CN105264483A - Web portal for managing premise security - Google Patents

Web portal for managing premise security Download PDF

Info

Publication number
CN105264483A
CN105264483A CN201480013856.0A CN201480013856A CN105264483A CN 105264483 A CN105264483 A CN 105264483A CN 201480013856 A CN201480013856 A CN 201480013856A CN 105264483 A CN105264483 A CN 105264483A
Authority
CN
China
Prior art keywords
network
security protection
protection system
place
external device
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201480013856.0A
Other languages
Chinese (zh)
Inventor
H·T·海伍德
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Publication of CN105264483A publication Critical patent/CN105264483A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N7/00Television systems
    • H04N7/18Closed-circuit television [CCTV] systems, i.e. systems in which the video signal is not broadcast
    • H04N7/183Closed-circuit television [CCTV] systems, i.e. systems in which the video signal is not broadcast for receiving images from a single remote source
    • H04N7/186Video door telephones
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms
    • G08B13/18Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength
    • G08B13/189Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems
    • G08B13/194Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems
    • G08B13/196Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
    • G08B13/19654Details concerning communication with a camera
    • G08B13/19656Network used to communicate with a camera, e.g. WAN, LAN, Internet
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms
    • G08B13/18Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength
    • G08B13/189Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems
    • G08B13/194Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems
    • G08B13/196Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
    • G08B13/19654Details concerning communication with a camera
    • G08B13/19658Telephone systems used to communicate with a camera, e.g. PSTN, GSM, POTS
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms
    • G08B13/18Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength
    • G08B13/189Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems
    • G08B13/194Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems
    • G08B13/196Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
    • G08B13/19695Arrangements wherein non-video detectors start video recording or forwarding but do not generate an alarm themselves
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N7/00Television systems
    • H04N7/18Closed-circuit television [CCTV] systems, i.e. systems in which the video signal is not broadcast
    • H04N7/188Capturing isolated or intermittent images triggered by the occurrence of a predetermined event, e.g. an object reaching a predetermined position
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/14Digital output to display device ; Cooperation and interconnection of the display device with other functional units
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms
    • G08B13/18Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength
    • G08B13/189Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems
    • G08B13/194Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems
    • G08B13/196Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
    • G08B13/19678User interface
    • G08B13/19684Portable terminal, e.g. mobile phone, used for viewing video remotely

Abstract

Premise data of a security event may be received over a first network. The premise data may be captured by a secure gatekeeper adapted to monitor premises. Media may be received over the first network for display on the secure gatekeeper. The media may be provided to the secure gatekeeper. The secure gatekeeper may be instructed over the first network to display the media.

Description

For managing the portal website of place safety
Background technology
In many intercom systems, the people attempting to access place presses the button to make hummer jingle bell.This button can warn the existence of this people to the occupant of buildings.Occupant can remove the lock of such as electronic lock etc., enters place to allow this people.Some intercom systems can also comprise camera, sound monitoring device and other device to provide the out of Memory with the relating to persons at venue entrance place to occupant.
General intercom system proposes many problems for occupant, and so same for visitor.To stay out or for a problem may be produced when weak population when occupant.Such as, when occupant be absent from the scene in, this may be warned true to visitor, and visitor may attempt to enter place in an unauthorized manner.In addition, if visitor sees the weak population (such as, the elderly or children) in place by intercom system, then this visitor may attempt to enter buildings and cheats to utilize the weak tendency of occupant.
Many intercom systems use landline telephone or adopt rigid line to be connected to electric power or the infrastructure of telecommunication in place.As conceivable, if visitor is connected to the wiring of intercom system by cut-out landline telephone or cut-out and is made intercom system unavailable, then these intercom systems may have problems.In addition, many intercom systems comprising camera may be difficult to carry out monitoring in 24 hours.The expense of consequent installation, monitoring and maintenance is usually much larger than predictable cost.The system so obtained often is difficult to management.The consequence cutting off the connection in the system that so obtains may be very serious and fundamentally may destroy safety.
Summary of the invention
One method, comprises the following steps: via first network to receive the locale data of security incident, wherein said locale data is captured by security protection system, and described security protection system is configured to monitor place; Receive via described first network and be suitable for being presented at the media in described security protection system; Via described first network, described media are provided to described security protection system; And indicate described security protection system to show described media via described first network.
In the implementation, described security protection system comprises the interior arrangement being connected to described first network and the external device (ED) being connected to described first network, wherein said interior arrangement is arranged in the safety zone in described place, and described external device (ED) is arranged in the insecure area in described place, and described external device (ED) can be configured to the described locale data catching described security incident.Described interior arrangement is configured to catch and is suitable for being presented at the media in described security protection system.
In various implementations, the computer system being connected to described first network is configured to catch and is suitable for being presented at the media in described security protection system.Described media capture in the web browser of described computer system.Described media capture on the local application of described computer system.Described media capture on the local application of described computer system, and described computer system comprises mobile device.
In some implementations, described media comprise one or more images of the people managing described place, one or more sound or one or more video.Described media comprise the realtime graphic stream of the people managing described place, one or more sound or one or more video.Described real-time streams captures in the web browser of mobile device.Described real-time streams captures on the local application of mobile device.Described real-time streams captures on the interior arrangement of described security protection system, and wherein said interior arrangement is arranged in the safety zone in described place.
In various implementations, described security protection system is integrated in the intercom system being connected to described first network.Described security protection system comprises doorbell, controls engine, video camera and infrared sensor.
In some implementations, described first network comprises cellular network.Cellular data and cellular voice link are provided to described security protection system by described cellular network.
In some implementations, described security incident comprises the mobile object near described security protection system.Described mobile object comprises people.
In various implementations, further comprising the steps of: the notice receiving described security incident via described first network from described security protection system; And in response to the described notice of described security incident, indicate described security protection system to catch described locale data.Described notice comprise from the motion sensor in described security protection system, represent the signal of mobile object.Described notice comprise from the thermal sensor in described security protection system, represent the signal of mobile object.
In some implementations, described method is further comprising the steps of: receive the instruction in order to manage described security protection system via described first network; And manage described security protection system according to described instruction.In various implementations, described method is further comprising the steps of: receive the instruction in order to manage place utensil via described first network; And manage described place utensil according to described instruction.
A kind of system, it can comprise: external device (ED) management engine, and it is connected to first network; And place safety management devices management engine, it is connected to described first network, wherein, at work: described place safety management devices management engine receives the media being suitable for being presented in security protection system via described first network, and described external device (ED) management engine carries out following operation: via described first network to receive the locale data of security incident, wherein said locale data is captured by security protection system, and described security protection system is configured to monitor place; Via described first network, described media are provided to described security protection system; And indicate described security protection system to show described media via described first network.
In the implementation, described security protection system comprises the interior arrangement being connected to described first network and the external device (ED) being connected to described first network, wherein said interior arrangement is arranged in the safety zone in described place, and described external device (ED) is arranged in the insecure area in described place, and described external device (ED) is configured to the described locale data catching described security incident.Described interior arrangement is configured to catch and is suitable for being presented at the media in described security protection system.
In various implementations, the computer system being connected to described first network is configured to catch and is suitable for being presented at the media in described security protection system.Described media capture in the web browser of described computer system.Described media capture on the local application of described computer system, and described computer system comprises mobile device.
In some implementations, described media comprise one or more images of the people managing described place, one or more sound or one or more video.Described media comprise the realtime graphic stream of the people managing described place, one or more sound or one or more video.Described real-time streams captures in the web browser of mobile device.Described real-time streams captures on the local application of mobile device.Described real-time streams captures on the interior arrangement of described security protection system, and wherein said interior arrangement is arranged in the safety zone in described place.
In various implementations, described security protection system is integrated in the intercom system being connected to described first network.Described security protection system comprises doorbell, controls engine, camera and infrared sensor.
In some implementations, described first network comprises cellular network.Cellular data and cellular voice link are provided to described security protection system by described cellular network.
In some implementations, described security incident comprises the mobile object near described security protection system.Described mobile object comprises people.
In various implementations, described system can also comprise: described external device (ED) management engine comprises event information and collects engine and external device (ED) allocation engine, and at work: described external device (ED) management engine receives the notice of described security incident from described security protection system via described first network; And described external device (ED) allocation engine is in response to the described notice of described security incident, described security protection system is indicated to catch described dwelling data.Described notice comprise from the motion sensor in described security protection system, represent the signal of mobile object.Described notice comprise from the thermal sensor in described security protection system, represent the signal of mobile object.
In some implementations, at work, described external device (ED) management engine carries out following operation: receive the instruction in order to manage described security protection system via described first network; And manage described security protection system according to described instruction.
In the implementation, also comprise place instrument management engine, at work, described place instrument management engine carries out following operation: receive the instruction in order to manage place utensil via described first network; And manage described place utensil according to described instruction.
A kind of system, it can comprise: for via first network to receive the parts of the locale data of security incident, wherein said locale data is captured by security protection system, and described security protection system is configured to monitor place; For receiving the parts of the media being suitable for being presented in described security protection system via described first network; For described media being provided to via described first network the parts of described security protection system; And for indicating described security protection system to show the parts of described media via described first network.
Accompanying drawing explanation
Fig. 1 illustrates the example of the partial exploded perspective view of remote unit.
Fig. 2 illustrates the example of the partial exploded perspective view of base unit.
Under Fig. 3 illustrates the state being set to " stay out (AWAYFROMHOME) " at safety feature, represent the example of the process flow diagram of the method for the potential pattern of the operation of this safety feature.
Under Fig. 4 illustrates the state being set to " be in (ATHOME) " at safety feature, represent the example of the process flow diagram of the method for the potential pattern of the operation of this safety feature.
Fig. 5 illustrates the example of place safety management environment.
Fig. 6 illustrates the example of place safety gate system.
Fig. 7 illustrates for utilizing place safety gate system to control the example of the process flow diagram of the method for place safety.
Fig. 8 illustrates the example of external device (ED) management engine.
Fig. 9 illustrates that event information collects the example of engine.
Figure 10 illustrates the example for providing the process flow diagram of the method for event information from event information engine.
Figure 11 illustrates the example of live view information engine.
Figure 12 illustrates the example of the process flow diagram of the method for providing the live view information relevant with place safety managing portal system.
Figure 13 illustrates that system information collects the example of engine.
Figure 14 illustrates the example of the process flow diagram of the method for providing the system information relevant with place safety managing portal system.
Figure 15 illustrates the example of place instrument management engine.
Figure 16 illustrates the example of the process flow diagram of the method for managing one or more places utensil.
Figure 17 illustrates the example of place safety management environment.
Figure 18 A illustrates the example of place safety management environment.
Figure 18 B illustrates the example of the framework for realizing place safety gate system.
Figure 19 illustrates the example of the screen of place safety gate system.
Figure 20 illustrates the example of computer system.
Embodiment
Fig. 1 illustrates the example of the partial exploded perspective view 16 of remote unit.In the example of fig. 1, remote unit comprises the independent basic module of steel underframe (3), circuit board (4) (being also used as subframe), moulded goods (1) and seal (13) these four.
Suitable hole (3a) is set in steel underframe (3), to make it possible to utilize screw rod (not shown) steel underframe (3) to be mounted to doorframe or suitable face (making this device to be used as entrance supervising device), three holes wherein in these four holes (3a) shown in Figure 1.
Aperture (8) is also set in steel underframe (3) and can underframe (3) be passed to make cable (14).These cables can be used for making remote unit be connected to base unit and/or supplying electric power to remote unit (16).
Series of projections (7) is set in steel underframe; When assembling the independent assembly (1) of remote unit, (3) and (4) to form individual unit, these projections can be used as the parts guaranteeing that moulded goods and circuit board are correctly located relative to steel underframe (3).Alternatively, these projections can be used for guaranteeing the assembly process in remote unit (16), are used in module units (16) weather proof rubber seal (not shown) and are in suitable posture relative to moulded goods (1) and steel underframe (3) maintenance.When teat (7) forms the guiding piece for this seal (not shown), before circuit board (4) and moulded goods are positioned at appropriate location relative to steel underframe (3), originally seal is positioned at the projection (7) of protrusion around.
Circuit board (4) is used as the subframe of all electronic packages that can be provided with such as camera, loudspeaker, microphone etc., and wherein this circuit board (4) self is arranged in moulded goods (1).
A large amount of assembly is included in the front of moulded goods (1), wherein these assemblies comprise plastic lens skull (2), camera lens (9), it can be the detecting device (10) of other this suitable detecting device of ultrasonic detector, passive type infrared detector or type well known by persons skilled in the art, loudspeaker (11), manual activation switch (5) and microphone (12).
Manual activation switch (5) is installed in moulded goods in the mode being used as rocker switch.In this switch (5), diode installed (LED) (not shown) is to throw light on from inside to this switch, and wherein this LED is connected to circuit board (4).Switch (5) also comprises the part manufactured by transparent plastic as shown in (6).
Also by utilizing suitable waterproof material to apply inner computing machine or remote unit (16) entirety with the form of spraying or dipping, make this remote unit (16) weather proof (that is, protection avoids damaging because of water).The second seal (not shown) can be utilized to make any clearance space between switch and moulded goods (1) weather proof.
With reference now to the Fig. 2 in accompanying drawing, shown in it as by the partial exploded perspective view of the base unit shown in (40).
Base unit (40) comprises the housing that point two parts (41a and 41b) are formed; These two parts can be manufactured by plastic material etc.
The rear portion (41b) of housing comprises two keyhole-shaped groove (not shown), with make it possible to by use screw rod (other suitable fixed part can also be used) by this cellular installation on wall or other suitable face.
Utilize six screw rods that the rear portion (41b) of housing is solidly connected to the front of mechanograph (41a), wherein these six screw rods insert the peristome (58) of back casing (41b) and insert the appropriate section of procapsid (41a), and four peristomes in these six peristomes are wherein only shown.
The selectable unit (SU) such as pushing away leaching (pushdip) mechanism or similar fixed part etc. as is known to persons skilled in the art can be used to be connected to back casing (41b) to make procapsid (41a).
The rear portion (41b) of housing also comprises removable door (54) to make it possible to SIM card be inserted this device (in appropriate circumstances), and arranges another removable door (55) to make it possible to insert and change battery.More door (not shown) can be set at the rear portion of housing, to make it possible to insert primary power plugs and sockets used and/or in order to make this device be connected to the plugs and sockets of remote monitor and/or the plugs and sockets in order to make this device be connected to fixation phone line.
The front portion (41a) of housing is provided with the insertion of smart card groove 53 used, and is built-in with screen (LCD etc.) with the image collected by the camera showing remote unit.Also be provided with keyboard (43) and operating rod (44), to make user can access menus, thus control the setting of this device and the related data of such as telephone number etc. can be inputted.
Power switch (45) is arranged together with power light (46).When battery needs to change, low battery/alarm function (47) provides warning to the user of this device.
Arrange and adopt the switch of the form of button (48a) can standard intercom system be used as to make base unit, and the indicator (48b) arranging the form of employing LED enough presses this button to activate intercom system at full tilt to represent.
Microphone (49) and loudspeaker (50) are also incorporated to the front portion (41a) of housing, to make it possible to communicate between base unit (30) and remote unit (16).
The all required electronic package comprising circuit board and antenna is all incorporated to the front portion (41a) of housing.
In use, utilize detecting device (10) to detect just close to the people of remote unit (16), thus activate camera, photograph one or more photo thus and/or alternatively the close of this people be recorded as video image.Utilize suitable parts set in base unit or utilize optional proper data memory unit to preserve these picture/video images relative to remote unit with remote mode, making, when remote unit is destroyed or is stolen, to remain image.The quantity of the photo taken and/or want the time span of record video image can be pre-set via base unit by user.Screen (42) can be used subsequently to watch these photos or video image.
People also have activated the LED thrown light on to switch (5) to utilize detecting device (10) to detect, makes the attention of just close people automatically attracted to switch (5) to encourage to use switch (5).This LED is set to automatic distinguishing after can being the prefixed time interval of several seconds ~ several minutes.
If people presses switch (5), then base unit can activate and utilize remote unit to produce the alarm signal that can hear.This makes the people pressing switch (5) can think the doorbell type mechanism of this switch activator standard.Then, hear that another people in the place of this alarm signal that can hear can by pressing the button (48a) to be used as the base unit (40) of standard intercom system, to set up the voice communication between remote unit (16) and base unit (40).In this communication period, screen (42) can be used to show the image of the camera from remote unit (16).
When there is not another people to be used as base unit (40) of standard intercom system in place, can carry out manually arranging with the telephone number dialing a series of pre-programmed in a predetermined order to base unit (40).Like this, another people answering dialed phone can communicate with the first with remote unit (16) via base unit (40).Alternatively, if do not pressed the button (48a) in the predetermined time interval from activator switch (5), then base unit (40) can start to dial phone numbers associated automatically.
Once another people replying the phone dialed is hung up, the phone that base unit is set up connects disconnection automatically.
Like this, activator switch the first can not judge that another communicated people is in the place entered via the access road adjoined with remote unit or at remote location place.Thus, base unit (40) and remote unit (16) are used as the first safety feature unlawfully entered in paid close attention to place of dissuasion.
Base unit can utilize standard landline telephone or mobile phone can be used to connect dials phone numbers associated.
The medium that the smart card that base unit uses can provide the storage of image used; These images can also be stored on the memory storage that is provided separately with base unit (40) and remote unit (16).
Alternatively, when base unit utilize mobile phone as the critical piece for dialing other phone or as when be used as fundamental telephone connect landline telephone can not suitably work for subsequent use, smart card can be the prepaid card of the type that " namely payable at sight is beaten (PayasYouGo) " type mobile phone uses.
In above-mentioned specific embodiment, although the alternative of such as 3G technology etc. can be utilized to make another people called out by phone can watch image collected by camera, the firstly normally adopt voice to the mode of voice via the communication between remote unit and another people called out by phone.Alternatively, screen can be incorporated to remote unit to allow the video between remote unit and base unit or between remote unit and another people called out by phone to the communication of video.
Can provide as lower component, wherein, even if un-activation switch (5), the phone that the photo taken by camera or video image automatic transmission also can extremely be dialed by these parts.
Communication between base unit (40) and remote unit (16) can connect or the suitable communication component of other form any well known by persons skilled in the art via cable, bluetooth (Bluetooth).
Even if safety feature is just utilizing the landline telephone except mobile link, safety feature disclosed herein also can prevented to be activated when not inserting the SIM card of suitably coding.SIM card can also allow the supplier that connected by the supplier of SIM or phone or original equipment manufacturer (OEM) to carry out Long-distance Control to the activation of this device.
In a word, the special benefits provided comprises following content.
For monitoring the safety feature of the entrance door of any buildings (such as, family, office, garage etc.).
For monitoring the safety monitoring device of automobile or other valuables any.
Allow the safety monitoring device with real-time interactive of bidirectional dialog.
By operating activated safety monitoring device close to " doorbell " type switch and/or to this " doorbell " type switch.
The owner is made to be connected to the safety monitoring device of visitor in the world Anywhere via telephone communication.
Align the safety monitoring device that close potential visitor carries out taking pictures.
Utilize the safety monitoring device of the second generation (2G), the third generation (3G), forth generation (4G) and/or the mobile phone platform in following generation.
The safety monitoring device of the second generation (2G), the third generation (3G), forth generation (4G) and/or the mobile phone platform in following generation can be connected directly to.
The safety monitoring device of landline telephone can be connected directly to.
Long-range " electric bell is pressed " activates the safety monitoring device that mechanism transferred to by phone.
Such as can remotely configure other trigger at entrance door place to activate the safety monitoring device of photo or video recording component.
Here the house-owner etc. away from place is made can to carry out interaction with the visitor in their place of access.The invasive that known supervision and home security system are monitored to family or office is movable, but does not comprise the possessory instant two-way interaction with place.
No matter the owner is indoor or away from their property, ensure that the real-time interactive between visitor and the owner of property all the time.Mobile network makes it possible to connect at the enterprising Serial Communication of global platform.This means that the owner abroad and still can be connected to telephoner for their property and/or visitor by voice or video.Preferably, this unit by enough little to hold all electronic packages and will all standard external doorframe width be applicable to.
Various embodiment can control via the access of door to closed region.In addition, known parts can be set, making it possible to remotely to access this device, reset image that the order, the access system that dial number number store or reset this system in case of need.
When answer call, the input that accesses to your password can also be required, to guarantee be not ready to another people and set up remote unit before the first communication and by the communication between another people of the side of calling.
In the another embodiment of safety feature, remote unit and/or base unit comprise the power supply unit not comprising the wiring of any outside, connector or contact.This can adopt such as to the canonical form of the inductive couplings etc. of inductive reception device internal induction electric power in remote unit and/or base unit.This induction power is the magnetic field come from typical charging pad transmission.Charging pad can be positioned on remote unit and/or base unit or its adjacent near.
In the another embodiment of safety feature, remote unit and/or base unit comprise additional keypad, display screen and speech recognition circuit.Need these assemblies to set up two-way communication with person hard of hearing.Visitor is by by pressing switch and microphone talk to remote unit activates remote unit.Then, utilize speech recognition circuit that the speech conversion of visitor is become text representation, then the text represented in communication to the inner display screen installed in house and/or transfer to mobile phone, thus can be read by person hard of hearing.Person hard of hearing by by from be positioned at inside, house keypad or from mobile phone input text response the communication of visitor is responded.Then the text response inputted converts voice to by speech recognition circuit, is then transferred to visitor.
The present embodiment can also be strengthened further by being incorporated to touch-screen display in remote unit and/or base unit.Keypad can be incorporated in this touch-screen.This touch-screen will show the menu of " one-touch " selection and the communication mode provided for respondent to visitor.
In the another embodiment of safety feature, unique fetcher code is stored in remote unit and/or base unit.These fetcher codes are dispensed to authorized officer, access property immediately to enable these personnel.When input code, identify this people, and the camera of safety feature will catch image and the access time of visitor.Then, text message is sent to the mobile phone of property owners, thus notifies when the identity of visitor and visitor obtain power access property to the owner.
In the another embodiment of safety feature, visitor can to the microphone talk of remote unit to leave message, and wherein this message is by the remote unit that is stored in safety feature and/or base unit.When visitor activates intercom system/doorbell switch and/or movable sensor, safety feature will catch image and the audio message of visitor.
Can by biometric scan device being incorporated to remote unit and/or base unit strengthens the present embodiment further.By the biometric scan characteristic storage of authorized person in remote unit and/or base unit, access property immediately to make these authorized persons.When inputting biometric scan (being generally fingerprint, impression of the hand or retina scanning), identify this people.The camera of safety feature will catch image and the access time of visitor.Then text message is sent to the mobile phone of property owners, thus notifies when the identity of visitor and these visitors obtain power access property to the owner.
In the another embodiment of safety feature, remote unit and/or base unit comprise additional braille keypad, braille intercom system/doorbell switch and sound-producing device.Need these assemblies to set up two-way communication with depending on barrier personnel.Utilize the sound-producing device being positioned at the vicinity of remote unit, will remote unit be directed to depending on barrier personnel.Sound-producing device will be activated by activating the moving detector be positioned near remote unit.Once located remote unit depending on barrier visitor, these can determine the function of key on keypad and/or intercom system/doorbell switch depending on barrier personnel by the impression braille text be positioned on assembly.Therefore, to the inside foundation in house and/or to mobile phone transmission audio frequency, video and/or textcommunication.
In the another embodiment of safety feature, predetermined text message is stored in remote unit and/or base unit.These text messages are dispensed to the activation of the safety feature of the array depending on discrete sensor.Each discrete sensor is mapped to individual function, such as, monitors the sensor in region in the sensor in the region in garden, monitoring garage and/or the sensor of monitoring particular door or window.Therefore, activate when being positioned at the sensor in garage when activated sensors, namely, safety feature by via mobile network and/or the Internet by text message transmission to the mobile phone of homeowner, thus to the potential security threat of owner's notice to garage.
The present embodiment can be strengthened further with lower component by being incorporated to, wherein these parts are used for being come illumination apparatus, audio devices by the mobile phone input predetermined code from homeowner, being carried out operated from a distance from camera and/or other remote-control device any, and wherein then these codes are sent to safety feature via mobile network and/or the Internet.
By being incorporated to removable wireless network transceiver module, being generally USB (universal serial bus) (USB) or one or more craft port that the insertion of " IEEE802.11 " wireless network module is used, strengthen the present embodiment further.Therefore, all distance sensors, remote camera and/or remote unit are all wirelessly networked to safety feature.
In the another embodiment of safety feature, all activation are all attached with timestamp and are recorded in remote unit and/or base unit, check for carrying out after a while and retrieve.
One or more craft port that can be used by the insertion being incorporated to removable memory module (being generally USB (universal serial bus) (USB) storage arrangement) strengthen the present embodiment further.This device can be used for dump and the activation data daily record backing up safety feature and/or the secure data stored.
In the another embodiment of safety feature, by obtained data via mobile network and/or internet transmissions extremely resident private library territory on the world wide web (www.This storehouse provides the access mode towards the secure data stored for particular security device.This storehouse is by the retrieval of management data and use.Usually, this storehouse is provided for remotely accessing stored data from external place and carries out the mode of replying.
In the another embodiment of safety feature, remote unit and/or base unit comprise additional alarm device.This alarm device can be audio frequency and/or visual alarm device usually.Property owners can by pressing predetermined button on base unit or switch or by making from the code of their mobile phone input via mobile network and/or internet transmissions, remotely to activate alarm, to activate alarm.
The present embodiment can be strengthened further by the interface unit comprising the existing warning system making safety feature be connected in property.Property owners can by pressing predetermined button on base unit or switch or by making the code that inputs from their mobile phone via mobile network and/or internet transmissions remotely to activate alarm, activating alarm.
In the another embodiment of safety feature, remote unit and/or base unit comprise subscriber identification module (SIM) and carry out certification to connect mobile network.The owner of safety feature can sign service contract with mobile network provider.Network provider by the special SIM of distribution safety feature, thus makes this safety feature to be connected to mobile network.The safety feature owner after contract period expires, with another mobile network provider negotiate service again of the special SIM by issuing these safety features self, thus can replace any existing SIM in safety feature.Traditional SIM as used in mobile phone, expect that SIM is staticizer instead of roaming device.Therefore, fixed address is set up for charging.Safety feature special SIM used will generate additional revenue stream for mobile network company.This revenue stream comprises the new fixed term contract for security service provided between client and network provider.This new fixed term contract usually by provide for each clients' accounts the new special numbering of SIM, safety feature and safety feature in-flight time usage charges scope.
Safety feature and its special SIM combined by maintaining integrality that mobile network is connected, carry out data verification inspection and any network challenge made it possible in response to the authenticity for SIM is authorized wanting the safety feature that be connected with mobile network.
Mobile network provider can monitor the physical location of SIM by the position setting up SIM via the community in mobile network.If illustrate that SIM is in roaming, then mobile network provider can select to make SIM unavailable and notify potential security risk to the safety feature owner.
In the another embodiment of safety feature, remote unit and/or base unit can be included in non-static platform as staticizer.These platforms are generally land vehicle, floating carrier and/or airborne vehicle.Remote unit and/or base unit comprise additional GPS (GPS) circuit.Need these assemblies, to be connected to transmit GPS coordinate in mobile network and/or the Internet via wireless Internet, thus upgrade the current location of platform.The present embodiment at platform stolen or abuse, will make it possible to successfully track this platform.
Be included in remote unit in platform and/or base unit and record triggered any example from any activation of the sensor in platform and/or any remote activation from platform owner, police law enforcement agency or signing security firm.After a while in any follow-up legal procedure can use safety data as potential evidence.Be included in remote unit in platform and/or base unit carries out two-way communication by making it possible between platform owner and the people monitored in this platform.
The control of platform can also be connected to and/or management system strengthens the present embodiment further by making safety feature.Therefore, platform owner, police law enforcement agency or signing security firm is made to shut down with remote mode and to make platform cisco unity malfunction.This platform can comprise the lock activated with remote mode, the people just monitored to be included in platform.
In the another embodiment of safety feature, remote unit and/or base unit can be used for monitoring specific region.Safety feature is transmission of audio and video data in mobile network and/or the Internet, thus set up property owners, law enforcement agency or private security company and monitor in this region anyone between communication.Once establish communication, then loudspeaker is usually utilized to notify that these people are just monitored to the people that safety feature is monitored.Subsequently in any follow-up legal procedure, obtained secure data can be used as potential evidence.
In the another embodiment of safety feature, even if safety device function can be incorporated to an integrated unit to reduce the physics size safety feature of safety feature for new opplication miniaturization.
The present embodiment can be strengthened further by being incorporated to by safety feature in portable computer (being generally laptop computer, notebook computer or personal digital assistant (PDA)).Therefore, if portable computer or the stolen and thief of PDA attempt to use this portable computer or PDA when first not stopping using safety feature, then this computing machine or PDA will capture the image of thief and by this image via mobile network and/or internet transmissions to possessory mobile phone and/or predetermined website domain name.Then, laptop computer or PDA will make self to stop using, and normally enter dormant state and forbid any user interface.Then, laptop computer or PDA the most at last message " this device stolen and current positive transmission trace signals (THISDEVICEHASBEENSTOLENANDISCURRENTLYTRANSMITTINGATRACKI NGSIGNAL) " are shown on screen, and/or activate loud audible alarm.
The present embodiment can be strengthened further: safety feature is incorporated to the jewelry of children, is generally ring decorations and/or necklace, wherein this safety feature can catch the image of the people holding these jewelry and the people once holding these jewelry by following.The present embodiment can be used to provide safety to children.
Can strengthen the present embodiment by utilizing safety feature further as data recording equipment, wherein this data recording equipment describes the history library of children from child to the life of growing up as image.
The present embodiment can also be strengthened further by safety feature is incorporated to clothing.Therefore, time on holiday, safety feature is for what doing, being in where and just regularly catching image at What for.All required functions in order to catch image are incorporated in clothing by the present embodiment.The present embodiment makes to operate field camera or camera.Therefore, when the clothing of wearer catches the image of the process that wearer carries out, the present embodiment can be favourable for regular situation.
In the another embodiment of safety feature, by utilize sharply snatch away mobile come the activation of triggering secure device.Therefore, once safety feature activates, alarm will be generated; This alarm can adopt the form of ear-piercing alarm or usually with listened to the circuit of set loop play sound " this is booty ".To require in safety feature, to input PIN (Personal Identification Number) (PIN) to stop this alarm.The present embodiment can be used for guaranteeing handbag, briefcase, pocket computer or portable or valuable other safety of goods any.
How potential the more embodiment of safety feature be as described below.
The accessory of fashion object, particularly such as handbag and wallet etc.;
The back side (neck or collar) of jacket;
The back side of the securing band of monitoring user;
Monitoring user and/or the computer screen by push button exciting;
The door of the monitoring person of opening and/or window
Monitor the mobile phone of user;
Passport and ID file;
Legal document folder;
Secret aircraft surveillance, wherein monitors hatch door that ground crew opened to catch the people opening hatch door, the persons or things of to board a plane via hatch door or getting off the plane and these persons or thingses just at What for;
Passport controls and/or immigrant;
Monitor the road markings of traffic;
Not thinking persistent surveillance but want the process evolution in the long-time section of detailed data (that is, the range of driving etc.)
Catch any weapon of the image of the person of opening, ammunition or storage device.
Fig. 5 illustrates the example of place safety management environment 500.In various implementations, place safety management environment 500 uses and is connected to cellular network and provides safety from having the manageable security protection system of any device (security protection system 505 such as, discussed further) that network connects here for place.
In some implementations, telemanagement is carried out in the access that place safety management environment 500 makes it possible to subtend place.As an example, someone may have the older father and mother lived by oneself.Place safety management environment 500 can make this people remotely can monitor the visitor of mother's premises and carry out long-range intervention when visitor appears at the Qianmen in mother house.As another example, another people carries out remote monitoring when his or her child is in, and remotely controls utensil (such as, place utensil 530) for the child of this people.As another example, the another people employing nurse may carry out long-range intervention when stranger rings a doorbell access place; This people also may be able to contact directly with anyone of Qianmen, place place, and may the remotely picture of the people at reception site Qianmen place, video and out of Memory.
In various implementations, place safety management environment 500 can allow the life of auxiliary the elderly.Such as, in some implementations, place safety management environment 500 can allow to control the access of paramedic and the automatic time of discrepancy and date.In some implementations, place safety management environment 500 can allow to provide telenursing service.More specifically, can panic signal be registered and/or get injured by a fall call signal by the heart in the controlling.The call center that the call alert of emergency condition can be sent to lineal relative or register.Alarm for flood, power-off, smoke and fire, gas leak, carbon monoxide leakage etc. can be set.In various implementations, place safety management environment 500 can allow family to monitor and robotization.That is, place safety management environment 500 can allow to carry out Long-distance Control to following content: energy ezpenditure, light/extinguish lamp and/or on/off home appliances, lock a door and/or open door lock robotization, open or close refrigeration and/or heating, remotely arrange and/or reset house configuration file etc.
In the example of hgure 5, place safety management environment 500 comprises security protection system 505, first network 510, second network 515, place safety gate system 520, place safety management devices 525 and place utensil 530.In various implementations, as described herein, one or more in place safety management devices 525, first network 510, second network 515, place safety gate system 520, security protection system 505 and place utensil 530 comprise " engine " and/or " database ".As used herein, " engine " comprise special or common processor, be generally firmware performed by this processor or software module.Consider according to specific implementation or other, engine can be centralized or its function can for distributed.Engine can comprise with computer-readable medium embody perform for processor specialized hardware, firmware or software.
As used herein, such as " database " can be implemented as the software in the physical computer-readable media adopting firmware, hardware, their combination or applicable known or device or system easily form to be embedded on universal or special machine.Database intention herein comprises and comprises table, comma separated value (CSV) file, traditional database (such as, SQL) or other any Organization of Data that is known or organized formats easily be suitable for.Although the physical location of database association assembly and further feature are not most important for understanding for the techniques described herein, the database association assembly of such as database interface etc. can be regarded as database " part ", the part of some other system component or their combination.Database can comprise data structure.As used herein, data structure with to store data in computing machine and the ad hoc fashion of carrying out arranging is associated, thus can use this data structure efficiently in given context.Data structure is usually extracted based on any place specified by computing machine address in its memory and stores the ability of data, and wherein namely address self can store in memory and utilize program to carry out the bit string operated.Thus, some data structures are based on the address being calculated data item by arithmetical operation; And other data structure is stored in structure self based on by the address of data item.Many data structures use sometimes with these two principles that non-normal method combines.The realization of data structure usually must with write for creating and operating the batch processing of the example of this structure.
In the example of hgure 5, security protection system 505 is connected to first network 510.In specific implementation, security protection system 505 comprises the first security protection system 505 (a) ~ n-th security protection system 505 (n).Note, letter " n " represents Arbitrary Digit, and in various implementations, security protection system 505 compares the device shown in Fig. 5 can comprise more or less device.In specific implementation, each security protection system 505 monitors the part in place.Monitoring can comprise the image of a part, video and the sound that catch place.Monitoring can also comprise the motion detected near the part in place.In the implementation, each security protection system 505 via first network 510 provide with monitor in the relevant information of this part in place.In various implementations, each security protection system 505 comprises the display showing the people be associated with place.In some implementations, as discussed herein, this display can provide with remote mode capture such as from the image of place safety management devices 525, the information of video or sound etc.In some implementations, as discussed herein, utilize place safety gate system 520 to control each security protection system 505.In various implementations, security protection system can be corresponding with the described here safe unit comprising base unit (40) and remote unit (16).
In the example of hgure 5, each security protection system 505 comprises interior arrangement 505-1 and external device (ED) 505-2.Interior arrangement 505-1 can be connected to place utensil 530.In the implementation, interior arrangement 505-1 is present in the security region in place.Such as, interior arrangement 505-1 may reside in and undertaken in the house protected by security protection system 505 or may reside in the safety zone of security protection system 505.Interior arrangement 505-1 can comprise the connection to first network 510 in inside.In various implementations, interior arrangement 505-1 with to illustrate here and the base unit illustrated (40) is corresponding.In various implementations, can comprise to the connection of first network 510 remote power supply all not relying on line of electric force, cable network connection, router etc. to be connected with honeycomb.As a result, in various implementations, even if the invaded person such as the connection of line of electric force, cable network, router cuts off or forbidding, interior arrangement 505-1 also can continue to work and can provide connection to first network 510 to place occupant.In some implementations, interior arrangement 505-1 can comprise the battery back-up module of lasting time expand section (such as, a couple of days).Rigid line power supply can be utilized to connect and to recover battery back-up module.In various implementations, interior arrangement 505-1 is also connected to place utensil, and comprises encryption technology to guarantee data to be provided to first network 510 safely.
In specific implementation, external device (ED) 505-2 is present in the unsecure parts in place, and directly (as shown in Figure 5) or may be operably coupled to interior arrangement 505-1 via first network 510.Such as, external device (ED) 505-2 may reside in and carries out the outside, house protected or the outside, safety zone that may reside in security protection system 505 by security protection system 505.In the implementation, external device (ED) 505-2 comprises the indicator (or other indicator) sending the such as bell of jingle bell etc. for visitor.In various implementations, external device (ED) 505-2 with to illustrate here and the remote unit illustrated (16) is corresponding.Indicator can show image and/or the video of the occupant in place and/or one or more users of place safety management devices 525 on the display of external device (ED) 505-2.As discussed herein, via camera, the occupant in place can be provided on interior arrangement 505-1.
In some implementations, external device (ED) 505-2 can comprise the remote power supply all not relying on line of electric force, cable network connection, router etc. and is connected with honeycomb.As a result, in various implementations, even if the invaded person such as the connection of line of electric force, cable network, router cuts off or forbidding, external device (ED) 505-2 also continues to work and can provide connection to first network 510 to place occupant.External device (ED) 505-2 can also comprise lasting time expand section and rigid line power supply can be utilized to connect the battery back-up module carrying out recovering.
In some implementations, external device (ED) 505-2 can provide double-directional speech and/or cellular data via first network 510.External device (ED) 505-2 can also catch picture and/or video, and can record these pictures and/or video time/date and out of Memory.In the implementation, external device (ED) 505-2 can comprise the motion sensor of such as infrared sensor etc.In these realize, the camera of external device (ED) 505-2 and other parts without the need to record, until till there is something (such as, visitor) near representing in motion sensor.As discussed herein, external device (ED) 505-2 can also record entering of visitor and/or time departure, and provides the image of user and/or the display of video of display place occupant and/or place safety management devices 525.External device (ED) 505-2 can also allow the occupant of place safety management devices 525 and/or user manually for visitor takes pictures, and can comprise anti-tamper and/or early warning warning system to prevent the security attack for security protection system 505.
In the example of hgure 5, first network 510 is connected to security protection system 505, second network 515 and place safety management devices 525.In specific implementation, first network 510 comprises the device of the assembly for connecting single computing machine of the networked system comprising the some computer systems connected together of such as the Internet etc. or such as bus etc.As used herein term " the Internet " refers to the specific protocol that uses such as ICP/IP protocol etc. and such as the inter-network of HTML (Hypertext Markup Language) (HTTP) of HTML (Hypertext Markup Language) (HTML) document forming WWW (web).Often by be called as the Internet " on " content server to provide content.Web server as a kind of content server is normally used as at least one computer system of server computer system, is configured to utilize the agreement of web to carry out work, and is connected to the Internet.The agreement of the physical connection of the Internet and the Internet and web and communication process are well known to the skilled person.In order to illustrate object, as understood according to related context, assuming that first network 510 connects from broadly comprising from the bottom line of the assembly illustrated in the example of Fig. 1, to the Internet and any part of each assembly of network being connected to the Internet.In some implementations, utilize the service provider of such as ISP (ISP) etc. to manage first network 510.
In various implementations, first network 510 can comprise such as Ethernet (Ethernet), 802.11, micro-wave access to global intercommunication (WiMAX), 3G, 4G, CDMA, GSM, LTE, Digital Subscriber Line (DSL) etc. technology.First network 510 can also comprise such as such as the following networking protocol: multi protocol label switches (MPLS), transmission control protocol/Internet Protocol (TCP/IP), User Datagram Protoco (UDP) (UDP), HTML (Hypertext Markup Language) (HTTP), Simple Mail Transfer protocol (SMTP) and file transfer protocol (FTP) (FTP) etc.The technology that comprises HTML (Hypertext Markup Language) (HTML) and extend markup language (XML) and/or form can be used to represent the data exchanged via first network 510.In addition, the conventional encryption technique of such as Secure Socket Layer (SSL) (SSL), Transport Layer Security (TLS) and internet protocol secure (IPsec) etc. can be used to be encrypted all or some links.
In specific implementation, first network 510 comprises the cable network of use wiring to carry out at least some communication.In some implementations, first network 510 comprises wireless network.As used herein, " wireless network " can comprise at least partly without the need to using electric wiring to carry out any computer network communicated.In various implementations, first network 510 comprise such as Ethernet, 802.11, micro-wave access to global intercommunication (WiMAX), 3G, 4G, CDMA, GSM, LTE, Digital Subscriber Line (DSL) etc. technology.First network 510 can also comprise such as such as the following networking protocol: multi protocol label switches (MPLS), transmission control protocol/Internet Protocol (TCP/IP), User Datagram Protoco (UDP) (UDP), HTML (Hypertext Markup Language) (HTTP), Simple Mail Transfer protocol (SMTP) and file transfer protocol (FTP) (FTP) etc.The technology that comprises HTML (Hypertext Markup Language) (HTML) and extend markup language (XML) and/or form can be used to represent the data exchanged via first network 510.In addition, the conventional encryption technique of such as Secure Socket Layer (SSL) (SSL), Transport Layer Security (TLS) and internet protocol secure (IPsec) etc. can be used to be encrypted all or some links.
In specific implementation, 802.11 protocol-compliants of the wireless network of first network 510 and institute of electrical and electronic engineers (IEEE) defined.In specific implementation, 802.3 protocol-compliants of first network 510 and IEEE defined.In some implementations, the IEEE802.3 compatible protocol of first network 510 can comprise the local area network technology utilizing some wide area networks to apply.Usually various types of copper cash or light cable is utilized to carry out physical connection between node and/or infrastructure equipment (hub, switch, router).IEEE802.3 compatible protocol can support the IEEE802.1 network architecture of first network 510.In some implementations, first network 510 comprises cellular network.More specifically, in some implementations, first network 510 allows the device connected to access cellular voice, cellular data and/or other network service via cell tower.Cell phone and/or cellular data service provider can be utilized to manage cell tower for supporting first network 510.
In the example of hgure 5, second network 515 can be connected to first network 510 and place safety gate system 520.In specific implementation, second network 515 comprises the device of the assembly for connecting single computing machine of the networked system comprising the some computer systems connected together of such as the Internet etc. or such as bus etc.As used herein term " the Internet " refers to the specific protocol that uses such as ICP/IP protocol etc. and such as the inter-network of HTML (Hypertext Markup Language) (HTTP) of HTML (Hypertext Markup Language) (HTML) document forming WWW (web).Often by be called as the Internet " on " content server to provide content.Web server as a kind of content server is normally used as at least one computer system of server computer system, is configured to utilize the agreement of web to carry out work, and is connected to the Internet.The agreement of the physical connection of the Internet and the Internet and web and communication process are well known to the skilled person.In order to illustrate object, as understood according to related context, assuming that second network 515 connects from broadly comprising from the bottom line of the assembly illustrated in the example of Fig. 1, to the Internet and any part of each assembly of network being connected to the Internet.In some implementations, utilize the service provider of such as ISP (ISP) etc. to manage second network 515.
In various implementations, second network 515 can comprise such as Ethernet (Ethernet), 802.11, micro-wave access to global intercommunication (WiMAX), 3G, 4G, CDMA, GSM, LTE, Digital Subscriber Line (DSL) etc. technology.Second network 515 can also comprise such as such as the following networking protocol: multi protocol label switches (MPLS), transmission control protocol/Internet Protocol (TCP/IP), User Datagram Protoco (UDP) (UDP), HTML (Hypertext Markup Language) (HTTP), Simple Mail Transfer protocol (SMTP) and file transfer protocol (FTP) (FTP) etc.The technology that comprises HTML (Hypertext Markup Language) (HTML) and extend markup language (XML) and/or form can be used to represent the data exchanged via second network 515.In addition, the conventional encryption technique of such as Secure Socket Layer (SSL) (SSL), Transport Layer Security (TLS) and internet protocol secure (IPsec) etc. can be used to be encrypted all or some links.
In specific implementation, second network 515 comprises the cable network of use wiring to carry out at least some communication.In some implementations, second network 515 comprises wireless network.As used herein, " wireless network " can comprise at least partly without the need to using electric wiring to carry out any computer network communicated.In various implementations, second network 515 comprise such as Ethernet, 802.11, micro-wave access to global intercommunication (WiMAX), 3G, 4G, CDMA, GSM, LTE, Digital Subscriber Line (DSL) etc. technology.Second network 515 can also comprise such as such as the following networking protocol: multi protocol label switches (MPLS), transmission control protocol/Internet Protocol (TCP/IP), User Datagram Protoco (UDP) (UDP), HTML (Hypertext Markup Language) (HTTP), Simple Mail Transfer protocol (SMTP) and file transfer protocol (FTP) (FTP) etc.The technology that comprises HTML (Hypertext Markup Language) (HTML) and extend markup language (XML) and/or form can be used to represent the data exchanged via second network 515.In addition, the conventional encryption technique of such as Secure Socket Layer (SSL) (SSL), Transport Layer Security (TLS) and internet protocol secure (IPsec) etc. can be used to be encrypted all or some links.
In specific implementation, 802.11 protocol-compliants of the wireless network of second network 515 and institute of electrical and electronic engineers (IEEE) defined.In specific implementation, 802.3 protocol-compliants of second network 515 and IEEE defined.In some implementations, the IEEE802.3 compatible protocol of second network 515 can comprise the local area network technology utilizing some wide area networks to apply.Usually various types of copper cash or light cable is utilized to carry out physical connection between node and/or infrastructure equipment (hub, switch, router).IEEE802.3 compatible protocol can support the IEEE802.1 network architecture of second network 515.In some implementations, second network 515 comprises cellular network.More specifically, in some implementations, second network 515 allows the device connected to access cellular voice, cellular data and/or other network service via cell tower.Cell phone and/or cellular data service provider can be utilized to manage cell tower for supporting first network 510.In some implementations, second network 515 is without the need to comprising cellular network.That is, in some implementations, second network 515 can in the part without the need to comprising the Internet when support from cell tower.
In the example of hgure 5, place safety gate system 520 is connected to second network 515.In the implementation, place safety gate system 520 is provided for that Administrative Security guard system 505, management place utensil 530, management are relevant to be arranged and manage the portal website of associated user account.In various implementations, place safety gate system 520 uses the instruction provided via first network 510 at least partly to control security protection system 505 via first network 510.In various implementations, place safety gate system 520 utilizes the external device (ED) 505-2 of security protection system 505 that image, sound and/or video are provided to place safety management devices 525.The state relevant with the motion sensor on external device (ED) 505-2, infrared sensor etc. can also change and be provided to place safety management devices 525 by place safety gate system 520.As discussed herein, account's setting and/or out of Memory can also be provided to place safety management devices 525 (such as, to manage place utensil 530) by place safety gate system 520.
In the example of hgure 5, place safety management devices 525 is connected to first network 510.In specific implementation, place safety management devices 525 comprises the first place safety management devices 525 (a) ~ n-th place safety management devices 525 (n).Again note, letter " n " represents Arbitrary Digit, and the specific implementation of place safety management devices 525 is compared the device shown in Fig. 5 and can be comprised more or less device.In specific implementation, each place safety management devices 525 makes user can Administrative Security guard system 505, place safety gate system 520 and/or place utensil 530.In some implementations, each place safety management devices 525 can comprise camera and/or microphone can be connected with security protection system 505 with remote mode to make user.More specifically, place safety management devices 525 can make people can with the external device (ED) 505-2 swap image of security protection system 505, sound and/or video.The state relevant with the motion sensor on external device (ED) 505-2, infrared sensor etc. can also be warned to change to place safety management devices 525.In various implementations, as discussed further here, place safety management devices 525 makes user can manage the account relevant with place safety gate system 520 to arrange.
In various implementations, place safety management devices 525 can comprise stand-alone utility.The example of stand-alone utility can be included in the local mobile applications that place safety management devices 525 performs.Stand-alone utility can comprise for some or all in the engine of Administrative Security guard system 505, place safety gate system 520 and/or place utensil 530.In some implementations, place safety management devices 525 comprises the container application of such as web browser etc.Container application can comprise for some or all in the engine of Administrative Security guard system 505, place safety gate system 520 and/or place utensil 530.
In the example of hgure 5, what place utensil 530 was connected in interior arrangement 505-1 is one or more.In various implementations, place utensil 530 comprises the utensil that interior arrangement 505-1 controls.For this reason, place utensil 530 can directly be controlled by interior arrangement 505-1 or can control via place safety gate system 520.In some implementations, place utensil 530 can be controlled by place safety management devices 525.In various implementations, what place utensil 530 can comprise in following utensil is one or more: lamp, media center, the utensil comprising computing machine or device, the utensil comprising nearly learning region or device, heat or refrigeration system and other utensil, device or equipment.
Fig. 6 illustrates the example of place safety gate system 600.In the example of fig. 6, place safety gate system 600 comprises computer-readable medium 605, external device (ED) management engine 610, interior arrangement management engine 615, place safety management devices management engine 620, place instrument management engine 625, network interface engine 630 and account management engine 635.In the implementation, as discussed herein, computer-readable medium 605 comprises " computer-readable medium ".In various implementations, as described herein, one or more in external device (ED) management engine 610, interior arrangement management engine 615, place safety management devices management engine 620, place instrument management engine 625, network interface engine 630 and account management engine 635 comprise one or more " engine " and/or " database ".
In the example of fig. 6, computer-readable medium 605 is connected to external device (ED) management engine 610, interior arrangement management engine 615, place safety management devices management engine 620, place instrument management engine 625, network interface engine 630 and account management engine 635.In the implementation, as discussed herein, computer-readable medium 605 comprises " computer-readable medium ".
In the example of fig. 6, external device (ED) management engine 610 is connected to computer-readable medium 605.In the implementation, the external device (ED) (such as, external device (ED) 505-2) of external device (ED) management engine 610 Administrative Security guard system (security protection system 505 such as, shown in Fig. 5).In the implementation, external device (ED) management engine 610 is received in the notice of positive event on external device (ED), receives image, sound and video, and image, sound and video are provided to external device (ED) from external device (ED).In various implementations, external device (ED) management engine 610 controls external device (ED).Such as, in various implementations, external device (ED) management engine 610 can change viewpoint or change the live view of external device (ED).
In the example of fig. 6, interior arrangement management engine 615 is connected to computer-readable medium 605.In the implementation, the interior arrangement (such as, interior arrangement 505-1) of interior arrangement management engine 615 Administrative Security guard system (security protection system 505 such as, shown in Fig. 5).In various implementations, interior arrangement management engine 615 is provided in the notice of positive event on interior arrangement, receives image, sound and video, and image, sound and video are provided to interior arrangement from interior arrangement.Interior arrangement management engine 615 can also provide the occupant in place to carry out interactive menu interactive used on interior arrangement.Interactive menu can be used to come the external device (ED) of control association, place utensil and/or other device.
In the example of fig. 6, place safety management devices management engine 620 is connected to computer-readable medium 605.In the implementation, place safety management devices management engine 620 manages place safety management devices (the place safety management devices 525 such as, shown in Fig. 5).In various implementations, place safety management devices management engine 620 is provided in the notice of positive event on place safety management devices, receive image, sound and video from place safety management devices, and image, sound and video are provided to place safety management devices.Place safety management devices management engine 620 can also provide the people be associated with place to carry out interactive menu interactive used on the security control apparatus of place.Interactive menu can be used to come the external device (ED) of control association, place utensil and/or other device.
In the example of fig. 6, place instrument management engine 625 is connected to computer-readable medium 605.In the implementation, place instrument management engine 625 manages place utensil (the place utensil 530 such as, shown in Fig. 5).In some implementations, realize controlling by being connected with the driver of place utensil 530.
In the example of fig. 6, network interface engine 630 is connected to computer-readable medium 605.In the implementation, network interface engine 630 is configured to transmission and the reception of carrying out data relative to network (second network 515 such as, shown in Fig. 5).Network interface engine 630 also can be configured to transmission and the reception of carrying out data relative to the first network 510 shown in Fig. 5.In various implementations, network interface engine 630 is encrypted for the one or more all data transferred in security protection system 505, place safety management devices 525 and/or place utensil 630.
In the example of fig. 6, account management engine 635 is connected to computer-readable medium 605.In various implementations, account management engine 635 makes it possible to management and the one or more accounts be associated in security protection system 505, place safety management devices 525 and/or place utensil 630.
Fig. 7 illustrates for utilizing place safety gate system to control the process flow diagram 700 of the example of the method for place safety.In the implementation, the structure shown in composition graphs 6 discusses process flow diagram 700.Note, process flow diagram 700 compares the module shown in Fig. 7 can have additional, less or other module.
In block 705, receive the notice of security incident from the external device (ED) of one or more security protection system via cellular network.In various implementations, external device (ED) management engine 610 is from the one or more external device (ED) 505-2 reception notification security protection system 505.In the implementation, this notice can comprise about visitor near external device (ED) 505-2 exist indicator other instruction.Such as, this notice can be triggered based on the sensor of external device (ED) 505-2 (such as, infrared sensor), and this is true.This notice can be transmitted via first network 510 (can comprise cellular network in this implementation) at least partly.
In block 710, in response to notice and via cellular network from the image of external device (ED) reception site, sound and/or video.In the implementation, external device (ED) management engine 610 receives image, sound and/or video from external device (ED) 505-2.In this implementation, external device (ED) 505-2 can be configured to according to this notice and provide image, sound and/or video.That is, external device (ED) 505-2 can be configured to according to this fact of sensor triggering external device (ED) 505-2 and provide image, sound and/or video.The image of reception site, sound and/or video can be come (cellular network can be comprised in this implementation) at least partly via first network 510.
In block 715, image, sound and/or video are provided to one or more site management safety feature via cellular network.In the implementation, what image, sound and/or video can be provided in place safety management devices 525 by place safety management devices management engine 620 is one or more.Image, sound and/or video can transmit via first network 510 at least partly.In various implementations, place safety management devices 525 can show image, sound and/or video to user in application program (such as, local application or in container application).
In block 720, image, sound and/or video are provided to the one or more internal element in security protection system via cellular network.In various implementations, interior arrangement management engine 615 image, sound and/or video are provided to one or more interior arrangement 505-1 in security protection system 505 one of them.Image, sound and/or video can transmit via first network 510 at least partly.In various implementations, interior arrangement 505-1 can show image, sound and/or video to user.
In block 725, receive image, sound and/or video via cellular network from one or more place safety management devices.In the implementation, place safety management devices management engine 620 receives image, sound and/or video from place safety management devices 525.Image, sound and/or video can transmit via first network 510 at least partly.In block 730, receive image, sound and/or video via cellular network from interior arrangement.In the implementation, interior arrangement management engine 615 receives image, sound and/or video from interior arrangement 505-1.These images, sound and/or video can transmit via first network 510 at least partly.
In block 735, be provided to external device (ED) by from the image of place security control apparatus, sound and/or video and/or from the image of interior arrangement, sound and/or video via cellular network.In some implementations, external device (ED) management engine 610 is provided to external device (ED) 505-2 by from the image of place security control apparatus 525, sound and/or video and/or from the image of interior arrangement 505-1, sound and/or video via cellular network.Image, sound and/or video can transmit via first network 510 at least partly.
In block 740, via the display of cellular network instruction external device (ED) from the image of place safety management devices, sound and/or video and/or from the image of interior arrangement, sound and/or video.In the implementation, external device (ED) management engine 610 at least partly indicates display from the image of place safety management devices 525, sound and/or video and/or from the image of interior arrangement 505-1, sound and/or video via first network 510.
Fig. 8 illustrates the example of external device (ED) management engine 800.In the example of fig. 8, external device (ED) management engine 800 comprises computer-readable medium 805, event information collects engine 810, live view information engine 815 and external device (ED) allocation engine 820.In the implementation, as discussed herein, computer-readable medium 805 comprises " computer-readable medium ".In various implementations, as described herein, to collect in engine 810, live view information engine 815 and external device (ED) allocation engine 820 one or more comprises one or more " engine " and/or " database " for event information.
In the example of fig. 8, event information is collected engine 810 and is connected to computer-readable medium 805.In the implementation, event information is collected engine 810 and is collected institute's event on external device (ED) 505-2.More specifically, event information collects expression that engine 810 can be connected to sensor (such as, infrared sensor and other motion sensor) and external device (ED) 505-2 such as exists the major event of people etc. other assembly at external device (ED) 505-2 place.Event information collects engine 810 can also be provided to other engine by major event.In some implementations, event information is collected engine 810 and the notice relevant with event is provided to other engine.In various implementations, event information collects the file event that engine 810 provides external device (ED) 505-2.
In the example of fig. 8, live view information engine 815 is connected to computer-readable medium 805.In various implementations, live view information engine 815 provides the image of the event near external device (ED) 505-2, sound and/or video.In some implementations, live view information engine 815 is connected with the camera on external device (ED) 505-2, display, microphone and/or loudspeaker.In various implementations, can utilize as event information collects the determined major event of engine 810 to trigger live view information engine 815.
In the example of fig. 8, external device (ED) allocation engine 820 is connected to computer-readable medium 805.In the implementation, external device (ED) allocation engine 820 couples of external device (ED) 505-2 are configured.More specifically, external device (ED) allocation engine 820 can provide the configuration parameter of the part for external device (ED) 505-2.Exemplarily, external device (ED) allocation engine 820 can control camera parameter, such as makes the camera on external device (ED) 505-2 carry out zoom, change viewpoint, focusing or catch angle etc.External device (ED) allocation engine 820 with various grade and/or direction controlling microphone, and/or can also can control the speaker system of external device (ED) 505-2.In some implementations, external device (ED) allocation engine 820 controls other configuration parameters one or more of external device (ED) 505-2.
Fig. 9 illustrates that event information collects the example of engine 900.In the example of figure 9, event information collection engine 900 comprises computer-readable medium 905, event triggers engine 910, event importance engine 915, file event engine 920 and event database 925.In the implementation, as discussed herein, computer-readable medium 905 comprises " computer-readable medium ".In various implementations, as described herein, event triggers engine 910, event importance engine 915, one or more in file event engine 920 comprise one or more " engine ".In the implementation, as described herein, event database 925 comprises one or more " database ".
In the example of figure 9, event triggers engine 910 and is connected to computer-readable medium 905.In the implementation, event triggers engine 910 and receives one group of event triggering from external device (ED) (the external device (ED) 505-2 such as, in Fig. 5).More specifically, in various implementations, event triggering engine 910 can be connected with the sensor on external device (ED).Such as, event trigger engine 910 can be connected with the motion sensor of external device (ED), with to people near external device (ED) or people just near external device (ED) movement judge.As another example, event trigger engine 910 can be connected with the thermal sensor on external device (ED), with to people near external device (ED) or people just near external device (ED) movement judge.Event triggers engine 910 and can also be connected, to judge the event near external device (ED) with other of such as camera, microphone etc.
In the example of figure 9, event importance engine 915 is connected to computer-readable medium 905.In various implementations, whether event importance engine 915 decision event triggers enough important extremely important to be characterized as being.Such as, in the implementation, it is enough important and be identified the motion into people or the motion of the non-human animal as cat or racoon etc. that event importance engine 915 can judge from the data of the motion sensor on external device (ED) (the external device (ED) 505-2 such as, in Fig. 5).As another example, it is enough important and the fire be identified as near external device (ED) or only reflect hot weather that event importance engine 915 can judge from the data of the thermal sensor on external device (ED).In the implementation, event importance engine 915 can make importance based on the similarity of archive data that stores in event database 925.
In the example of figure 9, file event engine 920 is connected to computer-readable medium 905, and in some implementations, file event engine 920 retrieves file event from event database 925.In various implementations, the event database 925 being connected to computer-readable medium 905 in the example of figure 9 can store archive event.These file events can comprise the event of filing for specific external device (ED), and can comprise the event of filing for other external device (ED).In some implementations, file event can comprise the hypothesis or desirable event that object or other object in order to decision event importance store.
Figure 10 illustrates the process flow diagram 1000 for providing the example of the method for event information from event information engine.In the implementation, the structure shown in composition graphs 9 discusses process flow diagram 1000.Note, process flow diagram 1000 compares the module shown in Figure 10 can have additional, less or other module.
In block 1005, receive the data of the external device (ED) from security protection system.In the implementation, event triggers engine 910 and receives data from the one or more external device (ED) (such as, external device (ED) 505-2) security protection system 505.These data can comprise the data of the sensor (such as, motion sensor, thermal sensor etc.) from external device (ED) 505-2.In some implementations, the cellular network via such as first network 510 grade receives this data.
In block 1010, the archive data that received data are associated with same or multiple file event is compared.In the implementation, received data and archive data compare by event importance engine 915.Such as, in the implementation, event importance engine 915 can compare from the data of the motion sensor on external device (ED) and the motion-dependent data of file event.As another example, the hot related data of the heat caught from thermal sensor and file event can compare by event importance engine 915.
In block 1015, whether the data received by judgement comprise critical event; This judgement based on the comparison.In the implementation, to comparing to evaluate, event importance engine 915 can by judging whether received data comprise critical event.In block 1020, if received data comprise critical event, then provide the notice of this critical event.In some implementations, event importance engine 915 can provide this notice.
Figure 11 illustrates the example of live view information engine 1100.In the example of fig. 11, live view information engine 1100 comprises computer-readable medium 1105, live view triggers engine 1110, picture catching engine 1115 and audio capture engine 1120.In the implementation, as discussed herein, computer-readable medium 1105 comprises " computer-readable medium ".In various implementations, as described herein, to trigger in engine 1110, picture catching engine 1115 and audio capture engine 1120 one or more comprises one or more " engine " and/or " database " for live view.
In the example of fig. 11, live view triggers engine 1110 and is connected to computer-readable medium 1105.In specific implementation, live view triggers engine 1110 and receives live view triggering from the external device (ED) (such as, external device (ED) 505-2) of one or more security protection system (one or more such as, in security protection system 505).In some implementations, live view triggers and may produce due to the sensor triggering such as motion sensor, thermal sensor etc.It may be also due to producing in order to the specific instruction initiating live view from place safety management devices (one or more in the place safety management devices 525 such as, in Fig. 5) that live view triggers.Live view triggers the seizure that other engine can be indicated to initiate image, sound and/or video.
In the example of fig. 11, picture catching engine 1115 is connected to computer-readable medium 1105.In the implementation, picture catching engine 1115 can indicate captured by camera image on the external device (ED) of security protection system (the one or more external device (ED) 505-2 such as, in security protection system 505) and/or video.In the example of fig. 11, audio capture engine 1120 is connected to computer-readable medium 1105.In the implementation, audio capture engine 1120 can indicate the microphone on the external device (ED) of security protection system (the one or more external device (ED) 505-2 such as, in security protection system 505) to catch sound.
Figure 12 illustrates the process flow diagram 1200 of the example of the method for providing the live view information relevant with place safety managing portal system.In the implementation, process flow diagram 1200 is discussed in conjunction with the structure shown in Figure 11.Note, process flow diagram 1200 compares the module shown in Figure 12 can have additional, less or other module.
In block 1205, receive live view and trigger; This live view triggers and initiate live view on the external device (ED) of security protection system.In the implementation, live view triggers engine 1110 and can initiate live view on one of them external device (ED) 505-2 of the security protection system 505 shown in Fig. 5.Live view triggers engine 1110 can initiate live view based on the information from such as motion sensor, thermal sensor etc.
In block 1210, trigger in response to live view and utilize external device (ED) to catch image and/or video.In the implementation, picture catching engine 1115 indicates image near the region of external device (ED) 505-2 of captured by camera on external device (ED) 505-2 and/or video.In block 1215, trigger in response to live view and utilize external device (ED) to catch audio frequency.In the implementation, audio capture engine 1120 indicates the microphone on external device (ED) 505-2 to catch the audio frequency in the region near external device (ED) 505-2.In block 1220, captured image, video and/or audio are provided to the interior arrangement of place safety management devices and/or security protection system.In the implementation, captured image, video and/or audio can be provided to the interior arrangement 505-1 of place safety management devices 525 and/or security protection system 505.
Figure 13 illustrates the example of external device (ED) allocation engine 1300.In the example in figure 13, external device (ED) allocation engine 1300 comprises computer-readable medium 1305, system information engine 1310 and Operation system setting engine 1315.In the implementation, as discussed herein, computer-readable medium 1305 comprises " computer-readable medium ".In various implementations, as described herein, one or more in system information engine 1310 and Operation system setting engine 1315 comprise one or more " engine " and/or " database ".
In the example in figure 13, system information engine 1310 is connected to computer-readable medium 1305.In the implementation, system information engine 1310 is configured to the current configuration obtaining external device (ED).Such as, system information engine 1310 can determine the existing configuration parameter (such as, the parameter of zoom, viewpoint, focusing, angle etc.) of the camera of external device (ED).As another example, system information engine 1310 can determine the microphone of external device (ED) and/or the existing configuration parameter (such as, the parameter of sound level etc.) of loudspeaker.In the example in figure 13, Operation system setting engine 1315 is connected to computer-readable medium 1305.In the implementation, Operation system setting engine 1315 makes it possible to arrange the various parameters on external device (ED).
Figure 14 illustrates the process flow diagram 1400 for the example of the method be configured the external device (ED) of security protection system.In the implementation, process flow diagram 1400 is discussed in conjunction with the structure shown in Figure 13.Note, process flow diagram 1400 compares the module shown in Figure 14 can have additional, less or other module.
In block 1405, obtain the system information of the external device (ED) of security protection system.In the implementation, system information engine 1310 obtains the information of the external device (ED) (the one or more external device (ED) 505-2 such as, in security protection system 505) of security protection system.In various example, this system information can comprise external device (ED) 505 camera arrange, microphone arrange, loudspeaker arrange and/or other configuration parameter.
In block 1410, system information is provided to the interior arrangement of place safety management devices and/or security protection system.In the implementation, system information can be provided to one or more (shown in Fig. 5) the interior arrangement 505-1 in security protection system 505 by interior arrangement management engine (the interior arrangement management engine 615 such as, in Fig. 6).In addition, in the implementation, one or more in system information can be provided to by place safety management devices management engine (such as, the place safety management devices management engine 620 of Fig. 6) (shown in Fig. 5) place safety management devices 525.
In block 1415, receive the instruction of the Operation system setting in order to revise external device (ED) from interior arrangement and/or place safety management devices.In some implementations, the instruction of the Operation system setting in order to revise external device (ED) can be provided to Operation system setting engine 1315 by interior arrangement management engine (such as, the interior arrangement management engine 615 of Fig. 6).Equally, in some implementations, the instruction of the Operation system setting in order to revise external device (ED) can be provided to Operation system setting engine 1315 by place safety management devices management engine (such as, the place safety management devices management engine 620 of Fig. 6).In these realize, Operation system setting engine 1315 receives the instruction of the Operation system setting revising external device (ED).
In block 1420, revise the Operation system setting of external device (ED) based on this instruction.In the implementation, Operation system setting engine 1315 such as can revise camera parameter, microphone parameters, loudspeaker parameters etc. based on the instruction in order to revise external device (ED).
Figure 15 illustrates the example of place instrument management engine 1500.In the example of fig. 15, place instrument management engine 1500 comprises computer-readable medium 1505, environmental selection engine 1510, place utensil selection engine 1515 and place utensil allocation engine 1520.In the implementation, as discussed herein, computer-readable medium 1505 comprises " computer-readable medium ".In various implementations, as described herein, to select in engine 1515 and place utensil allocation engine 1520 one or more comprises one or more " engine " and/or " database " for environmental selection engine 1510, place utensil.
In the example of fig. 15, environmental selection engine 1510 is connected to computer-readable medium 1505.In the implementation, environmental selection engine 1510 allows selection to comprise the environment of one or more places utensil.Such as, environmental selection engine 1510 can allow the one or more rooms (such as, bedroom, parlor, kitchen, bathroom etc.) in the place selecting to comprise place utensil.Note, environment needs not to be room, and can be at random any space in given place.In the example of fig. 15, place utensil selects engine 1515 to be connected to computer-readable medium 1505.In specific implementation, place utensil selection engine 1515 allows the particular appliance in Environment.Such as, place utensil selects engine 1515 user can be allowed to select the lamp in given environment, baking box, heat or refrigeration system, rinsing maching or dryer, dish-washing machine, refrigerator etc.In the example of fig. 15, place utensil allocation engine 1520 is connected to computer-readable medium 1505.In the implementation, place utensil allocation engine 1520 allows to be configured selected utensil.
Figure 16 illustrates the process flow diagram 1600 of the example of the method for managing one or more places utensil.In the implementation, process flow diagram 1600 is discussed in conjunction with the structure shown in Figure 15.Note, process flow diagram 1600 compares the module shown in Figure 16 can have additional, less or other module.
In block 1605, Environment.In specific implementation, environmental selection engine 110 impels the environment selecting the arbitrary region comprised in one group of place.This environment can comprise one or more places utensil of the one or more grades in all place utensils 530 as shown in Figure 5.In block 1610, select the place utensil in this environment.In some implementations, place utensil selects engine 1515 to allow to select particular place utensil in selected environment.In block 1615, the one or more configuration in the place utensil selected by acquisition.In some implementations, place utensil allocation engine 1520 can obtain the one or more configuration in selected place utensil.
In block 1620, receive the instruction for revising configuration from the interior arrangement of place safety management devices and/or security protection system.In some implementations, place utensil allocation engine 1520 receives the instruction in order to amendment configuration.These instructions can come from interior arrangement (the one or more interior arrangement 505-1 such as, in security protection system 505).These instructions can come from place safety management devices (one or more such as, in place safety management devices 525).In block 1625, revise configuration according to this instruction.In the implementation, place utensil allocation engine 1520 can revise configuration according to this instruction.
Figure 17 illustrates the example of place safety management environment 1700.In the example of Figure 17, place safety management environment 1700 comprises external device (ED) 1705, interior arrangement 1710, place safety gate system 1715 and place safety management devices 1720.In the example of Figure 17, external device (ED) 1705 is connected to interior arrangement 1710.In the implementation, one of them is corresponding for external device (ED) 1705 and the external device (ED) 505-2 shown in Fig. 5.In various implementations, external device (ED) 1705 can carry out the one or more operations in following operation: provide double-directional speech and/or cellular data via cellular network; Catch just close to the front in place people time/date/picture/video; Record enters and/or post-set time; Occupant can be talked to visitor safely under the state being in inside, place; The picture of manual seizure visitor; And provide anti-tamper and early warning warning system.
In the example of Figure 17, interior arrangement 1710 is connected to external device (ED) 1705 and is connected to place safety gate system 1715.In the implementation, one of them is corresponding for interior arrangement 1710 and the interior arrangement 505-1 shown in Fig. 5.In some implementations, what interior arrangement 1710 had with in properties is one or more: do not rely on ADSL, router, broadband connection or PC; Can not use when line of electric force or telephone wire are cut off; Similar wireless connections are used to connect product to enable other family; Usage data encryption technology carries out secure network transmission.In the implementation, interior arrangement 1710 has occupant and watches the video of visitor display panel used; Interior arrangement 1710 can also provide menu to show for other coupling arrangement.
In the example of Figure 17, place safety gate system 1715 is connected to interior arrangement 1710 and place safety management devices 1720.In the implementation, place safety gate system 1715 is corresponding with the place safety gate system 520 shown in Fig. 5.
In the example of Figure 17, place safety management devices 1720 is connected to place safety gate system 1715.In the example of Figure 17, place safety management devices 1720 comprises the place safety management devices 1720a and local place security control apparatus 1720b with web function.Any one in the place safety management devices 1720a of web function and local place security control apparatus 1720b all can be configured to carry out function here.In some implementations, one or more corresponding with the place safety management devices 525 shown in Fig. 5 of place safety management devices 1720.In various implementations, what place safety management devices 1720 carried out in following operation is one or more: answer the call; Remotely control external device (ED) 1705 and/or interior arrangement 1710; Remotely control place security portal system 1715; Be switched on or switched off utensil; The closed-circuit television (CCTV) of viewing external device (ED) 1705; Be switched on or switched off power supply; Illumination is lighted or extinguishes; Check that who have accessed this place; Open and/or lock package bin; Lock and/or unlock porch door; Reset the configuration file in place; And account executive is arranged.
Figure 18 A illustrates the example of place safety management environment 1800.In the example of Figure 18 A, place safety management environment 1800 comprises place safety gate system 1805,1810, one group, the Internet cellular network 1815, place safety management devices 1820 and security protection system 1825.In the example of Figure 18 A, place safety gate system 1805 is connected to the Internet 1810.In specific implementation, place safety gate system 1805 is connected to the Internet 1810 via fire wall and load equalizer.Place safety gate system 1805 can comprise web user interface (UI) module, characterize state transfer (REST) module, service module, Business Logic (BLL), data access layer (DAL), datum number storage according to storehouse and other module.In the implementation, place safety gate system 1805 is corresponding with the place safety gate system 520 shown in Fig. 5.
In the example of Figure 18 A, the Internet 1810 is connected to place safety gate system 1805, place safety management devices 1820 and security protection system 1825.In the implementation, the Internet 1810 can be corresponding with the second network 515 shown in Fig. 5.
In the example of Figure 18 A, one group of cellular network 1815 is connected to the Internet 1810, place safety management devices 1820 and security protection system 1825.In the implementation, one group of cellular network 1815 can be corresponding with the second network 515 shown in Fig. 5.
In the example of Figure 18 A, place safety management devices 1820 is connected to one group of cellular network 1815.In the implementation, place safety management devices 1820 is via mobile applications data (such as, characterizing state transfer) to the connection of one group of cellular network 1815 and/or fetches realization via cellular voice chain.Place safety management devices 1820 can also be realize via the weblication of the security web application program etc. of such as use safety HTML (Hypertext Markup Language) (HTTPS) and/or other agreement to the connection of one group of cellular network 1815.Place safety management devices 1820 can also realize via local mobile applications to the connection of one group of cellular network 1815.In some implementations, one or more corresponding with the place safety management devices 525 shown in Fig. 5 of place safety management devices 1820.
In the example of Figure 18 A, security protection system 1825 is connected to one group of cellular network 1815.In the example of Figure 18 A, security protection system 1825 comprises bell unit, " MyButler " control module, camera unit and passive infrared (PIR) unit.In some implementations, bell unit can be corresponding with the exterior section of security protection system 1825, and control module can be corresponding with the interior section of security protection system 1825.
In various implementations, security protection system 1825 is realize via the sign state diverting call of the connection using HTTPS and/or other agreement etc. to the connection of one group of cellular network 1815.In various implementations, security protection system 1825 provides and/or receives configuration data, image, video and/or sound relative to place safety gate system 1805.In various implementations, security protection system 1825 can one or more corresponding with the security protection system 505 shown in Fig. 5.
Figure 18 B illustrates the example of the framework 1800B for realizing the place safety gate system 1805 shown in Figure 18 A.Framework 1800B can comprise sign state transfer (REST) module, web user interface (UI) module, service layer, service realization, Business Logic, Business Entity, data access layer and datum number storage according to storehouse.
Figure 19 illustrates the example of the screen 1900 of place safety gate system.In the implementation, the content that can provide based on place safety gate system 520 using screen 1900 as web displaying on place security control apparatus 525, wherein place safety gate system 520 and place safety management devices 525 are all shown in Figure 5.In specific implementation, screen 1900 can show the webpage in order to the full protection system 505 shown in control chart 5.
In the example of Figure 19, screen 1900 comprises button 1905 and device list 1910.In the example of Figure 19, button 1905 comprises recent events button 1905a, event file button 1905b, live view button 1905c, Operation system setting button 1905d, system information button 1905e, device inventory button 1905f, account's button 1905g, log out button 1905h and help button 1905i.In the implementation, recent events button 1905a makes user link to the list of the recent events be associated with security protection system 505.In various implementations, recent events button 1905a provides the list using the event information shown in Fig. 8 to collect the recent events that engine 810 obtains.In the implementation, event file button 1905b makes user link to the list of file event.In some implementations, event file button 1905b provides the list using the event information shown in Fig. 8 to collect the file event that engine 810 obtains.
In the implementation, live view button 1905c makes user link to the live view in place.In various implementations, live view button 1905c provides video, picture and/or sound from the live view information engine 815 shown in Fig. 8.Video, picture and/or sound that live view button 1905c provides can based on the camera lens (9) shown in Fig. 1 and/or microphones (49).
In the implementation, Operation system setting button 1905d makes user link to the Operation system setting relevant with the place safety gate system 520 shown in Fig. 5.In various implementations, what Operation system setting button 1905d provided arranged can based on the Operation system setting engine 1315 shown in Figure 13.In the implementation, system information button 1905e makes user link to the system information relevant with the place safety gate system 520 shown in Fig. 5.In some implementations, the system information that system information button 1905e provides can based on the information from system information engine 1310.
In the implementation, device inventory button 1905f lists the device that place safety gate system 520 is just being monitored.More specifically, in various implementations, what device inventory button 1905f can list in the security protection system 505 shown in Fig. 5 is one or more.In the example of Figure 19, have selected device inventory button 1905f, and the various security protection systems 505 listed as discussed herein and other device.
In the implementation, account's button 1905g makes user link to the account information of user.Account's button 1905g can use the user account engine 830 shown in Fig. 8 to provide information.
In the example of Figure 19, screen 1900 comprises device inventory 1910.In various implementations, once user have selected device inventory button 1905f, generator inventory 1910.In the implementation, log out button 1905h allows user to nullify from place safety gate system 520.In the implementation, help button 1905i makes user link to the Help Topic relevant with place safety gate system 520.
In the example of Figure 19, device inventory 1910 comprises security protection system inventory 1915, parlor lamp control 1920, bedroom lamp control 1925, media center control 1930, computer learning control 1935, heats control 1940 and headlight control 1945.In various implementations, user can be made after selecting arrangement inventory button 1905f to link to device inventory 1910.In the implementation, security protection system inventory 1915 provides the inventory of the security protection system 505 shown in Fig. 5.Security protection system 1915 can provide the existing security protection system of management to user and/or add the ability of new security protection system.In the implementation, parlor lamp controls the control that 1920 provide parlor lamp.In the implementation, what parlor lamp controlled that the 1920 parlor lamps that control can comprise in the place utensil 530 shown in Fig. 5 is one or more.In various implementations, bedroom lamp controls the control that 1925 provide bedroom lamp.In the implementation, what bedroom lamp controlled that 1925 bedroom lamps that control can comprise in the place utensil 530 shown in Fig. 5 is one or more.In the implementation, media center controls the control that 1930 provide media center.It is one or more that media center can comprise in the place utensil 530 shown in Fig. 5.In various implementations, computer learning controls 1935 computer for controlling study.It is one or more that computer learning can comprise in the place utensil 530 shown in Fig. 5.In some implementations, the heating that control 1940 controls place is heated.It is one or more that heating can comprise in the place utensil 530 shown in Fig. 5.In various implementations, headlight controls the headlight that 1945 control place.It is one or more that headlight can comprise in the place utensil 530 shown in Fig. 5.
Figure 20 illustrates the example of the computer system 2000 that can realize the techniques described herein.Computer system 2000 can be the conventional computer system of the client computer system that can be used as server computer system or such as wireless client or workstation etc.Computer system 2000 comprises computing machine 2005, I/O device 2010 and display device 2015.Computing machine 2005 comprises processor 2020, communication interface 2025, storer 2030, display controller 2035, nonvolatile memory 2040, I/O controller 2045 and bus 2050.Computing machine 2005 can be connected to I/O device 2010 and display device 2015 or comprise I/O device 2010 and display device 2015.
Computing machine 2005 is connected to external system via the communication interface 2025 that can comprise modulator-demodular unit or network interface.Should be appreciated that communication interface 2025 can be regarded as a part for computer system 2000 or a part for computing machine 2005.Communication interface 2025 can be analog modem, isdn modem, cable modem, token ring interface, satellite transmission interface (such as, " direct-connected PC ") or other interface for making computer system be connected to other computer system.
Processor 2020 can be such as traditional microprocessor of such as IntelPentium (intel pentium) microprocessor or MotorolapowerPC (Motorola power PC) microprocessor etc.Storer 2030 is connected to processor 2020 via bus 2050.Storer 2030 can be dynamic RAM (DRAM) and can comprise static RAM (SRAM) (SRAM).Bus 2050 makes processor 2020 be connected to storer 2030, is also connected to nonvolatile memory 2040, display controller 2035 and I/O controller 2045.
I/O device 2010 can comprise keyboard, disk drive, printer, scanner and comprise input and/or the output unit of mouse or other indicating device.Display controller 2035 can control can be such as the display in the display device 2015 of cathode-ray tube (CRT) (CRT) or liquid crystal display (LCD) in a conventional manner.Display controller 2035 and I/O controller 2045 can utilize traditional well-known technology to realize.
Nonvolatile memory 2040 is often the storer of magnetic hard-disk, CD or other form for mass data.On computing machine 2005 during executive software, some data in these data are written directly storer 2030 frequently by direct memory access (DMA) process.Those skilled in the art will recognize immediately, and term " machine readable media " or " computer-readable medium " comprise the memory storage utilizing the addressable any type of processor 2020, and comprise the carrier wave of encoding to data-signal.
Computer system 2000 is examples for the many possible computer system with different frameworks.Such as, personal computer based on Intel microprocessor often has multiple bus, wherein in these buses, bus can be peripherals I/O bus used, and a bus (being often called as memory bus) makes processor 2020 directly be connected with storer 2030.These buses via due to bus protocol different and carry out any needed for the bridge assembly of translating and connecting together.
Network computer is the computer system of the another type used of can combining with instruction provided here.Network computer does not comprise hard disk or other mass storage usually, and executable program is connected loading storer 2030 to be performed by processor 2020 from network.WebTV system known in the art is also regarded as computer system, but this WebTV system may lack some features in the feature shown in Figure 20, and such as some inputs or outputs device.Typical computer system will at least comprise processor, storer and make storer be connected to the bus of processor.
Although Figure 20 illustrates the example of computer system 2000, note, as used herein term " computer system " intention is from broadly explaining.Usually, computer system will comprise processor, storer, nonvolatile memory and interface.Typical computer system usually will at least comprise processor, storer and make storer be connected to the device (such as, bus) of processor.Processor can be such as the application specific processor of the general Central Processing Unit (CPU) of such as microprocessor etc. or such as microcontroller etc.Figure 20 illustrates the example of computer system.
Storer nonrestrictive mode can comprise the random access memory (RAM) of such as dynamic ram (DRAM) and static RAM (SRAM) (SRAM) etc. by example.Storer can be local, long-range or distributed.As used herein, term " computer-readable recording medium " intention comprises the physical medium of such as storer etc.As used herein, computer-readable medium intention comprise legal (such as, be according to 35U.S.C.101's in the U.S.) All Media, and concrete to get rid of from unofficial All Media in nature, need to carry out the degree of this eliminating to reach for the claim comprising effective computer-readable medium.Known legal computer-readable medium comprises hardware (such as, register, random access memory (RAM), non-volatile (NV) storer (only giving some instances)), but hardware can be confined to maybe can be not limited to hardware.
Bus can also make processor be connected to nonvolatile memory.Nonvolatile memory is often the storer of magnetic floppy disc or hard disk, magneto-optic disk, CD, ROM (read-only memory) (ROM) (such as CD-ROM, EPROM or EEPROM etc.), magnetic or optical card or other form for mass data.On the computer systems during executive software, some data in these data are written into storer frequently by direct memory access process.Nonvolatile memory can be local, long-range or distributed.Owing to can utilize in storer, available all applicable datas are to create system, and therefore nonvolatile memory is optional.
Usually software is stored in the nonvolatile memory.In fact, for large program, may even whole program cannot be stored in memory.But, should be appreciated that in order to operating software, in case of need, this software is moved to the computer-readable position being applicable to process, and in order to illustrate object, in this article this position is called storer.Even if when software being moved to storer for execution, processor also will utilize in order to store the hardware register of value that is associated with this software and ideally in order to accelerate the local cache memory performed usually.As used herein, when software program being called " realizing with computer-readable recording medium ", assuming that this software program is stored in any known or easily position (nonvolatile memory ~ hardware register).When at least one value be associated with program being stored in the register that processor can read, processor is regarded as " being configured to perform this program ".
In an example of operation, the operating system software comprising file management system of such as disk operating system etc. can be utilized to carry out computer for controlling system.An example of the operating system software of the related file management system software of tool is known as the Microsoft that is positioned at Redmond, Washington city operating system family and the file management system of association.Another example of the operating system software of the related file management system software of tool is the file management system of (SuSE) Linux OS and association thereof.File management system is stored in the nonvolatile memory usually, and makes to store data in storer in order to input and output data the various actions (comprising and being stored on nonvolatile memory by file) required by processor executive operating system.
Bus can also make processor be connected to interface.Interface can comprise one or more input and/or output (I/O) device.I/O device nonrestrictive mode can be comprised keyboard, mouse or other indicating device, disk drive, printer, scanner and comprise other I/O device of display device by example.Display device nonrestrictive mode can comprise cathode-ray tube (CRT) (CRT), liquid crystal display (LCD) or some other be suitable for known or display device easily by example.It is one or more that interface can comprise in modulator-demodular unit or network interface.Should be appreciated that modulator-demodular unit or network interface can be regarded as a part for computer system.Interface can comprise analog modem, isdn modulator-demodular unit, cable modem, token ring interface, satellite transmission interface (such as, " direct PC ") or other interface for making computer system be connected to other computer system.Interface makes department of computer science's other device of unifying can connect together in network.
The some assemblies comprising client, server and engine as herein described can with compatible based on the computing system of cloud or use the computing system based on cloud to realize.As used herein, the computing system based on cloud is by maintaining centralized services that client terminal device can access via the communication interface of such as network etc. and computational resource, software and/or information are provided to the system of client terminal device by resource.Computing system based on cloud can relate to the subscription of service or use Utility Pricing model.User can visit the agreement of the computing system based on cloud via the web browser be positioned on their client terminal device or other container application.
This document describes the technology that those skilled in the art can realize in many ways.Such as, those skilled in the art can use process, equipment, system, composition of matter, the computer program embodied on computer-readable recording medium and/or such as below the processor of processor etc. to realize the techniques described herein, wherein this processor be configured to perform be connected to this processor storer on store and/or instruction that this storer provides.Unless otherwise indicated, otherwise can using the assembly being described for such as processor or the storer etc. that carry out task as being configured to carry out the general assembly of task in preset time or be manufactured into the specific components of carrying out task and realize.As used herein, term " processor " refers to one or more device, circuit and/or is configured to process the process kernel of data of such as computer program instructions etc.
In this article, the detailed description for one or more embodiment is together with illustrating that the accompanying drawing of principle of the present invention provides.The present invention is described in conjunction with these realizations, but the invention is not restricted to any realization.Scope of the present invention is only limited by appended claims, and the present invention comprises multiple change, distortion and equivalent.State that multiple detail is to provide pin complete understanding of the present invention in the following description.These details provide in order to the object of example, and can when putting into practice the present invention without the need to when part or all in these details according to claim.In order to clear, be not described in detail in technologic material known in the technical field relevant with the present invention, make to make the present invention fog necessarily.
The part of embodiment presents from the algorithm of the operation for the data bit in computer memory and symbol expression aspect.These arthmetic statements and expression are the modes that the technician of data processing field uses to most effectively the essence that they work is conveyed to other technician in this field.What algorithm was considered to obtain expected result here usually is in harmony the sequence of operation certainly.These operations are operations of the physical treatment of requirement physical quantity.Usually, although be not necessary, this tittle adopts the form that can be stored, transmit, combine, compare the electric or magnetic signal processed with other.Main for the reason generally used, prove sometimes these signals to be called that position, value, element, symbol, character, term or numeral etc. are easily.
But should keep firmly in mind, all these and term similar should be associated with suitable physical quantity and be only be applied to the convenient of these physical quantitys to mark.Unless as stated according to following discussion is concrete in addition significantly, otherwise be to be understood that, in whole instructions, the discussion of the such as term of " process " or " computing " or " calculating " or " judgement " or " display " etc. is utilized to refer to action and the process of computer system or similar computing electronics, wherein this computer system or similar computing electronics data processing that the physics be expressed as in the RS of computer system (electronics) is measured and be transformed to the storer or register that are expressed as computer system similarly or other this information stores, other data of physical quantity in transmission and display device.
The techniques described herein relate to the equipment for carrying out these operations.This equipment can build specially for required object, or this equipment can comprise the multi-purpose computer utilizing the computer program stored in computing machine optionally to activate or reconfigure.Can this computer program be stored in following computer-readable recording medium, such as, but not limited to ROM (read-only memory) (ROM), random access memory (RAM), EPROM, EEPROM, magnetic or optical card, comprise the medium of the dish of any type of software, CD, CD-ROM and magneto-optic disk or any type of applicable store electrons instruction, and be connected to computer system bus separately.
As disclosed herein, these realize making edit routine to use theme and create specialty based on the various sparetime of collecting from multiple source and professional content making.Although described some details of aforementioned realization to understand object clearly, realize needing not be confined to provided details.

Claims (47)

1. a method, comprises the following steps:
Receive the locale data of security incident via first network, wherein said locale data is captured by security protection system, and described security protection system is configured to monitor place;
Receive via described first network and be suitable for being presented at the media in described security protection system;
Via described first network, described media are provided to described security protection system; And
Described security protection system is indicated to show described media via described first network.
2. method according to claim 1, wherein,
Described security protection system comprises the interior arrangement being connected to described first network and the external device (ED) being connected to described first network, wherein said interior arrangement is arranged in the safety zone in described place, and described external device (ED) is arranged in the insecure area in described place, and
Described external device (ED) is configured to the described locale data catching described security incident.
3. method according to claim 2, wherein, described interior arrangement is configured to catch and is suitable for being presented at the media in described security protection system.
4. method according to claim 1, wherein, the computer system being connected to described first network is configured to catch and is suitable for being presented at the media in described security protection system.
5. method according to claim 4, wherein, described media capture on the web browser of described computer system.
6. method according to claim 4, wherein, described media capture on the local application of described computer system.
7. method according to claim 4, wherein, described media capture on the local application of described computer system, and described computer system comprises mobile device.
8. method according to claim 1, wherein, described media comprise one or more images of the people managing described place, one or more sound or one or more video.
9. method according to claim 1, wherein, described media comprise the realtime graphic stream of the people managing described place, one or more sound or one or more video.
10. method according to claim 9, wherein, described realtime graphic stream captures on the web browser of mobile device.
11. methods according to claim 9, wherein, described realtime graphic stream captures on the local application of mobile device.
12. methods according to claim 9, wherein, described realtime graphic stream captures on the interior arrangement of described security protection system, and wherein said interior arrangement is arranged in the safety zone in described place.
13. methods according to claim 1, wherein, described security protection system is integrated in the intercom system being connected to described first network.
14. methods according to claim 13, wherein, described security protection system comprises doorbell, controls engine, video camera and infrared sensor.
15. methods according to claim 1, wherein, described first network comprises cellular network.
16. methods according to claim 15, wherein, cellular data and cellular voice link are provided to described security protection system by described cellular network.
17. methods according to claim 1, wherein, described security incident comprises the mobile object near described security protection system.
18. methods according to claim 17, wherein, described mobile object comprises people.
19. methods according to claim 1, wherein, further comprising the steps of:
Receive the notice of described security incident from described security protection system via described first network; And
In response to the described notice of described security incident, described security protection system is indicated to catch described locale data.
20. methods according to claim 19, wherein, described notice comprise from the motion sensor in described security protection system, represent the signal of mobile object.
21. methods according to claim 19, wherein, described notice comprise from the thermal sensor in described security protection system, represent the signal of mobile object.
22. methods according to claim 1, wherein, further comprising the steps of:
The instruction in order to manage described security protection system is received via described first network; And
Described security protection system is managed according to described instruction.
23. methods according to claim 1, wherein, further comprising the steps of:
The instruction in order to manage place utensil is received via described first network; And
Described place utensil is managed according to described instruction.
24. 1 kinds of systems, comprising:
For receiving the parts of the locale data of security incident via first network, wherein said locale data is captured by security protection system, and described security protection system is configured to monitor place;
For receiving the parts of the media being suitable for being presented in described security protection system via described first network;
For described media being provided to via described first network the parts of described security protection system; And
For indicating described security protection system to show the parts of described media via described first network.
25. 1 kinds of systems, comprising:
External device (ED) management engine, it is connected to first network; And
Place safety management devices management engine, it is connected to described first network,
Wherein, at work:
Described place safety management devices management engine receives the media being suitable for being presented in security protection system via described first network, and
Described external device (ED) management engine carries out following operation:
Receive the locale data of security incident via described first network, wherein said locale data is captured by security protection system, and described security protection system is configured to monitor place;
Via described first network, described media are provided to described security protection system; And
Described security protection system is indicated to show described media via described first network.
26. systems according to claim 25, wherein, described security protection system comprises the interior arrangement being connected to described first network and the external device (ED) being connected to described first network, wherein said interior arrangement is arranged in the safety zone in described place, and described external device (ED) is arranged in the insecure area in described place, and
Described external device (ED) is configured to the described locale data catching described security incident.
27. systems according to claim 26, wherein, described interior arrangement is configured to catch and is suitable for being presented at the media in described security protection system.
28. systems according to claim 25, wherein, the computer system being connected to described first network is configured to catch and is suitable for being presented at the media in described security protection system.
29. systems according to claim 28, wherein, described media capture on the web browser of described computer system.
30. systems according to claim 28, wherein, described media capture on the local application of described computer system.
31. systems according to claim 28, wherein, described media capture on the local application of described computer system, and described computer system comprises mobile device.
32. systems according to claim 25, wherein, described media comprise one or more images of the people managing described place, one or more sound or one or more video.
33. systems according to claim 25, wherein, described media comprise the realtime graphic stream of the people managing described place, one or more sound or one or more video.
34. systems according to claim 33, wherein, described realtime graphic stream captures on the web browser of mobile device.
35. systems according to claim 33, wherein, described realtime graphic stream captures on the local application of mobile device.
36. systems according to claim 33, wherein, described realtime graphic stream captures on the interior arrangement of described security protection system, and wherein said interior arrangement is arranged in the safety zone in described place.
37. systems according to claim 25, wherein, described security protection system is integrated in the intercom system being connected to described first network.
38. according to system according to claim 37, and wherein, described security protection system comprises doorbell, controls engine, video camera and infrared sensor.
39. systems according to claim 25, wherein, described first network comprises cellular network.
40. according to system according to claim 39, and wherein, cellular data and cellular voice link are provided to described security protection system by described cellular network.
41. systems according to claim 25, wherein, described security incident comprises the mobile object near described security protection system.
42. systems according to claim 41, wherein, described mobile object comprises people.
43. systems according to claim 25, wherein,
Described external device (ED) management engine comprises event information and collects engine and external device (ED) allocation engine, and
At work:
Described external device (ED) management engine receives the notice of described security incident from described security protection system via described first network; And
Described external device (ED) allocation engine, in response to the described notice of described security incident, indicates described security protection system to catch described locale data.
44. systems according to claim 43, wherein, described notice comprise from the motion sensor in described security protection system, represent the signal of mobile object.
45. systems according to claim 43, wherein, described notice comprise from the thermal sensor in described security protection system, represent the signal of mobile object.
46. systems according to claim 25, wherein, at work, described external device (ED) management engine carries out following operation:
The instruction in order to manage described security protection system is received via described first network; And
Described security protection system is managed according to described instruction.
47. systems according to claim 25, wherein, also comprise place instrument management engine, and at work, described place instrument management engine carries out following operation:
The instruction in order to manage place utensil is received via described first network; And
Described place utensil is managed according to described instruction.
CN201480013856.0A 2013-01-11 2014-01-13 Web portal for managing premise security Pending CN105264483A (en)

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
US201361751546P 2013-01-11 2013-01-11
US61/751,546 2013-01-11
PCT/US2014/011342 WO2014110527A1 (en) 2013-01-11 2014-01-13 Web portal for managing premise security

Publications (1)

Publication Number Publication Date
CN105264483A true CN105264483A (en) 2016-01-20

Family

ID=51167429

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201480013856.0A Pending CN105264483A (en) 2013-01-11 2014-01-13 Web portal for managing premise security

Country Status (6)

Country Link
EP (1) EP2943873A4 (en)
CN (1) CN105264483A (en)
AU (1) AU2014205109A1 (en)
GB (1) GB2526712A (en)
SG (1) SG11201505423WA (en)
WO (1) WO2014110527A1 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108600585A (en) * 2018-04-09 2018-09-28 安徽龙运智能科技有限公司 A kind of conveniently intelligent movable doorbell

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
ES1141495Y (en) * 2015-06-24 2015-10-07 Fermax Design & Dev S L U MULTICHANNEL PORTER VIDEO SYSTEM WITH ACCESS TO ADVANCED DIGITAL SERVICES
EP3836103A1 (en) * 2019-12-11 2021-06-16 Carrier Corporation A method and a system for preserving intrusion event/s captured by camera/s

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050174229A1 (en) * 2004-02-06 2005-08-11 Feldkamp Gregory E. Security system configured to provide video and/or audio information to public or private safety personnel at a call center or other fixed or mobile emergency assistance unit
US20090072988A1 (en) * 2006-03-07 2009-03-19 Helen Theresa Haywood Security device comprising a plurality of interfaces
US20110246782A1 (en) * 1999-08-31 2011-10-06 Intertrust Technologies Corporation Data Protection Systems and Methods
TW201143379A (en) * 2010-05-19 2011-12-01 Hon Hai Prec Ind Co Ltd Application server and method for controlling a video camera

Family Cites Families (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
AUPP776498A0 (en) * 1998-12-17 1999-01-21 Portus Pty Ltd Local and remote monitoring using a standard web browser
US6778084B2 (en) * 2002-01-09 2004-08-17 Chang Industry, Inc. Interactive wireless surveillance and security system and associated method
US20040086093A1 (en) * 2002-10-29 2004-05-06 Schranz Paul Steven VoIP security monitoring & alarm system
US20080036862A1 (en) * 2006-08-11 2008-02-14 Steve Lang Digital video surveillance system
US8732854B2 (en) * 2006-11-01 2014-05-20 Time Warner Cable Enterprises Llc Methods and apparatus for premises content distribution
US8897433B2 (en) * 2009-02-02 2014-11-25 Alarmforce Industries Inc. Security system with two-way communication and video

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20110246782A1 (en) * 1999-08-31 2011-10-06 Intertrust Technologies Corporation Data Protection Systems and Methods
US20050174229A1 (en) * 2004-02-06 2005-08-11 Feldkamp Gregory E. Security system configured to provide video and/or audio information to public or private safety personnel at a call center or other fixed or mobile emergency assistance unit
US20090072988A1 (en) * 2006-03-07 2009-03-19 Helen Theresa Haywood Security device comprising a plurality of interfaces
TW201143379A (en) * 2010-05-19 2011-12-01 Hon Hai Prec Ind Co Ltd Application server and method for controlling a video camera

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108600585A (en) * 2018-04-09 2018-09-28 安徽龙运智能科技有限公司 A kind of conveniently intelligent movable doorbell

Also Published As

Publication number Publication date
GB201512896D0 (en) 2015-09-02
WO2014110527A1 (en) 2014-07-17
SG11201505423WA (en) 2015-08-28
AU2014205109A1 (en) 2015-07-30
EP2943873A4 (en) 2016-01-06
EP2943873A1 (en) 2015-11-18
GB2526712A (en) 2015-12-02

Similar Documents

Publication Publication Date Title
AU2023270262B2 (en) Doorbell call center
US20140125754A1 (en) Web portal for managing premise security
US9685071B1 (en) eReceptionist and eNeighborhood watch system for crime prevention and/or verification
US11132877B2 (en) Doorbell communities
US9230424B1 (en) Doorbell communities
US10986717B1 (en) Reduced false alarms for outdoor IP security cameras
JP7265995B2 (en) Scalable system and method for monitoring and concierge services
US9728077B1 (en) eReceptionist and eNeighborhood watch system for crime prevention and/or verification
US11011036B2 (en) Object tracking using disparate monitoring systems
CN104967825A (en) Gatekeeper electronic dog system
US11651665B2 (en) Doorbell communities
CN110390785A (en) A kind of smart home security inter-linked controlling method, device, medium and terminal device
Sunehra et al. An intelligent surveillance with cloud storage for home security
CN105264483A (en) Web portal for managing premise security
WO2023280273A1 (en) Control method and system
US11523485B1 (en) Reduced false alarms for outdoor IP security cameras
CN104853169A (en) Complement and perfection for personal portable mobile monitoring and domestic service platform
JP2022028739A (en) Opening-closing device, security server, and security system
US20240031663A1 (en) Integrated surveillance system and methods for capturing sensor data controlled by security gateway
Raavi et al. Camera Surveillance Using Raspberry Pi

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20160120