EP2943873A1 - Portail web pour la gestion de la sécurité de locaux - Google Patents

Portail web pour la gestion de la sécurité de locaux

Info

Publication number
EP2943873A1
EP2943873A1 EP14737555.4A EP14737555A EP2943873A1 EP 2943873 A1 EP2943873 A1 EP 2943873A1 EP 14737555 A EP14737555 A EP 14737555A EP 2943873 A1 EP2943873 A1 EP 2943873A1
Authority
EP
European Patent Office
Prior art keywords
network
premise
secure gatekeeper
secure
gatekeeper
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
EP14737555.4A
Other languages
German (de)
English (en)
Other versions
EP2943873A4 (fr
Inventor
Helen Theresa Haywood
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Publication of EP2943873A1 publication Critical patent/EP2943873A1/fr
Publication of EP2943873A4 publication Critical patent/EP2943873A4/fr
Withdrawn legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N7/00Television systems
    • H04N7/18Closed-circuit television [CCTV] systems, i.e. systems in which the video signal is not broadcast
    • H04N7/183Closed-circuit television [CCTV] systems, i.e. systems in which the video signal is not broadcast for receiving images from a single remote source
    • H04N7/186Video door telephones
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms
    • G08B13/18Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength
    • G08B13/189Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems
    • G08B13/194Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems
    • G08B13/196Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
    • G08B13/19654Details concerning communication with a camera
    • G08B13/19656Network used to communicate with a camera, e.g. WAN, LAN, Internet
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms
    • G08B13/18Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength
    • G08B13/189Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems
    • G08B13/194Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems
    • G08B13/196Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
    • G08B13/19654Details concerning communication with a camera
    • G08B13/19658Telephone systems used to communicate with a camera, e.g. PSTN, GSM, POTS
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms
    • G08B13/18Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength
    • G08B13/189Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems
    • G08B13/194Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems
    • G08B13/196Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
    • G08B13/19695Arrangements wherein non-video detectors start video recording or forwarding but do not generate an alarm themselves
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N7/00Television systems
    • H04N7/18Closed-circuit television [CCTV] systems, i.e. systems in which the video signal is not broadcast
    • H04N7/188Capturing isolated or intermittent images triggered by the occurrence of a predetermined event, e.g. an object reaching a predetermined position
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/14Digital output to display device ; Cooperation and interconnection of the display device with other functional units
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms
    • G08B13/18Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength
    • G08B13/189Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems
    • G08B13/194Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems
    • G08B13/196Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
    • G08B13/19678User interface
    • G08B13/19684Portable terminal, e.g. mobile phone, used for viewing video remotely

Definitions

  • a person seeking to access premises presses a button to ring a buzzer.
  • the button may alert an occupant of the building to the person's presence.
  • the occupant may release a lock, such as an electronic lock, to allow the person to enter the premises.
  • Some intercom systems may also incorporate cameras, sound monitoring devices, and other devices to provide the occupant with other information related to a person at the entrance of the premises.
  • Typical intercom systems present many problems for occupants and visitors alike.
  • One problem may arise when the occupant is not home or is vulnerable. For instance, when the occupant is not on the premises, a visitor may be alerted to that fact, and may seek to enter the premises in an unauthorized manner. Moreover, if the visitor sees a vulnerable person (e.g., an elderly person or a child) on the premises through an intercom, the visitor may attempt to enter the building to take advantage of the occupant's vulnerability.
  • a vulnerable person e.g., an elderly person or a child
  • a method can include: receiving, over a first network, premise data of a security event, the premise data captured by a secure gatekeeper, and the secure gatekeeper adapted to monitor premises; receiving, over the first network, media adapted for display on the secure gatekeeper; providing, over the first network, the media to the secure gatekeeper; instructing, over the first network, the secure gatekeeper to display the media.
  • the secure gatekeeper comprises an internal device coupled to the first network, and an external device coupled to the first network, the internal device located in a secure area of the premises, and the external device located in an unsecure area of the premises.
  • the external device may be adapted to capture the premise data of the security event.
  • the internal device may be configured to capture the media adapted for display on the secure gatekeeper.
  • a computer system coupled to the first network is configured to capture the media adapted for display on the secure gatekeeper.
  • the media may be captured on a web browser of the computer system.
  • the media may be captured on a native application of the computer system.
  • the media may be captured on a native application of the computer system, and the computer system comprises a mobile device.
  • the media comprises one or more images, one or more sounds, or one or more videos of a person managing the premises.
  • the media may comprise a live stream of images, one or more sounds, or one or more videos of a person managing the premises.
  • the live stream may be captured on a web browser of a mobile device.
  • the live stream may be captured on a native application of a mobile device.
  • the live stream may be captured on an internal device of the secure gatekeeper, the internal device located in a secure area of the premises.
  • the secure gatekeeper is integrated into an Intercom system coupled to the first network.
  • the secure gatekeeper may comprise a doorbell, a control engine, a camera, and an Infrared sensor.
  • the first network comprises a cellular network.
  • the cellular network may provide cellular data and a cellular voice link to the secure gatekeeper.
  • the security event comprises a moving object near the secure gatekeeper.
  • the moving object may comprise a person.
  • the method may further comprise: receiving, over the first network, a notification of the security event from the secure gatekeeper; instructing the secure gatekeeper to capture the premise data, the instructing being in response to the notification of the security event.
  • the notification may comprise a signal indicating a moving object, the signal being from a motion sensor on the secure gatekeeper.
  • the notification may comprise a signal indicating a moving object, the signal being from a heat sensor on the secure gatekeeper.
  • the method comprises: receiving, over the first network, instructions to manage the secure gatekeeper; managing the secure gatekeeper in accordance with the instructions.
  • the method comprises receiving, over the first network, instructions to manage a premise appliance; managing the premise appliance in accordance with the instructions.
  • a system can include: an external device management engine coupled to a first network; and a premise security management device management engine coupled to the first network.
  • premise security management device management engine receives, over the first network, media adapted for display on a secure gatekeeper; the external device management engine: receives, over the first network, premise data of a security event, the premise data captured by a secure gatekeeper, and the secure gatekeeper adapted to monitor premises; provides, over the first network, the media to the secure gatekeeper; instructs, over the first network, the secure gatekeeper to display the media.
  • the secure gatekeeper comprises an internal device coupled to the first network, and an external device coupled to the first network, the internal device located in a secure area of the premises, and the external device located in an unsecure area of the premises.
  • the external device may be adapted to capture the premise data of the security event.
  • the internal device may be configured to capture the media adapted for display on the secure gatekeeper.
  • a computer system coupled to the first network is configured to capture the media adapted for display on the secure gatekeeper.
  • the media may be captured on a web browser of the computer system.
  • the media may be captured on a native application of the computer system.
  • the media may be captured on a native application of the computer system, and the computer system comprises a mobile device.
  • the media comprises one or more images, one or more sounds, or one or more videos of a person managing the premises.
  • the media may comprise a live stream of images, one or more sounds, or one or more videos of a person managing the premises.
  • the live stream may be captured on a web browser of a mobile device.
  • the live stream may be captured on a native application of a mobile device.
  • the live stream may be captured on an internal device of the secure gatekeeper, the internal device located in a secure area of the premises.
  • the secure gatekeeper is integrated into an Intercom system coupled to the first network.
  • the secure gatekeeper may comprise a doorbell, a control engine, a camera, and an Infrared sensor.
  • the first network comprises a cellular network.
  • the cellular network may provide cellular data and a cellular voice link to the secure gatekeeper.
  • the security event comprises a moving object near the secure gatekeeper.
  • the moving object may comprise a person.
  • the system may further comprise: the external device management engine comprises an event information gathering engine and an external device configuration engine.
  • the external device management engine receives, over the first network, a notification of the security event from the secure gatekeeper; the external device configuration engine instructs the secure gatekeeper to capture the premise data, the instructing being in response to the notification of the security event.
  • the notification may comprise a signal indicating a moving object, the signal being from a motion sensor on the secure gatekeeper.
  • the notification may comprise a signal indicating a moving object, the signal being from a heat sensor on the secure gatekeeper.
  • external device management engine may: receive, over the first network, instructions to manage the secure gatekeeper; manage the secure gatekeeper in accordance with the instructions.
  • the system further comprises a premise appliance management engine, wherein in operation, the premise appliance management engine: receives, over the first network, instructions to manage a premise appliance; manages the premise appliance in accordance with the instructions.
  • a system may include: means for receiving, over a first network, premise data of a security event, the premise data captured by a secure gatekeeper, and the secure gatekeeper adapted to monitor premises; means for receiving, over the first network, media adapted for display on the secure gatekeeper; means for providing, over the first network, the media to the secure gatekeeper; means for instructing, over the first network, the secure gatekeeper to display the media.
  • FIG. 1 depicts an example of a partially exploded perspective view of a remote unit.
  • FIG. 2 depicts an example of a partially exploded perspective view of a base unit.
  • FIG. 3 depicts an example of a flowchart of a method indicating potential modes of operation of the security device, with the device set to "AWAY FROM HOME.”
  • FIG. 4 depicts an example of a flowchart of a method indicating potential modes of operation of the security device, with the device set to "AT HOME.”
  • FIG. 5 depicts an example of a premise security management environment.
  • FIG. 6 depicts an example of a premise security web portal system.
  • FIG. 7 depicts an example of a flowchart of a method for controlling premise security with a premise security web portal system.
  • FIG. 8 depicts an example of an external device management engine.
  • FIG. 9 depicts an example of an event information gathering engine.
  • FIG. 10 depicts an example of a flowchart of a method for providing event information from an event information gathering engine.
  • FIG. 11 depicts an example of a live view information gathering engine.
  • FIG. 12 depicts an example of a flowchart of a method for providing live view information related to a premise security management web portal system.
  • FIG. 13 depicts an example of a system information gathering engine.
  • FIG. 14 depicts an example of a flowchart of a method for providing system information related to a premise security management web portal system.
  • FIG. 15 depicts an example of a premise appliance management engine.
  • FIG. 16 depicts an example of a flowchart of a method for managing one or more premise appliances.
  • FIG. 17 depicts an example of a premise security management environment.
  • FIG. 18A depicts an example of a premise security management environment.
  • FIG. 18B depicts an example of an architecture used to implement a premise security web portal system.
  • FIG. 19 depicts an example of a screen of a premise security web portal system.
  • FIG. 20 depicts an example of a computer system.
  • FIG. 1 depicts an example of a partially exploded perspective view 16 of a remote unit.
  • the remote unit comprises four separate basic components, a steel chassis (3), a circuit board (4) (which also functions as a sub-frame), a plastic molding (1) and a seal (13).
  • An orifice (8) is also provided in the steel chassis (3) to allow the passage of cables (14) through the chassis (3).
  • the cables may be used to connect the remote unit to the base unit and/or to supply power to the remote unit (16).
  • a series of protruding sections (7) are provided in the steel chassis, such protrusions may act as means to ensure that plastic molding and circuit board are correctly located relative to the steel chassis (3), when the separate components (1), (3) and (4) of the remote unit are assembled to form a single unit.
  • the protrusions may act to ensure that a rubber seal (not shown), used to weather-proof the assembled unit (16), is maintained in an appropriate orientation with respect to the plastic molding (1) and the steel chassis (3) during assembly of the remote unit (16).
  • the protruding sections (7) form a guide for such a seal (not shown), the seal is initially positioned around the raised protrusions (7) prior to the circuit board (4) and plastic molding being positioned in the appropriate location relative to the steel chassis (3).
  • the circuit board (4) serves as a sub-frame onto which all of the electronic components such as the camera, speaker, microphone, etc. may be mounted, the circuit board
  • a number of components are incorporated into the front face of the plastic molding (1) these comprise a plastic lens cover (2), a camera lens (9), a detector (10) which may be an ultrasonic detector, a passive infrared detector, or other such suitable detector of a type that would be known to the skilled addressee, a speaker (11), a manually activated switch (5) and a microphone (12).
  • the manually activated switch (5) is mounted into the plastic molding in such a way that it operates as a rocker switch.
  • a light emitting diode (LED) (not shown) is mounted within the switch (5) in order to illuminate the switch from within, the LED being connected to the circuit board (4).
  • the switch (5) furthermore incorporates portions, which are manufactured from clear plastic as indicated by (6).
  • the remote unit (16) may also be weather proofed (i.e. protected from water damage) by coating the internal computer or the unit as a whole with suitable waterproofing materials in the form of sprays or dips. Any clearance space between the switch and the plastic molding (1) may also be weather proofed by means of a second seal (not shown).
  • FIG. 2 of the drawings wherein a partially exploded perspective view of the base unit as generally indicated by (40) is shown.
  • the base unit (40) includes a housing formed in two parts (41a and 41b); the two parts can be manufactured from plastics material or the like.
  • the rear part (41b) of the housing includes two keyhole shaped slots (not shown) to allow the unit to be mounted on a wall, or other suitable surface, by the use of screws-other suitable fixing means may also be used.
  • the rear part of the housing (41b) is secured to the front of the molding (41a) by the use of six screws which insert into openings (58) in the rear housing (41b), only four of the six openings are shown, and insert into corresponding portions in the front housing (41a).
  • the rear part of the housing (41b) further incorporates a removable door (54) to allow the insertion of a SIM card into the device (if appropriate) and a second removable door (55) is provided to allow the insertion and replacement of batteries. Further doors (not shown) may be provided in the rear part of the housing to allow the insertion of a plug socket for mains power supply, and/or a plug socket to connect the device to a remote monitor and/or a plug socket to connect the device to a fixed telephone line.
  • the front part of the housing (41a) provides a slot 53 for the insertion of a smart card and also incorporates a screen (LCD or the like) to display images collected by the camera of the remote unit. Also provided are a keyboard (43) and joystick (44) to allow a user to access menus to control the set-up of the device and to allow the entry of relevant data such as telephone numbers.
  • a power switch (45) is provided together with a power indicator light (46).
  • a low battery/alarm function (47) provides a warning to user of the device when the batteries need replacing.
  • a switch in the form of a button (48a) is provided to allow the base unit to be used as a standard intercom and an indicator (48b) in the form of an LED is provided to indicate that the button has been pressed sufficiently hard to activate the intercom.
  • a microphone (49) and speaker (50) are also incorporated into the front part of the housing (41a) to allow communication between the base unit (30) and the remote unit (16).
  • a person approaching the remote unit (16) is detected by the detector (10) which activates the camera such that one or more photographs are taken and/or alternatively the approach of the person is recorded as a video image.
  • the picture(s)/video images being saved remotely from the remote unit, either by suitable means provided in the base unit or by alternative suitable data storage means, such that if the remote unit is vandalized or stolen the images are retained.
  • the number of photographs to be taken and/or length of time for which video images are to be recorded may be preset by a user via the base unit.
  • the photographs or video images may be subsequently viewed using the screen (42).
  • the detection of a person by the detector (10) also activates the LED which illuminates the switch (5) such that the approaching person's attention is automatically drawn to the switch (5) to encourage use of the switch (5).
  • the LED is set to automatically switch off after a pre-set interval of time which may range from a few seconds to several minutes.
  • the base unit may activate the production of an audible alarm signal by the remote unit.
  • the person pressing the switch (5) is led to believe that the switch activates a standard doorbell type mechanism.
  • a second person, within the premises, hearing the audible alarm signal may then use the base unit (40) as a standard intercom by pressing the button (48a) to establish audio communication between the remote unit (16) and the base unit (40).
  • the screen (42) may be used to display images from the camera of the remote unit (16) during such communication.
  • the base unit (40) may be manually set to dial a series of preprogrammed telephone numbers in a pre-determined order. In this way a second person answering a dialed telephone may communicate with the first person via the base unit (40) and remote unit (16). Alternatively the base unit (40) may automatically start the dialing of the relevant telephone number if the button (48a) is not pressed within a predetermined time interval from the activation of the switch (5).
  • the base unit may utilize a standard land line or may use a mobile telephone connection to dial the relevant telephone numbers.
  • Smart cards used with the base unit may provide a medium for the storage of images; such images may also be stored on storage devices provided separately from the base unit (40) and remote unit (16).
  • the smart card may be a pre-payment card of the type used with 'Pay as You Go ' type mobile phones if the base unit utilizes a mobile phone as the primary means for dialing other telephones, or as backup in the event that the land line used as a primary telephone connection fails to function properly.
  • the communication between the first person via the remote unit and a second person called on a telephone would normally be voice to voice, although alternative means could be utilized such as 3G technology to enable the second person called on a telephone to view images collected by the camera.
  • a screen may be incorporated into the remote unit to allow video to video communication between the remote unit and the base unit, or between the remote unit and a second person called on a telephone.
  • Means may be provided to provide automatic transmission of photographs or video images taken by the camera to a dialed telephone even if the switch (5) is not activated.
  • Communication between the base unit (40) and the remote unit (16) may be via cable, Bluetooth connection, or any other form of suitable communication means as would be known to the skilled addressee.
  • the activation of the security device disclosed herein may be prevented without the insertion of an appropriately coded SIM card, even if the device is utilizing a landline rather than a mobile connection.
  • the SIM card may also allow the activation of the device to be remotely controlled by the supplier of the SIM or by the supplier of the telephone connection or by the original equipment manufacturer (OEM).
  • a security device for monitoring an entrance door to any building for example home, office, garage etc.
  • a security monitoring device for monitoring cars or any other valuable items for monitoring cars or any other valuable items.
  • a security monitoring device with real time interaction allowing two-way conversation.
  • a security monitoring device that is activated by the approach and/or operation of a 'doorbell' type switch.
  • a security monitoring device that connects its owner to a visitor anywhere in the world via telephonic communication.
  • a security monitoring device that photographs potential visitors on approach.
  • a security monitoring device that utilizes second (2G), third (3G), fourth (4G) and/or future generations of mobile technology platforms.
  • a security monitoring device that is able to connect directly to second (2G), third (3G), fourth (4G) and/or future generations of mobile technology platforms.
  • a security monitoring device that is able to connect directly to land lines.
  • a security monitoring device wherein a remote 'bell push' activates a telephone dial- out mechanism.
  • a security monitoring device wherein further triggers can be remotely placed for example at an entrance gate for activating photographic or video recording means.
  • the real time interaction between the visitor and the owner of the property are ensured at all times, whether the owner is indoors or away from their property.
  • the mobile network allows communications connection on a global platform. This means that the owner can be abroad and still be connected by voice or video to callers/visitors to their property.
  • the unit will be small enough to house all the electronic components and will fit all standard external doorframe widths.
  • Various embodiments may control access through gates to enclosed areas. Additionally known means may be provided to allow the device to be accessed remotely to; reorder the sequence in which the telephone numbers are dialed, to access images stored by the system, or to re-set the system if required.
  • the remote unit and/or base unit incorporates a power supply unit, which does not incorporate any external wires, connectors or contacts. This may be in a typical form, such as an inductive coupling, which induces power into an inductive receiver, within the remote unit and/or base unit. The induced power is a magnetic field, transmitted from a typical charging pad.
  • the charging pad may be located on or in the immediate vicinity of the remote unit and/or base unit.
  • the remote unit and/or base unit incorporates an additional key pad, display screen and speech recognition circuitry. These components are required for establishing two way communications with a person who is deaf.
  • the visitor will activate the remote unit by pressing a switch and speaking into the remote unit's microphone.
  • the visitor's speech is then converted into a textual representation, by the speech recognition circuitry, which is then communicated onto a display screen that is mounted internally in the house and/or transmitted to a mobile phone, which can be read by a person who is deaf.
  • the deaf person will respond to the visitor's communication by entering textual response from either a keypad located internally within the house, or from a mobile phone.
  • the textual response entered will then be converted into speech, by the speech recognition circuitry, which is then transmitted to the visitor.
  • This embodiment may be further enhanced by incorporating a touch screen display within the remote unit and/or base unit.
  • a keypad may be incorporated within the touch screen.
  • the touch screen will display a menu to the visitor, which offers "one touch" selection and communication means to visited person.
  • unique access codes are stored within the remote unit and/or base unit.
  • the access codes are assigned to authorized person(s), to give them immediate access to the property.
  • the security device's camera will capture an image of the visitor, along with the time of the visit.
  • a text message is then sent to the property owner's mobile phone, informing them of the identity of the visitor and at what time they gained access to the property.
  • the visitor may speak into remote unit's microphone to leave a message, which will be stored in the security device's remote unit and/or base unit.
  • the security device will capture an image of the visitor, as well as the audio message, when the visitor activates an intercom/ doorbell switch and/or movement sensor(s).
  • This embodiment may be further enhanced by incorporating biometric scanning devices to the remote unit and/or base unit.
  • the biometric scans of authorized person(s) are stored within the remote unit and/or base unit, to give them immediate access to the property. On entering the biometric scan, typically a fingerprint, handprint or retina scan, the person is identified.
  • the security device's camera will capture an image of the visitor, along with the time of the visit. A text message is then sent to the property owner's mobile phone, informing them of the identity of the visitor and at what time they gained access to the property.
  • the remote unit and/or base unit incorporates an additional brail keypad, brail intercom/doorbell switch and a sounding device.
  • These components are required for establishing two way communications with a person who is blind.
  • a blind visitor will be guided to the remote unit, by a sounding device located in close proximity to the remote unit.
  • the sounding device will be activated by the activation of a movement detector located in close proximity to the remote unit.
  • Once the blind visitor has located the remote unit they can determine the functionality of the keys on the keypad and/or intercom/doorbell switch, by feeling the brail text located upon the components. Therefore, audio, visual and/or textual communication is established to the inside of the house and/or transmitted to a mobile phone.
  • predetermined text messages are stored within the remote unit and/or base unit. These text messages are assigned to activations of the security device, which are dependent upon an array of discrete sensors. Each discrete sensor is mapped to an individual function, for example, a sensor monitoring a zone within the garden, a sensor monitoring a zone within the garage and/or a sensor monitoring a particular door or window. Therefore, when a sensor is activated, i.e. a sensor located within a garage, the security device will transmit a text message across the mobile network and/or internet, to the house owner's mobile phone, informing them of a potential security threat to their garage.
  • This embodiment may be further enhanced by incorporating a means for remotely operating an illumination device(s), audible device(s), slave camera(s) and/or any other remote devices, by entering predetermined codes from the house owner's mobile phone, which are then transmitted across the mobile network and/or internet to the security device.
  • This embodiment may be further enhanced by incorporating one or more docking ports for the insertion of a removable wireless network transceiver module, typically a Universal Serial Bus (USB) "Bluetooth” ® or “IEEE 802.1 1 " wireless network modules. Therefore, all remote sensors, remote cameras and/or remote units are wirelessly networked to the security device.
  • a removable wireless network transceiver module typically a Universal Serial Bus (USB) "Bluetooth” ® or “IEEE 802.1 1 " wireless network modules. Therefore, all remote sensors, remote cameras and/or remote units are wirelessly networked to the security device.
  • USB Universal Serial Bus
  • all activations are time stamped and logged within the remote unit and/or base unit, for inspection and retrieval at a later time.
  • This embodiment may be further enhanced by incorporating one or more docking port for the insertion of a removable memory module, typically a Universal Serial Bus (USB) memory device.
  • a removable memory module typically a Universal Serial Bus (USB) memory device.
  • USB Universal Serial Bus
  • This device may be used for dumping and backing up the security device's activation data log and/or stored security data.
  • the data obtained is transmitted across a mobile network and/or the internet to a dedicated gallery domain, which resides on the World Wide Web.
  • This gallery provides an access means to the security data stored for a particular security device.
  • the gallery will manage the retrieval and use of the data.
  • the gallery provides a means for remotely accessing and responding to the stored data from places abroad.
  • the remote unit and/or base unit incorporates an additional alarm device.
  • This may typically be an audio and/or visual alarm device.
  • the property owner may activate the alarm by pressing a predetermined button or switch on the base unit or by transmitting a code, entered from their mobile phone, across a mobile network and/or internet to activate the alarm remotely.
  • This embodiment may be further enhanced by incorporating an interface means which connects the security device to an existing alarm system within the property.
  • the property owner may activate the alarm by pressing a predetermined button or switch on the base unit or by transmitting a code, entered from their mobile phone, across a mobile network and/or internet to activate the alarm remotely.
  • the remote unit and/or base unit incorporates a Subscriber Identity Module (SIM), for authentication of mobile network connection.
  • SIM Subscriber Identity Module
  • the owner of the security device may enter into a service contract with a mobile network provider.
  • the network provider will issue a dedicated SIM for the security device, enabling it to connect to the mobile network.
  • the security device owner may after the contract term has expired, renegotiate a service with another mobile network provider, who will then issue their own dedicated SIM, which supersedes any existing SIM within the security device.
  • the SIM is intended to be a static device, and not a roaming device, like a conventional SIM for a mobile phone. Therefore, a fixed address is established for billing.
  • the dedicated SIM for the security device will generate additional revenue streams for the mobile network companies.
  • the revenue streams comprise offering new fixed term contracts between customers and network providers for security services.
  • the new fixed term contracts will typically provide, for each customer account, a SIM, a new dedicated number for the security device and a range of air time tariffs for the security device.
  • the security device in combination with its dedicated SIM will maintain the integrity of the mobile network connection, data verification checks and enable the authorization of the security device to connect with the mobile network in response to any network challenges to the SIM's authenticity.
  • the mobile network provider may monitor the actual location of the SIM by establishing its position via the cells within the mobile network. If the SIM is shown to be roaming, then the mobile network provider has the option of disabling the SIM and informing the security device owner of the potential security risk.
  • the remote unit and/or base unit may be incorporated as static devices, within a non-static platform. These platforms are typically land vehicles, floating vehicles and/or airborne vehicles.
  • the remote unit and/or base unit incorporate additional Global Positioning System (GPS) circuitry. These components are required for transmitting GPS coordinates across the mobile network and/or internet via a wireless internet connection, to update the present location of the platform. This embodiment will enable successful tracking of the platform, in the event of it being stolen or misused.
  • GPS Global Positioning System
  • the remote unit and/or base unit incorporated within the platform will record any instances which trigger any activation from sensors within the platform and/or any remote activation from platform owner, police enforcement departments or contracted security companies.
  • the security data obtained may be used as potential evidence, later at any subsequent legal proceedings.
  • the remote unit and/or base unit incorporated within the platform will enable two-way communication between the platform owner and the people being monitored within the platform. [0108]
  • This embodiment may be further enhanced by connecting the security device to the control and/or management systems of the platform. Therefore enabling the platform owner, police enforcement departments or contracted security companies to remotely shutdown and immobilize the platform.
  • the platform may engage locks, which have been activated remotely to contain the people being monitored within the platform.
  • the remote unit and/or base unit may be used to monitor a specific area.
  • the security device transmits over a mobile network and/or the internet, audio and visual data, which establishes communication between a property owner, law enforce department or private security company and any person(s) monitored within the area. Once communication has been established, the persons(s) monitored by the security device are informed, typically by a loudspeaker, that they are being monitored. .
  • the security data obtained may be used as potential evidence, later at any subsequent legal proceedings.
  • the security device functionality maybe incorporated into an integrated single unit to reduce the security devices physical size, i.e. for miniaturization of the security device for new applications.
  • This embodiment may be further enhanced by incorporating the security device into a portable computer, typically a laptop, notebook or Personal Digital Assistant (PDA). Therefore, if a portable computer or PDA is stolen, and the thief attempts to use it without deactivating the security device first.
  • the computer or PDA will capture an image of the thief and transmit it across a mobile network and/or the internet to the owner's mobile phone and/or predetermined web domain.
  • the laptop or PDA will then deactivate itself, typically going into a sleep state and disenable any user interface.
  • the laptop or PDA will then permanently display a message onto the screen, i.e. "THIS DEVICE HAS BEEN STOLEN AND IS CURRENTLY TRANSMITTING A TRACKING SIGNAL", and/or activate a loud audible alarm.
  • This embodiment may be further enhanced by incorporating the security device into children's jewelry, typically bangles and/or necklaces, which can capture images of who they are with and with whom they have been. This embodiment may be used to provide security for a child. [0113] This embodiment maybe further enhanced by utilizing the security device as a data logging device, which depicts the child's life from when they were a young child to adulthood, as a historic gallery of images.
  • This embodiment maybe further enhanced by incorporating the security device into clothing. Therefore, when going on holidays it captures images on a regular basis of what you did, where you were and what you were doing.
  • This embodiment embeds all the required functionality, to capture the images, within the clothing.
  • This embodiment eliminates the need to operate a camcorder or camera. Therefore, this embodiment may be advantageous for work practices, when the wearer's clothing captures images of the processes performed by the wearer.
  • the security device's activation will be triggered by a sharp, snatched movement. Therefore, once the security device is activated an alarm will be generated; this may be typically in the form of an ear piercing alarm, or an audible circuitry playing in a set loop sounding i.e. "This is stolen property”.
  • a Personal Identification Number (PIN) will be required to be entered, into the security device, to turn it off.
  • PIN Personal Identification Number
  • FIG. 5 depicts an example of a premise security management environment 500.
  • provided in the premise security management environment 500 provides security for premises using secure gatekeepers (e.g., the secure gatekeeper(s) 505 discussed further herein) connected to cellular networks and manageable from any device having a network connection.
  • secure gatekeepers e.g., the secure gatekeeper(s) 505 discussed further herein
  • the premise security management environment 500 allows remote management of access to premises.
  • a person may have an elderly parent who lives alone.
  • the premise security management environment 500 may allow the person to remotely monitor callers at the mother's house and to remotely intervene when visitors show up at the front door of the mother's house.
  • another person to remotely monitor when his or her children are at home, and remotely control appliances (e.g., the premise appliance(s) 530) for the person's children.
  • yet another person employing a babysitter may be able to remotely intervene when strangers ring the doorbell to the premises; the person may further be able to remotely keep in direct contact with anyone at the front door of the premises and may be able to remotely receive pictures, video, and other information of the people at the front door of the premises.
  • the premise security management environment 500 can allow for assisted living for elderly people. For instance, in some implementations, the premise security management environment 500 can allow for controlled access and automatic time and date logs of entries and exits of caretakers. In some implementations, the premise security management environment 500 can allow for the provision of telecare services. More specifically, panic signals and/or fall callout signals can be registered at a control center. Call alerts for emergencies can be sent to immediate family or to a registered call center. Alerts for floods, power cuts, smoke and fire, gas leaks, carbon monoxide leaks, etc. can be set up. In various implementations, the premise security management environment 500 can allow for home monitoring and automation.
  • the premise security management environment 500 can allow for remote control of energy consumption, turning on/off of lights and/or domestic appliances, automation of locking and/or unlocking doors, turning cooling and/or heating systems on or off, setting and/or resetting house profiles remotely, etc.
  • the premise security management environment 500 includes secure gatekeeper(s) 505, a first network 510, a second network 515, a premise security web portal system 520, premise security management device(s) 525, and premise appliance(s) 530.
  • one or more of the premise security management device(s) 525, the first network 510, the second network 515, the premise security web portal system 520, the secure gatekeeper(s) 505, and the premise appliance(s) 530 contain "engines,” and/or "datastores,” as described herein.
  • An "engine,” as used in this paper, includes a dedicated or shared processor and, typically, firmware or software modules executed by the processor. Depending upon implementation-specific or other considerations, an engine can be centralized or its functionality distributed. An engine can include special purpose hardware, firmware, or software embodied in a computer-readable medium for execution by the processor.
  • a "datastore,” as used in this paper, can be implemented, for example, as software embodied in a physical computer-readable medium on a general- or specific-purpose machine, in firmware, in hardware, in a combination thereof, or in an applicable known or convenient device or system.
  • Datastores in this paper are intended to include any organization of data, including tables, comma-separated values (CSV) files, traditional databases (e.g., SQL), or other applicable known or convenient organizational formats.
  • Datastore-associated components such as database interfaces, can be considered "part of a datastore, part of some other system component, or a combination thereof, though the physical location and other characteristics of datastore-associated components is not critical for an understanding of the techniques described in this paper.
  • Datastores can include data structures.
  • a data structure is associated with a particular way of storing and organizing data in a computer so it can be used efficiently within a given context.
  • Data structures are generally based on the ability of a computer to fetch and store data at any place in its memory, specified by an address, a bit string that can be itself stored in memory and manipulated by the program.
  • Some data structures are based on computing the addresses of data items with arithmetic operations; while other data structures are based on storing addresses of data items within the structure itself.
  • Many data structures use both principles, sometimes combined in non-trivial ways.
  • the implementation of a data structure usually entails writing a set of procedures for creating and manipulating instances of that structure.
  • the secure gatekeeper(s) 505 are coupled to the first network 510.
  • the secure gatekeeper(s) 505 include a first secure gatekeeper 505(a) through an nth secure gatekeeper 505(n).
  • the letter "n" designates an arbitrary number, and the secure gatekeeper(s) 505 may include more or less than the devices depicted in FIG. 5, in various implementations.
  • each of the secure gatekeeper(s) 505 monitors a portion of premises. Monitoring may include capturing images, video, and sound of the portion of the premises. Monitoring may also include detecting motion near the portion of the premises.
  • each of the secure gatekeeper(s) 505 provides, over the first network 510, information about the portion of the premises being monitored.
  • each of the secure gatekeeper(s) 505 contains a display that shows a person associated with the premises.
  • the display may provide information captured remotely, such as images, video, or sound from the premise security management device(s) 525, as discussed herein.
  • each of the secure gatekeeper(s) 505 is controlled by the premise security web portal system 520, as discussed herein.
  • the secure gatekeepers may correspond to a security unit, comprising the base unit (40) and the remote unit (16), described herein.
  • each of the secure gatekeeper(s) 505 includes an internal device 505-1 and an external device 505-2.
  • the internal device 505-1 may be coupled to the premise appliance(s) 530.
  • the internal device 505-1 resides in a secure portion area of the premises.
  • the internal device 505-1 may reside inside a house that is secured by the secure gatekeeper(s) 505 or may reside within a safe area of the secure gatekeeper(s) 505.
  • the internal device 505-1 may internally include a connection to the first network 510.
  • the internal device 505-1 corresponds to the base unit (40) shown and illustrated herein.
  • the connection to the first network 510 may include a remote power source and a cellular connection, neither of which are dependent on power lines, wired network connections, routers, etc.
  • the internal device 505-1 may continue to function and may provide a premise occupant with connectivity to the first network 510.
  • the internal device 505-1 may include a battery backup module that lasts for an extended period (e.g., several days). The battery backup module may be refreshed by hardwired power connection.
  • the internal device 505-1 further connects to the premise appliance(s), and includes encryption techniques to ensure data is securely provided the first network 510.
  • the external device 505-2 resides in an unsecure portion of the premises and is operatively coupled to the internal device 505-1 either directly (as shown in FIG. 5) or through the first network 510.
  • the external device 505-2 may reside outside a house secured by the secure gatekeeper(s) 505 or may reside outside a safe area of the secure gatekeeper(s) 505.
  • the external device 505-2 includes an indicator such as a bell (or other indicator) for a visitor to ring.
  • the external device 505-2 corresponds to the remote unit (16) shown and illustrated herein.
  • the indicator may show, on a display of the external device 505-2, images and/or video of an occupant of the premises and/or one or more users of the premise security management device(s) 525.
  • the occupant of the premises may be provided through the camera on the internal device 505-1 as discussed herein.
  • the external device 505-2 may include a remote power source and a cellular connection, neither of which are dependent on power lines, wired network connections, routers, etc. As a result, in various implementations, even if a power line, a wired network connection, a router, etc. is cut or otherwise disabled by an intruder, the external device 505-2 may continue to function and may provide a premise occupant with connectivity to the first network 510.
  • the external device 505-2 may also include a battery backup module that lasts for an extended period and that may be refreshed by a hard-wired power connection.
  • the external device 505-2 can provide two-way voice and/or cellular data over the first network 510.
  • the external device 505-2 may further take pictures and/or videos, and may log the time(s)/date(s) and other information of the pictures and/or videos.
  • the external device 505-2 can include a motion sensor, such as an infrared sensor. In these implementations, cameras and other portions of the external device 505-2 need not record until the motion sensor indicates the presence of something, e.g., a visitor, nearby.
  • the external device 505-2 may further log entry and/or exit times of visitors, and provide a display that shows images and/or video of premise occupants and/or users of the premise security management device(s) 525, as discussed herein.
  • the external device 505-2 may further allow occupants and/or users of the premise security management device(s) 525 to manually take pictures of visitors, and may include anti-tamper and/or early warning alert systems to prevent security attacks on the secure gatekeeper(s) 505.
  • the first network 510 is coupled to the secure gatekeeper(s) 505, the second network 515, and the premise security management device(s) 525.
  • the first network 510 includes a networked system including several computer systems coupled together, such as the Internet, or a device for coupling components of a single computer, such as a bus.
  • the term "Internet” as used in this paper refers to a network of networks using certain protocols, such as the TCP/IP protocol, and possibly other protocols such as the hypertext transfer protocol (HTTP) for hypertext markup language (HTML) documents making up the World Wide Web (the web). Content is often provided by content servers, which are referred to as being "on" the Internet.
  • HTTP hypertext transfer protocol
  • HTML hypertext markup language
  • a web server which is one type of content server, is typically at least one computer system, which operates as a server computer system and is configured to operate with the protocols of the web and is coupled to the Internet.
  • the physical connections of the Internet and the protocols and communication procedures of the Internet and the web are well known to those of skill in the relevant art.
  • the first network 510 broadly includes, as understood from relevant context, anything from a minimalist coupling of the components illustrated in the example of FIG. 1, to every component of the Internet and networks coupled to the Internet.
  • the first network 510 is administered by a service provider, such as an Internet Service Provider (ISP).
  • ISP Internet Service Provider
  • the first network 510 may include technologies such as Ethernet, 802.11, worldwide interoperability for microwave access (WiMAX), 3G, 4G, CDMA, GSM, LTE, digital subscriber line (DSL), etc.
  • the first network 10 may further include networking protocols such as multiprotocol label switching (MPLS), transmission control protocol/Internet protocol (TCP/IP), User Datagram Protocol (UDP), hypertext transport protocol (HTTP), simple mail transfer protocol (SMTP), file transfer protocol (FTP), and the like.
  • the data exchanged over first network 510 can be represented using technologies and/or formats including hypertext markup language (HTML) and extensible markup language (XML).
  • all or some links can be encrypted using conventional encryption technologies such as secure sockets layer (SSL), transport layer security (TLS), and Internet Protocol security (IPsec).
  • SSL secure sockets layer
  • TLS transport layer security
  • IPsec Internet Protocol security
  • the first network 510 includes a wired network using wires for at least some communications.
  • the first network 10 comprises a wireless network.
  • a "wireless network,” as used in this paper may include any computer network communicating at least in part without the use of electrical wires.
  • the first network 510 includes technologies such as Ethernet, 802.11 , worldwide interoperability for microwave access (WiMAX), 3G, 4G, CDMA, GSM, LTE, digital subscriber line (DSL), etc.
  • the first network 510 can further include networking protocols such as multiprotocol label switching (MPLS), transmission control protocol/Internet protocol (TCP/IP), User Datagram Protocol (UDP), hypertext transport protocol (HTTP), simple mail transfer protocol (SMTP), file transfer protocol (FTP), and the like.
  • MPLS multiprotocol label switching
  • TCP/IP transmission control protocol/Internet protocol
  • UDP User Datagram Protocol
  • HTTP hypertext transport protocol
  • HTTP simple mail transfer protocol
  • FTP file transfer protocol
  • the data exchanged over the first network 10 can be represented using technologies and/or formats including hypertext markup language (HTML) and extensible markup language (XML).
  • HTML hypertext markup language
  • XML extensible markup language
  • all or some links can be encrypted using conventional encryption technologies such as secure sockets layer (SSL), transport layer security (TLS), and Internet Protocol security (IPsec).
  • SSL secure sockets layer
  • TLS transport layer security
  • IPsec Internet Protocol security
  • the wireless network of the first network 510 is compatible with the 802.1 1 protocols specified by the Institute of Electrical and Electronics Engineers (IEEE).
  • the wireless network of the first network 510 is compatible with the 802.3 protocols specified by the IEEE.
  • IEEE 802.3 compatible protocols of the first network 510 may include local area network technology with some wide area network applications. Physical connections are typically made between nodes and/or infrastructure devices (hubs, switches, routers) by various types of copper or fiber cable.
  • the IEEE 802.3 compatible technology can support the IEEE 802.1 network architecture of the first network 510.
  • the first network 510 includes a cellular network.
  • the first network 510 allows the devices connected thereto to access cellular voice, cellular data, and/or other network services through cellular towers.
  • the cellular towers used to support the first network 510 may be administered by cellular phone and/or cellular data service providers.
  • the second network 515 may be coupled to the first network 10 and the premise security web portal system 520.
  • the second network 515 includes a networked system including several computer systems coupled together, such as the Internet, or a device for coupling components of a single computer, such as a bus.
  • the term "Internet” as used in this paper refers to a network of networks using certain protocols, such as the TCP/IP protocol, and possibly other protocols such as the hypertext transfer protocol (HTTP) for hypertext markup language (HTML) documents making up the World Wide Web (the web).
  • HTTP hypertext transfer protocol
  • HTML hypertext markup language
  • a web server which is one type of content server, is typically at least one computer system, which operates as a server computer system and is configured to operate with the protocols of the web and is coupled to the Internet.
  • the physical connections of the Internet and the protocols and communication procedures of the Internet and the web are well known to those of skill in the relevant art.
  • the second network 515 broadly includes, as understood from relevant context, anything from a minimalist coupling of the components illustrated in the example of FIG. 1, to every component of the Internet and networks coupled to the Internet.
  • the second network 15 is administered by a service provider, such as an Internet Service Provider (ISP).
  • ISP Internet Service Provider
  • the second network 515 may include technologies such as Ethernet, 802.1 1, worldwide interoperability for microwave access (WiMAX), 3G, 4G, CDMA, GSM, LTE, digital subscriber line (DSL), etc.
  • the second network 515 may further include networking protocols such as multiprotocol label switching (MPLS), transmission control protocol/Internet protocol (TCP/IP), User Datagram Protocol (UDP), hypertext transport protocol (HTTP), simple mail transfer protocol (SMTP), file transfer protocol (FTP), and the like.
  • MPLS multiprotocol label switching
  • TCP/IP transmission control protocol/Internet protocol
  • UDP User Datagram Protocol
  • HTTP hypertext transport protocol
  • SMTP simple mail transfer protocol
  • FTP file transfer protocol
  • the data exchanged over second network 515 can be represented using technologies and/or formats including hypertext markup language (HTML) and extensible markup language (XML).
  • the second network 515 includes a wired network using wires for at least some communications.
  • the second network 15 comprises a wireless network.
  • a "wireless network,” as used in this paper may include any computer network communicating at least in part without the use of electrical wires.
  • the second network 515 includes technologies such as Ethernet, 802.11 , worldwide interoperability for microwave access (WiMAX), 3G, 4G, CDMA, GSM, LTE, digital subscriber line (DSL), etc.
  • the second network 515 can further include networking protocols such as multiprotocol label switching (MPLS), transmission control protocol/Internet protocol (TCP/IP), User Datagram Protocol (UDP), hypertext transport protocol (HTTP), simple mail transfer protocol (SMTP), file transfer protocol (FTP), and the like.
  • MPLS multiprotocol label switching
  • TCP/IP transmission control protocol/Internet protocol
  • UDP User Datagram Protocol
  • HTTP hypertext transport protocol
  • SMTP simple mail transfer protocol
  • FTP file transfer protocol
  • the data exchanged over the second network 515 can be represented using technologies and/or formats including hypertext markup language (HTML) and extensible markup language (XML).
  • HTML hypertext markup language
  • XML extensible markup language
  • all or some links can be encrypted using conventional encryption technologies such as secure sockets layer (SSL), transport layer security (TLS), and Internet Protocol security (IPsec).
  • SSL secure sockets layer
  • TLS transport layer security
  • IPsec Internet Protocol security
  • the wireless network of the second network 515 is compatible with the 802.1 1 protocols specified by the Institute of Electrical and Electronics Engineers (IEEE).
  • the wireless network of the second network 515 is compatible with the 802.3 protocols specified by the IEEE.
  • IEEE 802.3 compatible protocols of the second network 515 may include local area network technology with some wide area network applications. Physical connections are typically made between nodes and/or infrastructure devices (hubs, switches, routers) by various types of copper or fiber cable.
  • the IEEE 802.3 compatible technology can support the IEEE 802.1 network architecture of the second network 515.
  • the second network 515 includes a cellular network.
  • the second network 515 allows the devices connected thereto to access cellular voice, cellular data, and/or other network services through cellular towers.
  • the cellular towers used to support the second network 515 may be administered by cellular phone and/or cellular data service providers.
  • the second network 515 need not comprise a cellular network. That is, in some implementations, the second network 515 may include portions of the Internet without the need for support from cellular towers. [00123] In the example of FIG. 5, the premise security web portal system 520 is coupled to the second network 515.
  • the premise security web portal system 520 provides a web portal for managing the secure gatekeeper(s) 505, managing the premise appliance(s) 530, managing related settings, and managing related user accounts.
  • the premise security web portal system 520 controls, over the first network 510, the secure gatekeeper(s) 505 using instructions provided at least in part through the first network 510.
  • the premise security web portal system 520 provides to the premise security management device(s) 525 images, sounds, and/or video with the external device 505-2 of the secure gatekeeper(s) 505.
  • the premise security web portal system 520 can further provide to the premise security management device(s) 525 changes in state regarding motion sensors, infrared sensors, etc. on the external device 505-2.
  • the premise security web portal system 520 can also provide to the premise security management device(s) 525 account settings and/or other information (e.g., to manage the premise appliance(s) 530) as discussed herein.
  • the premise security management device(s) 525 are coupled to the first network 510.
  • the premise security management device(s) 525 include a first premise security management device(s) 525(a) through an nth premise security management device(s) 525(n).
  • the letter "n" designates an arbitrary number, and that certain implementations of the premise security management device(s) 525 may include more or less than the devices depicted in FIG. 5.
  • each of the premise security management device(s) 525 allows a user to manage the secure gatekeeper(s) 505, the premise security web portal system 520, and/or the premise appliance(s) 530.
  • each of the premise security management device(s) 525 can include a camera and/or a microphone to allow users the ability to remotely interface with the secure gatekeeper(s) 505. More specifically, the premise security management device(s) 525 may allow people to exchange images, sounds, and/or video with the external device 505-2 of the secure gatekeeper(s) 505. The premise security management device(s) 525 may also be alerted to changes in state regarding motion sensors, infrared sensors, etc. on the external device 505-2. In various implementations, the premise security management device(s) 525 allow users to manage account settings related to the premise security web portal system 520, as discussed further herein.
  • the premise security management device(s) 525 can include a standalone application.
  • An example of a standalone application can include a native mobile application executed on the premise security management device(s) 525.
  • the standalone application can include some or of all of the engines used to manage the secure gatekeeper(s) 505, the premise security web portal system 520, and/or the premise appliance(s) 530.
  • the premise security management device(s) 525 includes a container application, such as a web browser.
  • the container application may include some or of all of the engines used to manage the secure gatekeeper(s) 505, the premise security web portal system 520, and/or the premise appliance(s) 530.
  • the premise appliance(s) 530 are coupled to one or more of the internal device 505-1.
  • the premise appliance(s) 530 include appliances that are controlled by the internal device 505-1.
  • the premise appliance(s) 530 can be controlled directly by the internal device 505-1 or can be controlled through the premise security web portal system 520.
  • the premise appliance(s) 530 can be controlled by the premise security management device(s) 525.
  • the premise appliance(s) 530 can include one or more of: lamps, media centers, appliances or devices including computers, appliances or devices including near study areas, heating or cooling systems, and other appliances, devices, or apparatuses.
  • FIG. 6 depicts an example of a premise security web portal system 600.
  • the premise security web portal system 600 includes a computer-readable medium 605, an external device management engine 610, an internal device management engine 615, a premise security management device management engine 620, a premise appliance management engine 625, a network interface engine 630, and an account management engine 635.
  • the computer-readable medium 605 includes a "computer-readable medium,” as discussed herein.
  • one or more of the external device management engine 610, the internal device management engine 615, the premise security management device management engine 620, the premise appliance management engine 625, the network interface engine 630, and the account management engine 635 includes one or more "engines,” and/or “datastores,” as described herein.
  • the computer-readable medium 605 is coupled to the external device management engine 610, the internal device management engine 615, the premise security management device management engine 620, the premise appliance management engine 625, the network interface engine 630, and the account management engine 635.
  • the computer-readable medium 605 includes a "computer- readable medium,” as discussed herein.
  • the external device management engine 610 is coupled to the computer-readable medium 605.
  • the external device management engine 610 manages external device(s) (e.g., external device 505-2) of secure gatekeeper(s) (e.g., the secure gatekeeper(s) 505, shown in FIG. 5).
  • the external device management engine 610 receives notifications of events occurring on external device(s), receives images, sound, and video from the external device(s), and provides images, sound, and video to the external device(s).
  • the external device management engine 610 controls external device(s). For instance, the external device management engine 610 can change a perspective or alter a live view of external device(s) in various implementations.
  • the internal device management engine 615 is coupled to the computer-readable medium 605.
  • the internal device management engine 615 manages internal device(s) (e.g., internal device 505-1) of secure gatekeeper(s) (e.g., the secure gatekeeper(s) 505, shown in FIG. 5).
  • the internal device management engine 615 provides notifications of events occurring on internal device(s), receives images, sound, and video from the internal device(s), and provides images, sound, and video to the internal device(s).
  • the internal device management engine 615 can also provide interactive menu(s) on the internal device(s) for the occupant of premises to interact with.
  • the interactive menu(s) may be used to control associated external device(s), premise appliance(s), and/or other devices.
  • the premise security management device management engine 620 is coupled to the computer-readable medium 605.
  • the premise security management device management engine 620 manages premise security management device(s) (e.g., premise security management device(s) 525 shown in FIG. 5).
  • the premise security management device management engine 620 provides notifications of events occurring on premise security management device(s), receives images, sound, and video from the premise security management device (s), and provides images, sound, and video to the premise security management device (s).
  • the premise security management device management engine 620 can also provide interactive menu(s) on premise security management device(s) for a person associated with premises to interact with. The interactive menu(s) may be used to control associated external device(s), premise appliance(s), and/or other devices.
  • the premise appliance management engine 625 is coupled to the computer-readable medium 605.
  • the premise appliance management engine 625 manages premise appliance(s) (e.g., premise appliance(s) 530 shown in FIG. 5).
  • control is achieved through interfacing with drivers on the premise appliance(s) 530.
  • the network interface engine 630 is coupled to the computer-readable medium 605.
  • the network interface engine 630 is configured to send and receive data to and from a network (e.g., the second network 515 shown in FIG. 5).
  • the network interface engine 630 may also be configured to send and receive data to and from the first network 510, shown in FIG. 5.
  • the network interface engine 630 encrypts all data for transmission to one or more of the secure gatekeeper(s) 505, the premise security management device(s) 525, and/or the premise appliance(s) 630.
  • the account management engine 635 is coupled to the computer-readable medium 605.
  • the account management engine 635 allows management of accounts associated with one or more of the secure gatekeeper(s) 505, the premise security management device(s) 525, and/or the premise appliance(s) 630.
  • FIG. 7 depicts a flowchart 700 of an example of a method for controlling premise security with a premise security web portal system.
  • the flowchart 700 is discussed in conjunction with the structures shown in FIG. 6. It is noted the flowchart 700 may have additional, fewer, or other modules than those depicted in FIG. 7.
  • a notification of a security event is received via a cellular network from an external device of one or more secure gatekeeper(s).
  • the external device management engine 610 receives a notification from an external device 505-2 of one or more of the secure gatekeeper(s) 505.
  • the notification may include a presence indicator or other indicator that a visitor is near the external device 505-2.
  • the notification may be based on the fact that a sensor (e.g., an infrared sensor) of the external device 505-2 was triggered.
  • the notification may pass, at least in part, through the first network 510, which in this implementation may comprise a cellular network.
  • an image, sound, and/or video of the premises is received in response to the notification and via the cellular network from the external device.
  • the external device management engine 610 receives image, sound and/or video from the external device 505-2.
  • the external device 505-2 may be configured to provide the image, sound, and/or video upon the notification. That is, the external device 505-2 may be configured to provide the image, sound, and/or video upon the fact that the sensor of the external device 505-2 was triggered.
  • the image, sound, and/or video of the premises may be received, at least in part, through the first network 510, which in this implementation may comprise a cellular network.
  • the image, sound, and/or video is provided via the cellular network to one or more premise management security devices.
  • the premise security management device management engine 620 may provide the image, sound, and/or video to one or more of the premise security management device(s) 525.
  • the image, sound, and/or video may pass, at least in part, through the first network 10.
  • the premise security management device(s) 525 may display the image, sound, and/or video on an application (e.g., a native application or within a container application) to a user.
  • the image, sound, and/or video is provided via the cellular network to an internal unit of one or more of the secure gatekeeper(s).
  • the internal device management engine 615 provides the image, sound, and/or video to one of the internal device 505-1 of one or more of the secure gatekeeper(s) 505.
  • the image, sound, and/or video may pass, at least in part, through the first network 10.
  • the internal device 505-1 may display the image, sound, and/or video to a user.
  • images, sound, and/or video are received via the cellular network, from the one or more premise security management device(s).
  • the premise security management device management engine 620 receives images, sound, and/or video from the premise security management device(s) 525. The images, sound, and/or video may pass, at least in part, through the first network 510.
  • images, sound, and/or video are received via the cellular network, from the internal device.
  • the internal device management engine 615 receives images, sound, and/or video from the internal device 505-1. The images, sound, and/or video may pass, at least in part, through the first network 510.
  • the images, sound, and/or video from the premise security management device(s) and/or the images, sound, and/or video from the internal device are provided via the cellular network to the external device.
  • the external device management engine 610 provides the images, sound, and/or video from the premise security management device(s) 525 and/or the images, sound, and/or video from the internal device 505-1 are provided via the cellular network to the external device 505-2.
  • the images, sound, and/or video may pass, at least in part, through the first network 510.
  • the external device is instructed, via the cellular network, to display the images, sound, and/or video from the premise security management device(s) and/or the images, sound, and/or video from the internal device.
  • the external device management engine 610 instructs, at least partly through the first network 510, to display the images, sound, and/or video from the premise security management device(s) 525 and/or the images, sound, and/or video from the internal device 505-1.
  • FIG. 8 depicts an example of an external device management engine 800.
  • the external device management engine 800 includes a computer-readable medium 805, an event information gathering engine 810, a live view information gathering engine 815, and an external device configuration engine 820.
  • the computer-readable medium 805 includes a "computer-readable medium,” as discussed herein.
  • one or more of the event information gathering engine 810, the live view information gathering engine 815, and the external device configuration engine 820 includes one or more "engines,” and/or "datastores,” as described herein.
  • the event information gathering engine 810 is coupled to the computer-readable medium 805.
  • the event information gathering engine 810 gathers events that have occurred on the external device 505-2. More specifically, the event information gathering engine 810 may be coupled to sensors (e.g., infrared and other motion sensors) and other components of the external device 505-2 that indicate a significant event, such as the presence of a person at the external device 505-2. The event information gathering engine 810 may also provide significant events to other engines. In some implementations, the event information gathering engine 810 provides notifications relating to events to other engines. In various implementations, the event information gathering engine 810 provides archived events of the external device 505-2.
  • the live view information gathering engine 815 is coupled to the computer-readable medium 805.
  • the live view information gathering engine 815 provides images, sounds, and/or video of events near the external device 505-2.
  • the live view information gathering engine 815 interfaces with cameras, displays, microphones, and/or speakers on the external device 505-2.
  • the live view information gathering engine 815 may, in various implementations, be triggered by significant events as determined by the event information gathering engine 810.
  • the external device configuration engine 820 is coupled to the computer-readable medium 805.
  • the external device configuration engine 820 configures the external device 505-2. More specifically, the external device configuration engine 820 may provide configuration parameters for portions of the external device 505-2.
  • the external device configuration engine 820 may control camera parameters, such as making a camera on the external device 505-2 zoom, change perspective, focus, or capture an angle.
  • the external device configuration engine 820 may also control microphones at various levels and/or directions, and/or may control speaker systems of the external device 505-2. In some implementations, the external device configuration engine 820 controls one or more other configuration parameters of the external device 505-2.
  • FIG. 9 depicts an example of an event information gathering engine 900.
  • the event information gathering engine 900 includes a computer-readable medium 905, an event trigger engine 910, an event significance engine 915, an archived event engine 920, and an event datastore 925.
  • the computer-readable medium 905 includes a "computer-readable medium,” as discussed herein.
  • one or more of the event trigger engine 910, the event significance engine 915, and the archived event engine 920 include one or more "engines," as described herein.
  • the event datastore 925 includes one or more "datastores," as described herein.
  • the event trigger engine 910 is coupled to the computer- readable medium 905.
  • the event trigger engine 910 receives a set of event triggers from an external device (e.g., the external device 505-2 in FIG. 5). More specifically, the event trigger engine 910 may, in various implementations, interface with sensors on the external device. For instance, the event trigger engine 910 may interface with a motion sensor of the external device to determine a person is near or is moving near the external device. As another example, the event trigger engine 910 may interface with a heat sensor on the external device to determine a person is near or is moving near the external device. The event trigger engine 910 may also interface with other items, such as cameras, microphones, etc., to determine events near the external device.
  • the event significance engine 915 is coupled to the computer-readable medium 905.
  • the event significance engine 915 determines whether event triggers are sufficiently important to be characterized as significant.
  • the event significance engine 915 may determine whether the data from a motion sensor on the external device (e.g., the external device 505-2 in FIG. 5) is significant enough to qualify as human motion or is the motion of a non-human animal like a cat or raccoon.
  • the event significance engine 915 may determine whether data from a heat sensor on the external device is significant enough to qualify as a fire near the external device, or merely reflects a hot day.
  • the event significance engine 915 may base significance on similarity to an archived event stored on the event datastore 925.
  • the archived event engine 920 is coupled to the computer- readable medium 905.
  • the archived event engine 920 retrieves archived events from the event datastore 925.
  • the event datastore 925 which in the example of FIG. 9 is coupled to the computer-readable medium 905, may, in various implementations, store archived events.
  • the archived events may comprise events archived for a particular external device and may further comprise events archived for other external devices.
  • the archived events may comprise hypothetical or ideal events that are stored for the purpose of determining event significance or other purposes.
  • FIG. 10 depicts a flowchart 1000 of an example of a method for providing event information from an event information gathering engine.
  • the flowchart 1000 is discussed in conjunction with the structures shown in FIG. 9. It is noted the flowchart 1000 may have additional, fewer, or other modules than those depicted in FIG. 10.
  • data from an external device of a secure gatekeeper is received.
  • the event trigger engine 910 receives data from an external device (e.g., an external device 505-2) of one or more of the secure gatekeepers 505.
  • the data may comprise data from a sensor (e.g., a motion sensor, a heat sensor, etc.) of the external device 505-2.
  • the data is received over a cellular network, such as the first network 510.
  • the received data is compared to archived data associated with one or more archived events.
  • the event significance engine 915 compares the received data to archived data.
  • the event significance engine 915 can compare data from a motion sensor on the external device to motion-related data of archived events.
  • the event significance engine 915 can compare heat captured from a heat sensor on the external device to heat-related data of archived events.
  • the event significance engine 915 can determine whether the received data comprises a significant event by evaluating the comparison.
  • a notification of the significant event is provided if the received data comprises a significant event. In some implementations, the event significance engine 915 can provide such a notification.
  • FIG. 1 1 depicts an example of a live view information gathering engine 1 100.
  • the live view information gathering engine 1 100 includes a computer- readable medium 1105, a live view trigger engine 1110, an image capture engine 1 1 15, and an audio capture engine 1120.
  • the computer-readable medium 1 105 includes a "computer-readable medium,” as discussed herein.
  • one or more of the live view trigger engine 1 1 10, the image capture engine 1115, and the audio capture engine 1120 include one or more "engines" and/or "datastores,” as described herein.
  • the live view trigger engine 1110 is coupled to the computer-readable medium 1 105.
  • the live view trigger engine 1110 receives live view triggers from an external device (e.g., the external device 505-2) of one or more secure gatekeepers (e.g., one or more of the secure gatekeepers 505).
  • the live view trigger may result from a sensor, such as a motion sensor, a heat sensor, etc. being triggered.
  • the live view trigger may also result from specific instructions from a premise security management device (e.g., one or more of the premise security management devices 525 in FIG. 5) to initiate a live view.
  • the live view trigger may instruct other engines to initiate capture of images, sound, and/or video.
  • the image capture engine 1 1 15 is coupled to the computer- readable medium 1105.
  • the image capture engine 1115 may direct cameras on an external device of a secure gatekeeper (e.g., an external device 505-2 of one or more of the secure gatekeepers 505) to capture images and/or video.
  • the audio capture engine 1 120 is coupled to the computer-readable medium 1105.
  • the audio capture engine 1 120 may direct microphones on an external device of a secure gatekeeper (e.g., an external device 505-2 of one or more of the secure gatekeepers 505) to capture sound.
  • FIG. 12 depicts a flowchart 1200 of an example of a method for providing live view information related to a premise security management web portal system.
  • the flowchart 1200 is discussed in conjunction with the structures shown in FIG. 11. It is noted the flowchart 1200 may have additional, fewer, or other modules than those depicted in FIG. 12.
  • a live view trigger is received; the live view trigger initiates a live view on an external device of a secure gatekeeper.
  • the live view trigger engine 1110 can initiate a live view on the external device 505-2 of one of the secure gatekeepers 505, shown in FIG. 5.
  • the live view trigger engine 11 10 may initiate the live view based on information from a sensor, e.g., a motion sensor, a heat sensor, etc.
  • images and/or video are captured with the external device in response to the live view trigger.
  • the image capture engine 1 115 instructs a camera on the external device 505-2 to capture images and/or video of the area proximate to the external device 505-2.
  • audio is captured with the external device in response to the live view trigger.
  • the audio capture engine 1120 instructs a microphone on the external device 505-2 to capture audio of the area proximate to the external device 505-2.
  • the captured images, video, and/or audio is provided to a premise security management device and/or an internal device of the secure gatekeeper.
  • the captured images, video, and/or audio may be provided to premise security management device(s) 525 and/or an internal device 505-1 of secure gatekeeper(s) 505.
  • FIG. 13 depicts an example of an external device configuration engine 1300.
  • the external device configuration engine 1300 includes a computer- readable medium 1305, a system information engine 1310, and a system setting engine 1315.
  • the computer-readable medium 1305 includes a "computer-readable medium,” as discussed herein.
  • one or more of the system information engine 1310 and the system setting engine 1315 include one or more "engines" and/or "datastores,” as described herein.
  • the system information engine 1310 is coupled to the computer-readable medium 1305.
  • the system information engine 1310 is configured to obtain a present configuration of an external device. For instance, the system information engine 1310 may determine existing configuration parameters of cameras of the external device (e.g., zoom, perspective, focus, angle, etc. parameters). As another example, the system information engine 1310 may determine existing configuration parameters of microphones and/or speakers of the external device (e.g., sound levels, etc. parameters).
  • the system setting engine 1315 is coupled to the computer-readable medium 1305. In an implementation, the system setting engine 1315 allows setting relevant parameters on the external device.
  • FIG. 14 depicts a flowchart 1400 of an example of a method for configuring an external device of a secure gatekeeper.
  • the flowchart 1400 is discussed in conjunction with the structures shown in FIG. 13. It is noted the flowchart 1400 may have additional, fewer, or other modules than those depicted in FIG. 14.
  • system information of an external device of a secure gatekeeper is obtained.
  • the system information engine 1310 obtains information of an external device of a secure gatekeeper (e.g., an external device 505-2 of one or more of the secure gatekeeper(s) 505).
  • the system information may include, in various examples, camera settings, microphone settings, speaker settings, and/or other configuration parameters of the external device 505.
  • the system information is provided to an internal device of the secure gatekeeper and/or a premise security management device.
  • an internal device management engine e.g., the internal device management engine 615 in FIG. 6) may provide the system information to the internal device 505-1 (shown in FIG.
  • a premise security management device management engine may provide the system information to one or more of the premise security management devices 525 (shown in FIG. 5).
  • an instruction to modify a system setting of the external device is received from the internal device and/or the premise security management device.
  • an internal device management engine e.g., the internal device management engine 615 in FIG. 6
  • a premise security management device management engine e.g., the premise security management device management engine 620 of FIG. 6
  • the system setting engine 1315 receives an instruction to modify a system setting of the external device.
  • a system setting of the external device is modified based on the instruction.
  • the system setting engine 1315 may modify, e.g., camera parameters, microphone parameters, speaker parameters, etc. based on the instructions to modify the external device.
  • FIG. 15 depicts an example of a premise appliance management engine 1500.
  • the premise appliance management engine 1500 includes a computer- readable medium 1505, an environment selection engine 1510, a premise appliance selection engine 1515, and a premise appliance configuration engine 1520.
  • the computer-readable medium 1505 includes a "computer-readable medium,” as discussed herein.
  • one or more of the environment selection engine 1510, the premise appliance selection engine 1515, and the premise appliance configuration engine 1520 include one or more "engines" and/or "datastores,” as described herein.
  • the environment selection engine 1510 is coupled to the computer-readable medium 1505.
  • the environment selection engine 1510 allows for selection of an environment containing one or more premise appliances.
  • the environment selection engine 1510 may allow for the selection of one or more rooms (e.g., bedroom, living room, kitchen, bathroom, etc.) of a premise containing premise appliances.
  • environments need not be rooms, but may arbitrarily be any space in given premises.
  • the premise appliance selection engine 1515 is coupled to the computer-readable medium 1505.
  • the premise appliance selection engine 1 15 allows for the selection of particular appliances within an environment.
  • the premise appliance selection engine 1515 could allow a user to select lamps, ovens, heating or cooling systems, washers or dryers, dishwashers, refrigerators, etc. within a given environment.
  • the premise appliance configuration engine 1520 is coupled to the computer-readable medium 1505.
  • the premise appliance configuration engine 1520 allows for configurations of selected appliances.
  • FIG. 16 depicts a flowchart 1600 of an example of a method for managing one or more premise appliances.
  • the flowchart 1600 is discussed in conjunction with the structures shown in FIG. 15. It is noted the flowchart 1600 may have additional, fewer, or other modules than those depicted in FIG. 16.
  • an environment is selected.
  • the environment selection engine 1 10 facilitates selection of an environment comprising an arbitrary area within a set of premises.
  • the environment may include one or more premise appliances, such as one or more of the premise appliances 530 shown in FIG. 5.
  • premise appliance(s) in the environment are selected.
  • the premise appliance selection engine 1515 allows selection of particular premise appliance(s) in the selected environment.
  • a configuration of one or more of the selected premise appliance(s) is obtained.
  • the premise appliance configuration engine 1520 may obtain the configuration of one or more of the selected premise appliances.
  • instructions to modify the configuration are received from an internal device of a secure gatekeeper and/or a premise security management device.
  • the premise appliance configuration engine 1520 receives instructions to modify the configuration.
  • the instructions may come from an internal device (e.g., an internal device 505-1 of one or more of the secure gatekeepers 505).
  • the instructions may come from a premise security management device (e.g., one or more of the premise security management devices 525).
  • the configuration is modified in accordance with the instruction.
  • the premise appliance configuration engine 1520 may modify the configuration in accordance with the instruction.
  • FIG. 17 depicts an example of a premise security management environment 1700.
  • the premise security management environment 1700 includes an external device 1705, an internal device 1710, a premise security web portal system 1715, and premise security management device(s) 1720.
  • the external device 1705 is coupled to the internal device 1710.
  • the external device 1705 corresponds to one of the external device(s) 505-2, shown in FIG. 5.
  • the external device 1705 can perform one or more of the following: providing two-way voice and/or cellular data over a cellular network; taking time(s)/date(s)/picture(s)/video(s) of people approaching the front of premises; logging entry and/or exit times; allowing occupants to safely talk to visitors while inside the premises; manually taking pictures of visitors; and providing anti-tamper and early warning alert systems.
  • the internal device 1710 is coupled to the external device 1705 and to the premise security web portal system 1715.
  • the internal device 1710 corresponds to one of the internal device(s) 505-1, shown in FIG. 5.
  • the internal device 1710 has one or more of the following attributes: not being dependent on ADSL, routers, broadband connections, or PCs; not being disabled if a power line or telephone line is cut; enabling other home connected products using similar wireless communications; using data encryption techniques for secure network transmissions.
  • the internal device 1710 has a display panel for occupants to see videos of visitors; the internal device 1710 can also provide menu displays for other connected devices.
  • the premise security web portal system 1715 is coupled to the internal device 1710 and the premise security management device 1720.
  • the premise security web portal system 1715 corresponds to the premise security web portal system 520, shown in FIG. 5.
  • the premise security management device 1720 is coupled to the premise security web portal system 1715.
  • the premise security management device(s) 1720 include a web-enabled premise security management device 1720a and a native premise security management device 1720b. Either of the web- enabled premise security management device 1720a and the native premise security management device 1720b can be configured to perform the functions herein.
  • the premise security management device 1720 corresponds to the one or more of the premise security management device(s) 525, shown in FIG. 5.
  • the premise security management device 1720 performs one or more of the following: answering calls; controlling the external device 1705 and/or internal device 1710 remotely; controlling the premise security web portal system 1715 remotely; turning on or off appliances; viewing closed circuit television (CCTV) for the external device 1705; turning power on or off; switching lighting on or off; seeing who has visited the premises; open and/or locking a parcel box; locking and/or unlocking a porch door; resetting a profile of the premises; and managing account settings.
  • CCTV closed circuit television
  • FIG. 18A depicts an example of a premise security management environment 1800.
  • the premise security management environment 1800 includes a premise security web portal system 1805, an Internet 1810, a set of cellular networks 1815, a premise security management device 1820, and a secure gatekeeper 1825.
  • the premise security web portal system 1805 is coupled to the Internet 1810.
  • the premise security web portal system 1805 is coupled to the Internet 1810 through a firewall and a load balancer.
  • the premise security web portal system 1805 can include a web user interface (UI) module, a representational state transfer (REST) module, a services module, a Business Logic Layer (BLL), a Data Access Layer (DAL), a data storage datastore, and other modules.
  • UI web user interface
  • REST representational state transfer
  • BLL Business Logic Layer
  • DAL Data Access Layer
  • the premise security web portal system 1805 corresponds to the premise security web portal system 520, shown in FIG. 5.
  • the Internet 1810 is coupled to the premise security web portal system 1805, the premise security management device 1820, and the secure gatekeeper 1825.
  • the Internet 1810 can correspond to the second network 515, shown in FIG. 5.
  • the set of cellular networks 1815 is coupled to the Internet 1810, the premise security management device 1820, and to the secure gatekeeper 1825.
  • the set of cellular networks 1815 may correspond to the second network 515, shown in FIG. 5.
  • the premise security management device 1820 is coupled to the set of cellular networks 1815.
  • the coupling of the premise security management device 1820 to the set of cellular networks 1815 is accomplished through mobile application data (e.g., representational state transfer) and/or through a cellular voice link.
  • the coupling of the premise security management device 1820 to the set of cellular networks 1815 may also be accomplished through a web application, such as a secure web application using secure hypertext transfer protocols (HTTPS) and/or other protocols.
  • HTTPS secure hypertext transfer protocols
  • the coupling of the premise security management device 1820 to the set of cellular networks 1815 may also be accomplished through native mobile applications.
  • the premise security management device 1820 corresponds to one or more of the premise security management device(s) 525, shown in FIG. 5.
  • the secure gatekeeper 1825 is coupled to the set of cellular networks 1815.
  • the secure gatekeeper 1825 includes a bell unit, a "MyButler” control unit, a camera unit, and a passive infrared (PIR) unit.
  • the bell unit may correspond to an external portion of the secure gatekeeper 1825, while the control unit may correspond to an internal portion of the secure gatekeeper 1825.
  • the coupling of the secure gatekeeper 1825 to the set of cellular networks 1815 is accomplished through representational state transfer calls using connections, such as HTTPS and/or other protocols.
  • the secure gatekeeper 1825 provides and/or receives configuration data, images, video, and/or sound to the premise security web portal system 1805.
  • the secure gatekeeper 1825 may correspond to one or more of the secure gatekeeper(s) 505, shown in FIG. 5.
  • FIG. 18B depicts an example of an architecture 1800B used to implement the premise security web portal system 1805, shown in FIG. 18A.
  • the architecture 1800B may include a representational state transfer (REST) module, a web user interface (UI) module, a service layer, a service implementation, a business logic layer, business entities, a data access layer, and a data storage datastore.
  • REST representational state transfer
  • UI web user interface
  • FIG. 19 depicts an example of a screen 1900 of a premise security web portal system.
  • the screen 1900 may be displayed as a web page on the premise security management device(s) 525 based on content provided by the premise security web portal system 520, both shown in FIG. 5.
  • the screen 1900 may display a web page to control the secure gatekeeper (s) 505, shown in FIG. 5.
  • the screen 1900 includes buttons 1905 and a device list 1910.
  • the buttons 1905 include a recent events button 1905a, an events archive button 1905b, a live view button 1905c, a system settings button 1905d, a system information button 1905e, a device listing button 1905f, an account button 1905g, a log out button 1905h, and a help button 1905L
  • the recent events button 1905a links the user to a list of recent events associated with the secure gatekeeper(s) 505.
  • the recent events button 1905a provides a list of recent events obtained using the event information gathering engine 810, shown in FIG. 8.
  • the events archive button 1905b links the user to a list of archived events.
  • the events archive button 1905b provides a list of archived events obtained using the event information gathering engine 810, shown in FIG. 8.
  • the live view button 1905c links the user to a live view of the premises.
  • the live view button 1905c provides video, picture and/or sound from the live view information gathering engine 815, shown in FIG. 8.
  • the video, picture and/or sound provided live view button 1905 c may be based on the camera lens (9) and/or the microphone (49), shown in FIG. 1.
  • the system settings button 1905d links the user to system settings related to the premise security web portal system 520, shown in FIG. 5.
  • the settings provided by the system settings button 1905d may be based on the system setting engine 1315, shown in FIG. 13.
  • the system information button 1905e links the user to system information related to the premise security web portal system 520, shown in FIG. 5.
  • system information provided by the system information button 1905e may be based on information from the system information engine 1310.
  • the device listing button 1905f lists devices being monitored by the premise security web portal system 520. More specifically, in various implementations, the device listing button 1905f may list one or more of the secure gatekeeper(s) 505, shown in FIG. 5. In the example of FIG. 19, the device listing button 1905f has been selected, and various secure gatekeeper(s) 505, as well as other devices, as discussed herein, are listed.
  • the account button 1905g links the user to the user's account information.
  • the account button 1905g may provide information using the user account engine 830, shown in FIG. 8.
  • the screen 1900 includes a device listing 1910.
  • the device listing 1910 is provided once the user has selected the device listing button 1905f.
  • the log out button 1905h allows the user to log out of the premise security web portal system 520.
  • the help button 1905i links the user to help topics related to the premise security web portal system 520.
  • the device listing 1910 includes a secure gatekeeper listing 1915, a living room lamp control 1920, a bedroom lamp control 1925, a media center control 1930, a computer study control 1935, a heating control 1940, and a front light control 1945.
  • the user may be linked to the device listing 1910 after selecting the device listing button 1905f.
  • the secure gatekeeper listing 1915 provides a listing of the secure gatekeeper(s) 505, shown in FIG. 5.
  • the secure gatekeeper 1915 can provide the user with the ability to manage existing secure gatekeeper(s) and/or add new secure gatekeeper(s).
  • the living room lamp control 1920 provides control of a living room lamp.
  • the living room lamp being controlled by the living room lamp control 1920 may include one or more of the premise appliance(s) 530, shown in FIG. 5.
  • the bedroom lamp control 1925 provides control of a bedroom lamp.
  • the bedroom room lamp being controlled by the bedroom lamp control 1925 may include one or more of the premise appliance(s) 530, shown in FIG. 5.
  • the media center control 1930 provides control of a media center.
  • the media center may comprise one or more of the premise appliance(s) 530, shown in FIG. 5.
  • the computer study control 1935 controls a computer study.
  • the computer study may comprise one or more of the premise appliance(s) 530, shown in FIG. 5.
  • the heating control 1940 controls a heating system of the premises.
  • the heating system may comprise one or more of the premise appliance(s) 530, shown in FIG. 5.
  • the front light control 1945 controls a front light of the premises.
  • the front lights may comprise one more of the premise appliance(s), shown in FIG. 5.
  • FIG. 20 shows an example of a computer system 2000 on which techniques described in this paper can be implemented.
  • the computer system 2000 can be a conventional computer system that can be used as a client computer system, such as a wireless client or a workstation, or a server computer system.
  • the computer system 2000 includes a computer 2005, I/O devices 2010, and a display device 2015.
  • the computer 2005 includes a processor 2020, a communications interface 2025, memory 2030, a display controller 2035, non-volatile storage 2040, I/O controller 2045, and a bus 2050.
  • the computer 2005 may be coupled to or include the I/O devices 2010 and display device 2015.
  • the computer 2005 interfaces to external systems through the communications interface 2025, which may include a modem or network interface. It will be appreciated that the communications interface 2025 can be considered to be part of the computer system 2000 or a part of the computer 2005.
  • the communications interface 2025 can be an analog modem, ISDN modem, cable modem, token ring interface, satellite transmission interface (e.g. "direct PC"), or other interfaces for coupling a computer system to other computer systems.
  • the processor 2020 may be, for example, a conventional microprocessor such as an Intel Pentium microprocessor or Motorola power PC microprocessor.
  • the memory 2030 is coupled to the processor 2020 by a bus 2050.
  • the memory 2030 can be Dynamic Random Access Memory (DRAM) and can also include Static RAM (SRAM).
  • the bus 2050 couples the processor 2020 to the memory 2030, also to the non-volatile storage 2040, to the display controller 2035, and to the I/O controller 2045.
  • the I/O devices 2010 can include a keyboard, disk drives, printers, a scanner, and other input and output devices, including a mouse or other pointing device.
  • the display controller 2035 may control in the conventional manner a display on the display device 2015, which can be, for example, a cathode ray tube (CRT) or liquid crystal display (LCD).
  • the display controller 2035 and the I/O controller 2045 can be implemented with conventional well-known technology.
  • the non-volatile storage 2040 is often a magnetic hard disk, an optical disk, or another form of storage for large amounts of data. Some of this data is often written, by a direct memory access process, into memory 2030 during execution of software in the computer 2005.
  • machine-readable medium or “computer-readable medium” includes any type of storage device that is accessible by the processor 2020 and also encompasses a carrier wave that encodes a data signal.
  • the computer system 2000 is one example of many possible computer systems that have different architectures.
  • personal computers based on an Intel microprocessor often have multiple buses, one of which can be an I/O bus for the peripherals and one that directly connects the processor 2020 and the memory 2030 (often referred to as a memory bus).
  • the buses are connected together through bridge components that perform any necessary translation due to differing bus protocols.
  • Network computers are another type of computer system that can be used in conjunction with the teachings provided herein.
  • Network computers do not usually include a hard disk or other mass storage, and the executable programs are loaded from a network connection into the memory 2030 for execution by the processor 2020.
  • a Web TV system which is known in the art, is also considered to be a computer system, but it may lack some of the features shown in FIG. 20, such as certain input or output devices.
  • a typical computer system will usually include at least a processor, memory, and a bus coupling the memory to the processor.
  • FIG. 20 shows an example of the computer system 2000
  • a computer system will include a processor, memory, non-volatile storage, and an interface.
  • a typical computer system will usually include at least a processor, memory, and a device (e.g., a bus) coupling the memory to the processor.
  • the processor can be, for example, a general- purpose central processing unit (CPU), such as a microprocessor, or a special-purpose processor, such as a microcontroller.
  • CPU general- purpose central processing unit
  • microprocessor such as a microprocessor
  • a special-purpose processor such as a microcontroller.
  • FIG. 20 An example of a computer system is shown in FIG. 20.
  • the memory can include, by way of example but not limitation, random access memory (RAM), such as dynamic RAM (DRAM) and static RAM (SRAM).
  • RAM random access memory
  • DRAM dynamic RAM
  • SRAM static RAM
  • the memory can be local, remote, or distributed.
  • computer-readable storage medium is intended to include only physical media, such as memory.
  • a computer-readable medium is intended to include all mediums that are statutory (e.g., in the United States, under 35 U.S.C. 101), and to specifically exclude all mediums that are nonstatutory in nature to the extent that the exclusion is necessary for a claim that includes the computer-readable medium to be valid.
  • Known statutory computer-readable mediums include hardware (e.g., registers, random access memory (RAM), non-volatile (NV) storage, to name a few), but may or may not be limited to hardware.
  • the bus can also couple the processor to the non-volatile storage.
  • the non-volatile storage is often a magnetic floppy or hard disk, a magnetic-optical disk, an optical disk, a readonly memory (ROM), such as a CD-ROM, EPROM, or EEPROM, a magnetic or optical card, or another form of storage for large amounts of data. Some of this data is often written, by a direct memory access process, into memory during execution of software on the computer system.
  • the non-volatile storage can be local, remote, or distributed. The non-volatile storage is optional because systems can be created with all applicable data available in memory.
  • a software program is assumed to be stored at an applicable known or convenient location (from non-volatile storage to hardware registers) when the software program is referred to as “implemented in a computer-readable storage medium.”
  • a processor is considered to be “configured to execute a program” when at least one value associated with the program is stored in a register readable by the processor.
  • a computer system can be controlled by operating system software, which is a software program that includes a file management system, such as a disk operating system.
  • operating system software is a software program that includes a file management system, such as a disk operating system.
  • file management system is typically stored in the non-volatile storage and causes the processor to execute the various acts required by the operating system to input and output data and to store data in the memory, including storing files on the non-volatile storage.
  • the bus can also couple the processor to the interface.
  • the interface can include one or more input and/or output (I/O) devices.
  • the I/O devices can include, by way of example but not limitation, a keyboard, a mouse or other pointing device, disk drives, printers, a scanner, and other I/O devices, including a display device.
  • the display device can include, by way of example but not limitation, a cathode ray tube (CRT), liquid crystal display (LCD), or some other applicable known or convenient display device.
  • the interface can include one or more of a modem or network interface. It will be appreciated that a modem or network interface can be considered to be part of the computer system.
  • the interface can include an analog modem, isdn modem, cable modem, token ring interface, satellite transmission interface (e.g. "direct PC"), or other interfaces for coupling a computer system to other computer systems. Interfaces enable computer systems and other devices to be coupled together in a network.
  • a cloud-based computing system is a system that provides computing resources, software, and/or information to client devices by maintaining centralized services and resources that the client devices can access over a communication interface, such as a network.
  • the cloud-based computing system can involve a subscription for services or use a utility pricing model. Users can access the protocols of the cloud-based computing system through a web browser or other container application located on their client device.
  • This paper describes techniques that those of skill in the art can implement in numerous ways. For instance, those of skill in the art can implement the techniques described in this paper using a process, an apparatus, a system, a composition of matter, a computer program product embodied on a computer-readable storage medium, and/or a processor, such as a processor configured to execute instructions stored on and/or provided by a memory coupled to the processor.
  • a component such as a processor or a memory described as being configured to perform a task may be implemented as a general component that is configured to perform the task at a given time or a specific component that is manufactured to perform the task.
  • the term 'processor' refers to one or more devices, circuits, and/or processing cores configured to process data, such as computer program instructions.
  • the apparatus can be specially constructed for the required purposes, or it can comprise a general-purpose computer selectively activated or reconfigured by a computer program stored in the computer.
  • a computer program may be stored in a computer-readable storage medium, such as, but is not limited to, read-only memories (ROMs), random access memories (RAMs), EPROMs, EEPROMs, magnetic or optical cards, any type of disk including floppy disks, optical disks, CD-ROMs, and magnetic-optical disks, or any type of media suitable for storing electronic instructions, and each coupled to a computer system bus.
  • implementations allow editors to create professional productions using themes and based on a wide variety of amateur and professional content gathered from numerous sources.

Landscapes

  • Engineering & Computer Science (AREA)
  • Multimedia (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Signal Processing (AREA)
  • Alarm Systems (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

Selon l'invention, des données de locaux d'un évènement de sécurité peuvent être reçues sur un premier réseau. Les données de locaux peuvent être capturées par un portier sécurisé conçu pour surveiller des locaux. Des éléments multimédias peuvent être reçus sur le premier réseau pour un affichage sur le portier sécurisé. Les éléments multimédias peuvent être fournis au portier sécurisé. Le portier sécurisé peut recevoir l'instruction, sur le premier réseau, d'afficher les éléments multimédias.
EP14737555.4A 2013-01-11 2014-01-13 Portail web pour la gestion de la sécurité de locaux Withdrawn EP2943873A4 (fr)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US201361751546P 2013-01-11 2013-01-11
PCT/US2014/011342 WO2014110527A1 (fr) 2013-01-11 2014-01-13 Portail web pour la gestion de la sécurité de locaux

Publications (2)

Publication Number Publication Date
EP2943873A1 true EP2943873A1 (fr) 2015-11-18
EP2943873A4 EP2943873A4 (fr) 2016-01-06

Family

ID=51167429

Family Applications (1)

Application Number Title Priority Date Filing Date
EP14737555.4A Withdrawn EP2943873A4 (fr) 2013-01-11 2014-01-13 Portail web pour la gestion de la sécurité de locaux

Country Status (6)

Country Link
EP (1) EP2943873A4 (fr)
CN (1) CN105264483A (fr)
AU (1) AU2014205109A1 (fr)
GB (1) GB2526712A (fr)
SG (1) SG11201505423WA (fr)
WO (1) WO2014110527A1 (fr)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
ES1141495Y (es) * 2015-06-24 2015-10-07 Fermax Design & Dev S L U Sistema de video portero multicanal con acceso a servicios digitales avanzados
CN108600585A (zh) * 2018-04-09 2018-09-28 安徽龙运智能科技有限公司 一种方便快捷的移动智能门铃
EP3836103A1 (fr) * 2019-12-11 2021-06-16 Carrier Corporation Procédé et système pour préserver des événements d'intrusion capturés par des caméras

Family Cites Families (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
AUPP776498A0 (en) * 1998-12-17 1999-01-21 Portus Pty Ltd Local and remote monitoring using a standard web browser
US7406603B1 (en) * 1999-08-31 2008-07-29 Intertrust Technologies Corp. Data protection systems and methods
US6778084B2 (en) * 2002-01-09 2004-08-17 Chang Industry, Inc. Interactive wireless surveillance and security system and associated method
US20040086093A1 (en) * 2002-10-29 2004-05-06 Schranz Paul Steven VoIP security monitoring & alarm system
US7158026B2 (en) * 2004-02-06 2007-01-02 @Security Broadband Corp. Security system configured to provide video and/or audio information to public or private safety personnel at a call center or other fixed or mobile emergency assistance unit
GB2435979A (en) * 2006-03-07 2007-09-12 Helen Theresa Haywood Door intercom telephone device
US20080036862A1 (en) * 2006-08-11 2008-02-14 Steve Lang Digital video surveillance system
US8732854B2 (en) * 2006-11-01 2014-05-20 Time Warner Cable Enterprises Llc Methods and apparatus for premises content distribution
CA2691774C (fr) * 2009-02-02 2014-11-18 Alarmforce Industries Inc. Systeme de securite avec dispositif de communication bidirectionnel et video
TW201143379A (en) * 2010-05-19 2011-12-01 Hon Hai Prec Ind Co Ltd Application server and method for controlling a video camera

Also Published As

Publication number Publication date
SG11201505423WA (en) 2015-08-28
EP2943873A4 (fr) 2016-01-06
WO2014110527A1 (fr) 2014-07-17
GB201512896D0 (en) 2015-09-02
CN105264483A (zh) 2016-01-20
GB2526712A (en) 2015-12-02
AU2014205109A1 (en) 2015-07-30

Similar Documents

Publication Publication Date Title
US20140125754A1 (en) Web portal for managing premise security
US9685071B1 (en) eReceptionist and eNeighborhood watch system for crime prevention and/or verification
US11085226B2 (en) Operating a door of a smart-home through various stages of user detection
US11132877B2 (en) Doorbell communities
US9230424B1 (en) Doorbell communities
CA2902332C (fr) Procedes d'utilisation d'un dispositif d'acquisition d'image integre a l'entree d'un batiment comportant un panneau de commande d'automatisation, et systemes et dispositifs associes
US8653969B2 (en) Home security system
US9728077B1 (en) eReceptionist and eNeighborhood watch system for crime prevention and/or verification
US10986717B1 (en) Reduced false alarms for outdoor IP security cameras
US9113051B1 (en) Power outlet cameras
EP3025314B1 (fr) Systèmes et procédés de communication de sonnette de porte
US20210264749A1 (en) Doorbell communities
CN104809838B (zh) 一种远程电子猫眼实时防盗监控系统
KR20150052974A (ko) 도어록 일체형 스마트 도어 및 그 제어방법
US11651665B2 (en) Doorbell communities
WO2014110527A1 (fr) Portail web pour la gestion de la sécurité de locaux
US10777055B1 (en) Displaying event video on a device
US11523485B1 (en) Reduced false alarms for outdoor IP security cameras
JP2022028739A (ja) 開閉装置、セキュリティサーバおよびセキュリティシステム
US20240177579A1 (en) Doorbell communities
WO2022113322A1 (fr) Système et dispositif de sécurité
WO2021187538A1 (fr) Système de secours
CN103914897A (zh) 一种基于云计算的安防系统

Legal Events

Date Code Title Description
PUAI Public reference made under article 153(3) epc to a published international application that has entered the european phase

Free format text: ORIGINAL CODE: 0009012

17P Request for examination filed

Effective date: 20150803

AK Designated contracting states

Kind code of ref document: A1

Designated state(s): AL AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO RS SE SI SK SM TR

AX Request for extension of the european patent

Extension state: BA ME

A4 Supplementary search report drawn up and despatched

Effective date: 20151204

RIC1 Information provided on ipc code assigned before grant

Ipc: G06F 3/14 20060101AFI20151130BHEP

Ipc: H04N 7/18 20060101ALI20151130BHEP

Ipc: G08B 13/196 20060101ALI20151130BHEP

DAX Request for extension of the european patent (deleted)
STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: THE APPLICATION IS DEEMED TO BE WITHDRAWN

18D Application deemed to be withdrawn

Effective date: 20170801