WO2012013859A1 - Method and apparatus for communicating the alarm information of a security system - Google Patents

Method and apparatus for communicating the alarm information of a security system Download PDF

Info

Publication number
WO2012013859A1
WO2012013859A1 PCT/FI2011/050668 FI2011050668W WO2012013859A1 WO 2012013859 A1 WO2012013859 A1 WO 2012013859A1 FI 2011050668 W FI2011050668 W FI 2011050668W WO 2012013859 A1 WO2012013859 A1 WO 2012013859A1
Authority
WO
WIPO (PCT)
Prior art keywords
alarm information
security system
alarm
control unit
information
Prior art date
Application number
PCT/FI2011/050668
Other languages
French (fr)
Inventor
Marko Matilainen
Original Assignee
Selamatic Oy
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Selamatic Oy filed Critical Selamatic Oy
Priority to EP18150430.9A priority Critical patent/EP3355292A1/en
Priority to EP11811886.8A priority patent/EP2599066A4/en
Publication of WO2012013859A1 publication Critical patent/WO2012013859A1/en

Links

Classifications

    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B25/00Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems
    • G08B25/01Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems characterised by the transmission medium
    • G08B25/10Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems characterised by the transmission medium using wireless transmission systems
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B25/00Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems
    • G08B25/01Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems characterised by the transmission medium
    • G08B25/08Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems characterised by the transmission medium using communication transmission lines
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B25/00Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems
    • G08B25/006Alarm destination chosen according to type of event, e.g. in case of fire phone the fire service, in case of medical emergency phone the ambulance
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B25/00Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems
    • G08B25/009Signalling of the alarm condition to a substation whose identity is signalled to a central station, e.g. relaying alarm signals in order to extend communication range

Definitions

  • the invention relates generally to a method and apparatus for communicating the alarm information of a security system.
  • a central unit included in the monitoring system manages base stations, which are intended to be located in a monitored property in such a way that an employee carrying a cordless phone would be able, over a base station or the central unit, to establish a connection from anywhere within the property with the monitoring system's central computer or another cordless telephone.
  • a method according to one embodiment of the invention for communicating the alarm information of a security system comprises receiving alarm information over a private cellular network from a cellular communicator, specifying a recipient of the received alarm information and transmitting the received alarm information, for example over a landline or wireless connection, to the specified recipient.
  • security system is used, for example, in reference to security systems for senior care centers and hospitals, monitoring systems for fire alarms, property automation monitoring systems, access control systems and burglar alarm systems.
  • alarm information is used, for example, in reference to information con- veyable in a security system, comprising for example alarm messages from personal security devices, event notifications from monitoring equipment, inquiries from terminals and fixed interval reports from monitoring equipment.
  • private cellular network is used in reference to local encrypted cellular communicator networks, which enable covering for example some specific building and/or area by means of pico- and/or femtocells.
  • the private local cellular communicator network is at the disposal of a security system, whereby its data connections are not dependent for example on malfunctions resulting from occasional overloading of external cellular communicator networks.
  • cellular communicator is used in reference to a cellular communicator complying for example with GSM, WAP, GPRS, UMTS, CDMA and CDMA2000 standards, which can be a cell phone or a smart phone provided with features of a palmtop computer, and which enables making connection not only with a micro network but also with a macro cellular communicator network.
  • An apparatus according to one embodiment of the invention for communicating the alarm information of a security system is adapted to receive alarm information over a private cellular network from a cellular communicator, to specify a recipient of the received alarm information, and to transmit the received alarm information to the specified recipient.
  • a computer program according to one embodiment of the invention for communicating the alarm information of a security system comprises a code for receiving alarm information over a private cellular network from a cellular communicator, a code for specifying a recipient of the received alarm information, and a code for transmitting the received alarm information to the specified recipient.
  • a method and apparatus according to embodiments of the invention enable the use of ordinary cellular communicators as terminals of a security system with quickly learnable operating systems and familiar functions. Nor, in this case, is there an absolute need for separate terminals in the security system, but employees are able to use their own personal cellular communicators for phone calls and transmission of messages in the system.
  • a method and apparatus enable reducing costs as phone calls are not directed through an external service provider's switching center, but the internal phone calls of a monitoring system remain "within" the system, the prices of terminals are moderate in comparison with cordless telephones, and monitored facilities can be covered with a smaller number of base stations.
  • a method and apparatus enable facilitating maintenance of a security system's terminals as there is a dense network of businesses capable of repairing the terminals and, if necessary, a damaged terminal is easy to replace with a new reasonably priced device.
  • fig. 1 shows an exemplary basic view of one security system of the invention
  • fig. 2 shows an exemplary flow chart of one method of the invention
  • fig. 3 shows an exemplary basic view of one apparatus of the invention.
  • Fig. 1 depicts a security system 100 according to one embodiment, which is used for monitoring for example a senior care center, hospital or shopping mall.
  • the se- curity system 100 comprises a security system monitoring computer 110, which is used for managing the security system 100 for example by receiving alarm, notification and/or acknowledgement messages from the system's terminals, by com- municating with terminals, and by tracking movements of terminal-carrying employees or patients within the premises of a monitored target.
  • the monitoring computer 110 is in communication with a security system control unit 120, by means of which in the premises of a monitored target is created a private and encrypted cellular communicator network over which cell phones 130a, 130b, 130c, functioning as terminals of the security system, are capable of communicating, i.e. establishing a voice link and receiving a phone call or transmitting and receiving for example text or multimedia messages, with other intra-system terminals or extra-system terminals.
  • the cell phones 130a, 130b, 130c are also capable of communicating wirelessly over a short range radio frequency connection, for example a Bluetooth connection, and/or an infrared connection.
  • the monitoring computer 110 provides a capability of tracking and controlling op- eration of the control unit 120 for example by installing and updating programs, and the monitoring computer 1 10 need not be located within the area of a monitored target but its physical location can be elsewhere.
  • a single monitoring computer 110 is also able to keep track of several security systems 100, each of which has its own private cellular communicator network.
  • a single monitor- ing computer 1 10 can be capable of simultaneously monitoring the security systems 100 of a senior care center, hospital and shopping mall.
  • the security system 100 includes two base stations 140a, 140b, which function as access points for the cell phones 130a, 130b, 130c to the security system's private cellular telephone network, and the operation of which is controlled by a base station controller (not shown in the figure), which can be either a separate device in communication with the control unit 120 or a computer program executed by the control unit 120.
  • the base stations 140a, 140b, which are in communication with the control unit 120 over a cable connection, are intended to be located in such a way that the picocells and/or femtocells provided thereby become overlapped and the monitored target has no areas left without a capability of establishing a connection to the closest base station 140a, 140b.
  • the system may further include a private cellular telephone network's above- mentioned switching center, which may also be either a separate device in communication with the control unit 120 or a computer program executed by the con- trol unit 120.
  • a transfer of data for example between the cell phone 130a and the control center 120, can be conducted not as shown in the figure, but over a chain of base stations, such that the data departing from the cell phone 130a travels by way of the base station 140a wirelessly to the base station 140b, and thence further to the control center 120.
  • the cell phones 130a, 130b, 130c can be used in the way of ordinary cell phones when operated outside a tar- get, and can be used for making contact over the external cellular telephone network 150 for example with another cell phone 130a, 130b, 130c located within a target area and vice versa.
  • a connection between the external network 150 and the security system's private network is established for example by means of a device serving as a gateway and a telephone exchange (neither is shown in the figure).
  • the gateway and the telephone exchange can be separate physical devices, or they can be either components included in the control unit 120 or computer programs executed thereby.
  • a call and/or an alert message of the security system can be produced in the cell phone 130a of a senior care center's resident with some predetermined button, combination of buttons, or by way of a user interface menu of the cell phone from the security system's own application.
  • the call and/or alert message becomes directed over the closest base station 140a to the control unit 120, which communicates the message to the terminal designated as a recipient of the message, which terminal can be the monitoring computer 110, another cellular communicator 130b, 130c belonging to an attendant of the senior care center, or both.
  • the transmitted call and/or alert message may contain for example a time of transmission, the name, the bed, the room and/or apartment number of a senior care center's resident, a reason for the message, which can be a simple call for the attendant or an alert notification to which the message-receiving attendant must respond immediately, and/or a possibility of establishing a voice connection with the sender of the message.
  • the message only proceeds to the monitoring computer 110, its operator, since the monitoring computer 110 has knowledge about the location of the senior care center's attendants, i.e. their cell phones 130b, 130c, in the service center, is able to determine which one of the attendants is closest to the resident who has sent the call and/or alert message, and is able to forward the message as such or in a modified form to this particular closest attendant.
  • Access control for the doors of a senior care center can be implemented in the security system 110 by means of door terminals 170, which are provided with a short range wireless connection, for example a radio frequency connection, for example Bluetooth, or an infrared connection.
  • a short range wireless connection for example a radio frequency connection, for example Bluetooth, or an infrared connection.
  • the cell phone 130b will be identified by the door terminal 170.
  • the door terminal 170 gives the electric door locking system a command to unlock.
  • the door terminal 170 may transmit to the cell phone 130b information intended for the monitoring computer 1 10 about cell phones that have passed through this particular door, the cell phone 130b communicating the information by means of the base station 140b and the control unit 120 to the monitoring computer 110.
  • the security system 100 acquires information about which cell phone 130a, 130b, 130c, i.e. its user, has passed through which door.
  • the door terminal 170 can be set to transmit access control information either at fixed intervals, whereby, when a particular time cycle draws to a close, the next cell phone 130a, 130b, 130c, which finds itself within the door terminal's operating range, will be assigned to communicate the access control information, and/or whenever the cell phone 130a, 130b, 130c finds itself within its operating range.
  • Surveillance for the outer entrances or the like of a senior care center can be implemented by means of a security-camera controlling computer 172a and a security camera 172b.
  • the security-camera controlling computer 172a is linked to the control unit 120 for example over a permanent Ethernet cable connection or a wireless connection.
  • an alarm message which contains for example a time of alarm, entrance identification data, a reason for alarm and/or a security camera image, to be transmitted either to the monitoring computer 110, from which is forwarded an alarm message or a check- ing request for example to the cell phone 130a, 130b, 130c of an attendant presently closest to this particular outer entrance, or directly to the cell phone 130a, 130b, 130c of one or more pre-designated attendants.
  • an anomaly is detected by the monitoring computer 110, to which security camera image data is communicated, or by its user, whereby an alarm message, which contains for example a time, entrance identification data, a reason for alarm and/or a security camera image, is prepared in the monitoring computer 110 and can be transmitted for example to the cell phone 130a, 130b, 130c of an attendant presently closest to this particular outer entrance or directly to the cell phone 130a, 130b, 130c of one or more pre-specified attendants.
  • an alarm message which contains for example a time, entrance identification data, a reason for alarm and/or a security camera image
  • a safety phone 174 can also be linked, by means of a permanent cable con- nection, a safety phone 174 and a wireless radio trigger button 176a, 176b, which is capable of communicating wirelessly therewith and which can be for example a radio trigger button 176b worn around the neck or a clip-equipped radio trigger button carried in the pocket (not visible in the figure).
  • the senior care center's resident can transmit an alert message or a call directly from appropriate safety phone buttons, whereby the message proceeds via the control unit 120 for example to the monitoring computer 110 and/or to one or more pre-specified attendant's cell phones 130a, 130b, 130c.
  • the resident may establish a voice link over the safety phone's microphone and the control unit 120 to the monitoring center 110 or to any of the pre-specified cell phones 130a, 130b, 130c.
  • the resident may send, by pressing the alert button of a radio trigger, an alert message over a radio connection to the safety phone 174, which communicates the message forward as already described above.
  • the radio trigger button 176b can be used to send an emergency message to the cell phone 130b, which communicates the emergency message via the base station 140b to the control unit 120, which in turn communicates the emergency message to the monitoring computer 110 and/or to one or more pre-specified attendant's cell phones 130a, 130b.
  • the location of the cell phone 130c i.e. the base station 140b, can be used for pinpointing the resident's location in the senior care center.
  • a USB cable for setting the cell phone 130a, 130b, 130c in communication with a call button terminal (not shown in the figure), having press buttons for an alert message and a call.
  • the cell phone 130a, 130b, 130c after detecting that the press button has been pressed, prepares a call message and sends over the base station 140a, 140b and the control unit 120 to the monitoring computer 110 and/or to one or more pre-specified attendant's cell phones 130a, 130b, 130c.
  • the security system 100 is required positioning more precise than cell-level precision, for example when a monitored target comprises several stories, it is possible to employ for example fixedly wall-mounted location transmitters (not shown in the figure), which transmit address information wirelessly, for example over a Bluetooth or infrared connection.
  • the cell phone 130a, 130b, 130c receives a piece of address information sent by the location transmitter and the cell phone user sends the piece of address information by means of some predetermined button, combination of buttons, or menu of the cell phone's user interface from the security system's own application further via the control unit 120 to the monitoring com- puter 110, which updates a location of the cell phone 130a, 130b, 130c in one or more of its own databases.
  • Fig. 2 shows a method 200 according to one embodiment for communicating an alarm, call, notification and/or inquiry message in a security system, which is located in a shopping mall, wherein a starting step 210 comprises activating and set- ting up to service condition the security system's control unit and programs to be executed therein, as well as the security system's base stations, terminals, monitoring equipment and monitoring computer along with its programs, all installed within the shopping mall area.
  • a step 220 the security company employee, who is the current user of a cell phone included in the security system, discovers suspicious signs in the shopping mall and prepares in his/her personal cell phone an alarm message by using a menu included in the cell phone.
  • One embodiment of the invention relates to a method as set forth in any of the preceding embodiments, said method comprising preparing alarm information in a cellular communicator and/or preparing alarm information in a first external security device, which, after detecting some predetermined event, prepares alarm information and conveys the alarm information to the cellular communicator over a short range connection.
  • the cell phone user After preparing a message, which is in a standard pattern or which can be modified as the case may be, the cell phone user sends the alarm message in a step 230 over the closest base station to the control unit.
  • One embodiment of the invention relates to a method as set forth in any of the preceding embodiments, which comprises transmitting alarm information from a cellular communicator over a base station of a private cellular network to the security system's control unit which is in communication with the private cellular network.
  • the control unit receives the alarm message from the base station in a step 240 and deduces in a step 250, for example according to pre-specified instructions stored in the memory of a control computer, transmitter information, message contents or a message type and/or, on the basis of receiver information, a receiver of the alarm message.
  • the message receiver is always the monitoring computer and, depending on a type of message, cer- tain pre-specified cell or smart phones included in the security system.
  • One embodiment of the invention relates to a method as set forth in any of the preceding embodiments, which further comprises receiving alarm information from a second external security device, which, after detecting some predetermined event or anomaly, prepares alarm information and sends the alarm information to the security system's control unit.
  • One embodiment of the invention relates to a method as set forth in any of the preceding embodiments, which comprises receiving from the security system's monitoring computer, and/or from a second external security device, alarm and/or surveillance information and communicating the alarm or surveillance information to a cellular communicator specified as the receiver.
  • the control unit transmits the alarm message either as such or in a modified form to one or more specified receivers in a step 260, and the alarm message communication method terminates in a step 270.
  • the private cellular network comprises a pico- or femtocell established by one or more base stations, which cell enables covering a building which is monitored by means of a security system, including one or more monitoring computers, a control unit, and one or more external security devices.
  • the cellular communicator is a cell phone or a smart phone.
  • One embodiment of the invention relates to a method as set forth in any of the preceding embodiments, wherein the security system's control unit comprises not only a server computer but also at least one of the following: a base station, a base station controller, and a switching center.
  • Fig. 3 shows a security system's control unit 300 according to one embodiment, which enables communicating alarm information.
  • the control unit 300 i.e. a server computer, comprises one or more processors 310, which enable executing for example instructions determined by a user or an application program, and processing data.
  • the control unit 300 has naturally an . external or internal memory 320 for storing and preserving data, for example instructions and user information, one or more programs 330 intended for controlling the security system's messages, a program 340 possibly intended for controlling base stations, and a program (switching center) 350 intended for controlling base station controllers and other components of a private cellular network, as well as one or more programs 360 intended for communication with external networks.
  • the control unit 300 may also include several memories 320, for example all of which are internal or external memories or some of the memories are internal and some external.
  • the control unit 300 further comprises a user interface 370, which is provided for example with the control unit's own switches, a keyboard, a cursor or mouse, a touch display and/or a touchpad, by means of which the user is able to input in- structions and data to the control unit 300, and/or a display and data transfer means 380 for receiving and transmitting data over a cable connection or a wireless connection.
  • a user interface 370 which is provided for example with the control unit's own switches, a keyboard, a cursor or mouse, a touch display and/or a touchpad, by means of which the user is able to input in- structions and data to the control unit 300, and/or a display and data transfer means 380 for receiving and transmitting data over a cable connection or a wireless connection.
  • One embodiment of the invention relates to an apparatus, which is set forth in any of the preceding embodiments and which is additionally adapted to receive alarm information from a second external security device, which, after detecting some pre-specified event, prepares alarm information and transmits the alarm information to a security system's control unit.
  • One embodiment of the invention relates to an apparatus, which is set forth in any of the preceding embodiments and which is additionally adapted to receive from a security system's monitoring computer, and/or a second external security device, alarm and/or surveillance information and to communicate the alarm and/or surveillance information to a cellular communicator specified as the receiver.
  • One embodiment of the invention relates to an apparatus as set forth in any of the preceding embodiments, which includes not only a server computer but also at least one of the following: a base station, a base station controller, and a switching center.
  • One or more programs 330 present in the control unit's memory 320 and intended for controlling the security system's messages, make it possible, along with the processor 310, that methods according to embodiments of the invention are capable of being executed in the control unit 300.
  • One embodiment of the invention relates to a computer program, which is set forth in any of the preceding embodiments and which additionally has a code for receiving alarm information from a second external security device, which, after detect- ing some pre-specified event, prepares alarm information and transmits the alarm information to a security system's control unit.
  • One embodiment of the invention relates to a computer program as set forth in any of the preceding embodiments, which has a code for receiving alarm and/or surveillance information arriving from a security system's monitoring computer and/or from a second external security device, and a code for communicating the alarm and/or surveillance information to a cellular communicator specified as the receiver.

Landscapes

  • Business, Economics & Management (AREA)
  • Emergency Management (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Health & Medical Sciences (AREA)
  • Public Health (AREA)
  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Alarm Systems (AREA)

Abstract

According to an exemplary embodiment, the invention relates to a method (200) for communicating the alarm information of a security system, which method comprises receiving (240) alarm information over a private cellular network from a cellular communicator, specifying (250) a recipient of the received alarm information and transmitting (260) the received alarm information to the specified recipient.

Description

METHOD AND APPARATUS FOR COMMUNICATING THE ALARM INFORMATION OF A
SECURITY SYSTEM
Technical field
The invention relates generally to a method and apparatus for communicating the alarm information of a security system.
Background
For monitored targets, such as for example commercial properties, industrial establishments, hospitals and eldercare facilities, have been developed various alarm and security systems with guards communicating by way of wireless termi- nals both with each other and with a control center.
Communication between the terminals of monitoring systems has been implemented for example by means of cordless telephones making use of the DECT standard. A central unit included in the monitoring system manages base stations, which are intended to be located in a monitored property in such a way that an employee carrying a cordless phone would be able, over a base station or the central unit, to establish a connection from anywhere within the property with the monitoring system's central computer or another cordless telephone.
The usefulness of several different DECT systems is undermined by a high price of telephones, the restriction of operation within certain areas covered by base sta- tions, as well as inconvenience regarding the maintenance of telephones and base stations as there is only a sparse maintenance network provided by businesses specialized in the maintenance or repair of DECT telephones. Another source of trouble is the complexity of expanding monitoring systems, the diversity of operating systems in various telephones, and the multitude of necessary base stations as a result of a relatively short range thereof.
Summary
It is one objective of the invention to eliminate some of the drawbacks and to propose a method and apparatus for communicating the alarm information of a security system. One objective of the invention is achieved by a method of claim 1 , one objective by an apparatus of claim 9, and one objective by a computer program of claim 10. A method according to one embodiment of the invention for communicating the alarm information of a security system comprises receiving alarm information over a private cellular network from a cellular communicator, specifying a recipient of the received alarm information and transmitting the received alarm information, for example over a landline or wireless connection, to the specified recipient.
The term "security system" is used, for example, in reference to security systems for senior care centers and hospitals, monitoring systems for fire alarms, property automation monitoring systems, access control systems and burglar alarm systems. The term "alarm information" is used, for example, in reference to information con- veyable in a security system, comprising for example alarm messages from personal security devices, event notifications from monitoring equipment, inquiries from terminals and fixed interval reports from monitoring equipment.
The term "private cellular network" is used in reference to local encrypted cellular communicator networks, which enable covering for example some specific building and/or area by means of pico- and/or femtocells. The private local cellular communicator network is at the disposal of a security system, whereby its data connections are not dependent for example on malfunctions resulting from occasional overloading of external cellular communicator networks. The term "cellular communicator" is used in reference to a cellular communicator complying for example with GSM, WAP, GPRS, UMTS, CDMA and CDMA2000 standards, which can be a cell phone or a smart phone provided with features of a palmtop computer, and which enables making connection not only with a micro network but also with a macro cellular communicator network. An apparatus according to one embodiment of the invention for communicating the alarm information of a security system is adapted to receive alarm information over a private cellular network from a cellular communicator, to specify a recipient of the received alarm information, and to transmit the received alarm information to the specified recipient. A computer program according to one embodiment of the invention for communicating the alarm information of a security system comprises a code for receiving alarm information over a private cellular network from a cellular communicator, a code for specifying a recipient of the received alarm information, and a code for transmitting the received alarm information to the specified recipient. Other embodiments of the invention are presented in the dependent claims.
A method and apparatus according to embodiments of the invention enable the use of ordinary cellular communicators as terminals of a security system with quickly learnable operating systems and familiar functions. Nor, in this case, is there an absolute need for separate terminals in the security system, but employees are able to use their own personal cellular communicators for phone calls and transmission of messages in the system.
In addition, a method and apparatus according to embodiments of the invention enable reducing costs as phone calls are not directed through an external service provider's switching center, but the internal phone calls of a monitoring system remain "within" the system, the prices of terminals are moderate in comparison with cordless telephones, and monitored facilities can be covered with a smaller number of base stations.
Furthermore, a method and apparatus according to embodiments of the invention enable facilitating maintenance of a security system's terminals as there is a dense network of businesses capable of repairing the terminals and, if necessary, a damaged terminal is easy to replace with a new reasonably priced device.
In addition, a method and apparatus according to embodiments of the invention readily allow for expanding a security system and adding more features. Description of figures
The detailed description of figures explains preferred embodiments of the invention in a slightly more precise manner with reference to the accompanying figures, in which fig. 1 shows an exemplary basic view of one security system of the invention, fig. 2 shows an exemplary flow chart of one method of the invention, and fig. 3 shows an exemplary basic view of one apparatus of the invention.
Detailed description of figures
Fig. 1 depicts a security system 100 according to one embodiment, which is used for monitoring for example a senior care center, hospital or shopping mall. The se- curity system 100 comprises a security system monitoring computer 110, which is used for managing the security system 100 for example by receiving alarm, notification and/or acknowledgement messages from the system's terminals, by com- municating with terminals, and by tracking movements of terminal-carrying employees or patients within the premises of a monitored target.
Over a permanent connection, for example an Ethernet cable connection, or over a wireless connection, the monitoring computer 110 is in communication with a security system control unit 120, by means of which in the premises of a monitored target is created a private and encrypted cellular communicator network over which cell phones 130a, 130b, 130c, functioning as terminals of the security system, are capable of communicating, i.e. establishing a voice link and receiving a phone call or transmitting and receiving for example text or multimedia messages, with other intra-system terminals or extra-system terminals. In addition, the cell phones 130a, 130b, 130c are also capable of communicating wirelessly over a short range radio frequency connection, for example a Bluetooth connection, and/or an infrared connection.
The monitoring computer 110 provides a capability of tracking and controlling op- eration of the control unit 120 for example by installing and updating programs, and the monitoring computer 1 10 need not be located within the area of a monitored target but its physical location can be elsewhere. A single monitoring computer 110 is also able to keep track of several security systems 100, each of which has its own private cellular communicator network. For example, a single monitor- ing computer 1 10 can be capable of simultaneously monitoring the security systems 100 of a senior care center, hospital and shopping mall.
In the case of this example, the security system 100 includes two base stations 140a, 140b, which function as access points for the cell phones 130a, 130b, 130c to the security system's private cellular telephone network, and the operation of which is controlled by a base station controller (not shown in the figure), which can be either a separate device in communication with the control unit 120 or a computer program executed by the control unit 120. The base stations 140a, 140b, which are in communication with the control unit 120 over a cable connection, are intended to be located in such a way that the picocells and/or femtocells provided thereby become overlapped and the monitored target has no areas left without a capability of establishing a connection to the closest base station 140a, 140b. The system may further include a private cellular telephone network's above- mentioned switching center, which may also be either a separate device in communication with the control unit 120 or a computer program executed by the con- trol unit 120. A transfer of data, for example between the cell phone 130a and the control center 120, can be conducted not as shown in the figure, but over a chain of base stations, such that the data departing from the cell phone 130a travels by way of the base station 140a wirelessly to the base station 140b, and thence further to the control center 120.
Communications between the security system 100 and its cell phones 130a, 130b, 130c and external networks, i.e. a cellular communicator network 150 and a public switched telephone network 160, take place also by way of the control unit 120 from the area of a micro cellular communicator network maintained by the security system 100, i.e. from the area of a monitored target. The cell phones 130a, 130b, 130c can be used in the way of ordinary cell phones when operated outside a tar- get, and can be used for making contact over the external cellular telephone network 150 for example with another cell phone 130a, 130b, 130c located within a target area and vice versa. A connection between the external network 150 and the security system's private network is established for example by means of a device serving as a gateway and a telephone exchange (neither is shown in the figure). The gateway and the telephone exchange can be separate physical devices, or they can be either components included in the control unit 120 or computer programs executed thereby.
In an elderly care environment, for example, a call and/or an alert message of the security system can be produced in the cell phone 130a of a senior care center's resident with some predetermined button, combination of buttons, or by way of a user interface menu of the cell phone from the security system's own application. In this case, the call and/or alert message becomes directed over the closest base station 140a to the control unit 120, which communicates the message to the terminal designated as a recipient of the message, which terminal can be the monitoring computer 110, another cellular communicator 130b, 130c belonging to an attendant of the senior care center, or both. The transmitted call and/or alert message may contain for example a time of transmission, the name, the bed, the room and/or apartment number of a senior care center's resident, a reason for the message, which can be a simple call for the attendant or an alert notification to which the message-receiving attendant must respond immediately, and/or a possibility of establishing a voice connection with the sender of the message. In case the message only proceeds to the monitoring computer 110, its operator, since the monitoring computer 110 has knowledge about the location of the senior care center's attendants, i.e. their cell phones 130b, 130c, in the service center, is able to determine which one of the attendants is closest to the resident who has sent the call and/or alert message, and is able to forward the message as such or in a modified form to this particular closest attendant.
Access control for the doors of a senior care center can be implemented in the security system 110 by means of door terminals 170, which are provided with a short range wireless connection, for example a radio frequency connection, for example Bluetooth, or an infrared connection. In this case, when for example an attendant, carrying his/her personal cell phone 130b, approaches a door terminal 170, the cell phone 130b will be identified by the door terminal 170. In case the cell phone 130b is not one of those cell phones with a permission to pass through this par- ticular door, the door does not open, and if, on the other hand, the cell phone 130b, i.e. its user, is authorized to use the door in question, the door terminal 170 gives the electric door locking system a command to unlock. Hence, in the process of opening the door or when the cellular communicator 130b finds itself within a door terminal's operating range, the door terminal 170 may transmit to the cell phone 130b information intended for the monitoring computer 1 10 about cell phones that have passed through this particular door, the cell phone 130b communicating the information by means of the base station 140b and the control unit 120 to the monitoring computer 110. Thus, the security system 100 acquires information about which cell phone 130a, 130b, 130c, i.e. its user, has passed through which door. The door terminal 170 can be set to transmit access control information either at fixed intervals, whereby, when a particular time cycle draws to a close, the next cell phone 130a, 130b, 130c, which finds itself within the door terminal's operating range, will be assigned to communicate the access control information, and/or whenever the cell phone 130a, 130b, 130c finds itself within its operating range.
Surveillance for the outer entrances or the like of a senior care center can be implemented by means of a security-camera controlling computer 172a and a security camera 172b. The security-camera controlling computer 172a is linked to the control unit 120 for example over a permanent Ethernet cable connection or a wireless connection. When the computer 172a or its user detects an anomaly in the security camera image, there is prepared in the computer 172a an alarm message, which contains for example a time of alarm, entrance identification data, a reason for alarm and/or a security camera image, to be transmitted either to the monitoring computer 110, from which is forwarded an alarm message or a check- ing request for example to the cell phone 130a, 130b, 130c of an attendant presently closest to this particular outer entrance, or directly to the cell phone 130a, 130b, 130c of one or more pre-designated attendants. Alternatively, an anomaly is detected by the monitoring computer 110, to which security camera image data is communicated, or by its user, whereby an alarm message, which contains for example a time, entrance identification data, a reason for alarm and/or a security camera image, is prepared in the monitoring computer 110 and can be transmitted for example to the cell phone 130a, 130b, 130c of an attendant presently closest to this particular outer entrance or directly to the cell phone 130a, 130b, 130c of one or more pre-specified attendants.
To the control unit 120 can also be linked, by means of a permanent cable con- nection, a safety phone 174 and a wireless radio trigger button 176a, 176b, which is capable of communicating wirelessly therewith and which can be for example a radio trigger button 176b worn around the neck or a clip-equipped radio trigger button carried in the pocket (not visible in the figure). The senior care center's resident can transmit an alert message or a call directly from appropriate safety phone buttons, whereby the message proceeds via the control unit 120 for example to the monitoring computer 110 and/or to one or more pre-specified attendant's cell phones 130a, 130b, 130c. If necessary, the resident may establish a voice link over the safety phone's microphone and the control unit 120 to the monitoring center 110 or to any of the pre-specified cell phones 130a, 130b, 130c. In an emer- gency, when a senior care center's resident is not able at a sudden onset of illness to press the alert button of a safety phone, he/she may send, by pressing the alert button of a radio trigger, an alert message over a radio connection to the safety phone 174, which communicates the message forward as already described above. Alternatively, if a resident, at a sudden onset of illness, is not in the vicinity of the safety phone 174, whereby the operating range of the wrist-held radio trigger button 176b is not enough, yet he/she has the cell phone 130c in his/her immediate proximity, he/she can use the radio trigger button 176b to send an emergency message to the cell phone 130b, which communicates the emergency message via the base station 140b to the control unit 120, which in turn communicates the emergency message to the monitoring computer 110 and/or to one or more pre-specified attendant's cell phones 130a, 130b. Thus, the location of the cell phone 130c, i.e. the base station 140b, can be used for pinpointing the resident's location in the senior care center.
On the other hand, it is also possible to employ a USB cable for setting the cell phone 130a, 130b, 130c in communication with a call button terminal (not shown in the figure), having press buttons for an alert message and a call. Thus, when a resident calls for an attendant, the cell phone 130a, 130b, 130c, after detecting that the press button has been pressed, prepares a call message and sends over the base station 140a, 140b and the control unit 120 to the monitoring computer 110 and/or to one or more pre-specified attendant's cell phones 130a, 130b, 130c. If in the security system 100 is required positioning more precise than cell-level precision, for example when a monitored target comprises several stories, it is possible to employ for example fixedly wall-mounted location transmitters (not shown in the figure), which transmit address information wirelessly, for example over a Bluetooth or infrared connection. When finding itself within the operating range of a location transmitter, the cell phone 130a, 130b, 130c receives a piece of address information sent by the location transmitter and the cell phone user sends the piece of address information by means of some predetermined button, combination of buttons, or menu of the cell phone's user interface from the security system's own application further via the control unit 120 to the monitoring com- puter 110, which updates a location of the cell phone 130a, 130b, 130c in one or more of its own databases.
Fig. 2 shows a method 200 according to one embodiment for communicating an alarm, call, notification and/or inquiry message in a security system, which is located in a shopping mall, wherein a starting step 210 comprises activating and set- ting up to service condition the security system's control unit and programs to be executed therein, as well as the security system's base stations, terminals, monitoring equipment and monitoring computer along with its programs, all installed within the shopping mall area.
In a step 220, the security company employee, who is the current user of a cell phone included in the security system, discovers suspicious signs in the shopping mall and prepares in his/her personal cell phone an alarm message by using a menu included in the cell phone.
One embodiment of the invention relates to a method as set forth in any of the preceding embodiments, said method comprising preparing alarm information in a cellular communicator and/or preparing alarm information in a first external security device, which, after detecting some predetermined event, prepares alarm information and conveys the alarm information to the cellular communicator over a short range connection. After preparing a message, which is in a standard pattern or which can be modified as the case may be, the cell phone user sends the alarm message in a step 230 over the closest base station to the control unit.
One embodiment of the invention relates to a method as set forth in any of the preceding embodiments, which comprises transmitting alarm information from a cellular communicator over a base station of a private cellular network to the security system's control unit which is in communication with the private cellular network.
The control unit receives the alarm message from the base station in a step 240 and deduces in a step 250, for example according to pre-specified instructions stored in the memory of a control computer, transmitter information, message contents or a message type and/or, on the basis of receiver information, a receiver of the alarm message. Alternatively, it is possible to specify that the message receiver is always the monitoring computer and, depending on a type of message, cer- tain pre-specified cell or smart phones included in the security system.
One embodiment of the invention relates to a method as set forth in any of the preceding embodiments, which further comprises receiving alarm information from a second external security device, which, after detecting some predetermined event or anomaly, prepares alarm information and sends the alarm information to the security system's control unit.
One embodiment of the invention relates to a method as set forth in any of the preceding embodiments, which comprises receiving from the security system's monitoring computer, and/or from a second external security device, alarm and/or surveillance information and communicating the alarm or surveillance information to a cellular communicator specified as the receiver.
Having deduced, on the basis of an alarm message and/or pre-specified instructions, a receiver or receivers, the control unit transmits the alarm message either as such or in a modified form to one or more specified receivers in a step 260, and the alarm message communication method terminates in a step 270. One embodiment of the invention relates to a method as set forth in any of the preceding embodiments, wherein the private cellular network comprises a pico- or femtocell established by one or more base stations, which cell enables covering a building which is monitored by means of a security system, including one or more monitoring computers, a control unit, and one or more external security devices. One embodiment of the invention relates to a method as set forth in any of the preceding embodiments, wherein the cellular communicator is a cell phone or a smart phone.
One embodiment of the invention relates to a method as set forth in any of the preceding embodiments, wherein the security system's control unit comprises not only a server computer but also at least one of the following: a base station, a base station controller, and a switching center.
Fig. 3 shows a security system's control unit 300 according to one embodiment, which enables communicating alarm information. The control unit 300, i.e. a server computer, comprises one or more processors 310, which enable executing for example instructions determined by a user or an application program, and processing data. The control unit 300 has naturally an . external or internal memory 320 for storing and preserving data, for example instructions and user information, one or more programs 330 intended for controlling the security system's messages, a program 340 possibly intended for controlling base stations, and a program (switching center) 350 intended for controlling base station controllers and other components of a private cellular network, as well as one or more programs 360 intended for communication with external networks. The control unit 300 may also include several memories 320, for example all of which are internal or external memories or some of the memories are internal and some external.
The control unit 300 further comprises a user interface 370, which is provided for example with the control unit's own switches, a keyboard, a cursor or mouse, a touch display and/or a touchpad, by means of which the user is able to input in- structions and data to the control unit 300, and/or a display and data transfer means 380 for receiving and transmitting data over a cable connection or a wireless connection.
One embodiment of the invention relates to an apparatus, which is set forth in any of the preceding embodiments and which is additionally adapted to receive alarm information from a second external security device, which, after detecting some pre-specified event, prepares alarm information and transmits the alarm information to a security system's control unit.
One embodiment of the invention relates to an apparatus, which is set forth in any of the preceding embodiments and which is additionally adapted to receive from a security system's monitoring computer, and/or a second external security device, alarm and/or surveillance information and to communicate the alarm and/or surveillance information to a cellular communicator specified as the receiver.
One embodiment of the invention relates to an apparatus as set forth in any of the preceding embodiments, which includes not only a server computer but also at least one of the following: a base station, a base station controller, and a switching center.
One or more programs 330, present in the control unit's memory 320 and intended for controlling the security system's messages, make it possible, along with the processor 310, that methods according to embodiments of the invention are capable of being executed in the control unit 300.
One embodiment of the invention relates to a computer program, which is set forth in any of the preceding embodiments and which additionally has a code for receiving alarm information from a second external security device, which, after detect- ing some pre-specified event, prepares alarm information and transmits the alarm information to a security system's control unit.
One embodiment of the invention relates to a computer program as set forth in any of the preceding embodiments, which has a code for receiving alarm and/or surveillance information arriving from a security system's monitoring computer and/or from a second external security device, and a code for communicating the alarm and/or surveillance information to a cellular communicator specified as the receiver.
The above description only presents a few embodiments for a solution of the invention. A principle according to the invention can naturally be varied within the scope of protection defined by the claims, regarding for example implementation details and application fields.

Claims

Claims
1. A method (200) for communicating the alarm information of a security system comprises receiving (240) alarm information over a private cellular network from a cellular communicator, specifying (250) a recipient of the received alarm infor- mation and transmitting (260) the received alarm information to the specified recipient.
2. A method according to claim 1 , which comprises preparing (220) alarm information in a cellular communicator or preparing (220) alarm information in a first external security device, which, after detecting some predetermined event, pre- pares alarm information and conveys the alarm information to the cellular communicator over a short range connection.
3. A method according to claim 1 or 2, which comprises transmitting (230) alarm information from a cellular communicator over a base station of a private cellular network to the security system's control unit which is in communication with the private cellular network
4. A method according to any of the preceding claims, which further comprises receiving (240) alarm information from a second external security device, which, after detecting some predetermined event, prepares alarm information and sends the alarm information to the security system's control unit.
5. A method according to any of the preceding claims, which comprises receiving (240) from the security system's monitoring computer, or from a second external security device, alarm or surveillance information and communicating (260) the alarm or surveillance information to a cellular communicator specified as the receiver.
6. A method according to any of the preceding claims, wherein the private cellular network comprises a pico- or femtocell established by one or more base stations, which cell enables covering a building monitored by means of a security system.
7. A method according to any of the preceding claims, wherein the cellular communicator is a cell phone or a smart phone.
8. A method according to any of the preceding claims, wherein the security system's control unit comprises not only a server computer but also at least one of the following: a base station, a base station controller, and a switching center.
9. An apparatus (300) which is adapted to carry out a method according to any of claims 1-8.
10. A computer program which is adapted to carry out a method according to any of claims 1-8 by executing the computer program in a computer.
PCT/FI2011/050668 2010-07-30 2011-07-20 Method and apparatus for communicating the alarm information of a security system WO2012013859A1 (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
EP18150430.9A EP3355292A1 (en) 2010-07-30 2011-07-20 Security system for communicating alarm information in a monitored target
EP11811886.8A EP2599066A4 (en) 2010-07-30 2011-07-20 Method and apparatus for communicating the alarm information of a security system

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
FI20105831A FI122235B (en) 2010-07-30 2010-07-30 Method and device for transmitting security system alarm information
FI20105831 2010-07-30

Publications (1)

Publication Number Publication Date
WO2012013859A1 true WO2012013859A1 (en) 2012-02-02

Family

ID=42555524

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/FI2011/050668 WO2012013859A1 (en) 2010-07-30 2011-07-20 Method and apparatus for communicating the alarm information of a security system

Country Status (3)

Country Link
EP (2) EP3355292A1 (en)
FI (1) FI122235B (en)
WO (1) WO2012013859A1 (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20020013517A1 (en) * 2000-05-19 2002-01-31 West Kenneth G. Patient monitoring system
US20040170154A1 (en) * 2000-07-13 2004-09-02 Ge Medical Systems Information Technologies Wireless lan architecture for integrated time-critical and non-time-critical services within medical facilities
WO2004109992A1 (en) * 2003-06-06 2004-12-16 Philips Intellectual Property & Standards Gmbh Method of controlling wireless data transmission by switching between short-range and long-range radio technologies
EP1795125A2 (en) * 2005-11-29 2007-06-13 Robert Bosch Gmbh Device for monitoring elderly or handicapped persons in an emergency situation
US20090063187A1 (en) 2007-08-31 2009-03-05 Johnson David C Medical data transport over wireless life critical network employing dynamic communication link mapping

Family Cites Families (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CA2274572C (en) * 1999-06-07 2006-10-03 Strategic Vista International Inc. Security alarm system
US7098787B2 (en) * 2003-05-29 2006-08-29 Intel Corporation System and method for signaling emergency responses
US7623857B1 (en) * 2005-10-21 2009-11-24 At&T Intellectual Property I, L.P. Intelligent pico-cell for transport of wireless device communications over wireline networks
GB2457876A (en) * 2008-02-22 2009-09-02 Paul Phillip Taylor Mobile phone with emergency button
JP4592769B2 (en) * 2008-02-27 2010-12-08 京セラ株式会社 Base station and mobile
JP5200595B2 (en) * 2008-03-14 2013-06-05 富士通株式会社 Wireless terminal device
US20090273462A1 (en) * 2008-05-01 2009-11-05 Honeywell International Inc. Using fixed mobile convergence femtocells for alarm reporting
US20100130209A1 (en) * 2008-11-25 2010-05-27 Cynthia Florkey Methods for facilitating user control of handoffs

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20020013517A1 (en) * 2000-05-19 2002-01-31 West Kenneth G. Patient monitoring system
US20040170154A1 (en) * 2000-07-13 2004-09-02 Ge Medical Systems Information Technologies Wireless lan architecture for integrated time-critical and non-time-critical services within medical facilities
WO2004109992A1 (en) * 2003-06-06 2004-12-16 Philips Intellectual Property & Standards Gmbh Method of controlling wireless data transmission by switching between short-range and long-range radio technologies
EP1795125A2 (en) * 2005-11-29 2007-06-13 Robert Bosch Gmbh Device for monitoring elderly or handicapped persons in an emergency situation
US20090063187A1 (en) 2007-08-31 2009-03-05 Johnson David C Medical data transport over wireless life critical network employing dynamic communication link mapping
WO2009032134A2 (en) * 2007-08-31 2009-03-12 Cardiac Pacemakers, Inc. Medical data transport over life critical network

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
See also references of EP2599066A4 *

Also Published As

Publication number Publication date
FI20105831A0 (en) 2010-07-30
EP3355292A1 (en) 2018-08-01
EP2599066A4 (en) 2014-12-31
FI122235B (en) 2011-10-31
EP2599066A1 (en) 2013-06-05

Similar Documents

Publication Publication Date Title
KR100993733B1 (en) System for location using rfid-tag
US9615226B2 (en) System and method for transmitting an emergency message over an integrated wireless network
CA2523728C (en) Method and apparatus for interfacing security systems by periodic check in with remote facility
KR100867027B1 (en) The integrating observation system of the housing entrance and method thereof
US8004399B2 (en) Life safety device with integrated Wi-Fi and GPS capability
JP5662856B2 (en) Alarm system
KR100789370B1 (en) Method and system of guiding a visitor using a sensor network
JP6804474B2 (en) Pre-intrusion detection system using SMS notification service, and rescue signal notification system and method
JP2009206716A (en) Base station and mobile device
US20190066413A1 (en) Door System and Method of Operation Thereof
US20140361874A1 (en) Tracking and emergency alert device
Datta et al. Automation, security and surveillance for a smart city: Smart, digital city
JP2023162263A (en) Security system, portable terminal, and program
EP3355292A1 (en) Security system for communicating alarm information in a monitored target
JP2002324291A (en) Safety confirmation service system
JP4245954B2 (en) Security system
TWI793806B (en) Smart home security service system
US10825329B2 (en) Identifying data of a person using of a personal emergency device
JP2024144395A (en) Security Systems
JP5512160B2 (en) Mobile phone system for collective housing and combined mobile phone / intercom system
KR101141384B1 (en) System for managing old man of private security service
KR20160102849A (en) Preliminary intrusion alarm system and method
KR20230068885A (en) Emergency notification device for public restrooms
JP5394331B2 (en) base station
CA3072957A1 (en) Active care control method, electronic control device, central gateway device and server

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 11811886

Country of ref document: EP

Kind code of ref document: A1

WWE Wipo information: entry into national phase

Ref document number: 2011811886

Country of ref document: EP

NENP Non-entry into the national phase

Ref country code: DE