WO1999039505A1 - Systeme de securite en reseau pour la surveillance et le controle d'un environnement en reseau - Google Patents

Systeme de securite en reseau pour la surveillance et le controle d'un environnement en reseau Download PDF

Info

Publication number
WO1999039505A1
WO1999039505A1 PCT/US1999/001803 US9901803W WO9939505A1 WO 1999039505 A1 WO1999039505 A1 WO 1999039505A1 US 9901803 W US9901803 W US 9901803W WO 9939505 A1 WO9939505 A1 WO 9939505A1
Authority
WO
WIPO (PCT)
Prior art keywords
control unit
site
network
security apparatus
site control
Prior art date
Application number
PCT/US1999/001803
Other languages
English (en)
Inventor
Imonitoring.Com
Sol Frank Kavy
Original Assignee
Sol Frank Kavy
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Sol Frank Kavy filed Critical Sol Frank Kavy
Priority to AU25656/99A priority Critical patent/AU2565699A/en
Publication of WO1999039505A1 publication Critical patent/WO1999039505A1/fr

Links

Classifications

    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B25/00Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems
    • G08B25/14Central alarm receiver or annunciator arrangements
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms
    • G08B13/18Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength
    • G08B13/189Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems
    • G08B13/194Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems
    • G08B13/196Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
    • G08B13/19654Details concerning communication with a camera
    • G08B13/19656Network used to communicate with a camera, e.g. WAN, LAN, Internet
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms
    • G08B13/18Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength
    • G08B13/189Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems
    • G08B13/194Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems
    • G08B13/196Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
    • G08B13/19678User interface
    • G08B13/19682Graphic User Interface [GUI] presenting system data to the user, e.g. information on a screen helping a user interacting with an alarm system
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms
    • G08B13/22Electrical actuation
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/20Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
    • H04N21/25Management operations performed by the server for facilitating the content distribution or administrating data related to end-users or client devices, e.g. end-user or client device authentication, learning user preferences for recommending movies
    • H04N21/258Client or end-user data management, e.g. managing client capabilities, user preferences or demographics, processing of multiple end-users preferences to derive collaborative data
    • H04N21/25808Management of client data
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/40Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
    • H04N21/41Structure of client; Structure of client peripherals
    • H04N21/4104Peripherals receiving signals from specially adapted client devices
    • H04N21/4131Peripherals receiving signals from specially adapted client devices home appliance, e.g. lighting, air conditioning system, metering devices
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/40Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
    • H04N21/41Structure of client; Structure of client peripherals
    • H04N21/422Input-only peripherals, i.e. input devices connected to specially adapted client devices, e.g. global positioning system [GPS]
    • H04N21/4227Providing Remote input by a user located remotely from the client device, e.g. at work
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/40Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
    • H04N21/43Processing of content or additional data, e.g. demultiplexing additional data from a digital video stream; Elementary client operations, e.g. monitoring of home network or synchronising decoder's clock; Client middleware
    • H04N21/436Interfacing a local distribution network, e.g. communicating with another STB or one or more peripheral devices inside the home
    • H04N21/43615Interfacing a Home Network, e.g. for connecting the client to a plurality of peripherals
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/40Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
    • H04N21/43Processing of content or additional data, e.g. demultiplexing additional data from a digital video stream; Elementary client operations, e.g. monitoring of home network or synchronising decoder's clock; Client middleware
    • H04N21/442Monitoring of processes or resources, e.g. detecting the failure of a recording device, monitoring the downstream bandwidth, the number of times a movie has been viewed, the storage space available from the internal hard disk
    • H04N21/44231Monitoring of peripheral device or external card, e.g. to detect processing problems in a handheld device or the failure of an external recording device
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/60Network structure or processes for video distribution between server and client or between remote clients; Control signalling between clients, server and network components; Transmission of management data between server and client, e.g. sending from server to client commands for recording incoming content stream; Communication details between server and client 
    • H04N21/65Transmission of management data between client and server
    • H04N21/658Transmission by the client directed to the server
    • H04N21/6582Data stored in the client, e.g. viewing habits, hardware capabilities, credit card number
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N7/00Television systems
    • H04N7/10Adaptations for transmission by electrical cable
    • H04N7/106Adaptations for transmission by electrical cable for domestic distribution
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N7/00Television systems
    • H04N7/18Closed-circuit television [CCTV] systems, i.e. systems in which the video signal is not broadcast
    • H04N7/181Closed-circuit television [CCTV] systems, i.e. systems in which the video signal is not broadcast for receiving images from a plurality of remote sources
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/20Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
    • H04N21/25Management operations performed by the server for facilitating the content distribution or administrating data related to end-users or client devices, e.g. end-user or client device authentication, learning user preferences for recommending movies
    • H04N21/258Client or end-user data management, e.g. managing client capabilities, user preferences or demographics, processing of multiple end-users preferences to derive collaborative data
    • H04N21/25866Management of end-user data
    • H04N21/25875Management of end-user data involving end-user authentication

Definitions

  • the present invention relates to the field of security systems, computer networks, and remote control systems.
  • Conventional security monitoring and control systems typically use direct point-to-point connections between a monitored location and a central control facility.
  • a hard-wired direct connection between a site control unit at the monitored location and the central control facility is used.
  • a point-to-point telephone line is used to transmit data between a control device at the monitored location and the central monitoring facility via a modem.
  • wireless transmission and receiving apparatus is used to transmit security data between a monitored location and a central control facility.
  • the bandwith limitations imposed by the wireless apparatus or the telephone infrastructure limits the amount and type of data that can be transmitted from the monitored location and the control facility. For example, many of these prior art systems are unable to transmit video as part of the transmitted security information.
  • U.S. Patent No. 4,876,597 assigned to ADT Security Systems, Inc., Parsippany, New Jersey ('597 herein), is representative of one type of prior art system.
  • the '597 patent describes a video observation system wherein a scene to be monitored at a remote location is captured as a series of still images. The monitoring of freight trains is cited as an application of this system. If the observer is at a location remote from the point at which the images are taken, the patent states that various techniques can be used to facilitate transmission of the image information (preferably in digital form) through relatively low cost transmission links such as voice grade telephone lines.
  • This patent represents conventional systems that use telephone lines for the transmission of security data from a monitored location to a control facility.
  • U.S. Patent No. 5,699,276 describes a utility meter interface apparatus for measuring utility usage at a residential location.
  • a computer is connected to the utility meter and provides an interface between a communication network and a device located inside the home.
  • the disclosed system relates to remote utility meter reading and remote load management.
  • the system includes a network interface that may be coupled to a digital service network, that communicates, for example, via satellite, wireless communication, fiber-optic cables, coaxial cables, or twisted pair telephone lines.
  • U.S. Patent No. 5,684,799 describes a full-service network having a distributed architecture.
  • the video distribution network consolidates video streams from different information providers and outputs a consolidated signal onto a transport ring.
  • the digital information is transmitted using asynchronous transfer mode (ATM) and RF distribution over a hybrid-fiber-coax local loop distribution.
  • ATM synchronous transfer mode
  • RF RF distribution over a hybrid-fiber-coax local loop distribution.
  • U.S. Patent No. 5,675,390 describes a home entertainment system combining complex processor capability with a high-quality display.
  • This patent relates to a home entertaining system having a high-quality monitor to display digitally received broadband video without a loss of signal quality.
  • the system provides a multipurpose computer system to control consumer electronics such as a large monitor or television.
  • the circuitry also provides audio and video tuning capability.
  • high-quality video signals are received from satellites broadcasting digital video signals, digital cable signals, and other wireless digital broadcasts.
  • a computer system with a card inserted therein includes a satellite tuner, digital demodulator, and a means to capture video, audio, and data in a form which a personal computer can process.
  • the system also provides support for remote control of both the personal computer and the monitor functions in the personal computer.
  • U.S. Patent No. 5,648,966 describes a method of sending an alarm to a network management station when an unusual event occurs in a managed network station.
  • This patent represents a class of technology related to the administration of a computer network.
  • These specialized network management systems provide a means for detecting network errors and for performing predefined procedures or notifications as a result of a network error. These systems are not analogous to the residential or commercial security monitoring and control of the present invention.
  • a networked security system for network-based monitoring and control of an environment includes: 1) a site control unit for monitoring and controlling devices in an environment, the site control unit further includes a site system controller for assembling device information into data packets for transfer on a network; and, 2) a user system connected with the site control unit via the network for receiving the data packets from the site control unit via the network and for processing the data packets for access by a networked user.
  • Figure 1 illustrates a prior art computer network topology.
  • Figure 2 illustrates the prior art architecture of a conventional computer system.
  • Figure 3 illustrates the computer network architecture of the preferred embodiment.
  • FIG. 4 illustrates the network structure of the present invention in more detail.
  • Figure 5 illustrates the site system controller software architecture.
  • Figure 6 illustrates the central station software architecture.
  • FIGS. 7-11 are flowcharts illustrating the processing logic used by the present invention.
  • the present invention is a networked security system for network-based monitoring and control of an environment.
  • numerous specific details are set forth in order to provide a thorough understanding of the present invention. However, it will be apparent to one of ordinary skill in the art that these specific details need not be used to practice the present invention. In other circumstances, well known structures, materials, circuits, and interfaces have not been shown or described in detail in order not to unnecessarily obscure the present invention.
  • Wide-area network 110 includes the Internet, or other proprietary networks including America On-Line , CompuServe , Microsoft Network , and Prodigy TM, each of which are well known to those of ordinary skill in the art.
  • Wide-area network 110 may include conventional network backbones, long-haul telephone lines, Internet service providers, various levels of network routers, and other conventional means for routing data between computers.
  • server 100 may communicate through wide-area network 110 to a plurality of client computer systems 120, 130, 140 connected through wide-area network 110 in various ways.
  • client 140 is connected directly to wide-area network 110 through direct or dial up telephone or other network transmission line.
  • clients 130 may be connected through wide-area network 110 using a modem pool 114.
  • a conventional modem pool 114 allows a plurality of client systems to connect with a smaller set of modems in modem pool 114 for connection through wide-area network 110.
  • wide-area network 110 is connected to a gateway computer 112.
  • Gateway computer 112 is used to route data to clients 120 through a local area network 116. In this manner, clients 120 can communicate with each other through local area network 116 or with server 100 through gateway 112 and wide-area network 110.
  • server computer 100 can communicate with client computers 150 using conventional means.
  • a server computer 100 may operate as a web server if the World-Wide Web (WWW) portion of the Internet is used for wide area network 110.
  • WWW World-Wide Web
  • web server 100 may communicate across the World-Wide Web with clients 150.
  • clients 150 use a client application program known as a web browser such as the NetscapeTM NavigatorTM published by Netscape Corporation of Mountain View, CA, the Internet ExplorerTM published by Microsoft Corporation of Redmond, Washington, the user interface of America On-LineTM, or the web browser or HTML translator or any other well-known supplier.
  • clients 150 may access graphical and textual data provided by web server 100.
  • FIG. 2 illustrates an example of a computer system 200 illustrating an exemplary client 150 or server 100 computer system in which the features of the present invention may be implemented.
  • Computer system 200 is comprised of a bus or other communications means 201 for communicating information, and a processing means such as processor 202 coupled with bus 201 for processing information.
  • Computer system 200 further comprises a random access memory (RAM) or other dynamic storage device 204 (commonly referred to as main memory), coupled to bus 201 for storing information and instructions to be executed by processor 202.
  • Main memory 204 also may be used for storing temporary variables or other intermediate information during execution of instructions by processor 202.
  • Computer system 200 also comprises a read only memory (ROM) and /or other static storage device 206 coupled to bus 201 for storing static information and instructions for processor 202.
  • ROM read only memory
  • An optional data storage device 207 such as a magnetic disk or optical disk and its corresponding drive may also be coupled to computer system 200 for storing information and instructions.
  • Computer system 200 can also be coupled via bus 201 to a display device 221, such as a cathode ray tube (CRT) or a liquid crystal display (LCD), for displaying information to a computer user.
  • a display device 221 such as a cathode ray tube (CRT) or a liquid crystal display (LCD)
  • graphical depictions of a business card and other types of graphical or textual information may be presented to the user on display device 221.
  • an alphanumeric input device 222 including alphanumeric and other keys is coupled to bus 201 for communicating information and/or command selections to processor 202.
  • cursor control device 223, such as a conventional mouse, trackball, or other type of cursor direction keys for communicating direction information and command selection to processor 202 and for controlling cursor movement on display 221.
  • the client 150 can be implemented as a network computer or thin client device, such as the WebTV NetworksTM Internet terminal or the OracleTM NC.
  • Client 150 may also be a laptop or palm-top computing device, such as the Palm PilotTM.
  • Such a network computer or thin client device does not necessarily include all of the devices and features of the above-described exemplary computer system; however, the functionality of the present invention may nevertheless be implemented with such devices.
  • a communication device 225 is also coupled to bus 201 for accessing remote computers or servers, such as web server 100, or other servers via the Internet, for example.
  • the communication device 225 may include a modem, a network interface card, or other well known interface devices, such as those used for interfacing with Ethernet, Token-ring, or other types of networks.
  • the computer system 200 may be coupled to a number of servers 100 via a conventional network infrastructure such as the infrastructure illustrated in Figure 1 and described above.
  • the present invention includes hardware and various processing steps, which will be described below.
  • the steps of the present invention may be embodied in machine or computer executable instructions.
  • the instructions can be used to cause a general purpose or special purpose processor, which is programmed with the instructions to perform the steps of the present invention.
  • the steps of the present invention may be performed by specific hardware components that contain hard wired logic for performing the steps, or by any combination of programmed computer components and custom hardware components. While embodiments of the present invention will be described with reference to the World-Wide Web, the method and apparatus described herein is equally applicable to other network infrastructures or other data communications systems.
  • FIG. 3 a preferred embodiment of the network configuration of the present invention is illustrated.
  • users at one of a plurality of user systems 314 and administrators at one of a plurality of central stations 316 may access one of a plurality of site control units 320 to monitor and control devices 322 at one of a plurality of sites 312 being monitored via the Internet 310.
  • User system 314 can be used by anyone authorized to access devices 322 at site 312.
  • the term "users" or "system users” denotes herein an operator of a user system 314.
  • Central station 316 is an administration site, which validates the operation of the networked security system and the authority of those using the system.
  • central stations 316 There can be one or a plurality of central stations 316.
  • the term "administrator” or "central station user” denotes herein an operator of a central station 316.
  • the central station 316 uses one or a plurality of databases 317 either resident within central station 316 or, as shown in Figure 3, residing on a network-accessible database server 317.
  • the database 317 is used for storage of device status information from monitored site 312 or user information related to users of user system 314.
  • Database 317 may be any of a variety of conventional ODBC-compliant databases, such as Microsoft Access, Oracle 8, or a SQL server. It will be apparent to those of ordinary skill in the art that database 317 may represent a plurality of databases. Providing a plurality of databases allows the system to support a plurality of redundant central stations 316.
  • user system 314 and central station 316 may be implemented as conventional computer systems with network access capability, such as the exemplary system shown in Figure 2.
  • Site control unit 320 may also be implemented as a conventional computer system, a conventional alarm panel, or a set-top box as described above.
  • Software for implementing the present invention runs on user system 314, central station 316, and on site control unit 320.
  • the present invention provides a means and method for networked-based monitoring and control of a site accessible via the Internet.
  • the preferred embodiment can be connected to the Internet and a conventional alarm panel.
  • the system performs the control functions and makes monitoring information available to any authorized users on the Internet.
  • the system is typically connected to a local LAN 116 and data packets are routed onto the Internet.
  • the system may connect directly to the Internet via a conventional Internet service provider (ISP), or users may connect to the Internet through central station 316, which may act as an ISP using conventional methods.
  • ISP Internet service provider
  • central station 316 which may act as an ISP using conventional methods.
  • the networked security system includes: 1) a site control unit for monitoring and controlling devices in an environment, the site control unit further includes a site system controller for assembling device information into data packets for transfer on the network; and, 2) a user system connected with the site control unit via the network for receiving the data packets from the site control unit via the network and for processing the data packets for access by a networked user.
  • a self-monitoring model users of user systems 314 communicate through the Internet directly with a Web server within site control unit 320. In this manner, a user may directly monitor or control devices at a site 312 of interest.
  • the user in a self-monitoring model is presented with a user interface on user system 314 providing the user with a full set of controls and real-time monitoring and status information for monitoring and controlling site 312.
  • the second type of access model is a station monitoring model.
  • a Web server within central station 316 collects information from site control unit 320 and stores this information in a database 317.
  • This collected information includes configuration and status information for the site control unit and user information including account and user configuration information.
  • the database 317 allows central station 316 to maintain complete and current status, as well as a status history, for all monitoring and control devices 322 at monitored site 312. Given that there may be many monitored sites 312, central station 316 keeps the information in database 317 up to date for each of the plurality of monitored sites 312. Users of user systems 314 may directly access the site control unit 320 in self-monitoring model, or users may query the status of a monitored site 312 by querying database 317 updated as a result of the station monitoring model.
  • the user system 314 computing system includes a Web interface 414, which includes a conventional Web client.
  • the Web Interface 414 may be implemented on a standard browser 416, such as one of the browsers listed above. These components provide network 310 or Internet access for the user system 314.
  • GUI graphical user interface
  • the site control unit 320 at the site 312 being monitored or controlled includes a site system controller 420.
  • the site system controller 420 contains the bulk of the software for driving the system of the present invention. This software is described in more detail below in connection with Figure 5.
  • the site system controller 420 can be coupled with several different types of conventional devices for controlling a variety of different types of monitoring and control devices.
  • site system controller 420 can be coupled with a conventional alarm panel 430, which is coupled with an array of conventional monitoring and control devices 322.
  • several conventional alarm panels 430 may be used, such as the FE100 or 685 units by AdemcoTM, the Martonics, SAFECOM, or Concept 1000/2000/3000 panels.
  • these conventional alarm panels include at least two external interfaces: a control interface 428 and a telephone line interface 427.
  • control interface 428 is a standard interface using a conventional protocol for enabling the alarm panel 430 to be programmed and controlled by a field service engineer.
  • This control interface 428 is connected with a compatible interface in the site system controller 420.
  • the telephone line interface 427 of the alarm panel is also a conventional alarm panel interface for reporting digital alarm and status information to a central facility.
  • this telephone interface is connected to a compatible interface of the site system controller 420.
  • several conventional monitoring and control devices 322 may be used with the present invention. These control devices 322 include, but are not limited to: window / door sensors, door openers, access
  • monitoring and control devices 322 include other types of devices including video cameras or other video sources, video cassette recorders (VCRs), audio sources, infrared (IR) programmable devices, or other types of monitoring or control devices. It will be apparent to those of ordinary skill in the art that the functionality of the site system controller 420 and the functionality of the alarm panel 430 may be integrated into a single unit.
  • site system controller 420 can also be coupled with a conventional device controller 432, such as a CM11A device controller manufactured by X-10 (USA) Inc. of Closter, NJ.
  • a conventional device controller 432 such as a CM11A device controller manufactured by X-10 (USA) Inc. of Closter, NJ.
  • Such conventional devices may be programmed to control a variety of devices 322, such as the devices set forth be example above.
  • These control devices 432 typically include a serial data interface for transferring data and control messages to/from the device.
  • the site system controller 420 is coupled to the conventional device controller 432 via this serial interface. It will be apparent to those of ordinary skill in the art that a variety of conventional control devices may be coupled to the site system controller 420 using conventional types of interfaces.
  • the site system controller 420 may also be configured to include a conventional video controller card 434, a conventional audio controller card 436, and a conventional IR controller card 438. These controllers, typically implemented as circuit cards housed within site system controller 420, may be used to receive and process corresponding video and audio data from devices 322.
  • the conventional IR controller 438 may be used to produce IR command signals for programming devices 322 having an IR receiver. Controllers 434, 436, and 438 typically include firmware or software drivers for programming the controllers via software within site system controller 420. It will be apparent to one of ordinary skill in the art that one or more of the control devices 430, 432,
  • the site system controller 420 software architecture 520 is illustrated.
  • the site system controller software 520 includes an embedded Web server 424 for accepting service requests from a user system 314 or a central station 316.
  • This software component may be implemented using a conventional Personal Web Server as developed by Microsoft Corporation of Redmond, Washington or the WebSite Server produced by O'Reilly Associates.
  • the site system controller software 520 also includes an embedded event server 512.
  • the event server 512 provides a means by which the site system controller 420 automatically obtains updated status information from one or more control devices 322 and forwards the status information to one or more central stations 316 or one or more databases 317 at pre-configured time intervals.
  • the site system controller software 520 further includes a graphical user interface generator (GUI) 513 for providing a user with a graphical means for monitoring and controlling the environment at the site 312.
  • GUI graphical user interface generator
  • the graphical user interface generator 513 of the site system controller software 520 includes a means for displaying and controlling the selection and manipulation of abstraction images or icons that represent objects familiar in the site 312 setting. These abstractions can be manipulated by the user to activate and control corresponding control devices 322 at the site 312.
  • the abstraction images and the other displayed components of the GUI 513 are constructed mainly in the site system controller 420 as conventional Web pages coded in a conventional coding language such as the Hypertext Markup Language (HTML). These Web pages of GUI 513 are transferred to user system 314 or central station 316 via network 310 and displayed to a user or administrator via the browser 416.
  • HTML Hypertext Markup Language
  • the site system controller software 520 further includes a Common Application Language Interface 514 (CAL) published by the CEBus Committee of the Electronic Industry Association (EIA), Specification EIA-600, first published in 1992.
  • This conventional interface provides a generic object interface for manipulating objects corresponding to control devices 322, or portions thereof.
  • the CAL interface is also described in the "CEBus Standard User's Guide, Grayson Evans, May, 1996.
  • the CAL interface is a basic description of a set of abstract base classes for Object Oriented programming. The base classes detail the data and methods for representing monitoring/control devices such as, televisions, VCRs, lights, dimmers, and security panels.
  • the CAL interface 514 translates a user or administrator action request into one or more device controller-specific commands for implementing the action request on a particular set of installed device controllers 321.
  • Common Object Modules COM or DCOM
  • COM is a conventional methodology (or approach to programming) in which the implementation and the interfaces are separated in a very specific manner. The approach yields a true separation between how something works and the interface to it.
  • COM is often used for programming in a Microsoft Win32 Application Program Interface (API). It allows different versions of systems to co-exist on the same platform. A description of the conventional COM system is found in, "Dale Rogerson; Inside COM, Microsoft's Component Object Model; Microsoft Press; 1997.”
  • the site system controller software 520 further includes a real time event manager 516 for responding to alarms and other events occurring in one or more of the control devices 322.
  • the real time event manager 516 receives an alert from one or more control devices 322 via a device controller 321 and performs one or more tasks or actions in response to the alert.
  • the tasks performed in response to a particular alert are pre-configured in the real time event manager
  • the tasks may include: sending an email message to a defined address, calling a pager, sending an error message, posting a database entry, or other types of actions.
  • the site system controller software 520 further includes a device model 518 for handling the device controller specific interfaces.
  • a particular device controller 321 may be an X10 device having an X10 type interface.
  • a LonWorks controller having a LonWorks interface developed by Echelon Corporation, Palo Alto, Ca. may be used.
  • the device model 518 insulates the higher level software components of the site system controller software 520 from the device-specific details of the device controller 321 interface.
  • the site system controller software 520 is supported in the preferred embodiment by the Windows 95 or Windows CE operating system 505 developed by Microsoft Corporation of Redmond, Washington.
  • the Windows operating system is well-known to those of ordinary skill in the art.
  • the operating system 505 of the preferred embodiment includes a conventional Secure Socket Layer (SSL) 506 component for handling secure data transfers between the site control unit 320 and user system 314 or central station 316.
  • SSL Secure Socket Layer
  • the central station 316 may act as a Web client or a Web server.
  • the central station contains both a conventional Web client 614 and a Web server 612. Both the Web server 612 and the Web client 614 are layered on a conventional browser 616 as described above.
  • the central station 316 also includes a database server 618 for accessing database 317. As described above, database 317 is used for storage of device status information and user information.
  • the Web server 612 of the central station 316 is used to collect information from the site control unit 320 and to cause the storage of this collected information into the database 317.
  • the Web client 614 of the central station 316 is used to access the database 317 to retrieve
  • the Web client 614 is further used to directly access a site control unit 320 to configure a device, check status of a device, or control a device at a monitored site 312. It will be apparent to those of ordinary skill in the art that the software components of the central station 316 and database 317 may be implemented on the same hardware platform or different hardware platforms as desired in a particular implementation.
  • FIGS 7-11 flowcharts illustrate the processing logic of the present invention.
  • Figures 7-9 illustrate the interaction between the processing logic in the user system 314 and the site system controller software 520 for implementing the preferred embodiment.
  • Figures 10 and 11 illustrate the interaction between the processing logic in the central station 316 and the site system controller software 520 for implementing the preferred embodiment.
  • a user at user system 314 invokes a conventional browser 416 (block 710).
  • the browser makes a request to a Domain Name Server (DNS) for a look-up of the requesting user's name.
  • DNS Domain Name Server
  • an IP address of a site control unit corresponding to the user is obtained from the DNS (block 715).
  • the user system 314 then makes an access to the user's site control unit 320 (SCU) using the retrieved IP address.
  • the Web server 424 of the SCU 320 returns a challenged-based request to the user system 314 via a Secure Socket Layer (SSL) 506 transaction (block 720).
  • SSL Secure Socket Layer
  • SSL is a conventional protocol.
  • the user system 314 responds to the SCU 320 with a secure response that requests access to the SCU 320 by the user of user system 314 (block 725). If the user is granted access to the SCU 320 on the basis of previously established authorization criteria for the user, processing path 735 is taken to the bubble labeled A shown in Figure 8. If access to the SCU 320 is denied, processing path 740 is taken back to block 715 where the user may enter new identifying information to obtain access to the SCU 320.
  • GUI 513 of site control unit 320 responds to the user system 314 access with the first of a set of HTML encoded Web pages of the SCU graphical user interface (GUI 513). These Web pages are transferred to the user system 314 and displayed by browser 416 (block 810). Using conventional browser tools, the user may navigate through these Web pages of GUI 513 and select one or more of the symbols and objects presented on these Web pages (block 815).
  • the symbols and objects generated by GUI 513 and displayed at the user system 314 represent abstraction symbols and objects that each correspond to an individual or set of control devices supported by that particular site control unit 320.
  • the user may navigate to a particular abstraction symbol of interest and select the abstraction symbol using browser 416 (block 820).
  • an action request message is sent to the site control unit 320 (block 820).
  • the SCU 320 invokes a CAL object interface corresponding to the action request message, which corresponds to the selected abstraction symbol (block 825).
  • the invoked CAL object interface of CAL Interface 514 causes a message to be sent to activate a corresponding driver interface through device model 518 (block 830).
  • the activated driver interface corresponds to the action request received from the user system 314.
  • the activated driver interface activates a corresponding driver and causes the driver to issue a controller level command to perform the specified action on the specified control device of control devices 322 through controllers 321.
  • the specified action and the specified control device is identified using information in the action request message.
  • hardware performs the controller level command to complete the specified action on the specified control device (block 835). Processing continues at the bubble labeled B shown in Figure 9.
  • processing for the user system / site control unit processing continues at bubble B.
  • the user has selected an abstraction symbol on the user system 314 and caused a corresponding action to be performed at site 312 through site control unit 320.
  • the site control unit 320 confirms completion of the controller level command and the action request by obtaining control device status for the activated control device from one of controllers 321 (block 910).
  • the control device status and action request status is sent from the SCU 320 to user system 314.
  • the updated control device status is reflected in the Web Pages of GUI 513 (block 915). Processing for the user system / site control unit in this illustrative example ends at block 920.
  • FIG. 10 a first portion of the interaction between the processing logic in the central station 316 and the site system controller software 520 is illustrated.
  • an event occurs in one of the control devices 322.
  • Such an event could include a tripped sensor, an alarm activation, a status change notification, etc.
  • the event causes the alarm panel 430 to fault in an alarm condition (block 1010).
  • the alarm panel 430 fault condition is detected by a sensor driver through device model 518.
  • the sensor driver passes the fault condition to the real time event manager 516 in the SCU 320 (block 1015).
  • the real time event manager 516 detects that the received fault condition is a security type of fault.
  • a previously configured set of actions i.e.
  • an action request path is initiated by the SCU 320 in response to this security fault (block 1020).
  • a different action request path may be pre-configured in real time event manager 516 for handling other types of faults, such as fire events, status transitions, etc.
  • the action request path will include a step of updating database 317 with information related to the fault condition.
  • a database update request is sent by the SCU 320 to one or more IP addresses corresponding to one or more databases 317 and one or more central stations 316 (block 1025).
  • the central station 316 updates the database 317.
  • an action request path for a particular type of fault may include various methods of notification including, sending an email to some predefined location to notify an individual of the fault, issuing a page or a telephone call, or other types of conventional actions in response to a fault.
  • the central station 316 sends a status message back to the SCU 320 that originated the event.
  • the status message serves as acknowledgement to the SCU 320 that the central station 316 satisfactorily handled the event (block 1120). Processing for the interaction between the SCU 320 and the central station 316 in this illustrative example terminates at block 1125.

Landscapes

  • Engineering & Computer Science (AREA)
  • Multimedia (AREA)
  • Signal Processing (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • Databases & Information Systems (AREA)
  • Human Computer Interaction (AREA)
  • Automation & Control Theory (AREA)
  • Computer Graphics (AREA)
  • Business, Economics & Management (AREA)
  • Emergency Management (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Computer And Data Communications (AREA)

Abstract

L'invention porte sur un système de sécurité en réseau destiné à la surveillance et au contrôle d'un environnement en réseau. Le système de sécurité en réseau inclut: 1) un poste de contrôle de site (320) pour surveiller et contrôler des dispositifs (322) dans un environnement. Le poste de contrôle de site (320) inclut en outre un système de contrôle du site qui recueillent des données sur le site et les rassemble en paquets pour les transférer dans un réseau (310); et 2) un système utilisateur (314) relié au poste de contrôle de site (320), par l'intermédiaire du réseau (310), pour recevoir les paquets de données du système de contrôle du site (320) à travers le réseau (310) et pour traiter ces paquets de données de manière à permettre à un utilisateur du réseau d'y accéder.
PCT/US1999/001803 1998-01-29 1999-01-27 Systeme de securite en reseau pour la surveillance et le controle d'un environnement en reseau WO1999039505A1 (fr)

Priority Applications (1)

Application Number Priority Date Filing Date Title
AU25656/99A AU2565699A (en) 1998-01-29 1999-01-27 Networked security system for network-based monitoring and control of an environment

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US1567498A 1998-01-29 1998-01-29
US09/015,674 1998-01-29

Publications (1)

Publication Number Publication Date
WO1999039505A1 true WO1999039505A1 (fr) 1999-08-05

Family

ID=21772868

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/US1999/001803 WO1999039505A1 (fr) 1998-01-29 1999-01-27 Systeme de securite en reseau pour la surveillance et le controle d'un environnement en reseau

Country Status (2)

Country Link
AU (1) AU2565699A (fr)
WO (1) WO1999039505A1 (fr)

Cited By (25)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1089493A2 (fr) * 1999-10-01 2001-04-04 General Electric Company Méthode de diagnostique à distance sur Internet
WO2001040912A2 (fr) * 1999-11-30 2001-06-07 Amico Joseph N D Systeme de securite lie a internet
EP1151427A1 (fr) * 1999-01-09 2001-11-07 Heat Timer Corporation Systeme de transmission de messages electroniques pouvant etre utilises pour la surveillance d'equipements et procede d'utilisation
WO2001084839A1 (fr) * 2000-05-03 2001-11-08 Perceptual Robotics, Inc. Systeme de gestion de reseau de cameras
DE10056216A1 (de) * 2000-11-13 2002-05-16 Siemens Ag Überwachungssystem für die unter Führung einer Projektleitung erfolgende Installation einer technischen Anlage und Verfahren zur Überwachung des Installationsortes der unter Führung einer Projektleitung erfolgende Installation einer technischen Anlage
EP1246149A1 (fr) * 1999-11-12 2002-10-02 Future Amenity Line Kabushiki Kaisha Syst me de s curit utilisant l'internet
EP1248465A1 (fr) * 1999-11-30 2002-10-09 Ecchandes Inc. Systeme d'acquisition de donnees, oeil artificiel, dispositif de vision, capteur d'images, et appareil associe
GB2377068A (en) * 2001-06-26 2002-12-31 Intamac Systems Ltd Security system with remote communication
EP1304672A1 (fr) * 2000-06-30 2003-04-23 Japan Network Service Co., Ltd Procede de surveillance a distance et serveur de commande de dispositif de surveillance
EP1465131A2 (fr) * 2000-03-13 2004-10-06 Pittway Corporation Système de securité et de communication integré avec liaison de communication securisée
EP1550095A2 (fr) * 2002-05-08 2005-07-06 Nettalon Security Systems, Inc. Procede et dispositif pour le controle de site a distance
ES2247917A1 (es) * 2004-03-22 2006-03-01 Secosol Soluciones Y Domotica S.L. Sistema de seguridad y televigilancia de localizaciones integrando el telecontrol de dispositivos domesticos.
EP1650346A1 (fr) * 2003-06-16 2006-04-26 KDM Co., Ltd. Systeme de gestion de blanchisserie automatique
FR2878057A1 (fr) * 2004-11-15 2006-05-19 Valerie Mai Dispositif de surveillance bebe ou jeune enfant adapte aux sites de dimensions importantes avec multi-utilisateurs
FR2878061A1 (fr) * 2004-11-16 2006-05-19 Domfort Soc Par Actions Simpli Systeme et procede de videosurveillance, centrale et terminal, adaptes pour ce systeme
AU2005217992B2 (en) * 2000-03-13 2007-03-29 Honeywell International Inc. Integrated security and communications system with secure communications link
FR2891938A1 (fr) * 2005-10-10 2007-04-13 Christophe Tuffery Procede de transmission d'informations non vocales permettant d'ameliorer l'efficacite des centres de secours.
WO2008056320A1 (fr) * 2006-11-07 2008-05-15 David Miles Winson Système de sécurité
EP1946275A2 (fr) * 2005-10-18 2008-07-23 Honeywell International Inc. Systeme de securite signalant des evenements par l'intermediaire de messages electroniques
EP2192563A1 (fr) * 2008-11-26 2010-06-02 Comcast Cable Communications, LLC Système de sécurité de bâtiment
GB2508131A (en) * 2012-09-28 2014-05-28 Thomas Damian Jordan Remotely monitoring status information
CN1559120B (zh) * 2001-09-25 2014-06-25 皇家飞利浦电子股份有限公司 用于监视网络设备状态的系统和方法
US8966044B2 (en) 2001-01-26 2015-02-24 Schneider Electric It Corporation Methods for displaying physical network topology and environmental status by location, organization, or responsible party
CN106056819A (zh) * 2016-06-27 2016-10-26 合肥指南针电子科技有限责任公司 一种住宅楼道内车辆防盗系统及方法
US9978265B2 (en) 2016-04-11 2018-05-22 Tti (Macao Commercial Offshore) Limited Modular garage door opener

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4962473A (en) * 1988-12-09 1990-10-09 Itt Corporation Emergency action systems including console and security monitoring apparatus
US4992866A (en) * 1989-06-29 1991-02-12 Morgan Jack B Camera selection and positioning system and method
US5206732A (en) * 1991-01-10 1993-04-27 Sony Broadcast & Communications Limited Video camera control apparatus
US5491511A (en) * 1994-02-04 1996-02-13 Odle; James A. Multimedia capture and audit system for a video surveillance network
US5583796A (en) * 1995-06-06 1996-12-10 Philips Electronics North America Corporation Video security backup system

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4962473A (en) * 1988-12-09 1990-10-09 Itt Corporation Emergency action systems including console and security monitoring apparatus
US4992866A (en) * 1989-06-29 1991-02-12 Morgan Jack B Camera selection and positioning system and method
US5206732A (en) * 1991-01-10 1993-04-27 Sony Broadcast & Communications Limited Video camera control apparatus
US5491511A (en) * 1994-02-04 1996-02-13 Odle; James A. Multimedia capture and audit system for a video surveillance network
US5583796A (en) * 1995-06-06 1996-12-10 Philips Electronics North America Corporation Video security backup system

Cited By (54)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1591978A3 (fr) * 1999-01-09 2006-01-04 Heat Timer Corporation Système de transmission de messages électroniques pour la surveillance d'équipements et procédé d'utilisation
EP1151427A4 (fr) * 1999-01-09 2004-05-19 Heat Timer Corp Systeme de transmission de messages electroniques pouvant etre utilises pour la surveillance d'equipements et procede d'utilisation
EP1151427A1 (fr) * 1999-01-09 2001-11-07 Heat Timer Corporation Systeme de transmission de messages electroniques pouvant etre utilises pour la surveillance d'equipements et procede d'utilisation
JP2003526230A (ja) * 1999-01-09 2003-09-02 ヒート タイマー コーポレーション 装置を監視する時に使用可能な電子メッセージ配信システムおよびその方法
EP1591978A2 (fr) * 1999-01-09 2005-11-02 Heat Timer Corporation Système de transmission de messages électroniques pour la surveillance d'équipements et procédé d'utilisation
EP1089493A2 (fr) * 1999-10-01 2001-04-04 General Electric Company Méthode de diagnostique à distance sur Internet
EP1089493A3 (fr) * 1999-10-01 2002-07-03 General Electric Company Méthode de diagnostique à distance sur Internet
EP1246149A1 (fr) * 1999-11-12 2002-10-02 Future Amenity Line Kabushiki Kaisha Syst me de s curit utilisant l'internet
EP1246149A4 (fr) * 1999-11-12 2003-03-19 Future Amenity Line Kabushiki Syst me de s curit utilisant l'internet
EP1248465A1 (fr) * 1999-11-30 2002-10-09 Ecchandes Inc. Systeme d'acquisition de donnees, oeil artificiel, dispositif de vision, capteur d'images, et appareil associe
WO2001040912A3 (fr) * 1999-11-30 2002-03-07 Amico Joseph N D Systeme de securite lie a internet
EP1248465A4 (fr) * 1999-11-30 2005-06-22 Ecchandes Inc Systeme d'acquisition de donnees, oeil artificiel, dispositif de vision, capteur d'images, et appareil associe
WO2001040912A2 (fr) * 1999-11-30 2001-06-07 Amico Joseph N D Systeme de securite lie a internet
EP1465131A3 (fr) * 2000-03-13 2005-02-16 Pittway Corporation Système de securité et de communication integré avec liaison de communication securisée
EP1465131A2 (fr) * 2000-03-13 2004-10-06 Pittway Corporation Système de securité et de communication integré avec liaison de communication securisée
US7558379B2 (en) 2000-03-13 2009-07-07 Steven Winick Integrated security and communications system with secure communications link
AU2005217992B2 (en) * 2000-03-13 2007-03-29 Honeywell International Inc. Integrated security and communications system with secure communications link
US6928148B2 (en) 2000-03-13 2005-08-09 Pittway Corporation Integrated security and communications system with secure communications link
EP1762996A1 (fr) * 2000-03-13 2007-03-14 Honeywell International Inc. Système intégré de sécurité et de communications
WO2001084839A1 (fr) * 2000-05-03 2001-11-08 Perceptual Robotics, Inc. Systeme de gestion de reseau de cameras
EP1304672A4 (fr) * 2000-06-30 2005-03-30 Japan Network Service Co Ltd Procede de surveillance a distance et serveur de commande de dispositif de surveillance
US7231654B2 (en) 2000-06-30 2007-06-12 Japan Network Service Co., Ltd. Remote monitoring method and monitor control server
EP1304672A1 (fr) * 2000-06-30 2003-04-23 Japan Network Service Co., Ltd Procede de surveillance a distance et serveur de commande de dispositif de surveillance
DE10056216A1 (de) * 2000-11-13 2002-05-16 Siemens Ag Überwachungssystem für die unter Führung einer Projektleitung erfolgende Installation einer technischen Anlage und Verfahren zur Überwachung des Installationsortes der unter Führung einer Projektleitung erfolgende Installation einer technischen Anlage
US8966044B2 (en) 2001-01-26 2015-02-24 Schneider Electric It Corporation Methods for displaying physical network topology and environmental status by location, organization, or responsible party
GB2377068A (en) * 2001-06-26 2002-12-31 Intamac Systems Ltd Security system with remote communication
WO2003001469A1 (fr) * 2001-06-26 2003-01-03 Intamac Systems Limited Systeme de protection de propriete
CN1559120B (zh) * 2001-09-25 2014-06-25 皇家飞利浦电子股份有限公司 用于监视网络设备状态的系统和方法
EP1550095A2 (fr) * 2002-05-08 2005-07-06 Nettalon Security Systems, Inc. Procede et dispositif pour le controle de site a distance
EP1550095A4 (fr) * 2002-05-08 2009-04-01 Nettalon Security Systems Inc Procede et dispositif pour le controle de site a distance
EP1650346A1 (fr) * 2003-06-16 2006-04-26 KDM Co., Ltd. Systeme de gestion de blanchisserie automatique
EP1650346A4 (fr) * 2003-06-16 2010-11-17 Wash House Co Ltd Systeme de gestion de blanchisserie automatique
ES2247917A1 (es) * 2004-03-22 2006-03-01 Secosol Soluciones Y Domotica S.L. Sistema de seguridad y televigilancia de localizaciones integrando el telecontrol de dispositivos domesticos.
FR2878057A1 (fr) * 2004-11-15 2006-05-19 Valerie Mai Dispositif de surveillance bebe ou jeune enfant adapte aux sites de dimensions importantes avec multi-utilisateurs
FR2878061A1 (fr) * 2004-11-16 2006-05-19 Domfort Soc Par Actions Simpli Systeme et procede de videosurveillance, centrale et terminal, adaptes pour ce systeme
FR2891938A1 (fr) * 2005-10-10 2007-04-13 Christophe Tuffery Procede de transmission d'informations non vocales permettant d'ameliorer l'efficacite des centres de secours.
WO2007042670A1 (fr) * 2005-10-10 2007-04-19 Christophe Tuffery Procede de transmission d'informations non vocales permettant d'ameliorer l'efficacite des centres de secours
EP1946275A2 (fr) * 2005-10-18 2008-07-23 Honeywell International Inc. Systeme de securite signalant des evenements par l'intermediaire de messages electroniques
EP1946275A4 (fr) * 2005-10-18 2010-11-03 Honeywell Int Inc Systeme de securite signalant des evenements par l'intermediaire de messages electroniques
WO2008056320A1 (fr) * 2006-11-07 2008-05-15 David Miles Winson Système de sécurité
GB2449584A (en) * 2006-11-07 2008-11-26 David Miles Winson A security system
US8902311B2 (en) 2008-11-26 2014-12-02 Comcast Cable Communications, Llc Building security system
US8289147B2 (en) 2008-11-26 2012-10-16 Comcast Cable Holdings Llc Building security system
US8049613B2 (en) 2008-11-26 2011-11-01 Comcast Cable Holdings, Llc Building security system
EP2192563A1 (fr) * 2008-11-26 2010-06-02 Comcast Cable Communications, LLC Système de sécurité de bâtiment
US9214080B2 (en) 2008-11-26 2015-12-15 Comcast Cable Holdings, Llc Building security system
US9530303B2 (en) 2008-11-26 2016-12-27 Comcast Cable Communications, Llc Building security system
US9852604B2 (en) 2008-11-26 2017-12-26 Comcast Cable Communications, Llc Building security system
GB2508131A (en) * 2012-09-28 2014-05-28 Thomas Damian Jordan Remotely monitoring status information
US9978265B2 (en) 2016-04-11 2018-05-22 Tti (Macao Commercial Offshore) Limited Modular garage door opener
US10127806B2 (en) 2016-04-11 2018-11-13 Tti (Macao Commercial Offshore) Limited Methods and systems for controlling a garage door opener accessory
US10157538B2 (en) 2016-04-11 2018-12-18 Tti (Macao Commercial Offshore) Limited Modular garage door opener
CN106056819A (zh) * 2016-06-27 2016-10-26 合肥指南针电子科技有限责任公司 一种住宅楼道内车辆防盗系统及方法
CN106056819B (zh) * 2016-06-27 2018-05-15 合肥指南针电子科技有限责任公司 一种住宅楼道内车辆防盗系统及方法

Also Published As

Publication number Publication date
AU2565699A (en) 1999-08-16

Similar Documents

Publication Publication Date Title
WO1999039505A1 (fr) Systeme de securite en reseau pour la surveillance et le controle d'un environnement en reseau
US10122784B2 (en) Configurable remote notification of detected events
US7149798B2 (en) Method and system for adaptively setting a data refresh interval
US20030122866A1 (en) Method and apparatus for controlling device connected to home network through the internet
WO2004034284A2 (fr) Procede et appareil assurant une fonctionnalite d'acces universel au web
JP4717323B2 (ja) 無人無線送信機の操作システム、特に無人無線送信機を遠隔制御及び遠隔監視するためのシステム
KR20030059367A (ko) 원격지에서의 가전기기 제어 방법 및 서버
KR101048548B1 (ko) Rg의 등록, 인증, 접속관리 프로토콜을 위한 방법
KR20000063800A (ko) 인터넷을 이용한 영상 프로그램 제공 및 주거 시설 제어장치 및 방법

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A1

Designated state(s): AL AM AT AT AU AZ BA BB BG BR BY CA CH CN CU CZ CZ DE DE DK DK EE EE ES FI FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MD MG MK MN MW MX NO NZ PL PT RO RU SD SE SG SI SK SK SL TJ TM TR TT UA UG UZ VN YU ZW

AL Designated countries for regional patents

Kind code of ref document: A1

Designated state(s): GH GM KE LS MW SD SZ UG ZW AM AZ BY KG KZ MD RU TJ TM AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE BF BJ CF CG CI CM GA GN GW ML MR NE SN TD TG

121 Ep: the epo has been informed by wipo that ep was designated in this application
DFPE Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed before 20040101)
NENP Non-entry into the national phase

Ref country code: KR

REG Reference to national code

Ref country code: DE

Ref legal event code: 8642

122 Ep: pct application non-entry in european phase