EP0955219A3 (en) * 1998-05-08 2000-06-28 E-Tronic-Handelsges.m.b.H. Device for remote transmission of condition data of an object
GB2365186B (en) * 2000-07-19 2005-04-20 Bounthavy Luangkhoth The mobile telephone alarm security systems
WO2002096084A1 (en) * 2001-05-23 2002-11-28 Hak Man Chan Automatic telephone dialler
FR2852722A1 (en) * 2003-03-18 2004-09-24 Fleet Technology Vehicles or offices monitoring method, involves central station determining identity and phone number of caller without billable connection being established
WO2007012831A1 (en) * 2005-07-29 2007-02-01 British Telecommunications Public Limited Company Authentication apparatus
US8233602B2 (en) 2005-07-29 2012-07-31 British Telecommunicatons Public Limited Company Authentication apparatus

Also Published As

Publication number Publication date
AU6177994A (en) 1995-09-11

Similar Documents

Publication Publication Date Title
US4764953A (en) Method and apparatus for remote doorbell answering
AU687044B2 (en) Alarm system
US6049273A (en) Cordless remote alarm transmission apparatus
US20030104800A1 (en) Telephone with alarm signalling
KR100937547B1 (en) Monitor system
US6060994A (en) Method for controlling united home security system
GB2166321A (en) Emergency call unit
AU672174B2 (en) Alarm installation
KR101272492B1 (en) To recognize the visitor and according to situation will be able to manage in order is connected with a cellular phone the phone
JP2001167365A (en) Security telephone set, portable telephone set with monitoring function, and method and device for monitoring abnormality
WO1995023391A1 (en) System for the protection of people and/or property
WO1997048220A2 (en) Programmed telephone security system
JP2000299740A (en) Interphone provided with transfer function
KR200234152Y1 (en) Telephone System Having Remote Alarm/Interphone Function
WO1991020151A1 (en) Telephone alarm monitoring system
JPS63238758A (en) Supervising call system for multiple dwelling house
KR20010088971A (en) New Tech Security System
US20060232409A1 (en) Alarm system using radio frequency identification tags
GB2317477A (en) Security system
KR20090095830A (en) Automatic security system and the method of wideo phone
JPH11239224A (en) Security system against trespass through door
EP1087602A2 (en) Alarm system
JP4010295B2 (en) Automatic notification device
KR200360304Y1 (en) Apparatus for perceiving and reporting of invasion
JP2001211269A (en) Supervisory system for specific area

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A1

Designated state(s): AT AU BB BG BR BY CA CH CN CZ DE DK ES FI GB GE HU JP KG KP KR KZ LK LU LV MD MG MN MW NL NO NZ PL PT RO RU SD SE SK TJ UA US UZ VN

AL Designated countries for regional patents

Kind code of ref document: A1

Designated state(s): AT BE CH DE DK ES FR GB GR IE IT LU MC NL PT SE BF BJ CF CG CI CM GA GN ML MR NE SN TD TG

121 Ep: the epo has been informed by wipo that ep was designated in this application
DFPE Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed before 20040101)
REG Reference to national code

Ref country code: DE

Ref legal event code: 8642

122 Ep: pct application non-entry in european phase
NENP Non-entry into the national phase

Ref country code: CA