WO2012013859A1 - Method and apparatus for communicating the alarm information of a security system - Google Patents
Method and apparatus for communicating the alarm information of a security system Download PDFInfo
- Publication number
- WO2012013859A1 WO2012013859A1 PCT/FI2011/050668 FI2011050668W WO2012013859A1 WO 2012013859 A1 WO2012013859 A1 WO 2012013859A1 FI 2011050668 W FI2011050668 W FI 2011050668W WO 2012013859 A1 WO2012013859 A1 WO 2012013859A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- alarm information
- security system
- alarm
- control unit
- information
- Prior art date
Links
Classifications
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B25/00—Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems
- G08B25/01—Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems characterised by the transmission medium
- G08B25/10—Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems characterised by the transmission medium using wireless transmission systems
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B25/00—Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems
- G08B25/01—Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems characterised by the transmission medium
- G08B25/08—Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems characterised by the transmission medium using communication transmission lines
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B25/00—Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems
- G08B25/006—Alarm destination chosen according to type of event, e.g. in case of fire phone the fire service, in case of medical emergency phone the ambulance
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B25/00—Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems
- G08B25/009—Signalling of the alarm condition to a substation whose identity is signalled to a central station, e.g. relaying alarm signals in order to extend communication range
Definitions
- the invention relates generally to a method and apparatus for communicating the alarm information of a security system.
- a central unit included in the monitoring system manages base stations, which are intended to be located in a monitored property in such a way that an employee carrying a cordless phone would be able, over a base station or the central unit, to establish a connection from anywhere within the property with the monitoring system's central computer or another cordless telephone.
- a method according to one embodiment of the invention for communicating the alarm information of a security system comprises receiving alarm information over a private cellular network from a cellular communicator, specifying a recipient of the received alarm information and transmitting the received alarm information, for example over a landline or wireless connection, to the specified recipient.
- security system is used, for example, in reference to security systems for senior care centers and hospitals, monitoring systems for fire alarms, property automation monitoring systems, access control systems and burglar alarm systems.
- alarm information is used, for example, in reference to information con- veyable in a security system, comprising for example alarm messages from personal security devices, event notifications from monitoring equipment, inquiries from terminals and fixed interval reports from monitoring equipment.
- private cellular network is used in reference to local encrypted cellular communicator networks, which enable covering for example some specific building and/or area by means of pico- and/or femtocells.
- the private local cellular communicator network is at the disposal of a security system, whereby its data connections are not dependent for example on malfunctions resulting from occasional overloading of external cellular communicator networks.
- cellular communicator is used in reference to a cellular communicator complying for example with GSM, WAP, GPRS, UMTS, CDMA and CDMA2000 standards, which can be a cell phone or a smart phone provided with features of a palmtop computer, and which enables making connection not only with a micro network but also with a macro cellular communicator network.
- An apparatus according to one embodiment of the invention for communicating the alarm information of a security system is adapted to receive alarm information over a private cellular network from a cellular communicator, to specify a recipient of the received alarm information, and to transmit the received alarm information to the specified recipient.
- a computer program according to one embodiment of the invention for communicating the alarm information of a security system comprises a code for receiving alarm information over a private cellular network from a cellular communicator, a code for specifying a recipient of the received alarm information, and a code for transmitting the received alarm information to the specified recipient.
- a method and apparatus according to embodiments of the invention enable the use of ordinary cellular communicators as terminals of a security system with quickly learnable operating systems and familiar functions. Nor, in this case, is there an absolute need for separate terminals in the security system, but employees are able to use their own personal cellular communicators for phone calls and transmission of messages in the system.
- a method and apparatus enable reducing costs as phone calls are not directed through an external service provider's switching center, but the internal phone calls of a monitoring system remain "within" the system, the prices of terminals are moderate in comparison with cordless telephones, and monitored facilities can be covered with a smaller number of base stations.
- a method and apparatus enable facilitating maintenance of a security system's terminals as there is a dense network of businesses capable of repairing the terminals and, if necessary, a damaged terminal is easy to replace with a new reasonably priced device.
- fig. 1 shows an exemplary basic view of one security system of the invention
- fig. 2 shows an exemplary flow chart of one method of the invention
- fig. 3 shows an exemplary basic view of one apparatus of the invention.
- Fig. 1 depicts a security system 100 according to one embodiment, which is used for monitoring for example a senior care center, hospital or shopping mall.
- the se- curity system 100 comprises a security system monitoring computer 110, which is used for managing the security system 100 for example by receiving alarm, notification and/or acknowledgement messages from the system's terminals, by com- municating with terminals, and by tracking movements of terminal-carrying employees or patients within the premises of a monitored target.
- the monitoring computer 110 is in communication with a security system control unit 120, by means of which in the premises of a monitored target is created a private and encrypted cellular communicator network over which cell phones 130a, 130b, 130c, functioning as terminals of the security system, are capable of communicating, i.e. establishing a voice link and receiving a phone call or transmitting and receiving for example text or multimedia messages, with other intra-system terminals or extra-system terminals.
- the cell phones 130a, 130b, 130c are also capable of communicating wirelessly over a short range radio frequency connection, for example a Bluetooth connection, and/or an infrared connection.
- the monitoring computer 110 provides a capability of tracking and controlling op- eration of the control unit 120 for example by installing and updating programs, and the monitoring computer 1 10 need not be located within the area of a monitored target but its physical location can be elsewhere.
- a single monitoring computer 110 is also able to keep track of several security systems 100, each of which has its own private cellular communicator network.
- a single monitor- ing computer 1 10 can be capable of simultaneously monitoring the security systems 100 of a senior care center, hospital and shopping mall.
- the security system 100 includes two base stations 140a, 140b, which function as access points for the cell phones 130a, 130b, 130c to the security system's private cellular telephone network, and the operation of which is controlled by a base station controller (not shown in the figure), which can be either a separate device in communication with the control unit 120 or a computer program executed by the control unit 120.
- the base stations 140a, 140b, which are in communication with the control unit 120 over a cable connection, are intended to be located in such a way that the picocells and/or femtocells provided thereby become overlapped and the monitored target has no areas left without a capability of establishing a connection to the closest base station 140a, 140b.
- the system may further include a private cellular telephone network's above- mentioned switching center, which may also be either a separate device in communication with the control unit 120 or a computer program executed by the con- trol unit 120.
- a transfer of data for example between the cell phone 130a and the control center 120, can be conducted not as shown in the figure, but over a chain of base stations, such that the data departing from the cell phone 130a travels by way of the base station 140a wirelessly to the base station 140b, and thence further to the control center 120.
- the cell phones 130a, 130b, 130c can be used in the way of ordinary cell phones when operated outside a tar- get, and can be used for making contact over the external cellular telephone network 150 for example with another cell phone 130a, 130b, 130c located within a target area and vice versa.
- a connection between the external network 150 and the security system's private network is established for example by means of a device serving as a gateway and a telephone exchange (neither is shown in the figure).
- the gateway and the telephone exchange can be separate physical devices, or they can be either components included in the control unit 120 or computer programs executed thereby.
- a call and/or an alert message of the security system can be produced in the cell phone 130a of a senior care center's resident with some predetermined button, combination of buttons, or by way of a user interface menu of the cell phone from the security system's own application.
- the call and/or alert message becomes directed over the closest base station 140a to the control unit 120, which communicates the message to the terminal designated as a recipient of the message, which terminal can be the monitoring computer 110, another cellular communicator 130b, 130c belonging to an attendant of the senior care center, or both.
- the transmitted call and/or alert message may contain for example a time of transmission, the name, the bed, the room and/or apartment number of a senior care center's resident, a reason for the message, which can be a simple call for the attendant or an alert notification to which the message-receiving attendant must respond immediately, and/or a possibility of establishing a voice connection with the sender of the message.
- the message only proceeds to the monitoring computer 110, its operator, since the monitoring computer 110 has knowledge about the location of the senior care center's attendants, i.e. their cell phones 130b, 130c, in the service center, is able to determine which one of the attendants is closest to the resident who has sent the call and/or alert message, and is able to forward the message as such or in a modified form to this particular closest attendant.
- Access control for the doors of a senior care center can be implemented in the security system 110 by means of door terminals 170, which are provided with a short range wireless connection, for example a radio frequency connection, for example Bluetooth, or an infrared connection.
- a short range wireless connection for example a radio frequency connection, for example Bluetooth, or an infrared connection.
- the cell phone 130b will be identified by the door terminal 170.
- the door terminal 170 gives the electric door locking system a command to unlock.
- the door terminal 170 may transmit to the cell phone 130b information intended for the monitoring computer 1 10 about cell phones that have passed through this particular door, the cell phone 130b communicating the information by means of the base station 140b and the control unit 120 to the monitoring computer 110.
- the security system 100 acquires information about which cell phone 130a, 130b, 130c, i.e. its user, has passed through which door.
- the door terminal 170 can be set to transmit access control information either at fixed intervals, whereby, when a particular time cycle draws to a close, the next cell phone 130a, 130b, 130c, which finds itself within the door terminal's operating range, will be assigned to communicate the access control information, and/or whenever the cell phone 130a, 130b, 130c finds itself within its operating range.
- Surveillance for the outer entrances or the like of a senior care center can be implemented by means of a security-camera controlling computer 172a and a security camera 172b.
- the security-camera controlling computer 172a is linked to the control unit 120 for example over a permanent Ethernet cable connection or a wireless connection.
- an alarm message which contains for example a time of alarm, entrance identification data, a reason for alarm and/or a security camera image, to be transmitted either to the monitoring computer 110, from which is forwarded an alarm message or a check- ing request for example to the cell phone 130a, 130b, 130c of an attendant presently closest to this particular outer entrance, or directly to the cell phone 130a, 130b, 130c of one or more pre-designated attendants.
- an anomaly is detected by the monitoring computer 110, to which security camera image data is communicated, or by its user, whereby an alarm message, which contains for example a time, entrance identification data, a reason for alarm and/or a security camera image, is prepared in the monitoring computer 110 and can be transmitted for example to the cell phone 130a, 130b, 130c of an attendant presently closest to this particular outer entrance or directly to the cell phone 130a, 130b, 130c of one or more pre-specified attendants.
- an alarm message which contains for example a time, entrance identification data, a reason for alarm and/or a security camera image
- a safety phone 174 can also be linked, by means of a permanent cable con- nection, a safety phone 174 and a wireless radio trigger button 176a, 176b, which is capable of communicating wirelessly therewith and which can be for example a radio trigger button 176b worn around the neck or a clip-equipped radio trigger button carried in the pocket (not visible in the figure).
- the senior care center's resident can transmit an alert message or a call directly from appropriate safety phone buttons, whereby the message proceeds via the control unit 120 for example to the monitoring computer 110 and/or to one or more pre-specified attendant's cell phones 130a, 130b, 130c.
- the resident may establish a voice link over the safety phone's microphone and the control unit 120 to the monitoring center 110 or to any of the pre-specified cell phones 130a, 130b, 130c.
- the resident may send, by pressing the alert button of a radio trigger, an alert message over a radio connection to the safety phone 174, which communicates the message forward as already described above.
- the radio trigger button 176b can be used to send an emergency message to the cell phone 130b, which communicates the emergency message via the base station 140b to the control unit 120, which in turn communicates the emergency message to the monitoring computer 110 and/or to one or more pre-specified attendant's cell phones 130a, 130b.
- the location of the cell phone 130c i.e. the base station 140b, can be used for pinpointing the resident's location in the senior care center.
- a USB cable for setting the cell phone 130a, 130b, 130c in communication with a call button terminal (not shown in the figure), having press buttons for an alert message and a call.
- the cell phone 130a, 130b, 130c after detecting that the press button has been pressed, prepares a call message and sends over the base station 140a, 140b and the control unit 120 to the monitoring computer 110 and/or to one or more pre-specified attendant's cell phones 130a, 130b, 130c.
- the security system 100 is required positioning more precise than cell-level precision, for example when a monitored target comprises several stories, it is possible to employ for example fixedly wall-mounted location transmitters (not shown in the figure), which transmit address information wirelessly, for example over a Bluetooth or infrared connection.
- the cell phone 130a, 130b, 130c receives a piece of address information sent by the location transmitter and the cell phone user sends the piece of address information by means of some predetermined button, combination of buttons, or menu of the cell phone's user interface from the security system's own application further via the control unit 120 to the monitoring com- puter 110, which updates a location of the cell phone 130a, 130b, 130c in one or more of its own databases.
- Fig. 2 shows a method 200 according to one embodiment for communicating an alarm, call, notification and/or inquiry message in a security system, which is located in a shopping mall, wherein a starting step 210 comprises activating and set- ting up to service condition the security system's control unit and programs to be executed therein, as well as the security system's base stations, terminals, monitoring equipment and monitoring computer along with its programs, all installed within the shopping mall area.
- a step 220 the security company employee, who is the current user of a cell phone included in the security system, discovers suspicious signs in the shopping mall and prepares in his/her personal cell phone an alarm message by using a menu included in the cell phone.
- One embodiment of the invention relates to a method as set forth in any of the preceding embodiments, said method comprising preparing alarm information in a cellular communicator and/or preparing alarm information in a first external security device, which, after detecting some predetermined event, prepares alarm information and conveys the alarm information to the cellular communicator over a short range connection.
- the cell phone user After preparing a message, which is in a standard pattern or which can be modified as the case may be, the cell phone user sends the alarm message in a step 230 over the closest base station to the control unit.
- One embodiment of the invention relates to a method as set forth in any of the preceding embodiments, which comprises transmitting alarm information from a cellular communicator over a base station of a private cellular network to the security system's control unit which is in communication with the private cellular network.
- the control unit receives the alarm message from the base station in a step 240 and deduces in a step 250, for example according to pre-specified instructions stored in the memory of a control computer, transmitter information, message contents or a message type and/or, on the basis of receiver information, a receiver of the alarm message.
- the message receiver is always the monitoring computer and, depending on a type of message, cer- tain pre-specified cell or smart phones included in the security system.
- One embodiment of the invention relates to a method as set forth in any of the preceding embodiments, which further comprises receiving alarm information from a second external security device, which, after detecting some predetermined event or anomaly, prepares alarm information and sends the alarm information to the security system's control unit.
- One embodiment of the invention relates to a method as set forth in any of the preceding embodiments, which comprises receiving from the security system's monitoring computer, and/or from a second external security device, alarm and/or surveillance information and communicating the alarm or surveillance information to a cellular communicator specified as the receiver.
- the control unit transmits the alarm message either as such or in a modified form to one or more specified receivers in a step 260, and the alarm message communication method terminates in a step 270.
- the private cellular network comprises a pico- or femtocell established by one or more base stations, which cell enables covering a building which is monitored by means of a security system, including one or more monitoring computers, a control unit, and one or more external security devices.
- the cellular communicator is a cell phone or a smart phone.
- One embodiment of the invention relates to a method as set forth in any of the preceding embodiments, wherein the security system's control unit comprises not only a server computer but also at least one of the following: a base station, a base station controller, and a switching center.
- Fig. 3 shows a security system's control unit 300 according to one embodiment, which enables communicating alarm information.
- the control unit 300 i.e. a server computer, comprises one or more processors 310, which enable executing for example instructions determined by a user or an application program, and processing data.
- the control unit 300 has naturally an . external or internal memory 320 for storing and preserving data, for example instructions and user information, one or more programs 330 intended for controlling the security system's messages, a program 340 possibly intended for controlling base stations, and a program (switching center) 350 intended for controlling base station controllers and other components of a private cellular network, as well as one or more programs 360 intended for communication with external networks.
- the control unit 300 may also include several memories 320, for example all of which are internal or external memories or some of the memories are internal and some external.
- the control unit 300 further comprises a user interface 370, which is provided for example with the control unit's own switches, a keyboard, a cursor or mouse, a touch display and/or a touchpad, by means of which the user is able to input in- structions and data to the control unit 300, and/or a display and data transfer means 380 for receiving and transmitting data over a cable connection or a wireless connection.
- a user interface 370 which is provided for example with the control unit's own switches, a keyboard, a cursor or mouse, a touch display and/or a touchpad, by means of which the user is able to input in- structions and data to the control unit 300, and/or a display and data transfer means 380 for receiving and transmitting data over a cable connection or a wireless connection.
- One embodiment of the invention relates to an apparatus, which is set forth in any of the preceding embodiments and which is additionally adapted to receive alarm information from a second external security device, which, after detecting some pre-specified event, prepares alarm information and transmits the alarm information to a security system's control unit.
- One embodiment of the invention relates to an apparatus, which is set forth in any of the preceding embodiments and which is additionally adapted to receive from a security system's monitoring computer, and/or a second external security device, alarm and/or surveillance information and to communicate the alarm and/or surveillance information to a cellular communicator specified as the receiver.
- One embodiment of the invention relates to an apparatus as set forth in any of the preceding embodiments, which includes not only a server computer but also at least one of the following: a base station, a base station controller, and a switching center.
- One or more programs 330 present in the control unit's memory 320 and intended for controlling the security system's messages, make it possible, along with the processor 310, that methods according to embodiments of the invention are capable of being executed in the control unit 300.
- One embodiment of the invention relates to a computer program, which is set forth in any of the preceding embodiments and which additionally has a code for receiving alarm information from a second external security device, which, after detect- ing some pre-specified event, prepares alarm information and transmits the alarm information to a security system's control unit.
- One embodiment of the invention relates to a computer program as set forth in any of the preceding embodiments, which has a code for receiving alarm and/or surveillance information arriving from a security system's monitoring computer and/or from a second external security device, and a code for communicating the alarm and/or surveillance information to a cellular communicator specified as the receiver.
Landscapes
- Business, Economics & Management (AREA)
- Emergency Management (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Health & Medical Sciences (AREA)
- Public Health (AREA)
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Alarm Systems (AREA)
Abstract
According to an exemplary embodiment, the invention relates to a method (200) for communicating the alarm information of a security system, which method comprises receiving (240) alarm information over a private cellular network from a cellular communicator, specifying (250) a recipient of the received alarm information and transmitting (260) the received alarm information to the specified recipient.
Description
METHOD AND APPARATUS FOR COMMUNICATING THE ALARM INFORMATION OF A
SECURITY SYSTEM
Technical field
The invention relates generally to a method and apparatus for communicating the alarm information of a security system.
Background
For monitored targets, such as for example commercial properties, industrial establishments, hospitals and eldercare facilities, have been developed various alarm and security systems with guards communicating by way of wireless termi- nals both with each other and with a control center.
Communication between the terminals of monitoring systems has been implemented for example by means of cordless telephones making use of the DECT standard. A central unit included in the monitoring system manages base stations, which are intended to be located in a monitored property in such a way that an employee carrying a cordless phone would be able, over a base station or the central unit, to establish a connection from anywhere within the property with the monitoring system's central computer or another cordless telephone.
The usefulness of several different DECT systems is undermined by a high price of telephones, the restriction of operation within certain areas covered by base sta- tions, as well as inconvenience regarding the maintenance of telephones and base stations as there is only a sparse maintenance network provided by businesses specialized in the maintenance or repair of DECT telephones. Another source of trouble is the complexity of expanding monitoring systems, the diversity of operating systems in various telephones, and the multitude of necessary base stations as a result of a relatively short range thereof.
Summary
It is one objective of the invention to eliminate some of the drawbacks and to propose a method and apparatus for communicating the alarm information of a security system. One objective of the invention is achieved by a method of claim 1 , one objective by an apparatus of claim 9, and one objective by a computer program of claim 10.
A method according to one embodiment of the invention for communicating the alarm information of a security system comprises receiving alarm information over a private cellular network from a cellular communicator, specifying a recipient of the received alarm information and transmitting the received alarm information, for example over a landline or wireless connection, to the specified recipient.
The term "security system" is used, for example, in reference to security systems for senior care centers and hospitals, monitoring systems for fire alarms, property automation monitoring systems, access control systems and burglar alarm systems. The term "alarm information" is used, for example, in reference to information con- veyable in a security system, comprising for example alarm messages from personal security devices, event notifications from monitoring equipment, inquiries from terminals and fixed interval reports from monitoring equipment.
The term "private cellular network" is used in reference to local encrypted cellular communicator networks, which enable covering for example some specific building and/or area by means of pico- and/or femtocells. The private local cellular communicator network is at the disposal of a security system, whereby its data connections are not dependent for example on malfunctions resulting from occasional overloading of external cellular communicator networks. The term "cellular communicator" is used in reference to a cellular communicator complying for example with GSM, WAP, GPRS, UMTS, CDMA and CDMA2000 standards, which can be a cell phone or a smart phone provided with features of a palmtop computer, and which enables making connection not only with a micro network but also with a macro cellular communicator network. An apparatus according to one embodiment of the invention for communicating the alarm information of a security system is adapted to receive alarm information over a private cellular network from a cellular communicator, to specify a recipient of the received alarm information, and to transmit the received alarm information to the specified recipient. A computer program according to one embodiment of the invention for communicating the alarm information of a security system comprises a code for receiving alarm information over a private cellular network from a cellular communicator, a code for specifying a recipient of the received alarm information, and a code for transmitting the received alarm information to the specified recipient.
Other embodiments of the invention are presented in the dependent claims.
A method and apparatus according to embodiments of the invention enable the use of ordinary cellular communicators as terminals of a security system with quickly learnable operating systems and familiar functions. Nor, in this case, is there an absolute need for separate terminals in the security system, but employees are able to use their own personal cellular communicators for phone calls and transmission of messages in the system.
In addition, a method and apparatus according to embodiments of the invention enable reducing costs as phone calls are not directed through an external service provider's switching center, but the internal phone calls of a monitoring system remain "within" the system, the prices of terminals are moderate in comparison with cordless telephones, and monitored facilities can be covered with a smaller number of base stations.
Furthermore, a method and apparatus according to embodiments of the invention enable facilitating maintenance of a security system's terminals as there is a dense network of businesses capable of repairing the terminals and, if necessary, a damaged terminal is easy to replace with a new reasonably priced device.
In addition, a method and apparatus according to embodiments of the invention readily allow for expanding a security system and adding more features. Description of figures
The detailed description of figures explains preferred embodiments of the invention in a slightly more precise manner with reference to the accompanying figures, in which fig. 1 shows an exemplary basic view of one security system of the invention, fig. 2 shows an exemplary flow chart of one method of the invention, and fig. 3 shows an exemplary basic view of one apparatus of the invention.
Detailed description of figures
Fig. 1 depicts a security system 100 according to one embodiment, which is used for monitoring for example a senior care center, hospital or shopping mall. The se- curity system 100 comprises a security system monitoring computer 110, which is used for managing the security system 100 for example by receiving alarm, notification and/or acknowledgement messages from the system's terminals, by com-
municating with terminals, and by tracking movements of terminal-carrying employees or patients within the premises of a monitored target.
Over a permanent connection, for example an Ethernet cable connection, or over a wireless connection, the monitoring computer 110 is in communication with a security system control unit 120, by means of which in the premises of a monitored target is created a private and encrypted cellular communicator network over which cell phones 130a, 130b, 130c, functioning as terminals of the security system, are capable of communicating, i.e. establishing a voice link and receiving a phone call or transmitting and receiving for example text or multimedia messages, with other intra-system terminals or extra-system terminals. In addition, the cell phones 130a, 130b, 130c are also capable of communicating wirelessly over a short range radio frequency connection, for example a Bluetooth connection, and/or an infrared connection.
The monitoring computer 110 provides a capability of tracking and controlling op- eration of the control unit 120 for example by installing and updating programs, and the monitoring computer 1 10 need not be located within the area of a monitored target but its physical location can be elsewhere. A single monitoring computer 110 is also able to keep track of several security systems 100, each of which has its own private cellular communicator network. For example, a single monitor- ing computer 1 10 can be capable of simultaneously monitoring the security systems 100 of a senior care center, hospital and shopping mall.
In the case of this example, the security system 100 includes two base stations 140a, 140b, which function as access points for the cell phones 130a, 130b, 130c to the security system's private cellular telephone network, and the operation of which is controlled by a base station controller (not shown in the figure), which can be either a separate device in communication with the control unit 120 or a computer program executed by the control unit 120. The base stations 140a, 140b, which are in communication with the control unit 120 over a cable connection, are intended to be located in such a way that the picocells and/or femtocells provided thereby become overlapped and the monitored target has no areas left without a capability of establishing a connection to the closest base station 140a, 140b. The system may further include a private cellular telephone network's above- mentioned switching center, which may also be either a separate device in communication with the control unit 120 or a computer program executed by the con- trol unit 120. A transfer of data, for example between the cell phone 130a and the control center 120, can be conducted not as shown in the figure, but over a chain
of base stations, such that the data departing from the cell phone 130a travels by way of the base station 140a wirelessly to the base station 140b, and thence further to the control center 120.
Communications between the security system 100 and its cell phones 130a, 130b, 130c and external networks, i.e. a cellular communicator network 150 and a public switched telephone network 160, take place also by way of the control unit 120 from the area of a micro cellular communicator network maintained by the security system 100, i.e. from the area of a monitored target. The cell phones 130a, 130b, 130c can be used in the way of ordinary cell phones when operated outside a tar- get, and can be used for making contact over the external cellular telephone network 150 for example with another cell phone 130a, 130b, 130c located within a target area and vice versa. A connection between the external network 150 and the security system's private network is established for example by means of a device serving as a gateway and a telephone exchange (neither is shown in the figure). The gateway and the telephone exchange can be separate physical devices, or they can be either components included in the control unit 120 or computer programs executed thereby.
In an elderly care environment, for example, a call and/or an alert message of the security system can be produced in the cell phone 130a of a senior care center's resident with some predetermined button, combination of buttons, or by way of a user interface menu of the cell phone from the security system's own application. In this case, the call and/or alert message becomes directed over the closest base station 140a to the control unit 120, which communicates the message to the terminal designated as a recipient of the message, which terminal can be the monitoring computer 110, another cellular communicator 130b, 130c belonging to an attendant of the senior care center, or both. The transmitted call and/or alert message may contain for example a time of transmission, the name, the bed, the room and/or apartment number of a senior care center's resident, a reason for the message, which can be a simple call for the attendant or an alert notification to which the message-receiving attendant must respond immediately, and/or a possibility of establishing a voice connection with the sender of the message. In case the message only proceeds to the monitoring computer 110, its operator, since the monitoring computer 110 has knowledge about the location of the senior care center's attendants, i.e. their cell phones 130b, 130c, in the service center, is able to determine which one of the attendants is closest to the resident who has sent the call
and/or alert message, and is able to forward the message as such or in a modified form to this particular closest attendant.
Access control for the doors of a senior care center can be implemented in the security system 110 by means of door terminals 170, which are provided with a short range wireless connection, for example a radio frequency connection, for example Bluetooth, or an infrared connection. In this case, when for example an attendant, carrying his/her personal cell phone 130b, approaches a door terminal 170, the cell phone 130b will be identified by the door terminal 170. In case the cell phone 130b is not one of those cell phones with a permission to pass through this par- ticular door, the door does not open, and if, on the other hand, the cell phone 130b, i.e. its user, is authorized to use the door in question, the door terminal 170 gives the electric door locking system a command to unlock. Hence, in the process of opening the door or when the cellular communicator 130b finds itself within a door terminal's operating range, the door terminal 170 may transmit to the cell phone 130b information intended for the monitoring computer 1 10 about cell phones that have passed through this particular door, the cell phone 130b communicating the information by means of the base station 140b and the control unit 120 to the monitoring computer 110. Thus, the security system 100 acquires information about which cell phone 130a, 130b, 130c, i.e. its user, has passed through which door. The door terminal 170 can be set to transmit access control information either at fixed intervals, whereby, when a particular time cycle draws to a close, the next cell phone 130a, 130b, 130c, which finds itself within the door terminal's operating range, will be assigned to communicate the access control information, and/or whenever the cell phone 130a, 130b, 130c finds itself within its operating range.
Surveillance for the outer entrances or the like of a senior care center can be implemented by means of a security-camera controlling computer 172a and a security camera 172b. The security-camera controlling computer 172a is linked to the control unit 120 for example over a permanent Ethernet cable connection or a wireless connection. When the computer 172a or its user detects an anomaly in the security camera image, there is prepared in the computer 172a an alarm message, which contains for example a time of alarm, entrance identification data, a reason for alarm and/or a security camera image, to be transmitted either to the monitoring computer 110, from which is forwarded an alarm message or a check- ing request for example to the cell phone 130a, 130b, 130c of an attendant presently closest to this particular outer entrance, or directly to the cell phone 130a,
130b, 130c of one or more pre-designated attendants. Alternatively, an anomaly is detected by the monitoring computer 110, to which security camera image data is communicated, or by its user, whereby an alarm message, which contains for example a time, entrance identification data, a reason for alarm and/or a security camera image, is prepared in the monitoring computer 110 and can be transmitted for example to the cell phone 130a, 130b, 130c of an attendant presently closest to this particular outer entrance or directly to the cell phone 130a, 130b, 130c of one or more pre-specified attendants.
To the control unit 120 can also be linked, by means of a permanent cable con- nection, a safety phone 174 and a wireless radio trigger button 176a, 176b, which is capable of communicating wirelessly therewith and which can be for example a radio trigger button 176b worn around the neck or a clip-equipped radio trigger button carried in the pocket (not visible in the figure). The senior care center's resident can transmit an alert message or a call directly from appropriate safety phone buttons, whereby the message proceeds via the control unit 120 for example to the monitoring computer 110 and/or to one or more pre-specified attendant's cell phones 130a, 130b, 130c. If necessary, the resident may establish a voice link over the safety phone's microphone and the control unit 120 to the monitoring center 110 or to any of the pre-specified cell phones 130a, 130b, 130c. In an emer- gency, when a senior care center's resident is not able at a sudden onset of illness to press the alert button of a safety phone, he/she may send, by pressing the alert button of a radio trigger, an alert message over a radio connection to the safety phone 174, which communicates the message forward as already described above. Alternatively, if a resident, at a sudden onset of illness, is not in the vicinity of the safety phone 174, whereby the operating range of the wrist-held radio trigger button 176b is not enough, yet he/she has the cell phone 130c in his/her immediate proximity, he/she can use the radio trigger button 176b to send an emergency message to the cell phone 130b, which communicates the emergency message via the base station 140b to the control unit 120, which in turn communicates the emergency message to the monitoring computer 110 and/or to one or more pre-specified attendant's cell phones 130a, 130b. Thus, the location of the cell phone 130c, i.e. the base station 140b, can be used for pinpointing the resident's location in the senior care center.
On the other hand, it is also possible to employ a USB cable for setting the cell phone 130a, 130b, 130c in communication with a call button terminal (not shown in the figure), having press buttons for an alert message and a call. Thus, when a
resident calls for an attendant, the cell phone 130a, 130b, 130c, after detecting that the press button has been pressed, prepares a call message and sends over the base station 140a, 140b and the control unit 120 to the monitoring computer 110 and/or to one or more pre-specified attendant's cell phones 130a, 130b, 130c. If in the security system 100 is required positioning more precise than cell-level precision, for example when a monitored target comprises several stories, it is possible to employ for example fixedly wall-mounted location transmitters (not shown in the figure), which transmit address information wirelessly, for example over a Bluetooth or infrared connection. When finding itself within the operating range of a location transmitter, the cell phone 130a, 130b, 130c receives a piece of address information sent by the location transmitter and the cell phone user sends the piece of address information by means of some predetermined button, combination of buttons, or menu of the cell phone's user interface from the security system's own application further via the control unit 120 to the monitoring com- puter 110, which updates a location of the cell phone 130a, 130b, 130c in one or more of its own databases.
Fig. 2 shows a method 200 according to one embodiment for communicating an alarm, call, notification and/or inquiry message in a security system, which is located in a shopping mall, wherein a starting step 210 comprises activating and set- ting up to service condition the security system's control unit and programs to be executed therein, as well as the security system's base stations, terminals, monitoring equipment and monitoring computer along with its programs, all installed within the shopping mall area.
In a step 220, the security company employee, who is the current user of a cell phone included in the security system, discovers suspicious signs in the shopping mall and prepares in his/her personal cell phone an alarm message by using a menu included in the cell phone.
One embodiment of the invention relates to a method as set forth in any of the preceding embodiments, said method comprising preparing alarm information in a cellular communicator and/or preparing alarm information in a first external security device, which, after detecting some predetermined event, prepares alarm information and conveys the alarm information to the cellular communicator over a short range connection.
After preparing a message, which is in a standard pattern or which can be modified as the case may be, the cell phone user sends the alarm message in a step 230 over the closest base station to the control unit.
One embodiment of the invention relates to a method as set forth in any of the preceding embodiments, which comprises transmitting alarm information from a cellular communicator over a base station of a private cellular network to the security system's control unit which is in communication with the private cellular network.
The control unit receives the alarm message from the base station in a step 240 and deduces in a step 250, for example according to pre-specified instructions stored in the memory of a control computer, transmitter information, message contents or a message type and/or, on the basis of receiver information, a receiver of the alarm message. Alternatively, it is possible to specify that the message receiver is always the monitoring computer and, depending on a type of message, cer- tain pre-specified cell or smart phones included in the security system.
One embodiment of the invention relates to a method as set forth in any of the preceding embodiments, which further comprises receiving alarm information from a second external security device, which, after detecting some predetermined event or anomaly, prepares alarm information and sends the alarm information to the security system's control unit.
One embodiment of the invention relates to a method as set forth in any of the preceding embodiments, which comprises receiving from the security system's monitoring computer, and/or from a second external security device, alarm and/or surveillance information and communicating the alarm or surveillance information to a cellular communicator specified as the receiver.
Having deduced, on the basis of an alarm message and/or pre-specified instructions, a receiver or receivers, the control unit transmits the alarm message either as such or in a modified form to one or more specified receivers in a step 260, and the alarm message communication method terminates in a step 270. One embodiment of the invention relates to a method as set forth in any of the preceding embodiments, wherein the private cellular network comprises a pico- or femtocell established by one or more base stations, which cell enables covering a building which is monitored by means of a security system, including one or more monitoring computers, a control unit, and one or more external security devices.
One embodiment of the invention relates to a method as set forth in any of the preceding embodiments, wherein the cellular communicator is a cell phone or a smart phone.
One embodiment of the invention relates to a method as set forth in any of the preceding embodiments, wherein the security system's control unit comprises not only a server computer but also at least one of the following: a base station, a base station controller, and a switching center.
Fig. 3 shows a security system's control unit 300 according to one embodiment, which enables communicating alarm information. The control unit 300, i.e. a server computer, comprises one or more processors 310, which enable executing for example instructions determined by a user or an application program, and processing data. The control unit 300 has naturally an . external or internal memory 320 for storing and preserving data, for example instructions and user information, one or more programs 330 intended for controlling the security system's messages, a program 340 possibly intended for controlling base stations, and a program (switching center) 350 intended for controlling base station controllers and other components of a private cellular network, as well as one or more programs 360 intended for communication with external networks. The control unit 300 may also include several memories 320, for example all of which are internal or external memories or some of the memories are internal and some external.
The control unit 300 further comprises a user interface 370, which is provided for example with the control unit's own switches, a keyboard, a cursor or mouse, a touch display and/or a touchpad, by means of which the user is able to input in- structions and data to the control unit 300, and/or a display and data transfer means 380 for receiving and transmitting data over a cable connection or a wireless connection.
One embodiment of the invention relates to an apparatus, which is set forth in any of the preceding embodiments and which is additionally adapted to receive alarm information from a second external security device, which, after detecting some pre-specified event, prepares alarm information and transmits the alarm information to a security system's control unit.
One embodiment of the invention relates to an apparatus, which is set forth in any of the preceding embodiments and which is additionally adapted to receive from a
security system's monitoring computer, and/or a second external security device, alarm and/or surveillance information and to communicate the alarm and/or surveillance information to a cellular communicator specified as the receiver.
One embodiment of the invention relates to an apparatus as set forth in any of the preceding embodiments, which includes not only a server computer but also at least one of the following: a base station, a base station controller, and a switching center.
One or more programs 330, present in the control unit's memory 320 and intended for controlling the security system's messages, make it possible, along with the processor 310, that methods according to embodiments of the invention are capable of being executed in the control unit 300.
One embodiment of the invention relates to a computer program, which is set forth in any of the preceding embodiments and which additionally has a code for receiving alarm information from a second external security device, which, after detect- ing some pre-specified event, prepares alarm information and transmits the alarm information to a security system's control unit.
One embodiment of the invention relates to a computer program as set forth in any of the preceding embodiments, which has a code for receiving alarm and/or surveillance information arriving from a security system's monitoring computer and/or from a second external security device, and a code for communicating the alarm and/or surveillance information to a cellular communicator specified as the receiver.
The above description only presents a few embodiments for a solution of the invention. A principle according to the invention can naturally be varied within the scope of protection defined by the claims, regarding for example implementation details and application fields.
Claims
1. A method (200) for communicating the alarm information of a security system comprises receiving (240) alarm information over a private cellular network from a cellular communicator, specifying (250) a recipient of the received alarm infor- mation and transmitting (260) the received alarm information to the specified recipient.
2. A method according to claim 1 , which comprises preparing (220) alarm information in a cellular communicator or preparing (220) alarm information in a first external security device, which, after detecting some predetermined event, pre- pares alarm information and conveys the alarm information to the cellular communicator over a short range connection.
3. A method according to claim 1 or 2, which comprises transmitting (230) alarm information from a cellular communicator over a base station of a private cellular network to the security system's control unit which is in communication with the private cellular network
4. A method according to any of the preceding claims, which further comprises receiving (240) alarm information from a second external security device, which, after detecting some predetermined event, prepares alarm information and sends the alarm information to the security system's control unit.
5. A method according to any of the preceding claims, which comprises receiving (240) from the security system's monitoring computer, or from a second external security device, alarm or surveillance information and communicating (260) the alarm or surveillance information to a cellular communicator specified as the receiver.
6. A method according to any of the preceding claims, wherein the private cellular network comprises a pico- or femtocell established by one or more base stations, which cell enables covering a building monitored by means of a security system.
7. A method according to any of the preceding claims, wherein the cellular communicator is a cell phone or a smart phone.
8. A method according to any of the preceding claims, wherein the security system's control unit comprises not only a server computer but also at least one of the following: a base station, a base station controller, and a switching center.
9. An apparatus (300) which is adapted to carry out a method according to any of claims 1-8.
10. A computer program which is adapted to carry out a method according to any of claims 1-8 by executing the computer program in a computer.
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
EP18150430.9A EP3355292A1 (en) | 2010-07-30 | 2011-07-20 | Security system for communicating alarm information in a monitored target |
EP11811886.8A EP2599066A4 (en) | 2010-07-30 | 2011-07-20 | Method and apparatus for communicating the alarm information of a security system |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
FI20105831A FI122235B (en) | 2010-07-30 | 2010-07-30 | Method and device for transmitting security system alarm information |
FI20105831 | 2010-07-30 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2012013859A1 true WO2012013859A1 (en) | 2012-02-02 |
Family
ID=42555524
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/FI2011/050668 WO2012013859A1 (en) | 2010-07-30 | 2011-07-20 | Method and apparatus for communicating the alarm information of a security system |
Country Status (3)
Country | Link |
---|---|
EP (2) | EP3355292A1 (en) |
FI (1) | FI122235B (en) |
WO (1) | WO2012013859A1 (en) |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20020013517A1 (en) * | 2000-05-19 | 2002-01-31 | West Kenneth G. | Patient monitoring system |
US20040170154A1 (en) * | 2000-07-13 | 2004-09-02 | Ge Medical Systems Information Technologies | Wireless lan architecture for integrated time-critical and non-time-critical services within medical facilities |
WO2004109992A1 (en) * | 2003-06-06 | 2004-12-16 | Philips Intellectual Property & Standards Gmbh | Method of controlling wireless data transmission by switching between short-range and long-range radio technologies |
EP1795125A2 (en) * | 2005-11-29 | 2007-06-13 | Robert Bosch Gmbh | Device for monitoring elderly or handicapped persons in an emergency situation |
US20090063187A1 (en) | 2007-08-31 | 2009-03-05 | Johnson David C | Medical data transport over wireless life critical network employing dynamic communication link mapping |
Family Cites Families (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CA2274572C (en) * | 1999-06-07 | 2006-10-03 | Strategic Vista International Inc. | Security alarm system |
US7098787B2 (en) * | 2003-05-29 | 2006-08-29 | Intel Corporation | System and method for signaling emergency responses |
US7623857B1 (en) * | 2005-10-21 | 2009-11-24 | At&T Intellectual Property I, L.P. | Intelligent pico-cell for transport of wireless device communications over wireline networks |
GB2457876A (en) * | 2008-02-22 | 2009-09-02 | Paul Phillip Taylor | Mobile phone with emergency button |
JP4592769B2 (en) * | 2008-02-27 | 2010-12-08 | 京セラ株式会社 | Base station and mobile |
JP5200595B2 (en) * | 2008-03-14 | 2013-06-05 | 富士通株式会社 | Wireless terminal device |
US20090273462A1 (en) * | 2008-05-01 | 2009-11-05 | Honeywell International Inc. | Using fixed mobile convergence femtocells for alarm reporting |
US20100130209A1 (en) * | 2008-11-25 | 2010-05-27 | Cynthia Florkey | Methods for facilitating user control of handoffs |
-
2010
- 2010-07-30 FI FI20105831A patent/FI122235B/en active IP Right Grant
-
2011
- 2011-07-20 WO PCT/FI2011/050668 patent/WO2012013859A1/en active Application Filing
- 2011-07-20 EP EP18150430.9A patent/EP3355292A1/en not_active Ceased
- 2011-07-20 EP EP11811886.8A patent/EP2599066A4/en not_active Ceased
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20020013517A1 (en) * | 2000-05-19 | 2002-01-31 | West Kenneth G. | Patient monitoring system |
US20040170154A1 (en) * | 2000-07-13 | 2004-09-02 | Ge Medical Systems Information Technologies | Wireless lan architecture for integrated time-critical and non-time-critical services within medical facilities |
WO2004109992A1 (en) * | 2003-06-06 | 2004-12-16 | Philips Intellectual Property & Standards Gmbh | Method of controlling wireless data transmission by switching between short-range and long-range radio technologies |
EP1795125A2 (en) * | 2005-11-29 | 2007-06-13 | Robert Bosch Gmbh | Device for monitoring elderly or handicapped persons in an emergency situation |
US20090063187A1 (en) | 2007-08-31 | 2009-03-05 | Johnson David C | Medical data transport over wireless life critical network employing dynamic communication link mapping |
WO2009032134A2 (en) * | 2007-08-31 | 2009-03-12 | Cardiac Pacemakers, Inc. | Medical data transport over life critical network |
Non-Patent Citations (1)
Title |
---|
See also references of EP2599066A4 * |
Also Published As
Publication number | Publication date |
---|---|
FI20105831A0 (en) | 2010-07-30 |
EP3355292A1 (en) | 2018-08-01 |
EP2599066A4 (en) | 2014-12-31 |
FI122235B (en) | 2011-10-31 |
EP2599066A1 (en) | 2013-06-05 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
KR100993733B1 (en) | System for location using rfid-tag | |
US9615226B2 (en) | System and method for transmitting an emergency message over an integrated wireless network | |
CA2523728C (en) | Method and apparatus for interfacing security systems by periodic check in with remote facility | |
KR100867027B1 (en) | The integrating observation system of the housing entrance and method thereof | |
US8004399B2 (en) | Life safety device with integrated Wi-Fi and GPS capability | |
JP5662856B2 (en) | Alarm system | |
KR100789370B1 (en) | Method and system of guiding a visitor using a sensor network | |
JP6804474B2 (en) | Pre-intrusion detection system using SMS notification service, and rescue signal notification system and method | |
JP2009206716A (en) | Base station and mobile device | |
US20190066413A1 (en) | Door System and Method of Operation Thereof | |
US20140361874A1 (en) | Tracking and emergency alert device | |
Datta et al. | Automation, security and surveillance for a smart city: Smart, digital city | |
JP2023162263A (en) | Security system, portable terminal, and program | |
EP3355292A1 (en) | Security system for communicating alarm information in a monitored target | |
JP2002324291A (en) | Safety confirmation service system | |
JP4245954B2 (en) | Security system | |
TWI793806B (en) | Smart home security service system | |
US10825329B2 (en) | Identifying data of a person using of a personal emergency device | |
JP2024144395A (en) | Security Systems | |
JP5512160B2 (en) | Mobile phone system for collective housing and combined mobile phone / intercom system | |
KR101141384B1 (en) | System for managing old man of private security service | |
KR20160102849A (en) | Preliminary intrusion alarm system and method | |
KR20230068885A (en) | Emergency notification device for public restrooms | |
JP5394331B2 (en) | base station | |
CA3072957A1 (en) | Active care control method, electronic control device, central gateway device and server |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 11811886 Country of ref document: EP Kind code of ref document: A1 |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2011811886 Country of ref document: EP |
|
NENP | Non-entry into the national phase |
Ref country code: DE |