NZ555980A - A method and apparatus for providing a response - Google Patents

A method and apparatus for providing a response

Info

Publication number
NZ555980A
NZ555980A NZ55598007A NZ55598007A NZ555980A NZ 555980 A NZ555980 A NZ 555980A NZ 55598007 A NZ55598007 A NZ 55598007A NZ 55598007 A NZ55598007 A NZ 55598007A NZ 555980 A NZ555980 A NZ 555980A
Authority
NZ
New Zealand
Prior art keywords
alarm
security
executable instructions
computer executable
activation
Prior art date
Application number
NZ55598007A
Inventor
Paul Thomas Staples
Jean Angela Staples
Original Assignee
Paul Thomas Staples
Jean Angela Staples
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Paul Thomas Staples, Jean Angela Staples filed Critical Paul Thomas Staples
Priority to NZ55598007A priority Critical patent/NZ555980A/en
Publication of NZ555980A publication Critical patent/NZ555980A/en

Links

Landscapes

  • Alarm Systems (AREA)

Abstract

A system and method for responding to a security alarm is provided. The method is run on a computer system and includes the steps of: - receiving an activation signal from a security alarm, and then engaging an operator, -then engaging a member of a taxi service to respond to the activation of the security alarm.

Description

PATENTS FORM NO. 5 Fee No. 4: $250.00 PATENT? APT 19?? COMPLETE ?PE^|F|CAT)QN After Provisional No: 555980 P^: 19 Jgne £0Q7 A METHOD AND APPARATUS FOR PROVIDING A RESPONSE WE Paul Thomas Staples and Jean Angela Staples, New Zealand citizens of 11 Camerton Close, Botany, Auckland, New Zealand hereby declare the invention for which we pray that a patent may be granted to us, and the method by which it is to be performed to be particularly described in and by the following statement: James & Wells Ref: 232658/61 LR A METHOD AND APPARATUS FOR PROVIDING A RESPONSE The present invention relates to a method and apparatus for providing a response.
Particularly, although not exclusively, the present invention relates to a method and 5 apparatus for monitoring and responding to a security alarm.
BftfffffiRftWNPART There are many ways to reduce the risk of being burgled and increase the safety of people and premises. Electronic alarms are one popular means and are routinely installed in houses and businesses for security (e.g. burglar) and safety (e.g. fire) 10 purposes. As an extra safeguard an alarm can be monitored and personnel sent to the site in response to an activation.
A major change in the security industry occurred circa 1984 in New Zealand when the New Zealand Police stated that they would no longer monitor or respond to alarms. This resulted in a sudden increase in demand for security services and 15 effectively created the alarm and mobile response industry in New Zealand. It also attracted a number of smaller entrants into the market.
Since 1984 the alarm and mobile response industry has continued to steadily grow due to companies, organisations and private consumers becoming more security conscious and more willing to invest in security to protect their assets.
The security industry can be divided into four main categories: alarms and installation; alarm monitoring; mobile patrol services; and static guards.
In the last few years the larger international companies have increased their market 2 James & Wells Ref: 232658/61 LR share dominance in alarm monitoring services by acquisitions, resulting in a few dominant providers across that industry.
Since 1997 these large corporate security firms have been acquiring most of the smaller security companies (competitors). By way of example, the two largest 5 security companies in New Zealand in the 1990s, Armourguard and Securitas (today known as ADT Armourguard and Chubb respectively) both have offshore ownership (US based Tyco and UK based Chubb Security Services respectively).
Two of the biggest acquisitions in the security industry in 2007 have taken place in Auckland, New Zealand with the sale of CDP Security (NZ) Limited to Matrix 10 Security Group Limited of New Zealand and First Security Guard Services to Integrated Services and Systems based in Denmark.
Subsequently, it has been perceived that the lack of competition has created dissatisfaction with customers. This rationalisation of the industry (especially in monitoring and alarm response) and foreign ownership has led to a decline in 15 service quality, manifesting itself particularly in slow alarm response times. The primary focus of this patent is to provide an improved alarm monitoring service particularly as regards alarm activation response times.
A typical alarm monitoring response service as provided by the above companies is now outlined and shown in Figure 1: An alarm installed in premises (e.g. a house (2a)) is activated (1a) in known fashion triggering a visual (typically flashing light) and audible (siren) signal at the premises. Under New Zealand legislation (primarily the Environment Act 1986 and parts of the Resource Management Act (Bylaws)) any siren external of the premise (2a) must cease sounding within a maximum time of 12 minutes. For this reason, 3 James & Wells Ref: 232658/61 LR most alarms stop emitting a sound after 10 minutes.
Following activation an alarm activation signal is sent to a monitoring station (3a) via the premise's (2a) telephone line (4a). This process can take approximately 3 to 18 seconds depending on the digital communicator being used.
The monitoring station (3a) receives the alarm activation signal from the premises (2a) in a data coded form. The signal is then decoded via alarm signal receiver software within the monitoring station (3a) and displayed on a computer screen with the time and location of the alarm activation.
An operator (not shown) located at the monitoring station (3a) will then action a 10 client's agreed instructions. This normally involves the engagement of a security guard patrol company to visit and secure the site of the alarm activation (as described further below).
Typically, security guard patrol companies (5a) operate a 24 hour service. During daylight hours such companies have minimal staff and patrol responding vehicles. 15 Additionally, during peak night hours (typically between 1700 and 2300 hours), 90% of resources and patrol vehicles are used in the evening to lock up and secure domestic and commercial buildings as this is predominantly the core business of security guard companies.
If the security guard company (5a) is a sizeable company, then they will usually 20 have an onsite control room for monitoring alarm activations (as previously described) and dispatching a security guard (typically in a car (6a)) to attend the site of the activation. Some smaller security companies use an answering service and dispatching occurs via pagers to a mobile phone held by the guard which can increase the response time through delays in relaying the message or signal to 4 James & Weils Ref: 232658/61 LR these devices. In most cases the guard is contacted and dispatched via radio (7a) or telephone and confirms when he or she is on site. When the guard arrives on site, he or she then advises the appropriate party i.e. control centre, contract security company or client directly etc of their finding and leaves an attendance 5 report in a convenient location at the site of the alarm activation, for example in a letter box or equivalent, verifying attendance at that address.
The disadvantage of this system is that during daylight and peak night hours the delay in response time can be between 25 minutes and 60 minutes, depending on whether staff are available to answer the call, on the road attending another job, or 10 carrying out primary duties and functions of the security company's core business of locking up domestic and commercial buildings as aforesaid. Ideally a response time should be less than 15 minutes. It would therefore be beneficial to have a method and apparatus for monitoring and responding to a security alarm that is cost effective, can provide improved response times and offer monitoring stations 15 response solutions that best meet client needs and requirements.
It is an object of the present invention to address the foregoing problems or at least to provide the public with a useful choice.
All references, including any patents or patent applications cited in this specification are hereby incorporated by reference. No admission is made that any reference 20 constitutes prior art. The discussion of the references states what their authors assert, and the applicants reserve the right to challenge the accuracy and pertinency of the cited documents. It will be clearly understood that, although a number of prior art publications may be referred to herein, this reference does not constitute an admission that any of these documents form part of the common 25 general knowledge in the art, in New Zealand or in any other country.
V \ James & Wells Ref: 232658/61 LR It is acknowledged that the term 'comprise' may, under varying jurisdictions, be attributed with either an exclusive or an inclusive meaning. For the purpose of this specification, and unless otherwise noted, the term 'comprise' shall have an inclusive meaning - i.e. that it will be taken to mean an inclusion of not only the 5 listed components it directly references, but also other non-specified components or elements. This rationale will also be used when the term 'comprised' or 'comprising' is used in relation to one or more steps in a method or process.
Further aspects and advantages of the present invention will become apparent from the ensuing description which is given by way of example only. disclosure of invent^ According to one aspect of the present invention there is provided a set of computer executable instructions configured to enable a method for responding to a security alarm which includes the steps of: a. receiving an activation signal from at least one security alarm, and 15 b. engaging at least one operator, characterised by the step of: c. engaging at least one member of a taxi service to respond to the security alarm activation in response to the activation signal.
Preferably, the activation signal will be sent through a transmission means to the 20 operator via a monitoring station. 6 James & Wells Ref: 232658/61 LR According to another aspect of the present invention there is provided an apparatus for implementing a set of computer executable instructions configured to enable a method for responding to a security alarm which apparatus includes: • at least one security alarm, • at least one transmission means, and • at least one operator wherein activation of the security alarm causes an activation signal to be sent via the transmission means to the operator characterised in that at least one member of a taxi service is engaged to respond to 10 the security alarm activation by the operator in response to the activation signal.
Preferably, the apparatus includes at least one monitoring station.
Preferably, the security alarm may include a software/hardware system configured to interact with the transmission means.
For the purposes of the specification the term 'security alarm' should be understood 15 to refer to an electronic device where sensors are connected to a control unit via a low-voltage hardware or a narrowband RF signal. The control unit in turn connects to a means for announcing the alarm when activated or any device that transmits such a visual or audible warning. For ease of reference throughout this specification the term 'security alarm' may now be referred to simply as an alarm.
For the purposes of this specification the term 'member of a taxi service' should be understood to mean a person employed by or contracted to a designated person or company for the primary purpose to carry passengers or objects to any specified 7 James & Wells Ref: 232658/61 LR destination. However, this should not be seen as a limitation on the embodiments envisaged for this invention as conceivably any other type of passenger and/or delivery service could be used with this invention. For example, courier companies and fast food delivery companies. For ease of reference the term 'taxi company' 5 will now be used.
For the purposes of the specification the term 'operator1 should be understood to mean a person(s) who, or automated computer/system which, operates a monitoring station to initiate a response to an alarm activation.
For the purposes of this specification the term 'monitoring station' should be 10 understood to be a monitoring facility comprising software/hardware capable of receiving, displaying and/or forwarding an activation signal received from an alarm.
Brief Description of Drawings Further aspects of the present invention will become apparent from the following description which is given by way of example only and with reference to the 15 accompanying drawings in which: Figure 1 shows the method and apparatus for responding to an alarm activation as known in the prior art; Figure 2 is a schematic diagram of the apparatus of a preferred embodiment of the response method of the present invention, and Figure 3 is a flow diagram showing the main process steps of a preferred embodiment of the present invention. 8 James & Wells Ref: 232658/61 LR PEmiff PssfrR'PTjQN \ucmw iiMP,E>E Figure 1 relates to a typical alarm response service as currently provided by security companies and as known in the art. This has been discussed previously in the background art section of this application and need not be described here.
Figure 2 is a schematic diagram of the apparatus of a preferred embodiment of the response method of the present invention comprising an alarm (1), monitoring station (4) connected to the alarm (1) via telecommunications system (3), a control centre (7), and in-vehicle equipment (12) located on the dashboard of taxi (11). Each of these features will be discussed in more detail below.
Alarm System A security alarm (1) is installed in premises (2) in known fashion.
In preferred embodiments of the present invention the alarm (1) is for the protection of building(s) (2). However, this should not be seen as a limitation on the embodiments envisaged for this invention as the alarm (1) may include protection 15 for other property such as vehicles or even personal security - for example, in response to a medical emergency or a personal safety alarm device.
It should be appreciated by those skilled in the art that any typical security alarm/system (1) known in the industry could conceivably be used with this invention. It is envisaged that the alarm system and its components will be 20 dependent on the requirements of the end user. For example, proprietary alarm systems which may be used with this invention include, but are not limited to, those manufactured by Ademco, Honeywell, Paradox and Bosch. These proprietary brands of alarm systems may be dedicated to one function or may be able to 9 James & Wells Ref: 232658/61 LR handle fire, intrusion and safety alarms simultaneously.
The alarm system typically comprises the following componentry: one or more sensors (I.R, heat, microwave etc) coupled to a control unit or panel usually located inside a building (2) capable of receiving a signal from the sensor(s), a power 5 transformer with back up batteries or alternative supply source, sirens or speakers, visual signal (typically flashing light) and alarm siren drivers etc. It is known that the control unit of the alarm (1) with software usually generates an activation signal to the siren (internal and/or external siren either with or without visually flashing light) for warding off intruders.
In preferred embodiments the security alarm (1) may be activated by security sensors. For example, the security sensor may indicate the opening of a door or window or detect motion via passive infrared (PIR).
It is envisaged that the control unit of the security alarm (1) may have a separate channel or zone for different sensors. For example, burglar and fire sensors, and 15 more complex systems may have a separate zone for every different sensor, as well as internal "trouble" indicators (mains power loss, low battery, wire broken etc).
Preferably, the sophistication of the security alarm (1) may range from small, self-contained noise makers to complicated, multi-zone systems with colour-coded computer monitor outputs. As will be apparent to those skilled in the art many of 20 these concepts also apply to portable alarms for protecting other property such as vehicles and their contents as aforesaid.
In preferred embodiments the alarm (1) may be hardwired, wireless (radio signals) or communicate by infrared.
It is envisaged different types of wiring systems can be used for this invention. For James & Wells Ref: 232658/61 LR example, wired systems are convenient when sensors require power to operate correctly. Generally an alarm panel is located at the centre of a building (2), and all devices are connected with wire(s) back to the panel.
Preferably, more complex alarm panel or control units may use a BUS network 5 where the wire(s) which connect(s) the device to the alarm panel may be a data loop around the perimeter of the facility and have "drops" for the sensor devices. These sensor devices may include a unique device identifier integrated into the sensor device itself.
The advantage of wired systems is that, if wired correctly, they can detect 10 tampering with the wiring connectors. Wireless systems on the other hand, often use battery-powered transmitters which are easy to install but may reduce the reliability of the system if the sensor or batteries are not maintained.
Telecommunications System Referring back to Figure 2, the alarm (1) signal activated by security sensor(s) 15 located in a building (2) is sent via a telecommunications system (3) to a monitoring station (4). This occurs in addition to generating an activation signal to an internal and/or external siren as per a stand alone alarm system.
Preferably, the telecommunications system (3) may comprise well known devices to those skilled in the art. For example these devices may include, but are not 20 limited to, a phone, telephone line, or one or more wireless repeaters. These wireless repeaters enhance a signal (3a) in situations where the signal (3a) needs to travel over a long distance between the alarm panel and monitoring station (4) (typically distances greater than 5 km). It is envisaged that hybrid systems may utilise both wired and wireless repeaters to achieve the benefits of both systems. 11 James & Wells Ref: 232658/61 LR In preferred embodiments the telecommunications system (3) may be connected through the buildings' (2) electrical circuits and transmit coded signals from the control unit (not shown) of the security alarm (1) to the monitoring station (4).
Monitoring Station A monitoring station (4) is linked to the alarm (1) via the telecommunications system (3) and receives the telecommunications transmission alarm activation signal (3a) from the alarm (1) preferably in a data coded form. The activation signal (3a) is decoded via receiver software within the tower box (5) of the monitoring station (4) to display this information (8a, described later in the 10 specification) in meaningful form at the control centre (7).
It is envisaged that the monitoring station (4) is not a separate entity and may form part of the same computer apparatus within the control centre (7). For example, the monitoring station (4) will have its own monitoring control centre including hard drive with dispatching software partitioned on the same hard drive of the computer 15 apparatus at the control centre (7).
In alternative embodiments where a control centre (7) may not be present, the monitoring station (4) may be located at any other suitable site. For example, the monitoring station (4) may be located at and maintained by a third party security company to directly dispatch instructions (via software) to the available licenced 20 security taxi driver(s) (13) logged on at the time of activation.
It is further envisaged that a number of different configurations of monitoring stations (4) could conceivably be used with this invention. For example, a system may connect to a central monitoring station or responder via a direct phone wire (or tamper-resistant fibre optic cable), and the alarm monitoring system may include 12 James & Wells Ref: 232658/61 LR not only intrusion sensors, but the communication wire itself.
While direct phone circuits are an option, because of their high cost they are becoming uncommon. Direct connections are usually utilised in government buildings or public facilities (such as schools/university campus) that have a 5 dedicated police, fire or emergency department.
More preferably, the monitoring station (4) is configured with a digital telephone dialler unit that will receive the telecommunications transmission signal (3a) from the alarm (1) via a Public Telephone Switched Network (PTSN) and notify the occurrence of the security alarm (1) activation, either with a synthesised voice, or 10 more preferably via an encoded message string that the monitoring station (4) decodes as aforesaid. However, this should not be seen as a limitation on the embodiments envisaged for this invention as other alternative receiving networks may include, but are not limited to, the internet or cellular telephone networks and it is envisaged that the monitoring station (4) could be configured with these systems 15 or devices.
Control Centre The telecommunications signal (3a) containing the alarm activation information (8a) is preferably transmitted from the monitoring station (4) to a designated control centre (7).
In preferred embodiments the designated control centre (7) may be a physical building or premises (leased or owned) and constitute the security division of a taxi company. It is envisaged that the control centre (7) is responsible for all inbound alarm activation and response call traffic.
The control centre (7) is equipped with a software system (9) which comprises at 13 James & Wells Ref: 232658/61 LR least two components: • any proprietary taxi dispatch system used in the industry; and • software which allows automated conversion of information (8a) into (8b) (described later in the specification) and includes a unique encoder or identifier to enable distinction of an alarm activation signal from a standard passenger taxi call.
As will be appreciated, a significant advantage of this invention is that it is able to use an existing taxi dispatch system configured with a means for tracking vehicles/allocating jobs. An example of such a system (which should not be seen as limiting) is the ARTEDATA taxi dispatch system manufactured by Cecam Consultancy Limited New Zealand. This is a complete computerised taxi system comprising: • Base system software incorporating Global Positioning System (GPS), Computerised Dispatch System (CDS), Interactive Voice Response (IVR) and Public Mobile Data Network (PMDN) technologies for receiving, locating, dispatching, recording and reporting. For example, in the event of client proof of delivery requirements, the software can give the client back end access under their log in code. Upon verification, it can replay the route of the licenced security taxi driver (13) and how long s/he was onsite.
This information can be downloaded to a cell phone or email address for the client's and security company's records; and • Taxi equipment including fully integrated digital dispatch system with taxi meter, Mobile Data Terminal (MDT), GPS location and communications via General Packet Radio Service (GPRS) (Vodafone New Zealand's data 14 James & Wells Ref: 232658761 LR network).
The system locates the most suitable taxi (11) (based on a number of search criteria) (i.e. availability and proximity to the site of the alarm activation) with the assistance of GPS. The whole process, starting with the alarm activation to the 5 time the licenced security taxi driver (13) arrives on site may be totally automated without the intervention of an operator (10) or dependence on voice radio calls.
However, it is also preferable that the control centre (7) is manned 24 hours a day/7 days a week by a rostered staff of operators (10) to act as an additional back-up to the automated software process. It is envisaged that any number of 10 operators (10) and associated staff (e.g. administrative, accounts etc) may be employed at the control centre (7) to manage the control centre (7).
Computer monitors at the control centre (7) can show information to the operator (10) such as the physical location (or "zone") of the sensor(s) on a list or even an electronic map of the protected premises (site of activation, building (2)), which can 15 make a resulting response more effective.
Licensed Security Taxi Driver, Taxi and Associated Apparatus Information regarding the activation (8b) is sent by the automated software (9) to in-vehicle equipment (12) of the closest available taxi (11) of a member (13) of a taxi service. In alternative embodiments the information (8b) may be sent manually 20 by an operator (10) who inputs this information directly via computer to the in-vehicle equipment (12) or simply passes it on via a telephone or RT call to the taxi driver (13).
In preferred embodiments members of a taxi service will be security trained and may be simply referred to as a licenced security taxi driver (13). It is envisaged James & Wells Ref: 232658/61 LR that the security training will be conducted under a formal qualifications framework. This may include training via an independent contractor training facility, preferably once members have cleared a security check by the New Zealand Police or an equivalent authority.
The in-vehicle equipment (12) is well known apparatus for receiving and forwarding information currently used in the taxi industry to allocate passenger pick ups. Typically, the in-vehicle equipment (12) installed in each taxi (11) comprises a Mobile Data Terminal (MDT), Intelligence Interface Unit, PMDN modem and GPS receiver. The Intelligent Interface Unit provides the in-vehicle processing of 10 information, and it communicates with the software dispatch system at the monitoring station (4) and/or control centre (7).
The Mobile Data Terminal displays the message containing information regarding the activation (8b) to the licenced security taxi driver (13). It is also envisaged that the licenced security taxi driver (13) can communicate with the monitoring station 15 (4) and/or control centre (7) using pre-canned messages stored in the MDT.
Figure 2 also shows a letter box (14) used by the licenced security taxi driver (13) to leave an alarm attendance report verifying attendance at the site of alarm activation or building (2).
The method of the preferred embodiment will now be described by reference to 20 Figure 3 which is a flow diagram showing the main process steps of a preferred embodiment of the present invention.
Step A - Security Alarm is Activated A security alarm (1) is activated by the tripping of security sensors in a building (2) in known fashion. A control unit of the alarm (1) generates an activation signal or 16 James & Wells Ref: 232658/61 LR telecommunications transmission signal (3a) in response to the activation.
Step B - Telecommunications Transmission Signal sent to Monitoring Station The telecommunications transmission signal (3a) is sent via the telecommunications system (3) to the monitoring station (4).
This process takes approximately 3 to 18 seconds depending on the type of communications device being used. In a preferred embodiment, in the first instance the control unit of the alarm (1) instructs a landline telephone call to be dialled which contains the telecommunications signal (3a). For example, the alarm (1) might be programmed to dial the telephone number 0508 732874 (SECURITY) 10 which notifies a designated responding service provider via the monitoring station (4). In preferred embodiments the alarm system may be configured with a back-up dialler capability for use when the primary PTSN circuit configured to dial (for example, 0508 732874) is not functioning. Such back-up might be facilitated by connection to a second phone line, or a specialised encoded cellular phone, radio 15 or internet interface device to bypass the PTSN entirely. Such secondary means may also be utilised where there has been an intentional attempt to tamper with the phone line(s).
Step C - information Received and Processed at Monitoring Station The monitoring station (4) linked to the telecommunications system (3) receives the 20 telecommunications transmission alarm signal (3a) from the alarm (1) in a data coded form. The activation signal (3a) is decoded via receiver software within the tower box (5) of the monitoring station (4) to display an information packet (8a) containing details about the activation in a meaningful form to the operator (10) located at control centre (7). 17 James & Wells Ref: 232658/61 LR A server (6) (contained within the tower box (5)) with computer software located at the monitoring station (4) has the ability to receive and store all information packets (8a) of the alarm activation for subsequent processing. For example, this information packet (8a) may include the time and location of the security alarm (1) 5 activation and type of activation (e.g. fire, burglar, panic etc).
It is envisaged that codes may be encoded into the sensor(s) of security alarm (1) and transmitted with the activation signal (3a) to indicate a specific type of sensor that has been triggered. For example, a code for a heat or motion sensor (indicating a possible fire or intrusion respectively) may be received, interpreted 10 and stored on a specific server (6). Server (6) may include a plurality of servers, hard drive partitions, software applications or similar configured to process particular activation types. For example one server may be dedicated to fire activations and another for intrusions. This enables the same type of information to be easily stored, processed and retrieved etc on that particular server.
It is envisaged that the list of services to be monitored at the monitoring station (4) may include, but are not limited to, intrusion alarm monitoring, fire alarm and sprinkler monitoring, critical condition monitoring, medical response monitoring, elevator telephone monitoring and hold-up panic alarm monitoring.
Further information or data that can be stored by the server (6) in the tower box (5) 20 of the monitoring station (4) includes data which has been collated by the control centre (7) and system software (9) as part of the activation/response method for subsequent report generation. For example, the security registration number of the licenced security driver (13), taxi vehicle (11) details, data on direction of travel, acceptance time, time on site, possible cause of activation and action taken with 25 respect to the activation might all be stored for subsequent report generation. This 18 James & Wells Ref: 232658/61 LR information can be relayed via the monitoring station (4) to the security division of the taxi company or control centre (7), so it can be forwarded to the client (e.g. mailing a confirmation of alarm activation details and response) as proof of delivery of service.
As aforesaid, preferably the monitoring station (4) is monitored 24 hours a day and 7 days a week. The desired result of an alarm system is to cause an appropriate alarm output and response when sensors indicate the valid conditions for triggering of the alarm (1). The ability of the control unit or panel of the alarm (1) to communicate back to the monitoring station (4) 24 hours a day and 7 days a week 10 is crucial to the concept of effective and timely monitoring.
Preferably, the process of the monitoring station (4) is automated by software. For example, once the monitoring station has received, stored and processed the alarm activation information packet (8a), the software automatically transmits this information and allows further processing by software at the control centre (7).
Step D - Further Transmission Signal Transmitted to the Control Centre A further transmission signal (3b) containing the decoded alarm activation information packet (8a) is transmitted from the monitoring station (4) to the control centre (7) equipped with a software system (9) and preferably manned by operators (10).
Step E - Information Received and Processed at Control Centre The information packet (8a) is received and processed by the proprietary software system (9) at the control centre (7).
It should be appreciated that the information received and processed at the control 19 James & Wells Ref: 232658/61 LR centre (7) then later transmitted to the licenced security taxi driver (13) may occur by the following pathways: 1) A fully automated process driven by software: The proprietary taxi dispatch software system (9) can process information 5 packet (8a) to calculate the measured distance and travelling time between the nearest vehicle (11) and location of the security alarm activation.
The proprietary taxi dispatch software system (9) simultaneously processes and continuously updates the number of available licensed security taxi drivers (13) who are logged on in the suburb where the security alarm 10 activation has occurred. The closest taxi (11) and the estimated time of arrival of that taxi (11) is monitored via GPS tracking. This information and intitial alarm activation information packet (8a) is collated by the software (9) to now comprise information (8b).
Specifically, the software sends information (8b) in a priority order system 15 i.e. to the available taxi (11) in the area based on their proximity to the activation. For example, information (8b) is sent to taxis (11) which are within the range to respond to the security activation within an allocated 15 minute timeframe.
It is envisaged all calls requiring response action will be dispatched within 20 120 seconds of all relevant details received from the monitoring station (4). 2) An automated process overseen by a person (an operator (10)): In preferred embodiments of the present invention the process may be driven by software as described above and overseen by an operator (10) James & Wells Ref: 232658/61 LR located in a monitoring control room of the control centre (7). A rostered operator (10) available 24 hours a day, seven days a week may act as an additional back up to the automated process. S/he can view on a computer screen and oversee which members of the taxi service or licenced security 5 taxi driver(s) (13) are available in the area or suburb where the security alarm activation has occurred and to which licenced security taxi driver (13) the job has been assigned. 3) An automated process with manual intervention by an operator (10): In alternative embodiments of the present invention the operator (10) as 10 described above may manually intervene and override the automated software (9) (if necessary) to ensure the job is accepted by the next closest licenced security taxi driver (13).
It is envisaged that either a list of activated sensor(s) or an electronic map with location and type of sensor(s) at the protected premises may be 15 displayed on a computer screen. Therefore, an operator (10) may manually initiate various actions depending on the sensor(s) activated and the response required. For example, these actions may be immediately to alert the fire brigade if a heat sensor has been activated.
Step F - Role of Licensed Security Taxi Driver Information regarding the activation (8b) is sent by the automated software system (9) to a Mobile Data Terminal (MDT) of the in-vehicle equipment (12) of the closest available taxi (11) with licenced security taxi driver (13). In alternative embodiments the information (8b) may be sent manually by an operator (10) who inputs this information directly via computer to the in-vehicle equipment (12). 21 James & Wells Ref: 232658/61 LR The licenced security taxi driver (13) can accept jobs by way of predetermined keystrokes on the MDT of the in-vehicle equipment (12). In the event that the closest available taxi (11) with licenced security taxi driver (13) does not accept the job within a predetermined timeframe, for example 60 seconds, the next closest 5 available taxi (11) with licenced security taxi driver (13) is alerted by the automated software system (9) or operator (10) as described above and can accept the job.
It is envisaged that the licenced security taxi driver (13) will be on site within 15 minutes from the time s/he receives the job details on the MDT of the in-vehicle equipment (12) and accepts the job.
Upon accepting the job and arriving at the building (2) or site of security alarm activation, the licenced security taxi driver (13) advises the control centre (7) of the time to reach the location. This information can be recorded into the software system (9) or alternatively software can automatically determine this information via GPS. The responding licenced security taxi driver (13) then engages in a physical 15 walk around the nominated building or premises (2) to investigate whether or not there has been a breach of security and ascertain any possible cause for the alarm (1) to activate.
The role of the responding licenced security taxi driver (13) is to verify the original alarm activation notification relayed to the monitoring station (4). Also, the licenced 20 security taxi driver (13) can observe, record details for the authorities in the event of a breach of security and, if necessary, secure the site until additional authorities arrive. The licenced security taxi driver (13) can report back to the control centre (7) by activating and using pre-canned messaged stored on the MDT of the in-vehicle equipment (12) which sends data back (feedback H1 and H2) via (PMDN) 25 technologies to the control centre (7) and onto the monitoring station (4) or vice 22 James & Wells Ref: 232658/61 LR versa. As previously described, this data may include verification of the sensor(s) triggered and possible cause for the activation etc. There are two possible outcomes from this inspection: a false activation (no breach) or an actual activation (breach).
Step G1 * No Breach at Site of Alarm Activation Upon notification from the responding licenced security taxi driver (13) that no breach has occurred and the responding licenced security taxi driver (13) has verified the possible cause for the alarm's activation, the responding licenced security taxi driver (13) may leave the site. The 24 hour control centre (7) will 10 advise the monitoring station (4) in all circumstances the outcome of the response to the alarm activation which in effect closes any further responsibility of the licenced security taxi driver (13) to the job.
It is also envisaged that the control centre (7) may be able to remotely disarm and/or rearm the alarm following the response to the alarm activation.
Also, upon leaving the notified address the licenced security taxi driver (13) will preferably leave in a letter box (14) an alarm attendance report verifying attendance at that address.
Step G2 - Breach at Site of Alarm Activation In the event the licenced security taxi driver (13) considers that there has been a 20 breach at the premises or building (2), urgent action to notify either the monitoring station (4) (feedback H3) or alternatively control centre (7) (feedback H1) occurs whereby the licenced security taxi driver (13) activates the MDT of the in-vehicle equipment (12). 23 James & Wells Ref: 232658/61 LR Preferably, the monitoring station (4) or alternatively control centre (7) has a client security profile of instructions to carry out in sequence in response to such notification by the licenced security taxi driver (13). This may result in such actions as engaging one of many second tier security specialist response companies, 5 engaging the Police or Fire Service etc to attend the notified address, or other options depending on feedback (H1 or H3) instructions received.
In all circumstances should other authorities and service providers such as Police, Fire, Ambulance or glaziers be required to attend the notified address, the operator (10) located at the control centre (7) will continue to action any instructions required 10 and relay this information (feedback H2) to the monitoring station (4) as to the action being taken.
The licenced security taxi driver (13) can then receive a further notification from the monitoring station (4) (feedback H3) input by the operator (10) located at the 24 hour control centre (7) that his/her urgent notification has been acknowledged and 15 is in the process of being attended to by specialist response companies. It is intended that the licenced security taxi driver (13) will leave the site once the specialist response company(s) have arrived on site.
There are many advantages associated with this invention: « Reduced response times from the initial alarm activation (i.e. 15 minutes 20 compared to the industry norm of 25 to 60 minutes). The use of a taxi company gives access to a fleet of vehicles with an increased available coverage. Therefore it is more likely that a vehicle will be in close proximity to the site of the alarm activation. Taxi companies also have more effective despatch systems than security companies and staff 24 James & Wells Ref: 232658/61 LR experienced in allocating jobs, which leads to reduced response times.
• The method and apparatus leverages off current and historic monitoring station relationships, but offers a new and improved service concept.
« Taxi based operators have a greater geographical knowledge of the 5 coverage area, which also aides in reducing response times.
• It allows the taxi company to offer to the public a value added service such as sending licenced security officers to an alarm activation when not engaging with fare paying passengers thereby maximising the use of the taxi company's existing infrastructure/personnel.
• The reduction of costs by utilisation of existing resources. For example, the security company does not need to maintain a separate fleet of vehicles and this invention is able to use an existing taxi despatch system configured with a means for tracking vehicles/allocating jobs. Similarly, the invention provides for a productive use of vehicles and 15 drivers which often are otherwise redundant when on duty but not engaging with fare paying passengers.
Aspects of the present invention have been described by way of example only and it should be appreciated that modifications and additions may be made thereto without departing from the scope thereof as defined in the appended claims.

Claims (15)

    WHAT WE CLAIM IS:
  1. A set of computer executable instructions configured to enable a method for responding to a security alarm which includes the steps of: a. receiving an activation signal from at least one security alarm, and b. engaging at least one operator, characterised by the step of: c. engaging at least one member of a taxi service to respond to the security alarm activation in response to the activation signal.
  2. A set of computer executable instructions as claimed in claim 1, wherein the operator is engaged via the activation signal being received at a monitoring station.
  3. A set of computer executable instructions as claimed in claim 1 or claim 2, wherein the activation signal is received and processed at the monitoring station to produce an alarm information packet.
  4. A set of computer executable instructions as claimed in any one of claims 1 to 3, wherein the alarm information packet is transmitted to a control centre.
  5. A set of computer executable instructions as claimed in any one of claims 1 to 4, wherein the alarm information packet is received and processed at the control centre.
  6. A set of computer executable instructions as claimed in any one of claims 1 to 5, wherein the member of the taxi service is engaged by the operator.
  7. An apparatus for implementing a set of computer executable instructions configured to enable the method as claimed in claim 1, for responding to a security alarm which apparatus for implementing the set of computer executable instructions includes: 26 • at least one security alarm, • at least one transmission means, and • at least one operator wherein activation of the security alarm causes an activation signal to be sent via the transmission means to the operator, characterised in that at least one member of a taxi service is engaged to respond to the security alarm activation in response to the activation signal.
  8. 8. An apparatus for implementing a set of computer executable instructions as claimed in claim 7, wherein the security alarm includes a software/hardware system configured to interact with the transmission means.
  9. 9. An apparatus for implementing a set of computer executable instructions as claimed in claim 7 or claim 8, wherein the apparatus includes at least one monitoring station.
  10. 10. An apparatus for implementing a set of computer executable instructions as claimed in claim 9, wherein the activation signal is sent from the security alarm through the transmission means to the operator via the monitoring station.
  11. 11. An apparatus for implementing a set of computer executable instructions as claimed in claim 9 or claim 10, wherein the monitoring station is configured with a digital telephone dialer unit that receives the activation signal via a Public Telephone Switched Network (PTSN).
  12. 12. An apparatus for implementing a set of computer executable instructions as claimed in any one of claims 7 to 11, wherein the security alarm communicates with the monitoring station via the transmission means. 27
  13. 13. An apparatus for implementing a set of computer executable instructions as claimed in any one of claims 7 to 12, wherein the transmission means includes at least one wireless repeater.
  14. 14. A set of computer executable instructions configured to enable a method for responding to a security alarm substantially as herein described with reference to and as illustrated by Figures 2 and 3.
  15. 15. An apparatus for implementing a set of computer executable instructions configured to enable a method for responding to a security alarm substantially as herein described with reference to and as illustrated by Figures 2 and 3. Paul Thomas Staples and Jean Angela Staples by their Attorneys 28
NZ55598007A 2007-06-19 2007-06-19 A method and apparatus for providing a response NZ555980A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
NZ55598007A NZ555980A (en) 2007-06-19 2007-06-19 A method and apparatus for providing a response

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
NZ55598007A NZ555980A (en) 2007-06-19 2007-06-19 A method and apparatus for providing a response

Publications (1)

Publication Number Publication Date
NZ555980A true NZ555980A (en) 2009-03-31

Family

ID=40600339

Family Applications (1)

Application Number Title Priority Date Filing Date
NZ55598007A NZ555980A (en) 2007-06-19 2007-06-19 A method and apparatus for providing a response

Country Status (1)

Country Link
NZ (1) NZ555980A (en)

Similar Documents

Publication Publication Date Title
US11259165B2 (en) Systems, devices, and methods for emergency responses and safety
US10223891B2 (en) Real-time multi-component web based travel safety system and method
US8265241B2 (en) Apparatus for citizen requests for assistance
US8350700B2 (en) System for, and method of, monitoring the movement of mobile items
US7138916B2 (en) Computerized risk management program
RU2595631C2 (en) Notification on an emergency situation and response
US8489063B2 (en) Systems and methods for providing emergency messages to a mobile device
KR100702501B1 (en) Wireless house server and method for communicating with the wireless house server
US20020024424A1 (en) Civil defense alert system and method using power line communication
CN104401820B (en) Elevator management system
EP3058557B1 (en) A mobile control unit, a facility management system, a mobile unit control system, a facility management method and a mobile unit control method
US20220343443A1 (en) Safety management and building operational assessment system and method for multiple occupancy buildings
WO2020053678A1 (en) Kit for monitoring the services and the events in a city
RU2585991C2 (en) System for tracking and security of objects
KR101764092B1 (en) Fire protection management system using geographical information and the control mehod thereof
NZ555980A (en) A method and apparatus for providing a response
TWI421805B (en) Used to track the control of the vehicle movement and its task system monitoring system approach
JP2019179313A (en) Notification processing system and notification processing method
JP2002133565A (en) Emergency reporting system
Till et al. Notification
Lo Organizing for Intelligent Transportation Systems: Case Study of Emergency Operations in San Francisco Bay Area
RU2532721C2 (en) Corporate call centre for security and information service of group of facilities
Nasui et al. Cloud based student transportation safety system

Legal Events

Date Code Title Description
PSEA Patent sealed
LAPS Patent lapsed