EP4154226A1 - Installations et procédés de sécurité - Google Patents

Installations et procédés de sécurité

Info

Publication number
EP4154226A1
EP4154226A1 EP22729585.4A EP22729585A EP4154226A1 EP 4154226 A1 EP4154226 A1 EP 4154226A1 EP 22729585 A EP22729585 A EP 22729585A EP 4154226 A1 EP4154226 A1 EP 4154226A1
Authority
EP
European Patent Office
Prior art keywords
visitor
security
premises
security code
interior space
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
EP22729585.4A
Other languages
German (de)
English (en)
Inventor
Pablo TORRES MONTERO
Juan Jose CARRACOSA PULIDO
Maider Patricia AGUINAGA ACHUCARRO
Encarnacion SERRANO CASTILLO
Alvaro URIEN AYALA
Rafael José SCHWARTZ SOLÉ
Russell Gwynfryn MORGAN
Johan Zander
Christoffer LARSSON
Joakim Pettersson
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Verisure SARL
Original Assignee
Verisure SARL
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Verisure SARL filed Critical Verisure SARL
Publication of EP4154226A1 publication Critical patent/EP4154226A1/fr
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00571Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by interacting with a central unit
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00896Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys specially adapted for particular uses
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/20Individual registration on entry or exit involving the use of a pass
    • G07C9/27Individual registration on entry or exit involving the use of a pass with central registration
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/30Individual registration on entry or exit not involving the use of a pass
    • G07C9/38Individual registration on entry or exit not involving the use of a pass with central registration
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms
    • G08B13/18Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength
    • G08B13/189Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems
    • G08B13/194Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems
    • G08B13/196Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
    • G08B13/19617Surveillance camera constructional details
    • G08B13/19619Details of casing
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C2209/00Indexing scheme relating to groups G07C9/00 - G07C9/38
    • G07C2209/08With time considerations, e.g. temporary activation, valid time window or time limitations
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C2209/00Indexing scheme relating to groups G07C9/00 - G07C9/38
    • G07C2209/60Indexing scheme relating to groups G07C9/00174 - G07C9/00944
    • G07C2209/62Comprising means for indicating the status of the lock
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B25/00Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems
    • G08B25/008Alarm setting and unsetting, i.e. arming or disarming of the security system

Definitions

  • the present invention relates to security installations to secure at least part of a perimeter of premises and to monitor premises, the security installation including an electrically controlled lock on an exterior closure, e.g. door, of the premises, and to methods performed by the system and by controllers of the system.
  • Security installations that are or include security monitoring systems for monitoring premises, often referred to as alarm systems, typically provide a means for detecting the presence and/or actions of people at the premises, and reacting to detected events.
  • alarm systems typically provide a means for detecting the presence and/or actions of people at the premises, and reacting to detected events.
  • Such systems include sensors to detect the opening and closing of doors and windows to provide a secure perimeter to the premises, creating one or more protected interior spaces, movement detectors to monitor spaces (both within and outside buildings) for signs of movement, microphones to detect sounds such as breaking glass, and image sensors to capture still or moving images of monitored zones.
  • Such systems may be self-contained, with alarm indicators such as sirens and flashing lights that may be activated in the event of an alarm condition being detected.
  • Such installations typically include a control unit (which may also be termed a central unit), generally mains powered, that is coupled to the sensors, detectors, cameras, etc. (“nodes”), and which processes received notifications and determines a response.
  • the central unit may be linked to the various nodes by wires, but increasingly is instead linked wirelessly, rather than by wires, since this facilitates installation and may also provide some safeguards against sensors/detectors effectively being disabled by disconnecting them from the central unit.
  • the nodes of such systems typically include an autonomous power source, such as a battery power supply, rather than being mains powered.
  • a security monitoring system may include an installation at a premises, domestic or commercial, that is linked to a Central Monitoring Station (CMS) where, typically, human operators manage the responses required by different alarm and notification types.
  • CMS Central Monitoring Station
  • the central unit at the premises installation typically processes notifications received from the nodes in the installation, and notifies the Central Monitoring Station of only some of these, depending upon the settings of the system and the nature of the detected events.
  • the central unit at the installation is effectively acting as a gateway between the nodes and the Central Monitoring Station.
  • the central unit may be linked by wires, or wirelessly, to the various nodes of the installation, and these nodes will typically be battery rather than mains powered.
  • Such security monitoring systems contribute to the safety and wellbeing of occupants of the protected premises, as well as safeguarding articles within the protected perimeter - which may of course not simply be limited to a house or dwelling, but may also extend to the grounds of the house, protected by a boundary fence and gate, for example.
  • Embodiments of the present invention seek to provide enhanced security monitoring systems, and corresponding apps, methods and other implementations that improve the scope of security monitoring systems to address aspects of the problem of parcel theft, as well as providing new functionality and methods.
  • a security monitoring system to secure at least part of a perimeter of premises, the premises including: an exterior closure in the secure perimeter giving access to a protected interior space at or of the premises; an electrically controlled lock for the exterior closure; an actuator for a visitor to indicate their presence at the closure or more generally at the premises; and a controller, the controller being configured to: receive details of a scheduled event that will involve granting a visitor access to the protected interior space by opening the exterior closure, the details including a scheduled time window and a security code specific to the scheduled event; and upon receiving, within the scheduled time window, an indication from the actuator that a visitor is present at the closure, to: prompt the visitor to confirm that they are present for the purpose of the event, and upon receiving such confirmation from the visitor, prompt the visitor to input a security code; receive from the visitor a security code, and if the received security code matches the security code specific to the scheduled event, to cause the unlocking of the electrically controlled lock to give the visitor access to (optionally to admit to) the protected interior space
  • the controller may be a controller of a video entry arrangement.
  • the video entry arrangement may be configured prompt the visitor using audio prompts.
  • the video entry arrangement may be configured to prompt the visitor using voiced prompts using pre-stored messages.
  • the controller of the video entry arrangement may be arranged to cause the unlocking of the electrically controlled lock by signalling to a processor of a security monitoring system that forms part of the security installation.
  • the processor of the security monitoring system may be configured to supply the details of the scheduled event to the controller of the video entry arrangement.
  • the video entry arrangement may be a video doorbell.
  • the controller may be a processor of a security monitoring system that forms part of the security installation, the processor being configured to supply a remote monitoring centre with the received details of the scheduled event, and optionally also the received security code.
  • the processor may also be configured to only unlock the electrically controlled lock to give the visitor access to the protected interior space at the premises (or more commonly only to part of the protected space - the rest remaining off-limits and monitored by the security monitoring system) for the scheduled event if confirmation is received from the remote monitoring centre that the received security code matches the security code specific to the scheduled event.
  • the security monitoring system may further comprise an audio interface to enable audio communication with a visitor at the closure, wherein the processor is configured to enable the remote monitoring centre to use the audio interface to speak to the visitor.
  • the security monitoring system may further comprise a first video camera arranged to observe a space in front of the exterior of the closure, the processor being configured to enable the remote monitoring centre to use the first video camera to observe the visitor.
  • the first video camera is a video doorbell.
  • the video doorbell includes the audio interface.
  • the security monitoring system may further comprise a second video camera arranged to observe the protected interior space behind the closure, the processor being configured to enable the remote monitoring centre to use the second video camera to observe the visitor within the protected interior space.
  • the processor may be configured to unlock the electrically controlled lock to give the visitor access to the protected interior space of the premises for the scheduled event only if the security code is received from the visitor while the security monitoring system is in an armed state.
  • the controller may be configured, in the event that the security code received from the visitor matches the security code previously received by the controller, not to react to any signals or notifications received from a status sensor associated with the closure for a predetermined period, while maintaining the security monitoring system in an armed state. In this way, the security monitoring system can continue to monitor the rest of the perimeter.
  • a dedicated delivery zone is defined, all the sensors for which are effectively “disarmed” temporarily during the drop-off while the rest of the premises is still fully protected.
  • the controller is further configured not to react to any signals or notifications received from a status sensor associated with the area of the protected interior space to which the visitor is admitted for a predetermined period, while maintaining the security monitoring system in an armed state - so that, for example, other areas of the protected interior space can continue to be monitored for unauthorised entry - and an alarm raised, and or the central monitoring station involved, according to the settings of the system.
  • the predetermined period may be until the visitor has been observed to vacate the interior space.
  • An operator in the central monitoring station may continue to observe the visitor as long as he or she is on the premises, using for example an interior camera (s) that observes all of the interior space to which the visitor is admitted.
  • a method performed by a controller of a security installation configured to secure at least part of a perimeter of premises, the premises including: an exterior closure in the secure perimeter giving access to a protected interior space of the premises; an electrically controlled lock for the exterior closure; an actuator for a visitor to indicate their presence at the perimeter; and a controller, the method comprising: receiving at the controller details of a scheduled event that will involve granting a visitor access to the protected interior space by opening the exterior closure, the details including a scheduled time window and a security code specific to the scheduled event; receiving at the controller, within the scheduled time window, an indication from the actuator that a visitor is present at the premises: prompting the visitor to confirm that they are present for the purpose of the event, and upon receiving such confirmation from the visitor, prompting the visitor to input a security code; receiving from the visitor a security code, and if the received security code matches the security code specific to the scheduled event, unlocking the electrically controlled lock to give the visitor access to the protected interior space of the premises for the scheduled event
  • the method may further comprise providing the prompts the visitor using audio prompts.
  • the voiced prompts may be generated using pre-stored messages.
  • the method may further comprise causing unlocking of the electrically controlled lock by signalling from the controller to a processor of a security monitoring system that forms part of the security installation.
  • the method may further comprise supplying the details of the scheduled event to the controller of the video entry arrangement from the processor of the security monitoring system.
  • the method according to the second aspect may further comprise, when the controller is a processor of a security monitoring system that forms part of the security installation, supplying the received details of the scheduled event, and the received security code, to a remote monitoring centre; unlocking the electrically controlled lock to give the visitor access to (optionally to admit the visitor to)) the protected interior space at the premises for the scheduled event only upon receiving confirmation from the remote monitoring centre that the received security code matches the security code specific to the scheduled event.
  • the method may further comprise using the processor to enable audio communication between the remote monitoring centre and the visitor at the premises.
  • the method may further comprise enabling the remote monitoring centre to use a first video camera to observe the visitor in front of the exterior of the closure.
  • the first video camera is a video doorbell.
  • the video doorbell includes the audio interface.
  • the method may further comprise enabling the remote monitoring centre to use a second video camera to observe the visitor within the protected interior space behind the closure.
  • the method may further comprise only unlocking the electrically controlled lock to give the visitor access to the protected interior space at (e.g. of) the premises for the scheduled event in the event that the security code is received from the visitor while the security monitoring system is in an armed state.
  • the method further comprises, in the event that the security code received from the visitor matches the security code previously received by the controller, ignoring any signals or notifications received from a status sensor associated with the closure for a predetermined period, while maintaining the security monitoring system in an armed state.
  • the predetermined period is until the visitor has been observed to vacate the interior space.
  • a method of enabling an event involving granting a visitor access to an interior space of premises, the interior space protected by a perimeter secured by a security installation, the perimeter including a closure provided with an electrically controlled lock comprising: sharing with the visitor an access code, and a scheduled time window, specific to the event; providing the access code, and the scheduled time window, to a controller (optionally a controller of the security monitoring system or of a video entry arrangement of the installation), and storing the provided access code; subsequently, within the time window and while the security installation is in an armed condition, determining the presence of a visitor at the premises; prompting the visitor at the premises to supply an access code; and in the event that the supplied access code matches the stored access code, unlocking the electrically controlled lock to give the visitor access to the interior space without raising an alarm.
  • an app for a security monitoring system to generate a one-time code (OTC) which can be used subsequently to disarm the security monitoring system
  • the app sending the OTC to a controller of the security monitoring system, the controller forwarding the OTC to a central monitoring station (CMS) that monitors the security monitoring system (or the app may send the OTC to the CMS directly rather than through the controller) , with the CMS subsequently making a decision to disarm the security monitoring system upon being presented with a code that has been presented at an interface associated with the security monitoring system, the interface preferably being at the premises protected by the security monitoring system.
  • CMS central monitoring station
  • an app for a security monitoring system to generate a one-time code (OTC) which can be used subsequently to disarm the security monitoring system, the app sending the OTC to a controller of the security monitoring system, the controller forwarding the OTC to a video entry arrangement at premises protected by the security monitoring system, with a processor of the video entry arrangement subsequently making a decision to cause the unlocking of a lock of a closure in a perimeter of the premises upon being presented with a code that has been presented at an interface associated with the security monitoring system, the interface preferably being at the premises protected by the security monitoring system.
  • OTC one-time code
  • an app for a premises security monitoring system being configured to: generate securely a one-time-passcode which can be used to disarm the premises security monitoring system; and share the one-time-passcode with a controller of the security monitoring system.
  • a method of controlling a security monitoring system comprising: generating a one-time-passcode in an app for the security monitoring system; and communicating the a one-time-passcode to a controller of the security monitoring system for subsequent use in disarming the security monitoring system.
  • a method of controlling a security monitoring system comprising: receiving at a controller of the security monitoring system a one-time-passcode generated by an app for the security monitoring system run on a device other than the controller; and subsequently, while the security monitoring system is in an armed state, disarming the security monitoring system in response to receiving the one-time-passcode via a user interface.
  • the method of the seventh aspect may further comprise receiving at the controller a time window of validity for the one-time passcode, and disarming the security monitoring system only in response to receiving the one-time-passcode via a user interface within the time window of validity.
  • the user interface is an audio interface, or a keypad, optionally located at the premises protected by the security monitoring system.
  • a method of enabling an event involving granting a visitor access to an interior space of premises, the interior space protected by a perimeter secured by a security monitoring system, the perimeter including a closure provided with an electrically controlled lock comprising: sharing with the visitor an access code, and a scheduled time, specific to the event; providing the access code, and the scheduled time, to a controller of the security monitoring system, and storing the provided access code; subsequently, while the security monitoring system is in an armed condition, determining the presence of a visitor at the premises; prompting the visitor at the premises to supply an access code; and in the event that the supplied access code matches the stored access code, unlocking the electrically controlled lock to give the visitor access to the interior space without raising an alarm.
  • the method of the eighth aspect may further comprise disarming the security monitoring system in the event that the supplied access code matches the stored access code.
  • the method of the eighth aspect may further comprise, in the event that the supplied access code matches the stored access code, configuring a controller of the security monitoring system not to react to any signals or notifications received from a status sensor associated with the closure for a predetermined period, while maintaining the security monitoring system in an armed state.
  • the predetermined period is until the visitor has been observed to vacate the interior space.
  • a method of granting a visitor access to an interior space within a secure perimeter of premises the premises protected by a security monitoring system, the premises including: an exterior closure in the secure perimeter giving access to the protected interior space of the premises; an electrically controlled lock for the exterior closure; an actuator for a visitor to indicate their presence at the closure; and a controller; the method comprising receiving at the controller details of a scheduled event that will involve granting a visitor access to the protected interior space by opening the exterior closure, the details including a scheduled time window and a security code specific to the scheduled event; and upon receiving, within the scheduled time window, an indication from the actuator that a visitor is present at the closure: prompting the visitor to confirm that they are present for the purpose of the event, and upon receiving such confirmation from the visitor, prompting the visitor to input a security code; receiving from the visitor a security code, and if the received security code matches the security code specific to the scheduled event, causing the unlocking of the electrically controlled lock to give the visitor access to the protected interior space
  • the closure e.g. door
  • an automatic closing mechanism such as a door spring, to ensure that when a delivery person leaves the premises, after completing a delivery, the door (or gate or whatever) closes correctly, so that the electrically controlled lock is once again effective to protect against unlawful entry.
  • Figure 1 is a schematic drawing showing a front elevation of stylised building with an external space which is monitored by a security monitoring system according to an embodiment of the invention
  • Figure 2 is a schematic part plan view of premises protected by a security monitoring system, together with other elements of the system;
  • Figure 3a shows a timing diagram of a first part of a method according to an aspect of the invention
  • Figure 3b shows a timing diagram of a second part of a method according to an aspect of the invention
  • Figure 4 shows a timing diagram of a method according to an aspect of the invention
  • Figure 5 shows schematically an architecture including a security monitoring system, a video entry arrangement, and an electrically controlled lock
  • Figure 6 is a schematic block diagram of a video entry arrangement
  • Figure 7 is a timing diagram of a method according to another aspect of the invention.
  • FIG. 1 shows a view of the front of a premises 100 protected by a security monitoring system according to an aspect of the present invention.
  • the premises here in the form of a house, have an exterior door, here front door, 102.
  • the door gives access to a protected interior space.
  • the security monitoring system secure at least part of a perimeter to the premises (100), and the door constitutes an exterior closure 102 in the secure perimeter giving access to a protected interior space 200 of the premises.
  • a lock 104 on the exterior door is electrically controlled so that it can be locked and unlocked remotely.
  • a first video camera in the form of a video doorbell 106 which looks out from the fa9ade of the premises so that anyone approaching the door along the path 108 can be seen, and in particular when they stand at the door their face should clearly be visible.
  • the video doorbell includes an actuator, e.g. a push button, for a visitor to indicate their presence at the closure.
  • the video doorbell also includes an audio interface to enable bidirectional audio communication with a visitor at the closure 102.
  • the video doorbell includes an infrared light source to illuminate whatever is in front of the video doorbell.
  • the fa9ade of the house also carries an external keypad 110 with which a user can disarm the security monitoring system, and unlock the lock 104.
  • an optional second video camera 112 which is coupled to a movement detector, such as a PIR sensor 114, which, when the security monitoring system is armed, may be arranged to capture video of the front of the house and the private area, e.g. the garden, in front of the house.
  • the second video camera is preferably provided with an audio interface 116 to enable bidirectional audio communication with anyone observed by the second video camera.
  • the house may be surrounded by a perimeter fence, the fence including a security gate.
  • the security monitoring system may also be used to secure that perimeter, the gate forming an exterior closure in the secure perimeter giving access to a protected interior space of the premises, and a further video doorbell and another external keypad may be provided and with which a user can disarm the security monitoring system, and unlock a lock securing the gate, and thereby gain admittance to the protected grounds of the house.
  • FIG. 2 is a schematic part plan view of a premises 100 protected by security monitoring system according to an aspect of the invention, together with other elements of the system, corresponding generally to the premises of figure 1.
  • the front door 102 with electrically controlled lock 104, leads into the protected interior space 200 of the premises.
  • Each of the windows 202, and the rear door 204 is fitted with a sensor 206 to detect when they are opened.
  • Each of the sensors 206 includes a radio transceiver to report events to a controller , or central unit, 208 of the security monitoring system. If one of the sensors 206 is triggered when the system is armed, a signal is sent to the central unit 208 which in turn may signal an alarm event to a central monitoring station 210.
  • the central unit 208 is connected to the central monitoring station 210 via the Internet 212, either via a wired or a wireless connection. Also wirelessly coupled to the central unit 208 are the video doorbell 106, the electrically controlled lock 104, and if present the second video camera 112 its associated movement sensor 114 (although the latter may be integral with the second video camera 112) and the audio interface 116. These items, and the sensors 206, are preferably coupled to the central unit 208 using transceivers operating in the industrial scientific and medical (ISM) bandwidths, for example a sub- gigahertz bandwidth such as 868 MHz, and the communications are encrypted preferably using shared secret keys.
  • ISM industrial scientific and medical
  • the security monitoring system may also include other sensors within the protected interior space, such as an interior video camera 214 and associated movement detector 216 (which again may be integral with the camera 214), and each of the interior doors 218 may also be provided with a sensor 206 to detect the opening/closing of the door. Also shown in figure 2 are a user device 220, preferably loaded with an appropriate app - as will be described later, and a public land mobile network (PLMN) by means of which the central monitoring station 210, and the central unit 208, may communicate with the user device 220.
  • PLMN public land mobile network
  • the security monitoring system app is installed on a user device 220, here shown as a smartphone, although of course it could be almost any kind of electronic device, such as a laptop or desktop computer, a tablet such as an iPad, a smart watch, or even a television.
  • the security monitoring system app may be used to schedule a delivery following for example the placing of an order for goods from an online or bricks and mortar retailer. Possibly the security monitoring system app may provide the option of ordering goods or services from selected retailers or service providers, so that relevant order details, as will be explained below, may be seamlessly transferred between an ordering process and the scheduling of an event with the security monitoring service.
  • Figure 3a is a timing diagram of the first part of a method according to an aspect of the invention.
  • a user places an order and schedules a delivery with a supply company 250.
  • the user may place an order with the supply company and only subsequently schedule a delivery, and even conceivably may schedule delivery with the supply company before placing the order for the goods or services.
  • the same method and systems may be used when arranging collection of something from the premises, for example laundry or dry-cleaning, or a pet which needs to be taken for a walk or taken to the vet.
  • the user then at 302 uses the security system app, for example on device 220, to log the delivery with the controller 208 of the security monitoring system.
  • the user In logging the delivery with the controller 208, the user provides the scheduled time window that was agreed with the supply company 250, for example June 21 st between 1 PM and 3 PM.
  • the user also provides an identifier for the delivery, which will act as a security code specific to the scheduled event, for example the last six or more digits of the order number. There is a balance to be drawn between the need for security and the desire of the user to correctly enter a possibly alphanumeric sequence.
  • Amazon (RTM) order numbers currently take the form of 3 digits followed by - followed by 7 digits - followed by 7 digits, and it may be considered too onerous or potentially error prone to require the full 17 digits, plus hyphens, to be entered. Smaller scale suppliers may well operate with much shorter order numbers, but the risk of bad actors gaining entrance illegitimately is probably too great to rely on a code of three digits or less.
  • the security monitoring system app may be configured to generate secure one time codes, and the user of the app can, when scheduling the delivery with the Supply Co. may trigger the app to generate a secure one-time code of six or more characters which is provided to the Supply Co at step 300, and then to the central unit 208 at step 304.
  • the central unit passes the concierge delivery schedule and authentication data, e.g. the pass code, to the central monitoring station 210.
  • this communication is encrypted and passes either through a wired data connection or wirelessly between the central unit and a central monitoring station.
  • the reason for wanting to provide a central monitoring station with the details of the scheduled delivery (or collection) is so that the central monitoring station can be sure to have a human operator on standby for the relevant period.
  • the scheduled delivery window 309 shown by the pair of dotted lines in figure 3a is expected to be at a time when the security monitoring system has a status of “armed away” - which is a status typically used when the premises are unoccupied.
  • the “scheduled concierge service” provided by the security monitoring system will not be needed if the user is expecting to be at home at the time of schedule delivery.
  • the user may configure the system, using the security monitoring system app, or an appropriate interface for the central unit or some other control terminal of the security monitoring system, to allow the scheduled concierge service to operate even when the security monitoring system is set in an “armed at home” status, or even a disarmed status.
  • the user is away, the premises are unoccupied, and the security monitoring system is in the armed away state.
  • This dialogue can be provided from within the video doorbell 106, or it may be provided from the central unit 208, or possibly, but less preferably from the central monitoring station.
  • the announcement 320 is provided from the central unit 208 (but may equally be provided directly by the doorbell if it is so configured).
  • Figure 3 a also shows the possibility of connecting the doorbell video camera to the central unit 208 upon detecting the first bell push within the scheduled delivery window, and optionally coupling that doorbell video to the central monitoring station 210, at step 314 the central monitoring station may at that stage send a voice link request 316 to the central unit, which leads a central unit to connect 318 audio from the audio interface of video doorbell 106 (or audio interface 116 if the video is coming from second video camera 112) to the central monitoring station 210.
  • the central monitoring station is only connected to the doorbell video and audio after the delivery person has confirmed that they are indeed present for the purpose of the scheduled event, but this is less preferable because of the risk of missing the security code input as result of a delayed completion of the connection to the central monitoring station.
  • the delivery person receives, preferably over the audio interface, a prompt to input the security code which was agreed between the user and the Supply Co. at step 300.
  • a visual interface for example a display on the external keypad 110
  • the delivery person then provides the security code, preferably by speaking the security code into the audio interface, but possibly by keying the code into the external keypad 110.
  • the code input as speech is received at the central monitoring station where it is heard by a human operator, who confirms that it corresponds to the previously registered code for the scheduled event.
  • the human operator has also been observing the delivery person, and the space in front of the exterior closure, e.g.
  • the human operator sends an unlock instruction 336 to the central unit which also has the effect of causing an activation command 338 to be sent to an interior video camera 214 which observes the door, and the space behind the door - i.e. part of the protected interior space of the premises. Images from the interior video camera 214 then transmitted 340 to the central unit 208, and then forwarded 342 to the central monitoring station 210.
  • the central unit 208 is configured to ignore any signals or notifications received from for example the sensor 206 the detects the status of the door 102 and also from the movement sensor 216 in the interior space, e.g. the entry hall, into which the delivery person needs to go to deposit the package.
  • the security monitoring system is in the expected armed away state, the other sensors 206 on the exterior doors and windows, and on internal doors 218, and any other internal motion sensors are still active, and the central unit 208 will continue to respond in the usual way to any incidents reported by the sensors.
  • the other sensors protecting the perimeter and interior of the premises remain active, and any breach of these, such as for example entry into an internally secured area, will trigger an alarm event that will be signalled to the to the central unit and onwards to the central monitoring station.
  • Figure 3b shows the continuation of the process begun in figure 3a.
  • the central unit 208 transmits an unlock instruction 344 to the electronically controlled lock 104 which then unlocks.
  • the delivery person is then able to open the door, if it is not automatically opened already, to deposit the delivery (or alternatively to collect whatever needs collecting).
  • the operator in the central monitoring station 210 is observing images from the interior video camera 214, which are being passed via the central unit 208, to ensure that the delivery person’s behaviour is appropriate.
  • the delivery person then leaves the protected interior space, closing the door behind them.
  • the lock 104 sends a lock status update 350 to the central unit 208, which then forwards this to the central monitoring station, so that the operator can speak 358 to the delivery person via the audio interface if the door has not been closed correctly - the operator basically telling the delivery person to close the door properly before they leave.
  • the central monitoring station may then send the confirmation to the central unit that the scheduled event has been completed, or the central unit may be configured to recognise this fact based on receiving the correct lock status update at step 350.
  • the controller of the security monitoring system then reverts to its previous status.
  • the described security monitoring system provides a secure perimeter to premises, the premises including: an exterior closure, such as door 102, in the secure perimeter giving access to a protected interior space 200 of the premises.
  • An electrically controlled lockl04 is provided for the exterior closure or door 102.
  • An actuator for example a bell push, is provided for a visitor to indicate their presence at the door.
  • the security monitoring system includes a controller 208 coupled to the lock, and the controller is configured to: receive details of a scheduled event that will involve granting a visitor (such as a delivery person) access to the protected interior space by opening the exterior closure, the details including a scheduled time window and a security code specific to the scheduled event.
  • the controller upon receiving, within the scheduled time window, an indication from the actuator that a visitor is present at the closure, is configured to: prompt the visitor to confirm that they are present for the purpose of the event, and upon receiving such confirmation from the visitor, prompt the visitor to input a security code; receive from the visitor a security code, and if the received security code matches the security code specific to the scheduled event, to unlock the electrically controlled lock to admit the visitor to the protected interior space of the premises for the scheduled event.
  • the security of delivered items is improved, while maintaining the security of the premises, and without requiring that anyone be at the premises to receive the delivery.
  • An approved user of the system e.g. a member of the household, can use the system to schedule secure delivery or collection at the time they order goods or services, safe in the knowledge that the goods that are ordered will be safe from “porch pirates” and other opportunists.
  • the controller may be configured to share with a remote monitoring centre (210) the received details of the scheduled event, and the received security code, and only unlock the electrically controlled lock to admit the visitor to the protected interior space of the premises for the scheduled event if confirmation is received from the remote monitoring centre that the received security code matches the security code specific to the scheduled event.
  • a remote monitoring centre (210) the received details of the scheduled event, and the received security code
  • the controller 208 to control the process, including the checking of the security code
  • This variant of the invention introduces the possibility of using a human operator to check the security code, which many users may find more reassuring, and which may indeed be more secure.
  • the security monitoring system may further comprise an audio interface to enable audio communication with a visitor at the closure, the controller being configured to enable the remote monitoring centre to use the audio interface to speak to the visitor. In this way, an operator in the central monitoring station is able to clarify any uncertainties, as well as guiding the visitor in what they have to do and where they have to leave the package (or collect the package).
  • the security monitoring system preferably further comprises a first video camera arranged to observe a space in front of the exterior of the closure, the controller being configured to enable the remote monitoring centre to use the first video camera to observe the visitor.
  • a first video camera arranged to observe a space in front of the exterior of the closure
  • the controller being configured to enable the remote monitoring centre to use the first video camera to observe the visitor.
  • first video camera may be a video doorbell, which is convenient both in terms of the location of the camera, and the co-location of the video and audio interfaces, along with the actuator, and in terms of the visual performance of the camera - as video doorbells are typically very well placed to capture images of people at the door.
  • the video doorbell includes the audio interface, as this is likely to be well located from the point of view of performance, and it may also reduce installation complexity and time.
  • the security monitoring system further comprising a second video camera arranged to observe the protected interior space behind the closure, the controller being configured to enable the remote monitoring centre to use the second video camera to observe the visitor within the protected interior space.
  • the security monitoring system may be configured to only unlock the electrically controlled lock to admit the visitor to the protected interior space of the premises for the scheduled event if the security code is received from the visitor while the security monitoring system is in an armed state. In this way, the risk of admitting a stranger to the premises when the premises are occupied is reduced. This risk may be further reduced by restricting the scheduled concierge service to times when the security monitoring system is in armed away mode.
  • the controller of the security monitoring system may be configured, in the event that the security code received from the visitor matches the security code previously received by the controller, not to react to any signals or notifications received from a status sensor associated with the closure for a predetermined period, while maintaining the security monitoring system in an armed state.
  • the security monitoring system can continue to monitor the rest of the periphery, and the interior of the premises, while securely admitting the visitor and without an alarm condition being caused by correct behaviour of the visitor.
  • the predetermined period may be until the visitor has been observed to vacate the interior space.
  • Figure 4 corresponds generally to figure 3 a, but shows a sequence of events where the visitor at the doorbell does not confirm that they are present for the purpose of the scheduled event.
  • the announcement 320 there is no subsequent bell push.
  • the audio interface may be used to make an announcement to the effect that the visitor should wait while the system tries to connect them with the occupant of the house.
  • the central monitoring station transmits a handover instruction 422 to the central unit which causes the central unit to transmit doorbell ring instruction to the doorbell app, either directly or through the doorbell itself - the doorbell been connected typically via Wi-Fi to the Internet.
  • the user resident of the house will typically have an appropriate doorbell app on their phone or other device, and this will receive the doorbell ring and, typically the video and audio from the doorbell.
  • the user can then use the doorbell app in a conventional manner to speak to the visitor at the door.
  • the user can then use the security system app to send instructions to the central unit 208 causing the central unit to unlock the electrically controlled lock 104, so that the visitor can be admitted.
  • the central unit also sends an activation command 432 to the interior video camera, which provides interior video images to the central unit which then passes them on to the security system app, so that the user can observe the entrance of the visitor and the closing of the door.
  • the actuator, the external video source, and the external audio interface may all be provided in free-standing components to implement embodiments of the invention.
  • the first video camera if used, to be the video camera of a video doorbell, because of the generally ideal location of such a camera in terms of surveying the space in front of the front door 102, it is also possible to use a different video camera installation, such as that shown as 112, which also observes the space in front of the front door.
  • a video camera installation such as that shown schematically in figures 1 and 2 as 112 may provide a view not only of the space in front of the front door, but also of the door.
  • the video camera installation 112 includes, or has an associated, motion detector 114, such as a PIR sensor, with the camera 112 typically only being turned on when the movement sensor detects movement.
  • motion detector 114 such as a PIR sensor
  • a surveillance camera installation does not require a movement sensor, rather when the surveillance cameras activated it may continuously monitor a surveilled area, typically streaming images continuously or every few seconds to a monitoring location.
  • Such a surveillance camera may also operate under the control of a security monitoring system according to an aspect of the invention, the controller 208 of the security monitoring system transmitting a signal to cause the surveillance camera to capture images at transmit the captured images to the controller 208, and to forward the captured images for checking remotely, e.g. at the central monitoring station 210 or at a user device 220.
  • a completely separate area e.g. annex or garage
  • FIG. 5 shows schematically an architecture in which a security monitoring system, shown generally as 500, is coupled to a video entry arrangement 510, an electrically controlled lock, such as the lock 104 of figures 1 to 4, and a remote monitoring station 210.
  • the security monitoring system 500 includes a security monitoring system controller 208, together with a collection of various sensors 520, including an external video camera 112, an internal video camera 214, a closure status sensor 206 for the closure (e.g.
  • admittance zone sensor 216 an example of which is the motion sensor 216 shown in figure 2, but more generally this is a sensor of any form to detect presence within a zone to which a delivery person, or the like, may be admitted using a system as described in this patent application.
  • FIG. 6 is a schematic block diagram of a video entry arrangement 510, such as that shown in figure 5.
  • the video entry arrangement 510 may take the form of a video doorbell.
  • the video entry arrangement 510 includes a video entry arrangement controller, 600, including a processor 602, and a memory 604.
  • an audio interface 610 preferably comprising both an input device 612, and an output device 614, a video camera, 620, and an actuator, or bell push, 630.
  • Figure 7 is a timeline illustrating schematically a scheduled delivery taking place using an installation such as that shown in figure 5, , in which the central monitoring station effectively provides backup, but the bulk of the processing is handled by the video entry arrangement 510, e.g. video doorbell) using for example pre-recorded announcements.
  • the installation automatically handles communication with the delivery person, with the operator and the central monitoring station taking a more passive role, perhaps simply monitoring the delivery on screen and being ready to take action if something goes wrong.
  • This approach has the merit of probably being rather cheaper to run.
  • the pass code should be one generated by the system, for example by the system security app 220, or by corresponding functionality in the cloud for example, rather than simply the last four digits of the order number.
  • a user places an order when schedules are deliver it with a supply company 250.
  • the user may place an order with the supply company and only subsequently schedule a delivery and even conceivably may schedule delivery with the supply company before actually placing the order for the goods or services (users of supermarket delivery services in these times of Covid will have experienced the difficulty of securing a delivery slot at a desired time, and know that it is sometimes better to book a delivery slot first, and then place the order for goods).
  • the user then at 702 uses for example the security system app 220 on their smart phone or other device to log the delivery with the controller 208 of the security monitoring system.
  • this logging of the delivery with the controller 208 may be done (705) using a user interface device of the security monitoring system, rather than remotely using a security system app or website.
  • the controller 208 is provided with the scheduled time window that was agreed with the supply company 250 for example, June 21 between 1 PM and 3 PM.
  • the controller 208 is also provided with an identification, e.g. a code, for the delivery, which will act as a security code specific to the scheduled event.
  • the supply company 250 we preferably avoid using an order number or other identifier provided by the supply company 250. Rather, in this case we want to use a code or password which is generated by the system - for example by the security system app 220, a security system server, or some cloud-based entity associated with the security system. So, here we are effectively creating a one-time code or PIN, which we provide to the supply company 250 for the delivery person to use when making the delivery, and which we also provide to the security monitoring system controller, or central unit 208. Conveniently, the one-time code can be provided to the supply company by completing a field on a form provided by the supply company as part of the ordering process.
  • the central unit is preferably automatically provided with the delivery schedule and the relevant one-time pass code by the security system app or equivalent.
  • the user may use a user interface device of the security monitoring system to provide the scheduled delivery time and the pass code to the central unit 208.
  • the central unit 208 may receive a “flag” indicating use of the scheduled concierge service.
  • the central unit 208 has the schedule delivery window and one-time code, these are passed at 706 to the video entry arrangement 510.
  • the details of the schedule delivery are stored in memory 604, and the VEA controller 600 primed to switch operating mode for the scheduled delivery window.
  • the VEA controller 600 automatically starts a routine specific to the scheduled concierge.
  • the video entry arrangement 510 may be configured to transmit 712 images captured by the video camera 620, and preferably sounds captured by audio interface 610, to the central unit 208 of the security monitoring system, from where they are onwards transmitted 714 to the central monitoring station 210.
  • the installation may be configured so that under ordinary circumstances, that is outside scheduled delivery windows, the video entry arrangement 510 behaves just like a conventional stand-alone video doorbell, with video images shared with a user via a video doorbell app and not with the security monitoring system.
  • the video entry arrangement may be arranged as an integral part of the security monitoring system.
  • the video entry arrangement 510 plays a pre-recorded announcement to ask the person who activated the actuator 630 to confirm whether they are present for the scheduled concierge service, for example “if you’re here to make a delivery, please press the button once more” (although clearly a different number of extra presses could be specified).
  • the video entry arrangement may be configured to play a ringing tone, music or provide another message, such as “one moment please, I’ll try to connect you”, followed by musical ringing tone, and otherwise behaving in the conventional way to connect the video entry arrangement to a designated user via a video entry arrangement app, for example. But if the instructions from the pre-recorded announcement are followed, and the button is pressed twice, 722, the video entry arrangement recognises this as a trigger to play another pre-recorded announcement, 728.
  • Pre-recorded announcement 728 tells the delivery person what they need to do in order to provide the code for the delivery, for example, speaking the code (if the video entry arrangement includes speech recognition functionality to recognise all the permitted characters for one-time codes, e.g. all the numerals, or all the alphanumerics), or keying the code into a keyboard (which may be provided so that householders can disarm the security monitoring system, and unlock a door, to gain admittance), or displaying some identifier - such as a QR code to the video camera 620.
  • the video entry arrangement 510 communicates successful code entry to the central unit 208.
  • this causes the central unit 208 to activate at 738 a video camera, such as interior camera 214, to observe the delivery person once they have opened the closure (e.g. door 102), and he central unit may then begin to supply images from the video camera to the central monitoring station 210.
  • the central unit 208 sends an unlock instruction 744 to the electrically controlled lock 104.
  • the video entry arrangement 510(and optionally central monitoring station 210) may also receive confirmation from the central unit 208 that the lock has been unlocked, and in any event the video entry arrangement preferably makes another announcement to the effect that the delivery person is now free to enter through the relevant closure, e.g.
  • an operator at the central monitoring station 210 observes 748 the delivery. If the operator decides that the delivery person’s behaviour is wrong, or suspicious, he may involve security personnel such as the local police, or security guard - or even activate a smoke producing device to prevent the delivery person from being able to see to steal anything (this is of course also an option with all the other embodiments described). When the delivery person leaves, he closes the door behind him, allowing the lock 104 to lock itself again automatically - or under the control of the central unit 208, depending upon the setup.
  • a motion or presence detector for example a PIR in the video entry arrangement (e.g. a video doorbell), to detect the presence of someone at the door (or wherever else the arrangement covers), rather than relying on the bell push 710 to trigger the playing of the announcement 720.
  • the central unit could be configured to couple the doorbell video to the central monitoring station at the commencement of the schedule delivery window, so that an operator in the central monitoring station 210 may react to the presence of someone (who perhaps looks like a delivery person) rather than relying on 310.
  • the video entry arrangement 510 e.g. doorbell
  • the video entry arrangement 510 could be programmed to give detailed instructions, e.g. how to enter a PIN code on an outdoor PIN pad.
  • the protected interior space may not be a room or hall of a dwelling, or a garage or outbuilding, or even a space large enough to accommodate a person - it could instead be an enclosure such a locker or cubby hole, large enough to receive and contain parcels and most other common deliveries.
  • the inputting of the security code may be in any manner: audibly (using speech or some other sound), physically using key presses, visually (using a QR code or other visual representation), or by presentation of a specially coded token.

Landscapes

  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Alarm Systems (AREA)
  • Lock And Its Accessories (AREA)
  • Selective Calling Equipment (AREA)
  • Burglar Alarm Systems (AREA)

Abstract

L'invention concerne une installation de sécurité pour sécuriser au moins une partie d'un périmètre de locaux (100), les locaux (100) comprenant : une fermeture extérieure (102) dans le périmètre sécurisé donnant accès à un espace intérieur protégé (200) au niveau des locaux ; un verrou à commande électrique (104) pour la fermeture extérieure (102) ; un actionneur pour qu'un visiteur puisse indiquer sa présence au niveau des locaux ; et un dispositif de commande, le dispositif de commande étant configuré pour : recevoir des détails d'un événement planifié qui va impliquer l'octroi à un visiteur d'un accès à l'espace intérieur protégé (200) par ouverture de la fermeture extérieure, les détails comprenant une fenêtre temporelle planifiée et un code de sécurité spécifique à l'événement planifié ; et, lors de la réception, dans la fenêtre temporelle planifiée, d'une indication provenant de l'actionneur selon laquelle un visiteur est présent au niveau de la fermeture, pour : inviter le visiteur à confirmer qu'il est présent dans le but de l'événement, et lors de la réception d'une telle confirmation en provenance du visiteur, inviter le visiteur à entrer un code de sécurité ; recevoir du visiteur un code de sécurité, et si le code de sécurité reçu correspond au code de sécurité spécifique à l'événement planifié, provoquer le déverrouillage du verrou à commande électrique (104) pour donner l'accès visiteur à l'espace intérieur protégé (200) des locaux pour l'événement planifié.
EP22729585.4A 2021-05-20 2022-05-18 Installations et procédés de sécurité Pending EP4154226A1 (fr)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
ES202130464 2021-05-20
PCT/EP2022/063409 WO2022243359A1 (fr) 2021-05-20 2022-05-18 Installations et procédés de sécurité

Publications (1)

Publication Number Publication Date
EP4154226A1 true EP4154226A1 (fr) 2023-03-29

Family

ID=82019177

Family Applications (1)

Application Number Title Priority Date Filing Date
EP22729585.4A Pending EP4154226A1 (fr) 2021-05-20 2022-05-18 Installations et procédés de sécurité

Country Status (5)

Country Link
EP (1) EP4154226A1 (fr)
AR (1) AR125878A1 (fr)
CL (1) CL2022003730A1 (fr)
PE (1) PE20241706A1 (fr)
WO (1) WO2022243359A1 (fr)

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP2698774B1 (fr) * 2012-08-14 2017-06-14 Securitas Direct AB Procédé et dispositif de contrôle d'un système de secours
US10861265B1 (en) * 2017-01-23 2020-12-08 Vivint, Inc. Automated door lock
US11210878B2 (en) * 2018-01-08 2021-12-28 Comcast Cable Communications, Llc Premises access system
PT3540704T (pt) * 2018-03-13 2021-02-17 Verisure Sarl Uma unidade de monitoramento para um sistema de vigilância e um sistema de vigilância compreendendo tal unidade de monitoramento

Also Published As

Publication number Publication date
WO2022243359A1 (fr) 2022-11-24
CL2022003730A1 (es) 2023-04-28
AR125878A1 (es) 2023-08-23
PE20241706A1 (es) 2024-08-13

Similar Documents

Publication Publication Date Title
US20220301401A1 (en) Control access utilizing video analytics
US10854067B1 (en) Connected door hinge
US7106193B2 (en) Integrated alarm detection and verification device
US20190317462A1 (en) Managing barrier and occupancy based home automation system
US7132941B2 (en) System for monitoring an environment
US7120232B2 (en) Lifestyle multimedia security system
US11182989B1 (en) Controlled indoor access using smart indoor door knobs
WO2008056320A1 (fr) Système de sécurité
KR101801200B1 (ko) 스마트 초인종 시스템
GB2325548A (en) Security alarm systems
EP3142089B1 (fr) Notification sur l' armement d' un système basée sur une position ble
JPS5843097A (ja) 複数のアクセスレベルを有する警備システム
KR100891010B1 (ko) 홈오토메이션을 위한 스마트 디지털 도어록 시스템
US9847016B2 (en) System and method of communicating data from an alarm system to emergency services personnel
US20090295578A1 (en) Portable security system and method thereof
WO2022243359A1 (fr) Installations et procédés de sécurité
JP2864205B2 (ja) 遠隔監視システム
EP4154228A2 (fr) Procédés et installations de sécurité
JP2019028580A (ja) 監視システム
TW202044204A (zh) 事件管控方法及事件管控裝置
WO2024068038A1 (fr) Agencement d'entrée vidéo, et système et procédé associés
WO2024068032A1 (fr) Installations de sécurité et procédés
JP7426795B2 (ja) 在宅管理システム
WO2024068031A1 (fr) Procédé et appareil d'authentification dans un système de sécurité
JP7426580B2 (ja) 制御システム、及び、制御方法

Legal Events

Date Code Title Description
STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: UNKNOWN

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: THE INTERNATIONAL PUBLICATION HAS BEEN MADE

PUAI Public reference made under article 153(3) epc to a published international application that has entered the european phase

Free format text: ORIGINAL CODE: 0009012

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: REQUEST FOR EXAMINATION WAS MADE

17P Request for examination filed

Effective date: 20221219

AK Designated contracting states

Kind code of ref document: A1

Designated state(s): AL AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO RS SE SI SK SM TR

DAV Request for validation of the european patent (deleted)
DAX Request for extension of the european patent (deleted)