WO2022243359A1 - Security installations and methods - Google Patents

Security installations and methods Download PDF

Info

Publication number
WO2022243359A1
WO2022243359A1 PCT/EP2022/063409 EP2022063409W WO2022243359A1 WO 2022243359 A1 WO2022243359 A1 WO 2022243359A1 EP 2022063409 W EP2022063409 W EP 2022063409W WO 2022243359 A1 WO2022243359 A1 WO 2022243359A1
Authority
WO
WIPO (PCT)
Prior art keywords
visitor
security
premises
security code
interior space
Prior art date
Application number
PCT/EP2022/063409
Other languages
French (fr)
Inventor
Pablo TORRES MONTERO
Juan Jose CARRACOSA PULIDO
Maider Patricia AGUINAGA ACHUCARRO
Encarnacion SERRANO CASTILLO
Alvaro URIEN AYALA
Rafael José SCHWARTZ SOLÉ
Russell Gwynfryn MORGAN
Johan Zander
Christoffer LARSSON
Joakim Pettersson
Original Assignee
Verisure Sàrl
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Verisure Sàrl filed Critical Verisure Sàrl
Priority to EP22729585.4A priority Critical patent/EP4154226A1/en
Publication of WO2022243359A1 publication Critical patent/WO2022243359A1/en

Links

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00571Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by interacting with a central unit
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00896Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys specially adapted for particular uses
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/20Individual registration on entry or exit involving the use of a pass
    • G07C9/27Individual registration on entry or exit involving the use of a pass with central registration
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/30Individual registration on entry or exit not involving the use of a pass
    • G07C9/38Individual registration on entry or exit not involving the use of a pass with central registration
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms
    • G08B13/18Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength
    • G08B13/189Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems
    • G08B13/194Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems
    • G08B13/196Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
    • G08B13/19617Surveillance camera constructional details
    • G08B13/19619Details of casing
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C2209/00Indexing scheme relating to groups G07C9/00 - G07C9/38
    • G07C2209/08With time considerations, e.g. temporary activation, valid time window or time limitations
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C2209/00Indexing scheme relating to groups G07C9/00 - G07C9/38
    • G07C2209/60Indexing scheme relating to groups G07C9/00174 - G07C9/00944
    • G07C2209/62Comprising means for indicating the status of the lock
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B25/00Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems
    • G08B25/008Alarm setting and unsetting, i.e. arming or disarming of the security system

Definitions

  • the present invention relates to security installations to secure at least part of a perimeter of premises and to monitor premises, the security installation including an electrically controlled lock on an exterior closure, e.g. door, of the premises, and to methods performed by the system and by controllers of the system.
  • Security installations that are or include security monitoring systems for monitoring premises, often referred to as alarm systems, typically provide a means for detecting the presence and/or actions of people at the premises, and reacting to detected events.
  • alarm systems typically provide a means for detecting the presence and/or actions of people at the premises, and reacting to detected events.
  • Such systems include sensors to detect the opening and closing of doors and windows to provide a secure perimeter to the premises, creating one or more protected interior spaces, movement detectors to monitor spaces (both within and outside buildings) for signs of movement, microphones to detect sounds such as breaking glass, and image sensors to capture still or moving images of monitored zones.
  • Such systems may be self-contained, with alarm indicators such as sirens and flashing lights that may be activated in the event of an alarm condition being detected.
  • Such installations typically include a control unit (which may also be termed a central unit), generally mains powered, that is coupled to the sensors, detectors, cameras, etc. (“nodes”), and which processes received notifications and determines a response.
  • the central unit may be linked to the various nodes by wires, but increasingly is instead linked wirelessly, rather than by wires, since this facilitates installation and may also provide some safeguards against sensors/detectors effectively being disabled by disconnecting them from the central unit.
  • the nodes of such systems typically include an autonomous power source, such as a battery power supply, rather than being mains powered.
  • a security monitoring system may include an installation at a premises, domestic or commercial, that is linked to a Central Monitoring Station (CMS) where, typically, human operators manage the responses required by different alarm and notification types.
  • CMS Central Monitoring Station
  • the central unit at the premises installation typically processes notifications received from the nodes in the installation, and notifies the Central Monitoring Station of only some of these, depending upon the settings of the system and the nature of the detected events.
  • the central unit at the installation is effectively acting as a gateway between the nodes and the Central Monitoring Station.
  • the central unit may be linked by wires, or wirelessly, to the various nodes of the installation, and these nodes will typically be battery rather than mains powered.
  • Such security monitoring systems contribute to the safety and wellbeing of occupants of the protected premises, as well as safeguarding articles within the protected perimeter - which may of course not simply be limited to a house or dwelling, but may also extend to the grounds of the house, protected by a boundary fence and gate, for example.
  • a security monitoring system to secure at least part of a perimeter of premises, the premises including: an exterior closure in the secure perimeter giving access to a protected interior space at or of the premises; an electrically controlled lock for the exterior closure; an actuator for a visitor to indicate their presence at the closure or more generally at the premises; and a controller, the controller being configured to: receive details of a scheduled event that will involve granting a visitor access to the protected interior space by opening the exterior closure, the details including a scheduled time window and a security code specific to the scheduled event; and upon receiving, within the scheduled time window, an indication from the actuator that a visitor is present at the closure, to: prompt the visitor to confirm that they are present for the purpose of the event, and upon receiving such confirmation from the visitor, prompt the visitor to input a security code; receive from the visitor a security code, and if the received security code matches the security code specific to the scheduled event, to cause the unlocking of the electrically controlled lock to give the visitor access to (optionally to admit to) the protected interior space
  • the controller may be a controller of a video entry arrangement.
  • the video entry arrangement may be configured prompt the visitor using audio prompts.
  • the video entry arrangement may be configured to prompt the visitor using voiced prompts using pre-stored messages.
  • the video entry arrangement may be a video doorbell.
  • the controller may be a processor of a security monitoring system that forms part of the security installation, the processor being configured to supply a remote monitoring centre with the received details of the scheduled event, and optionally also the received security code.
  • the processor may also be configured to only unlock the electrically controlled lock to give the visitor access to the protected interior space at the premises (or more commonly only to part of the protected space - the rest remaining off-limits and monitored by the security monitoring system) for the scheduled event if confirmation is received from the remote monitoring centre that the received security code matches the security code specific to the scheduled event.
  • the security monitoring system may further comprise an audio interface to enable audio communication with a visitor at the closure, wherein the processor is configured to enable the remote monitoring centre to use the audio interface to speak to the visitor.
  • the security monitoring system may further comprise a first video camera arranged to observe a space in front of the exterior of the closure, the processor being configured to enable the remote monitoring centre to use the first video camera to observe the visitor.
  • the first video camera is a video doorbell.
  • the video doorbell includes the audio interface.
  • the security monitoring system may further comprise a second video camera arranged to observe the protected interior space behind the closure, the processor being configured to enable the remote monitoring centre to use the second video camera to observe the visitor within the protected interior space.
  • the processor may be configured to unlock the electrically controlled lock to give the visitor access to the protected interior space of the premises for the scheduled event only if the security code is received from the visitor while the security monitoring system is in an armed state.
  • the controller may be configured, in the event that the security code received from the visitor matches the security code previously received by the controller, not to react to any signals or notifications received from a status sensor associated with the closure for a predetermined period, while maintaining the security monitoring system in an armed state. In this way, the security monitoring system can continue to monitor the rest of the perimeter.
  • a dedicated delivery zone is defined, all the sensors for which are effectively “disarmed” temporarily during the drop-off while the rest of the premises is still fully protected.
  • the predetermined period may be until the visitor has been observed to vacate the interior space.
  • An operator in the central monitoring station may continue to observe the visitor as long as he or she is on the premises, using for example an interior camera (s) that observes all of the interior space to which the visitor is admitted.
  • a method performed by a controller of a security installation configured to secure at least part of a perimeter of premises, the premises including: an exterior closure in the secure perimeter giving access to a protected interior space of the premises; an electrically controlled lock for the exterior closure; an actuator for a visitor to indicate their presence at the perimeter; and a controller, the method comprising: receiving at the controller details of a scheduled event that will involve granting a visitor access to the protected interior space by opening the exterior closure, the details including a scheduled time window and a security code specific to the scheduled event; receiving at the controller, within the scheduled time window, an indication from the actuator that a visitor is present at the premises: prompting the visitor to confirm that they are present for the purpose of the event, and upon receiving such confirmation from the visitor, prompting the visitor to input a security code; receiving from the visitor a security code, and if the received security code matches the security code specific to the scheduled event, unlocking the electrically controlled lock to give the visitor access to the protected interior space of the premises for the scheduled event
  • the method may further comprise providing the prompts the visitor using audio prompts.
  • the voiced prompts may be generated using pre-stored messages.
  • the method may further comprise causing unlocking of the electrically controlled lock by signalling from the controller to a processor of a security monitoring system that forms part of the security installation.
  • the method may further comprise supplying the details of the scheduled event to the controller of the video entry arrangement from the processor of the security monitoring system.
  • the method according to the second aspect may further comprise, when the controller is a processor of a security monitoring system that forms part of the security installation, supplying the received details of the scheduled event, and the received security code, to a remote monitoring centre; unlocking the electrically controlled lock to give the visitor access to (optionally to admit the visitor to)) the protected interior space at the premises for the scheduled event only upon receiving confirmation from the remote monitoring centre that the received security code matches the security code specific to the scheduled event.
  • the method may further comprise using the processor to enable audio communication between the remote monitoring centre and the visitor at the premises.
  • the method may further comprise enabling the remote monitoring centre to use a first video camera to observe the visitor in front of the exterior of the closure.
  • the first video camera is a video doorbell.
  • the video doorbell includes the audio interface.
  • the method may further comprise enabling the remote monitoring centre to use a second video camera to observe the visitor within the protected interior space behind the closure.
  • the method may further comprise only unlocking the electrically controlled lock to give the visitor access to the protected interior space at (e.g. of) the premises for the scheduled event in the event that the security code is received from the visitor while the security monitoring system is in an armed state.
  • the method further comprises, in the event that the security code received from the visitor matches the security code previously received by the controller, ignoring any signals or notifications received from a status sensor associated with the closure for a predetermined period, while maintaining the security monitoring system in an armed state.
  • the predetermined period is until the visitor has been observed to vacate the interior space.
  • a method of enabling an event involving granting a visitor access to an interior space of premises, the interior space protected by a perimeter secured by a security installation, the perimeter including a closure provided with an electrically controlled lock comprising: sharing with the visitor an access code, and a scheduled time window, specific to the event; providing the access code, and the scheduled time window, to a controller (optionally a controller of the security monitoring system or of a video entry arrangement of the installation), and storing the provided access code; subsequently, within the time window and while the security installation is in an armed condition, determining the presence of a visitor at the premises; prompting the visitor at the premises to supply an access code; and in the event that the supplied access code matches the stored access code, unlocking the electrically controlled lock to give the visitor access to the interior space without raising an alarm.
  • an app for a security monitoring system to generate a one-time code (OTC) which can be used subsequently to disarm the security monitoring system
  • the app sending the OTC to a controller of the security monitoring system, the controller forwarding the OTC to a central monitoring station (CMS) that monitors the security monitoring system (or the app may send the OTC to the CMS directly rather than through the controller) , with the CMS subsequently making a decision to disarm the security monitoring system upon being presented with a code that has been presented at an interface associated with the security monitoring system, the interface preferably being at the premises protected by the security monitoring system.
  • CMS central monitoring station
  • an app for a security monitoring system to generate a one-time code (OTC) which can be used subsequently to disarm the security monitoring system, the app sending the OTC to a controller of the security monitoring system, the controller forwarding the OTC to a video entry arrangement at premises protected by the security monitoring system, with a processor of the video entry arrangement subsequently making a decision to cause the unlocking of a lock of a closure in a perimeter of the premises upon being presented with a code that has been presented at an interface associated with the security monitoring system, the interface preferably being at the premises protected by the security monitoring system.
  • OTC one-time code
  • an app for a premises security monitoring system being configured to: generate securely a one-time-passcode which can be used to disarm the premises security monitoring system; and share the one-time-passcode with a controller of the security monitoring system.
  • a method of controlling a security monitoring system comprising: generating a one-time-passcode in an app for the security monitoring system; and communicating the a one-time-passcode to a controller of the security monitoring system for subsequent use in disarming the security monitoring system.
  • a method of controlling a security monitoring system comprising: receiving at a controller of the security monitoring system a one-time-passcode generated by an app for the security monitoring system run on a device other than the controller; and subsequently, while the security monitoring system is in an armed state, disarming the security monitoring system in response to receiving the one-time-passcode via a user interface.
  • the method of the seventh aspect may further comprise receiving at the controller a time window of validity for the one-time passcode, and disarming the security monitoring system only in response to receiving the one-time-passcode via a user interface within the time window of validity.
  • the user interface is an audio interface, or a keypad, optionally located at the premises protected by the security monitoring system.
  • a method of enabling an event involving granting a visitor access to an interior space of premises, the interior space protected by a perimeter secured by a security monitoring system, the perimeter including a closure provided with an electrically controlled lock comprising: sharing with the visitor an access code, and a scheduled time, specific to the event; providing the access code, and the scheduled time, to a controller of the security monitoring system, and storing the provided access code; subsequently, while the security monitoring system is in an armed condition, determining the presence of a visitor at the premises; prompting the visitor at the premises to supply an access code; and in the event that the supplied access code matches the stored access code, unlocking the electrically controlled lock to give the visitor access to the interior space without raising an alarm.
  • the method of the eighth aspect may further comprise disarming the security monitoring system in the event that the supplied access code matches the stored access code.
  • the method of the eighth aspect may further comprise, in the event that the supplied access code matches the stored access code, configuring a controller of the security monitoring system not to react to any signals or notifications received from a status sensor associated with the closure for a predetermined period, while maintaining the security monitoring system in an armed state.
  • the predetermined period is until the visitor has been observed to vacate the interior space.
  • a method of granting a visitor access to an interior space within a secure perimeter of premises the premises protected by a security monitoring system, the premises including: an exterior closure in the secure perimeter giving access to the protected interior space of the premises; an electrically controlled lock for the exterior closure; an actuator for a visitor to indicate their presence at the closure; and a controller; the method comprising receiving at the controller details of a scheduled event that will involve granting a visitor access to the protected interior space by opening the exterior closure, the details including a scheduled time window and a security code specific to the scheduled event; and upon receiving, within the scheduled time window, an indication from the actuator that a visitor is present at the closure: prompting the visitor to confirm that they are present for the purpose of the event, and upon receiving such confirmation from the visitor, prompting the visitor to input a security code; receiving from the visitor a security code, and if the received security code matches the security code specific to the scheduled event, causing the unlocking of the electrically controlled lock to give the visitor access to the protected interior space
  • the closure e.g. door
  • an automatic closing mechanism such as a door spring, to ensure that when a delivery person leaves the premises, after completing a delivery, the door (or gate or whatever) closes correctly, so that the electrically controlled lock is once again effective to protect against unlawful entry.
  • Figure 1 is a schematic drawing showing a front elevation of stylised building with an external space which is monitored by a security monitoring system according to an embodiment of the invention
  • Figure 2 is a schematic part plan view of premises protected by a security monitoring system, together with other elements of the system;
  • Figure 3a shows a timing diagram of a first part of a method according to an aspect of the invention
  • Figure 3b shows a timing diagram of a second part of a method according to an aspect of the invention
  • Figure 4 shows a timing diagram of a method according to an aspect of the invention
  • Figure 5 shows schematically an architecture including a security monitoring system, a video entry arrangement, and an electrically controlled lock
  • Figure 6 is a schematic block diagram of a video entry arrangement
  • Figure 7 is a timing diagram of a method according to another aspect of the invention.
  • FIG. 1 shows a view of the front of a premises 100 protected by a security monitoring system according to an aspect of the present invention.
  • the premises here in the form of a house, have an exterior door, here front door, 102.
  • the door gives access to a protected interior space.
  • the security monitoring system secure at least part of a perimeter to the premises (100), and the door constitutes an exterior closure 102 in the secure perimeter giving access to a protected interior space 200 of the premises.
  • a lock 104 on the exterior door is electrically controlled so that it can be locked and unlocked remotely.
  • a first video camera in the form of a video doorbell 106 which looks out from the fa9ade of the premises so that anyone approaching the door along the path 108 can be seen, and in particular when they stand at the door their face should clearly be visible.
  • the video doorbell includes an actuator, e.g. a push button, for a visitor to indicate their presence at the closure.
  • the video doorbell also includes an audio interface to enable bidirectional audio communication with a visitor at the closure 102.
  • the video doorbell includes an infrared light source to illuminate whatever is in front of the video doorbell.
  • the fa9ade of the house also carries an external keypad 110 with which a user can disarm the security monitoring system, and unlock the lock 104.
  • an optional second video camera 112 which is coupled to a movement detector, such as a PIR sensor 114, which, when the security monitoring system is armed, may be arranged to capture video of the front of the house and the private area, e.g. the garden, in front of the house.
  • the second video camera is preferably provided with an audio interface 116 to enable bidirectional audio communication with anyone observed by the second video camera.
  • the house may be surrounded by a perimeter fence, the fence including a security gate.
  • the security monitoring system may also be used to secure that perimeter, the gate forming an exterior closure in the secure perimeter giving access to a protected interior space of the premises, and a further video doorbell and another external keypad may be provided and with which a user can disarm the security monitoring system, and unlock a lock securing the gate, and thereby gain admittance to the protected grounds of the house.
  • FIG. 2 is a schematic part plan view of a premises 100 protected by security monitoring system according to an aspect of the invention, together with other elements of the system, corresponding generally to the premises of figure 1.
  • the front door 102 with electrically controlled lock 104, leads into the protected interior space 200 of the premises.
  • Each of the windows 202, and the rear door 204 is fitted with a sensor 206 to detect when they are opened.
  • Each of the sensors 206 includes a radio transceiver to report events to a controller , or central unit, 208 of the security monitoring system. If one of the sensors 206 is triggered when the system is armed, a signal is sent to the central unit 208 which in turn may signal an alarm event to a central monitoring station 210.
  • the central unit 208 is connected to the central monitoring station 210 via the Internet 212, either via a wired or a wireless connection. Also wirelessly coupled to the central unit 208 are the video doorbell 106, the electrically controlled lock 104, and if present the second video camera 112 its associated movement sensor 114 (although the latter may be integral with the second video camera 112) and the audio interface 116. These items, and the sensors 206, are preferably coupled to the central unit 208 using transceivers operating in the industrial scientific and medical (ISM) bandwidths, for example a sub- gigahertz bandwidth such as 868 MHz, and the communications are encrypted preferably using shared secret keys.
  • ISM industrial scientific and medical
  • the security monitoring system may also include other sensors within the protected interior space, such as an interior video camera 214 and associated movement detector 216 (which again may be integral with the camera 214), and each of the interior doors 218 may also be provided with a sensor 206 to detect the opening/closing of the door. Also shown in figure 2 are a user device 220, preferably loaded with an appropriate app - as will be described later, and a public land mobile network (PLMN) by means of which the central monitoring station 210, and the central unit 208, may communicate with the user device 220.
  • PLMN public land mobile network
  • the security monitoring system app is installed on a user device 220, here shown as a smartphone, although of course it could be almost any kind of electronic device, such as a laptop or desktop computer, a tablet such as an iPad, a smart watch, or even a television.
  • the security monitoring system app may be used to schedule a delivery following for example the placing of an order for goods from an online or bricks and mortar retailer. Possibly the security monitoring system app may provide the option of ordering goods or services from selected retailers or service providers, so that relevant order details, as will be explained below, may be seamlessly transferred between an ordering process and the scheduling of an event with the security monitoring service.
  • Figure 3a is a timing diagram of the first part of a method according to an aspect of the invention.
  • a user places an order and schedules a delivery with a supply company 250.
  • the user may place an order with the supply company and only subsequently schedule a delivery, and even conceivably may schedule delivery with the supply company before placing the order for the goods or services.
  • the same method and systems may be used when arranging collection of something from the premises, for example laundry or dry-cleaning, or a pet which needs to be taken for a walk or taken to the vet.
  • the user then at 302 uses the security system app, for example on device 220, to log the delivery with the controller 208 of the security monitoring system.
  • the user In logging the delivery with the controller 208, the user provides the scheduled time window that was agreed with the supply company 250, for example June 21 st between 1 PM and 3 PM.
  • the user also provides an identifier for the delivery, which will act as a security code specific to the scheduled event, for example the last six or more digits of the order number. There is a balance to be drawn between the need for security and the desire of the user to correctly enter a possibly alphanumeric sequence.
  • Amazon (RTM) order numbers currently take the form of 3 digits followed by - followed by 7 digits - followed by 7 digits, and it may be considered too onerous or potentially error prone to require the full 17 digits, plus hyphens, to be entered. Smaller scale suppliers may well operate with much shorter order numbers, but the risk of bad actors gaining entrance illegitimately is probably too great to rely on a code of three digits or less.
  • the security monitoring system app may be configured to generate secure one time codes, and the user of the app can, when scheduling the delivery with the Supply Co. may trigger the app to generate a secure one-time code of six or more characters which is provided to the Supply Co at step 300, and then to the central unit 208 at step 304.
  • the central unit passes the concierge delivery schedule and authentication data, e.g. the pass code, to the central monitoring station 210.
  • this communication is encrypted and passes either through a wired data connection or wirelessly between the central unit and a central monitoring station.
  • the reason for wanting to provide a central monitoring station with the details of the scheduled delivery (or collection) is so that the central monitoring station can be sure to have a human operator on standby for the relevant period.
  • the scheduled delivery window 309 shown by the pair of dotted lines in figure 3a is expected to be at a time when the security monitoring system has a status of “armed away” - which is a status typically used when the premises are unoccupied.
  • the “scheduled concierge service” provided by the security monitoring system will not be needed if the user is expecting to be at home at the time of schedule delivery.
  • the user may configure the system, using the security monitoring system app, or an appropriate interface for the central unit or some other control terminal of the security monitoring system, to allow the scheduled concierge service to operate even when the security monitoring system is set in an “armed at home” status, or even a disarmed status.
  • the user is away, the premises are unoccupied, and the security monitoring system is in the armed away state.
  • This dialogue can be provided from within the video doorbell 106, or it may be provided from the central unit 208, or possibly, but less preferably from the central monitoring station.
  • the announcement 320 is provided from the central unit 208 (but may equally be provided directly by the doorbell if it is so configured).
  • Figure 3 a also shows the possibility of connecting the doorbell video camera to the central unit 208 upon detecting the first bell push within the scheduled delivery window, and optionally coupling that doorbell video to the central monitoring station 210, at step 314 the central monitoring station may at that stage send a voice link request 316 to the central unit, which leads a central unit to connect 318 audio from the audio interface of video doorbell 106 (or audio interface 116 if the video is coming from second video camera 112) to the central monitoring station 210.
  • the central monitoring station is only connected to the doorbell video and audio after the delivery person has confirmed that they are indeed present for the purpose of the scheduled event, but this is less preferable because of the risk of missing the security code input as result of a delayed completion of the connection to the central monitoring station.
  • the delivery person receives, preferably over the audio interface, a prompt to input the security code which was agreed between the user and the Supply Co. at step 300.
  • a visual interface for example a display on the external keypad 110
  • the delivery person then provides the security code, preferably by speaking the security code into the audio interface, but possibly by keying the code into the external keypad 110.
  • the code input as speech is received at the central monitoring station where it is heard by a human operator, who confirms that it corresponds to the previously registered code for the scheduled event.
  • the human operator has also been observing the delivery person, and the space in front of the exterior closure, e.g.
  • the human operator sends an unlock instruction 336 to the central unit which also has the effect of causing an activation command 338 to be sent to an interior video camera 214 which observes the door, and the space behind the door - i.e. part of the protected interior space of the premises. Images from the interior video camera 214 then transmitted 340 to the central unit 208, and then forwarded 342 to the central monitoring station 210.
  • the central unit 208 is configured to ignore any signals or notifications received from for example the sensor 206 the detects the status of the door 102 and also from the movement sensor 216 in the interior space, e.g. the entry hall, into which the delivery person needs to go to deposit the package.
  • the security monitoring system is in the expected armed away state, the other sensors 206 on the exterior doors and windows, and on internal doors 218, and any other internal motion sensors are still active, and the central unit 208 will continue to respond in the usual way to any incidents reported by the sensors.
  • the other sensors protecting the perimeter and interior of the premises remain active, and any breach of these, such as for example entry into an internally secured area, will trigger an alarm event that will be signalled to the to the central unit and onwards to the central monitoring station.
  • Figure 3b shows the continuation of the process begun in figure 3a.
  • the central unit 208 transmits an unlock instruction 344 to the electronically controlled lock 104 which then unlocks.
  • the delivery person is then able to open the door, if it is not automatically opened already, to deposit the delivery (or alternatively to collect whatever needs collecting).
  • the operator in the central monitoring station 210 is observing images from the interior video camera 214, which are being passed via the central unit 208, to ensure that the delivery person’s behaviour is appropriate.
  • the delivery person then leaves the protected interior space, closing the door behind them.
  • the lock 104 sends a lock status update 350 to the central unit 208, which then forwards this to the central monitoring station, so that the operator can speak 358 to the delivery person via the audio interface if the door has not been closed correctly - the operator basically telling the delivery person to close the door properly before they leave.
  • the central monitoring station may then send the confirmation to the central unit that the scheduled event has been completed, or the central unit may be configured to recognise this fact based on receiving the correct lock status update at step 350.
  • the controller of the security monitoring system then reverts to its previous status.
  • the described security monitoring system provides a secure perimeter to premises, the premises including: an exterior closure, such as door 102, in the secure perimeter giving access to a protected interior space 200 of the premises.
  • An electrically controlled lockl04 is provided for the exterior closure or door 102.
  • An actuator for example a bell push, is provided for a visitor to indicate their presence at the door.
  • the security monitoring system includes a controller 208 coupled to the lock, and the controller is configured to: receive details of a scheduled event that will involve granting a visitor (such as a delivery person) access to the protected interior space by opening the exterior closure, the details including a scheduled time window and a security code specific to the scheduled event.
  • the controller upon receiving, within the scheduled time window, an indication from the actuator that a visitor is present at the closure, is configured to: prompt the visitor to confirm that they are present for the purpose of the event, and upon receiving such confirmation from the visitor, prompt the visitor to input a security code; receive from the visitor a security code, and if the received security code matches the security code specific to the scheduled event, to unlock the electrically controlled lock to admit the visitor to the protected interior space of the premises for the scheduled event.
  • the security of delivered items is improved, while maintaining the security of the premises, and without requiring that anyone be at the premises to receive the delivery.
  • An approved user of the system e.g. a member of the household, can use the system to schedule secure delivery or collection at the time they order goods or services, safe in the knowledge that the goods that are ordered will be safe from “porch pirates” and other opportunists.
  • the controller may be configured to share with a remote monitoring centre (210) the received details of the scheduled event, and the received security code, and only unlock the electrically controlled lock to admit the visitor to the protected interior space of the premises for the scheduled event if confirmation is received from the remote monitoring centre that the received security code matches the security code specific to the scheduled event.
  • a remote monitoring centre (210) the received details of the scheduled event, and the received security code
  • the controller 208 to control the process, including the checking of the security code
  • This variant of the invention introduces the possibility of using a human operator to check the security code, which many users may find more reassuring, and which may indeed be more secure.
  • the security monitoring system may further comprise an audio interface to enable audio communication with a visitor at the closure, the controller being configured to enable the remote monitoring centre to use the audio interface to speak to the visitor. In this way, an operator in the central monitoring station is able to clarify any uncertainties, as well as guiding the visitor in what they have to do and where they have to leave the package (or collect the package).
  • the security monitoring system preferably further comprises a first video camera arranged to observe a space in front of the exterior of the closure, the controller being configured to enable the remote monitoring centre to use the first video camera to observe the visitor.
  • a first video camera arranged to observe a space in front of the exterior of the closure
  • the controller being configured to enable the remote monitoring centre to use the first video camera to observe the visitor.
  • first video camera may be a video doorbell, which is convenient both in terms of the location of the camera, and the co-location of the video and audio interfaces, along with the actuator, and in terms of the visual performance of the camera - as video doorbells are typically very well placed to capture images of people at the door.
  • the video doorbell includes the audio interface, as this is likely to be well located from the point of view of performance, and it may also reduce installation complexity and time.
  • the security monitoring system further comprising a second video camera arranged to observe the protected interior space behind the closure, the controller being configured to enable the remote monitoring centre to use the second video camera to observe the visitor within the protected interior space.
  • the security monitoring system may be configured to only unlock the electrically controlled lock to admit the visitor to the protected interior space of the premises for the scheduled event if the security code is received from the visitor while the security monitoring system is in an armed state. In this way, the risk of admitting a stranger to the premises when the premises are occupied is reduced. This risk may be further reduced by restricting the scheduled concierge service to times when the security monitoring system is in armed away mode.
  • the controller of the security monitoring system may be configured, in the event that the security code received from the visitor matches the security code previously received by the controller, not to react to any signals or notifications received from a status sensor associated with the closure for a predetermined period, while maintaining the security monitoring system in an armed state.
  • the security monitoring system can continue to monitor the rest of the periphery, and the interior of the premises, while securely admitting the visitor and without an alarm condition being caused by correct behaviour of the visitor.
  • the predetermined period may be until the visitor has been observed to vacate the interior space.
  • Figure 4 corresponds generally to figure 3 a, but shows a sequence of events where the visitor at the doorbell does not confirm that they are present for the purpose of the scheduled event.
  • the announcement 320 there is no subsequent bell push.
  • the audio interface may be used to make an announcement to the effect that the visitor should wait while the system tries to connect them with the occupant of the house.
  • the central monitoring station transmits a handover instruction 422 to the central unit which causes the central unit to transmit doorbell ring instruction to the doorbell app, either directly or through the doorbell itself - the doorbell been connected typically via Wi-Fi to the Internet.
  • the user resident of the house will typically have an appropriate doorbell app on their phone or other device, and this will receive the doorbell ring and, typically the video and audio from the doorbell.
  • the user can then use the doorbell app in a conventional manner to speak to the visitor at the door.
  • the user can then use the security system app to send instructions to the central unit 208 causing the central unit to unlock the electrically controlled lock 104, so that the visitor can be admitted.
  • the central unit also sends an activation command 432 to the interior video camera, which provides interior video images to the central unit which then passes them on to the security system app, so that the user can observe the entrance of the visitor and the closing of the door.
  • the actuator, the external video source, and the external audio interface may all be provided in free-standing components to implement embodiments of the invention.
  • the first video camera if used, to be the video camera of a video doorbell, because of the generally ideal location of such a camera in terms of surveying the space in front of the front door 102, it is also possible to use a different video camera installation, such as that shown as 112, which also observes the space in front of the front door.
  • a video camera installation such as that shown schematically in figures 1 and 2 as 112 may provide a view not only of the space in front of the front door, but also of the door.
  • the video camera installation 112 includes, or has an associated, motion detector 114, such as a PIR sensor, with the camera 112 typically only being turned on when the movement sensor detects movement.
  • motion detector 114 such as a PIR sensor
  • a surveillance camera installation does not require a movement sensor, rather when the surveillance cameras activated it may continuously monitor a surveilled area, typically streaming images continuously or every few seconds to a monitoring location.
  • Such a surveillance camera may also operate under the control of a security monitoring system according to an aspect of the invention, the controller 208 of the security monitoring system transmitting a signal to cause the surveillance camera to capture images at transmit the captured images to the controller 208, and to forward the captured images for checking remotely, e.g. at the central monitoring station 210 or at a user device 220.
  • a completely separate area e.g. annex or garage
  • FIG. 5 shows schematically an architecture in which a security monitoring system, shown generally as 500, is coupled to a video entry arrangement 510, an electrically controlled lock, such as the lock 104 of figures 1 to 4, and a remote monitoring station 210.
  • the security monitoring system 500 includes a security monitoring system controller 208, together with a collection of various sensors 520, including an external video camera 112, an internal video camera 214, a closure status sensor 206 for the closure (e.g.
  • admittance zone sensor 216 an example of which is the motion sensor 216 shown in figure 2, but more generally this is a sensor of any form to detect presence within a zone to which a delivery person, or the like, may be admitted using a system as described in this patent application.
  • FIG. 6 is a schematic block diagram of a video entry arrangement 510, such as that shown in figure 5.
  • the video entry arrangement 510 may take the form of a video doorbell.
  • the video entry arrangement 510 includes a video entry arrangement controller, 600, including a processor 602, and a memory 604.
  • an audio interface 610 preferably comprising both an input device 612, and an output device 614, a video camera, 620, and an actuator, or bell push, 630.
  • Figure 7 is a timeline illustrating schematically a scheduled delivery taking place using an installation such as that shown in figure 5, , in which the central monitoring station effectively provides backup, but the bulk of the processing is handled by the video entry arrangement 510, e.g. video doorbell) using for example pre-recorded announcements.
  • the installation automatically handles communication with the delivery person, with the operator and the central monitoring station taking a more passive role, perhaps simply monitoring the delivery on screen and being ready to take action if something goes wrong.
  • This approach has the merit of probably being rather cheaper to run.
  • the pass code should be one generated by the system, for example by the system security app 220, or by corresponding functionality in the cloud for example, rather than simply the last four digits of the order number.
  • a user places an order when schedules are deliver it with a supply company 250.
  • the user may place an order with the supply company and only subsequently schedule a delivery and even conceivably may schedule delivery with the supply company before actually placing the order for the goods or services (users of supermarket delivery services in these times of Covid will have experienced the difficulty of securing a delivery slot at a desired time, and know that it is sometimes better to book a delivery slot first, and then place the order for goods).
  • the user then at 702 uses for example the security system app 220 on their smart phone or other device to log the delivery with the controller 208 of the security monitoring system.
  • this logging of the delivery with the controller 208 may be done (705) using a user interface device of the security monitoring system, rather than remotely using a security system app or website.
  • the controller 208 is provided with the scheduled time window that was agreed with the supply company 250 for example, June 21 between 1 PM and 3 PM.
  • the controller 208 is also provided with an identification, e.g. a code, for the delivery, which will act as a security code specific to the scheduled event.
  • the supply company 250 we preferably avoid using an order number or other identifier provided by the supply company 250. Rather, in this case we want to use a code or password which is generated by the system - for example by the security system app 220, a security system server, or some cloud-based entity associated with the security system. So, here we are effectively creating a one-time code or PIN, which we provide to the supply company 250 for the delivery person to use when making the delivery, and which we also provide to the security monitoring system controller, or central unit 208. Conveniently, the one-time code can be provided to the supply company by completing a field on a form provided by the supply company as part of the ordering process.
  • the central unit is preferably automatically provided with the delivery schedule and the relevant one-time pass code by the security system app or equivalent.
  • the user may use a user interface device of the security monitoring system to provide the scheduled delivery time and the pass code to the central unit 208.
  • the central unit 208 may receive a “flag” indicating use of the scheduled concierge service.
  • the central unit 208 has the schedule delivery window and one-time code, these are passed at 706 to the video entry arrangement 510.
  • the details of the schedule delivery are stored in memory 604, and the VEA controller 600 primed to switch operating mode for the scheduled delivery window.
  • the VEA controller 600 automatically starts a routine specific to the scheduled concierge.
  • the video entry arrangement 510 may be configured to transmit 712 images captured by the video camera 620, and preferably sounds captured by audio interface 610, to the central unit 208 of the security monitoring system, from where they are onwards transmitted 714 to the central monitoring station 210.
  • the installation may be configured so that under ordinary circumstances, that is outside scheduled delivery windows, the video entry arrangement 510 behaves just like a conventional stand-alone video doorbell, with video images shared with a user via a video doorbell app and not with the security monitoring system.
  • the video entry arrangement may be arranged as an integral part of the security monitoring system.
  • the video entry arrangement 510 plays a pre-recorded announcement to ask the person who activated the actuator 630 to confirm whether they are present for the scheduled concierge service, for example “if you’re here to make a delivery, please press the button once more” (although clearly a different number of extra presses could be specified).
  • the video entry arrangement may be configured to play a ringing tone, music or provide another message, such as “one moment please, I’ll try to connect you”, followed by musical ringing tone, and otherwise behaving in the conventional way to connect the video entry arrangement to a designated user via a video entry arrangement app, for example. But if the instructions from the pre-recorded announcement are followed, and the button is pressed twice, 722, the video entry arrangement recognises this as a trigger to play another pre-recorded announcement, 728.
  • Pre-recorded announcement 728 tells the delivery person what they need to do in order to provide the code for the delivery, for example, speaking the code (if the video entry arrangement includes speech recognition functionality to recognise all the permitted characters for one-time codes, e.g. all the numerals, or all the alphanumerics), or keying the code into a keyboard (which may be provided so that householders can disarm the security monitoring system, and unlock a door, to gain admittance), or displaying some identifier - such as a QR code to the video camera 620.
  • the video entry arrangement 510 communicates successful code entry to the central unit 208.
  • this causes the central unit 208 to activate at 738 a video camera, such as interior camera 214, to observe the delivery person once they have opened the closure (e.g. door 102), and he central unit may then begin to supply images from the video camera to the central monitoring station 210.
  • the central unit 208 sends an unlock instruction 744 to the electrically controlled lock 104.
  • the video entry arrangement 510(and optionally central monitoring station 210) may also receive confirmation from the central unit 208 that the lock has been unlocked, and in any event the video entry arrangement preferably makes another announcement to the effect that the delivery person is now free to enter through the relevant closure, e.g.
  • an operator at the central monitoring station 210 observes 748 the delivery. If the operator decides that the delivery person’s behaviour is wrong, or suspicious, he may involve security personnel such as the local police, or security guard - or even activate a smoke producing device to prevent the delivery person from being able to see to steal anything (this is of course also an option with all the other embodiments described). When the delivery person leaves, he closes the door behind him, allowing the lock 104 to lock itself again automatically - or under the control of the central unit 208, depending upon the setup.
  • a motion or presence detector for example a PIR in the video entry arrangement (e.g. a video doorbell), to detect the presence of someone at the door (or wherever else the arrangement covers), rather than relying on the bell push 710 to trigger the playing of the announcement 720.
  • the central unit could be configured to couple the doorbell video to the central monitoring station at the commencement of the schedule delivery window, so that an operator in the central monitoring station 210 may react to the presence of someone (who perhaps looks like a delivery person) rather than relying on 310.
  • the video entry arrangement 510 e.g. doorbell
  • the video entry arrangement 510 could be programmed to give detailed instructions, e.g. how to enter a PIN code on an outdoor PIN pad.
  • the protected interior space may not be a room or hall of a dwelling, or a garage or outbuilding, or even a space large enough to accommodate a person - it could instead be an enclosure such a locker or cubby hole, large enough to receive and contain parcels and most other common deliveries.
  • the inputting of the security code may be in any manner: audibly (using speech or some other sound), physically using key presses, visually (using a QR code or other visual representation), or by presentation of a specially coded token.

Abstract

Provided is a security installation to secure at least part of a perimeter of premises (100), the premises (100) including: an exterior closure (102) in the secure perimeter giving access to a protected interior space (200) at the premises; an electrically controlled lock (104) for the exterior closure (102); an actuator for a visitor to indicate their presence at the premises; and a controller, the controller being configured to: receive details of a scheduled event that will involve granting a visitor access to the protected interior space (200) by opening the exterior closure, the details including a scheduled time window and a security code specific to the scheduled event; and upon receiving, within the scheduled time window, an indication from the actuator that a visitor is present at the closure, to: prompt the visitor to confirm that they are present for the purpose of the event, and upon receiving such confirmation from the visitor, prompt the visitor to input a security code; receive from the visitor a security code, and if the received security code matches the security code specific to the scheduled event, to cause the unlocking of the electrically controlled lock (104) to give the visitor access to the protected interior space (200) of the premises for the scheduled event.

Description

Security installations and methods
Technical field
The present invention relates to security installations to secure at least part of a perimeter of premises and to monitor premises, the security installation including an electrically controlled lock on an exterior closure, e.g. door, of the premises, and to methods performed by the system and by controllers of the system.
Background
Security installations that are or include security monitoring systems for monitoring premises, often referred to as alarm systems, typically provide a means for detecting the presence and/or actions of people at the premises, and reacting to detected events. Commonly such systems include sensors to detect the opening and closing of doors and windows to provide a secure perimeter to the premises, creating one or more protected interior spaces, movement detectors to monitor spaces (both within and outside buildings) for signs of movement, microphones to detect sounds such as breaking glass, and image sensors to capture still or moving images of monitored zones. Such systems may be self-contained, with alarm indicators such as sirens and flashing lights that may be activated in the event of an alarm condition being detected. Such installations typically include a control unit (which may also be termed a central unit), generally mains powered, that is coupled to the sensors, detectors, cameras, etc. (“nodes”), and which processes received notifications and determines a response. The central unit may be linked to the various nodes by wires, but increasingly is instead linked wirelessly, rather than by wires, since this facilitates installation and may also provide some safeguards against sensors/detectors effectively being disabled by disconnecting them from the central unit. Similarly, for ease of installation and to improve security, the nodes of such systems typically include an autonomous power source, such as a battery power supply, rather than being mains powered.
As an alternative to self-contained systems, a security monitoring system may include an installation at a premises, domestic or commercial, that is linked to a Central Monitoring Station (CMS) where, typically, human operators manage the responses required by different alarm and notification types. In such centrally monitored systems, the central unit at the premises installation typically processes notifications received from the nodes in the installation, and notifies the Central Monitoring Station of only some of these, depending upon the settings of the system and the nature of the detected events. In such a configuration, the central unit at the installation is effectively acting as a gateway between the nodes and the Central Monitoring Station. Again, in such installations the central unit may be linked by wires, or wirelessly, to the various nodes of the installation, and these nodes will typically be battery rather than mains powered.
Such security monitoring systems contribute to the safety and wellbeing of occupants of the protected premises, as well as safeguarding articles within the protected perimeter - which may of course not simply be limited to a house or dwelling, but may also extend to the grounds of the house, protected by a boundary fence and gate, for example.
A security concern has arisen in recent years with the greatly increased reliance, at least in Western countries, of Internet shopping - exemplified by the ever-increasing volume of parcels delivered from Amazon (RTM) and other online stores. The convenience of online shopping, not just in terms of the breadth of goods available, and the ease of ordering with a few clicks on a computer or smartphone, but also often the speed of delivery had already made online shopping ubiquitous - even before the upsurge attributable to Covid-19. But one less attractive aspect of online shopping is the threat of parcel theft where parcels are, as is common, left on the doorstep. Known, at least in the US, as “Porch Pirates” the bad actors who perpetrate such thefts account for a reported 1.7 million packages stolen or lost in the US alone - at least according to researchers at the Rensselaer Polytechnic Institute. According to a CNBC (RTM) report of January 2020, Amazon (RTM) “Prime members say they receive on average 51 packages per year, and one in three Americans report having at least one package stolen, resulting in $25 million of lost goods and services every day, according to C+R Research”. This problem is clearly not confined to the US, and the scale of this problem is believed to be very significant in many countries.
Because the parcels are taken are those left outside, even the best premises security monitoring system doesn’t seem to offer much help.
There therefore exists a need to improve the scope of security monitoring systems to address the problem of parcel theft.
Embodiments of the present invention seek to provide enhanced security monitoring systems, and corresponding apps, methods and other implementations that improve the scope of security monitoring systems to address aspects of the problem of parcel theft, as well as providing new functionality and methods.
Summary of the invention
According to a first aspect, there is provided a security monitoring system to secure at least part of a perimeter of premises, the premises including: an exterior closure in the secure perimeter giving access to a protected interior space at or of the premises; an electrically controlled lock for the exterior closure; an actuator for a visitor to indicate their presence at the closure or more generally at the premises; and a controller, the controller being configured to: receive details of a scheduled event that will involve granting a visitor access to the protected interior space by opening the exterior closure, the details including a scheduled time window and a security code specific to the scheduled event; and upon receiving, within the scheduled time window, an indication from the actuator that a visitor is present at the closure, to: prompt the visitor to confirm that they are present for the purpose of the event, and upon receiving such confirmation from the visitor, prompt the visitor to input a security code; receive from the visitor a security code, and if the received security code matches the security code specific to the scheduled event, to cause the unlocking of the electrically controlled lock to give the visitor access to (optionally to admit to) the protected interior space at the premises for the scheduled event.
The controller may be a controller of a video entry arrangement.
The video entry arrangement may be configured prompt the visitor using audio prompts. The video entry arrangement may be configured to prompt the visitor using voiced prompts using pre-stored messages.
The controller of the video entry arrangement may be arranged to cause the unlocking of the electrically controlled lock by signalling to a processor of a security monitoring system that forms part of the security installation. The processor of the security monitoring system may be configured to supply the details of the scheduled event to the controller of the video entry arrangement.
The video entry arrangement may be a video doorbell.
The controller may be a processor of a security monitoring system that forms part of the security installation, the processor being configured to supply a remote monitoring centre with the received details of the scheduled event, and optionally also the received security code.
The processor may also be configured to only unlock the electrically controlled lock to give the visitor access to the protected interior space at the premises (or more commonly only to part of the protected space - the rest remaining off-limits and monitored by the security monitoring system) for the scheduled event if confirmation is received from the remote monitoring centre that the received security code matches the security code specific to the scheduled event. The security monitoring system may further comprise an audio interface to enable audio communication with a visitor at the closure, wherein the processor is configured to enable the remote monitoring centre to use the audio interface to speak to the visitor.
The security monitoring system may further comprise a first video camera arranged to observe a space in front of the exterior of the closure, the processor being configured to enable the remote monitoring centre to use the first video camera to observe the visitor. Preferably, the first video camera is a video doorbell. Preferably, the video doorbell includes the audio interface.
Optionally, the security monitoring system may further comprise a second video camera arranged to observe the protected interior space behind the closure, the processor being configured to enable the remote monitoring centre to use the second video camera to observe the visitor within the protected interior space.
The processor may be configured to unlock the electrically controlled lock to give the visitor access to the protected interior space of the premises for the scheduled event only if the security code is received from the visitor while the security monitoring system is in an armed state.
The controller may be configured, in the event that the security code received from the visitor matches the security code previously received by the controller, not to react to any signals or notifications received from a status sensor associated with the closure for a predetermined period, while maintaining the security monitoring system in an armed state. In this way, the security monitoring system can continue to monitor the rest of the perimeter.
Optionally, for any of the described embodiments, a dedicated delivery zone is defined, all the sensors for which are effectively “disarmed” temporarily during the drop-off while the rest of the premises is still fully protected.
Preferably, the controller is further configured not to react to any signals or notifications received from a status sensor associated with the area of the protected interior space to which the visitor is admitted for a predetermined period, while maintaining the security monitoring system in an armed state - so that, for example, other areas of the protected interior space can continue to be monitored for unauthorised entry - and an alarm raised, and or the central monitoring station involved, according to the settings of the system.
The predetermined period may be until the visitor has been observed to vacate the interior space. An operator in the central monitoring station may continue to observe the visitor as long as he or she is on the premises, using for example an interior camera (s) that observes all of the interior space to which the visitor is admitted. According to a second aspect, there is provided a method performed by a controller of a security installation configured to secure at least part of a perimeter of premises, the premises including: an exterior closure in the secure perimeter giving access to a protected interior space of the premises; an electrically controlled lock for the exterior closure; an actuator for a visitor to indicate their presence at the perimeter; and a controller, the method comprising: receiving at the controller details of a scheduled event that will involve granting a visitor access to the protected interior space by opening the exterior closure, the details including a scheduled time window and a security code specific to the scheduled event; receiving at the controller, within the scheduled time window, an indication from the actuator that a visitor is present at the premises: prompting the visitor to confirm that they are present for the purpose of the event, and upon receiving such confirmation from the visitor, prompting the visitor to input a security code; receiving from the visitor a security code, and if the received security code matches the security code specific to the scheduled event, unlocking the electrically controlled lock to give the visitor access to the protected interior space of the premises for the scheduled event.
The method may further comprise providing the prompts the visitor using audio prompts. The voiced prompts may be generated using pre-stored messages.
In the event that the controller is a controller of a video entry arrangement, the method may further comprise causing unlocking of the electrically controlled lock by signalling from the controller to a processor of a security monitoring system that forms part of the security installation. The method may further comprise supplying the details of the scheduled event to the controller of the video entry arrangement from the processor of the security monitoring system.
The method according to the second aspect may further comprise, when the controller is a processor of a security monitoring system that forms part of the security installation, supplying the received details of the scheduled event, and the received security code, to a remote monitoring centre; unlocking the electrically controlled lock to give the visitor access to (optionally to admit the visitor to)) the protected interior space at the premises for the scheduled event only upon receiving confirmation from the remote monitoring centre that the received security code matches the security code specific to the scheduled event.
The method may further comprise using the processor to enable audio communication between the remote monitoring centre and the visitor at the premises. The method may further comprise enabling the remote monitoring centre to use a first video camera to observe the visitor in front of the exterior of the closure. Preferably, the first video camera is a video doorbell. Preferably, the video doorbell includes the audio interface.
The method may further comprise enabling the remote monitoring centre to use a second video camera to observe the visitor within the protected interior space behind the closure.
The method may further comprise only unlocking the electrically controlled lock to give the visitor access to the protected interior space at (e.g. of) the premises for the scheduled event in the event that the security code is received from the visitor while the security monitoring system is in an armed state. Optionally, the method further comprises, in the event that the security code received from the visitor matches the security code previously received by the controller, ignoring any signals or notifications received from a status sensor associated with the closure for a predetermined period, while maintaining the security monitoring system in an armed state. Optionally, the predetermined period is until the visitor has been observed to vacate the interior space.
According to a third aspect there is provided a method of enabling an event involving granting a visitor access to an interior space of premises, the interior space protected by a perimeter secured by a security installation, the perimeter including a closure provided with an electrically controlled lock, the method comprising: sharing with the visitor an access code, and a scheduled time window, specific to the event; providing the access code, and the scheduled time window, to a controller (optionally a controller of the security monitoring system or of a video entry arrangement of the installation), and storing the provided access code; subsequently, within the time window and while the security installation is in an armed condition, determining the presence of a visitor at the premises; prompting the visitor at the premises to supply an access code; and in the event that the supplied access code matches the stored access code, unlocking the electrically controlled lock to give the visitor access to the interior space without raising an alarm.
According to a fourth aspect there is provided use of an app for a security monitoring system to generate a one-time code (OTC) which can be used subsequently to disarm the security monitoring system, the app sending the OTC to a controller of the security monitoring system, the controller forwarding the OTC to a central monitoring station (CMS) that monitors the security monitoring system (or the app may send the OTC to the CMS directly rather than through the controller) , with the CMS subsequently making a decision to disarm the security monitoring system upon being presented with a code that has been presented at an interface associated with the security monitoring system, the interface preferably being at the premises protected by the security monitoring system.
According to a another aspect there is provided use of an app for a security monitoring system to generate a one-time code (OTC) which can be used subsequently to disarm the security monitoring system, the app sending the OTC to a controller of the security monitoring system, the controller forwarding the OTC to a video entry arrangement at premises protected by the security monitoring system, with a processor of the video entry arrangement subsequently making a decision to cause the unlocking of a lock of a closure in a perimeter of the premises upon being presented with a code that has been presented at an interface associated with the security monitoring system, the interface preferably being at the premises protected by the security monitoring system.
According to a fifth aspect there is provided an app for a premises security monitoring system, the app being configured to: generate securely a one-time-passcode which can be used to disarm the premises security monitoring system; and share the one-time-passcode with a controller of the security monitoring system.
According to a sixth aspect there is provided a method of controlling a security monitoring system, the method comprising: generating a one-time-passcode in an app for the security monitoring system; and communicating the a one-time-passcode to a controller of the security monitoring system for subsequent use in disarming the security monitoring system.
According to a seventh aspect there is provided a method of controlling a security monitoring system, the method comprising: receiving at a controller of the security monitoring system a one-time-passcode generated by an app for the security monitoring system run on a device other than the controller; and subsequently, while the security monitoring system is in an armed state, disarming the security monitoring system in response to receiving the one-time-passcode via a user interface.
The method of the seventh aspect may further comprise receiving at the controller a time window of validity for the one-time passcode, and disarming the security monitoring system only in response to receiving the one-time-passcode via a user interface within the time window of validity. Preferably, the user interface is an audio interface, or a keypad, optionally located at the premises protected by the security monitoring system.
According to an eighth aspect there is provided a method of enabling an event involving granting a visitor access to an interior space of premises, the interior space protected by a perimeter secured by a security monitoring system, the perimeter including a closure provided with an electrically controlled lock, the method comprising: sharing with the visitor an access code, and a scheduled time, specific to the event; providing the access code, and the scheduled time, to a controller of the security monitoring system, and storing the provided access code; subsequently, while the security monitoring system is in an armed condition, determining the presence of a visitor at the premises; prompting the visitor at the premises to supply an access code; and in the event that the supplied access code matches the stored access code, unlocking the electrically controlled lock to give the visitor access to the interior space without raising an alarm.
The method of the eighth aspect may further comprise disarming the security monitoring system in the event that the supplied access code matches the stored access code.
The method of the eighth aspect may further comprise, in the event that the supplied access code matches the stored access code, configuring a controller of the security monitoring system not to react to any signals or notifications received from a status sensor associated with the closure for a predetermined period, while maintaining the security monitoring system in an armed state. Optionally, the predetermined period is until the visitor has been observed to vacate the interior space.
According to a nineth aspect there is provided a method of granting a visitor access to an interior space within a secure perimeter of premises, the premises protected by a security monitoring system, the premises including: an exterior closure in the secure perimeter giving access to the protected interior space of the premises; an electrically controlled lock for the exterior closure; an actuator for a visitor to indicate their presence at the closure; and a controller; the method comprising receiving at the controller details of a scheduled event that will involve granting a visitor access to the protected interior space by opening the exterior closure, the details including a scheduled time window and a security code specific to the scheduled event; and upon receiving, within the scheduled time window, an indication from the actuator that a visitor is present at the closure: prompting the visitor to confirm that they are present for the purpose of the event, and upon receiving such confirmation from the visitor, prompting the visitor to input a security code; receiving from the visitor a security code, and if the received security code matches the security code specific to the scheduled event, causing the unlocking of the electrically controlled lock to give the visitor access to the protected interior space at the premises for the scheduled event.
In any of the described embodiments, the closure, e.g. door, may be provided with an automatic closing mechanism - such as a door spring, to ensure that when a delivery person leaves the premises, after completing a delivery, the door (or gate or whatever) closes correctly, so that the electrically controlled lock is once again effective to protect against unlawful entry.
Description of Figures
Embodiments of the invention will now be described, by way of example only, with reference to the accompanying drawings, in which:
Figure 1 is a schematic drawing showing a front elevation of stylised building with an external space which is monitored by a security monitoring system according to an embodiment of the invention;
Figure 2 is a schematic part plan view of premises protected by a security monitoring system, together with other elements of the system;
Figure 3a shows a timing diagram of a first part of a method according to an aspect of the invention;
Figure 3b shows a timing diagram of a second part of a method according to an aspect of the invention;
Figure 4 shows a timing diagram of a method according to an aspect of the invention;
Figure 5 shows schematically an architecture including a security monitoring system, a video entry arrangement, and an electrically controlled lock;
Figure 6 is a schematic block diagram of a video entry arrangement; and
Figure 7 is a timing diagram of a method according to another aspect of the invention.
Specific description
Figure 1 shows a view of the front of a premises 100 protected by a security monitoring system according to an aspect of the present invention. The premises, here in the form of a house, have an exterior door, here front door, 102. The door gives access to a protected interior space. The security monitoring system secure at least part of a perimeter to the premises (100), and the door constitutes an exterior closure 102 in the secure perimeter giving access to a protected interior space 200 of the premises. A lock 104 on the exterior door is electrically controlled so that it can be locked and unlocked remotely. To the side of the door, on the fa9ade of the house, is a first video camera in the form of a video doorbell 106 which looks out from the fa9ade of the premises so that anyone approaching the door along the path 108 can be seen, and in particular when they stand at the door their face should clearly be visible. The video doorbell includes an actuator, e.g. a push button, for a visitor to indicate their presence at the closure. The video doorbell also includes an audio interface to enable bidirectional audio communication with a visitor at the closure 102.
As is conventional, the video doorbell includes an infrared light source to illuminate whatever is in front of the video doorbell. Optionally, as shown, the fa9ade of the house also carries an external keypad 110 with which a user can disarm the security monitoring system, and unlock the lock 104. Also shown is an optional second video camera 112 which is coupled to a movement detector, such as a PIR sensor 114, which, when the security monitoring system is armed, may be arranged to capture video of the front of the house and the private area, e.g. the garden, in front of the house. As with the doorbell camera, the second video camera is preferably provided with an audio interface 116 to enable bidirectional audio communication with anyone observed by the second video camera. Optionally, the house may be surrounded by a perimeter fence, the fence including a security gate. The security monitoring system may also be used to secure that perimeter, the gate forming an exterior closure in the secure perimeter giving access to a protected interior space of the premises, and a further video doorbell and another external keypad may be provided and with which a user can disarm the security monitoring system, and unlock a lock securing the gate, and thereby gain admittance to the protected grounds of the house.
Figure 2 is a schematic part plan view of a premises 100 protected by security monitoring system according to an aspect of the invention, together with other elements of the system, corresponding generally to the premises of figure 1. The front door 102, with electrically controlled lock 104, leads into the protected interior space 200 of the premises. Each of the windows 202, and the rear door 204 is fitted with a sensor 206 to detect when they are opened. Each of the sensors 206 includes a radio transceiver to report events to a controller , or central unit, 208 of the security monitoring system. If one of the sensors 206 is triggered when the system is armed, a signal is sent to the central unit 208 which in turn may signal an alarm event to a central monitoring station 210. The central unit 208 is connected to the central monitoring station 210 via the Internet 212, either via a wired or a wireless connection. Also wirelessly coupled to the central unit 208 are the video doorbell 106, the electrically controlled lock 104, and if present the second video camera 112 its associated movement sensor 114 (although the latter may be integral with the second video camera 112) and the audio interface 116. These items, and the sensors 206, are preferably coupled to the central unit 208 using transceivers operating in the industrial scientific and medical (ISM) bandwidths, for example a sub- gigahertz bandwidth such as 868 MHz, and the communications are encrypted preferably using shared secret keys. The security monitoring system may also include other sensors within the protected interior space, such as an interior video camera 214 and associated movement detector 216 (which again may be integral with the camera 214), and each of the interior doors 218 may also be provided with a sensor 206 to detect the opening/closing of the door. Also shown in figure 2 are a user device 220, preferably loaded with an appropriate app - as will be described later, and a public land mobile network (PLMN) by means of which the central monitoring station 210, and the central unit 208, may communicate with the user device 220.
The security monitoring system app is installed on a user device 220, here shown as a smartphone, although of course it could be almost any kind of electronic device, such as a laptop or desktop computer, a tablet such as an iPad, a smart watch, or even a television. The security monitoring system app may be used to schedule a delivery following for example the placing of an order for goods from an online or bricks and mortar retailer. Possibly the security monitoring system app may provide the option of ordering goods or services from selected retailers or service providers, so that relevant order details, as will be explained below, may be seamlessly transferred between an ordering process and the scheduling of an event with the security monitoring service. These and other aspects of methods and systems according to aspects of the invention will now be described with reference to Figures 3 and 4.
Figure 3a is a timing diagram of the first part of a method according to an aspect of the invention. As a first step 300, a user places an order and schedules a delivery with a supply company 250. Although shown as a single step, the user may place an order with the supply company and only subsequently schedule a delivery, and even conceivably may schedule delivery with the supply company before placing the order for the goods or services. Also, although throughout this description we focus primarily on the topic of deliveries, it will be appreciated that essentially the same method and systems may be used when arranging collection of something from the premises, for example laundry or dry-cleaning, or a pet which needs to be taken for a walk or taken to the vet.
Having placed the order and schedule the delivery, the user then at 302 uses the security system app, for example on device 220, to log the delivery with the controller 208 of the security monitoring system. In logging the delivery with the controller 208, the user provides the scheduled time window that was agreed with the supply company 250, for example June 21st between 1 PM and 3 PM. The user also provides an identifier for the delivery, which will act as a security code specific to the scheduled event, for example the last six or more digits of the order number. There is a balance to be drawn between the need for security and the desire of the user to correctly enter a possibly alphanumeric sequence.
For example, Amazon (RTM) order numbers currently take the form of 3 digits followed by - followed by 7 digits - followed by 7 digits, and it may be considered too onerous or potentially error prone to require the full 17 digits, plus hyphens, to be entered. Smaller scale suppliers may well operate with much shorter order numbers, but the risk of bad actors gaining entrance illegitimately is probably too great to rely on a code of three digits or less.
So it is preferred to make the security code at least six digits. If the Supply Co. order number is shorter than this, then it is preferable to provide the Supply Co. with a security code that the delivery person will need to provide to the system, as will be described later. Conveniently, the security monitoring system app may be configured to generate secure one time codes, and the user of the app can, when scheduling the delivery with the Supply Co. may trigger the app to generate a secure one-time code of six or more characters which is provided to the Supply Co at step 300, and then to the central unit 208 at step 304.
Preferably, once the user has finished scheduling the con CA service with the central unit 208, the central unit, at step 306 passes the concierge delivery schedule and authentication data, e.g. the pass code, to the central monitoring station 210. As with all other communications between the central unit and the central monitoring station this communication is encrypted and passes either through a wired data connection or wirelessly between the central unit and a central monitoring station. The reason for wanting to provide a central monitoring station with the details of the scheduled delivery (or collection) is so that the central monitoring station can be sure to have a human operator on standby for the relevant period.
Generally, as shown at 308, the scheduled delivery window 309 shown by the pair of dotted lines in figure 3a, is expected to be at a time when the security monitoring system has a status of “armed away” - which is a status typically used when the premises are unoccupied. This is because, in general the “scheduled concierge service” provided by the security monitoring system will not be needed if the user is expecting to be at home at the time of schedule delivery. Nevertheless, the user may configure the system, using the security monitoring system app, or an appropriate interface for the central unit or some other control terminal of the security monitoring system, to allow the scheduled concierge service to operate even when the security monitoring system is set in an “armed at home” status, or even a disarmed status. Nevertheless, for the purpose of the present description we will assume that the user is away, the premises are unoccupied, and the security monitoring system is in the armed away state.
When delivery driver arrives with the package, she will know that she has to operate the actuator to indicate her presence at the door (more generally exterior closure) - which will typically mean pushing the bell push of a video doorbell 106, at step 310. It will be recognised that in these times of Covid 19 delivery people are sometimes reluctant to operate doorbells. For this reason, when scheduling the delivery, at step 300, it’s important that the user makes it clear that delivery will be using a scheduled concierge service which requires the delivery person to operate the actuator, e.g. the bell push. If the doorbell is pressed within the schedule delivery window, the delivery person hears an announcement along the lines of “If you are here for delivery press the button again to acknowledge”, although of course the dialogue may require more than one additional button press. This dialogue can be provided from within the video doorbell 106, or it may be provided from the central unit 208, or possibly, but less preferably from the central monitoring station. The announcement 320 is provided from the central unit 208 (but may equally be provided directly by the doorbell if it is so configured). Figure 3 a also shows the possibility of connecting the doorbell video camera to the central unit 208 upon detecting the first bell push within the scheduled delivery window, and optionally coupling that doorbell video to the central monitoring station 210, at step 314 the central monitoring station may at that stage send a voice link request 316 to the central unit, which leads a central unit to connect 318 audio from the audio interface of video doorbell 106 (or audio interface 116 if the video is coming from second video camera 112) to the central monitoring station 210. Optionally the central monitoring station is only connected to the doorbell video and audio after the delivery person has confirmed that they are indeed present for the purpose of the scheduled event, but this is less preferable because of the risk of missing the security code input as result of a delayed completion of the connection to the central monitoring station.
At step 328, the delivery person receives, preferably over the audio interface, a prompt to input the security code which was agreed between the user and the Supply Co. at step 300. A less preferred alternative is to use a visual interface, for example a display on the external keypad 110, to prompt for the security code. The delivery person then provides the security code, preferably by speaking the security code into the audio interface, but possibly by keying the code into the external keypad 110. In the preferred approach, the code input as speech is received at the central monitoring station where it is heard by a human operator, who confirms that it corresponds to the previously registered code for the scheduled event. Preferably the human operator has also been observing the delivery person, and the space in front of the exterior closure, e.g. door 102, so that they may satisfy themselves that everything is as it should be. If satisfied, the human operator sends an unlock instruction 336 to the central unit which also has the effect of causing an activation command 338 to be sent to an interior video camera 214 which observes the door, and the space behind the door - i.e. part of the protected interior space of the premises. Images from the interior video camera 214 then transmitted 340 to the central unit 208, and then forwarded 342 to the central monitoring station 210. The central unit 208 is configured to ignore any signals or notifications received from for example the sensor 206 the detects the status of the door 102 and also from the movement sensor 216 in the interior space, e.g. the entry hall, into which the delivery person needs to go to deposit the package. Meanwhile, if the security monitoring system is in the expected armed away state, the other sensors 206 on the exterior doors and windows, and on internal doors 218, and any other internal motion sensors are still active, and the central unit 208 will continue to respond in the usual way to any incidents reported by the sensors. The other sensors protecting the perimeter and interior of the premises remain active, and any breach of these, such as for example entry into an internally secured area, will trigger an alarm event that will be signalled to the to the central unit and onwards to the central monitoring station.
Figure 3b shows the continuation of the process begun in figure 3a. The central unit 208 transmits an unlock instruction 344 to the electronically controlled lock 104 which then unlocks. The delivery person is then able to open the door, if it is not automatically opened already, to deposit the delivery (or alternatively to collect whatever needs collecting). Throughout this stage of the process the operator in the central monitoring station 210 is observing images from the interior video camera 214, which are being passed via the central unit 208, to ensure that the delivery person’s behaviour is appropriate. The delivery person then leaves the protected interior space, closing the door behind them. The lock 104 sends a lock status update 350 to the central unit 208, which then forwards this to the central monitoring station, so that the operator can speak 358 to the delivery person via the audio interface if the door has not been closed correctly - the operator basically telling the delivery person to close the door properly before they leave. The central monitoring station may then send the confirmation to the central unit that the scheduled event has been completed, or the central unit may be configured to recognise this fact based on receiving the correct lock status update at step 350. The controller of the security monitoring system then reverts to its previous status.
It will be appreciated that the described security monitoring system provides a secure perimeter to premises, the premises including: an exterior closure, such as door 102, in the secure perimeter giving access to a protected interior space 200 of the premises. An electrically controlled lockl04 is provided for the exterior closure or door 102. An actuator, for example a bell push, is provided for a visitor to indicate their presence at the door. The security monitoring system includes a controller 208 coupled to the lock, and the controller is configured to: receive details of a scheduled event that will involve granting a visitor (such as a delivery person) access to the protected interior space by opening the exterior closure, the details including a scheduled time window and a security code specific to the scheduled event. The controller, upon receiving, within the scheduled time window, an indication from the actuator that a visitor is present at the closure, is configured to: prompt the visitor to confirm that they are present for the purpose of the event, and upon receiving such confirmation from the visitor, prompt the visitor to input a security code; receive from the visitor a security code, and if the received security code matches the security code specific to the scheduled event, to unlock the electrically controlled lock to admit the visitor to the protected interior space of the premises for the scheduled event. In this way, the security of delivered items is improved, while maintaining the security of the premises, and without requiring that anyone be at the premises to receive the delivery. The same approach works equally well to support scheduled collections, for example collection of laundry or dry cleaning. An approved user of the system, e.g. a member of the household, can use the system to schedule secure delivery or collection at the time they order goods or services, safe in the knowledge that the goods that are ordered will be safe from “porch pirates” and other opportunists.
The controller may be configured to share with a remote monitoring centre (210) the received details of the scheduled event, and the received security code, and only unlock the electrically controlled lock to admit the visitor to the protected interior space of the premises for the scheduled event if confirmation is received from the remote monitoring centre that the received security code matches the security code specific to the scheduled event. Thus, although it is possible to use the controller 208 to control the process, including the checking of the security code, this variant of the invention introduces the possibility of using a human operator to check the security code, which many users may find more reassuring, and which may indeed be more secure. The security monitoring system may further comprise an audio interface to enable audio communication with a visitor at the closure, the controller being configured to enable the remote monitoring centre to use the audio interface to speak to the visitor. In this way, an operator in the central monitoring station is able to clarify any uncertainties, as well as guiding the visitor in what they have to do and where they have to leave the package (or collect the package).
The security monitoring system preferably further comprises a first video camera arranged to observe a space in front of the exterior of the closure, the controller being configured to enable the remote monitoring centre to use the first video camera to observe the visitor. In this way an operator in the central monitoring station is able to visually check the delivery person, if necessary being able to ask for the person’s work ID to be presented, and also allowing video of the delivery to be stored: both things which are likely to be off-putting to potential bad actors. The operator in the central monitoring station may also tell the delivery person that they will not be admitted until their face has been clearly revealed - and the delivery person told to remove any hats, hoodies, face masks, and sunglasses so that their likeness can be captured clearly. This is likely to reduce the risk of opportunists getting away with repeated impersonations of delivery crew. It is also an attractive feature are far as users are concerned, as it provides a clear perception of improved security compared to a system that doesn’t use video.
Conveniently, first video camera may be a video doorbell, which is convenient both in terms of the location of the camera, and the co-location of the video and audio interfaces, along with the actuator, and in terms of the visual performance of the camera - as video doorbells are typically very well placed to capture images of people at the door.
Conveniently, the video doorbell includes the audio interface, as this is likely to be well located from the point of view of performance, and it may also reduce installation complexity and time.
Preferably, the security monitoring system further comprising a second video camera arranged to observe the protected interior space behind the closure, the controller being configured to enable the remote monitoring centre to use the second video camera to observe the visitor within the protected interior space.
It will be noted that the security monitoring system may be configured to only unlock the electrically controlled lock to admit the visitor to the protected interior space of the premises for the scheduled event if the security code is received from the visitor while the security monitoring system is in an armed state. In this way, the risk of admitting a stranger to the premises when the premises are occupied is reduced. This risk may be further reduced by restricting the scheduled concierge service to times when the security monitoring system is in armed away mode.
It will also be noted that the controller of the security monitoring system may be configured, in the event that the security code received from the visitor matches the security code previously received by the controller, not to react to any signals or notifications received from a status sensor associated with the closure for a predetermined period, while maintaining the security monitoring system in an armed state. In this way, the security monitoring system can continue to monitor the rest of the periphery, and the interior of the premises, while securely admitting the visitor and without an alarm condition being caused by correct behaviour of the visitor. The predetermined period may be until the visitor has been observed to vacate the interior space.
Figure 4 corresponds generally to figure 3 a, but shows a sequence of events where the visitor at the doorbell does not confirm that they are present for the purpose of the scheduled event. In this case following the announcement 320, there is no subsequent bell push. After waiting a predetermined time, of say 10 to 30 seconds, the audio interface may be used to make an announcement to the effect that the visitor should wait while the system tries to connect them with the occupant of the house. The central monitoring station transmits a handover instruction 422 to the central unit which causes the central unit to transmit doorbell ring instruction to the doorbell app, either directly or through the doorbell itself - the doorbell been connected typically via Wi-Fi to the Internet. The user, resident of the house will typically have an appropriate doorbell app on their phone or other device, and this will receive the doorbell ring and, typically the video and audio from the doorbell. The user, can then use the doorbell app in a conventional manner to speak to the visitor at the door. If appropriate, the user can then use the security system app to send instructions to the central unit 208 causing the central unit to unlock the electrically controlled lock 104, so that the visitor can be admitted. Preferably, the central unit also sends an activation command 432 to the interior video camera, which provides interior video images to the central unit which then passes them on to the security system app, so that the user can observe the entrance of the visitor and the closing of the door.
Although use of a doorbell video camera for the purpose of observing the visitor, and the doorbell audio interface as a means to speak with the delivery person are preferred, it will be appreciated that the actuator, the external video source, and the external audio interface may all be provided in free-standing components to implement embodiments of the invention. Thus, although it is preferred for the first video camera, if used, to be the video camera of a video doorbell, because of the generally ideal location of such a camera in terms of surveying the space in front of the front door 102, it is also possible to use a different video camera installation, such as that shown as 112, which also observes the space in front of the front door. Unlike most video doorbells, which typically do not show a view of the exterior face of the front door itself, a video camera installation such as that shown schematically in figures 1 and 2 as 112 may provide a view not only of the space in front of the front door, but also of the door. As previously described, the video camera installation 112 includes, or has an associated, motion detector 114, such as a PIR sensor, with the camera 112 typically only being turned on when the movement sensor detects movement. It is also possible to make use of a different form of video camera installation, such as a surveillance camera installation. Typically, a surveillance camera installation does not require a movement sensor, rather when the surveillance cameras activated it may continuously monitor a surveilled area, typically streaming images continuously or every few seconds to a monitoring location. Such a surveillance camera may also operate under the control of a security monitoring system according to an aspect of the invention, the controller 208 of the security monitoring system transmitting a signal to cause the surveillance camera to capture images at transmit the captured images to the controller 208, and to forward the captured images for checking remotely, e.g. at the central monitoring station 210 or at a user device 220.
For arrangements, systems and methods according to the invention, we may typically give access to and (partially) disarm a certain area, while the rest of the protected premises is still protected. For example, we could give access just to the hallway in main premises, or a completely separate area (e.g. annex or garage) more tailored towards deliveries.
It is contemplated that there may be overlapping deliveries in time, e.g. two deliveries on the same day, arriving between say 3pm and 5pm, with different codes.
There are also many ways imaginable to authenticate a delivery person. It doesn’t need to be a code, could be a code word (e.g. “Swordfish”, “Zeppelin”, or “Excommunicate” or a combination of words). We could ask them to show a valid ID for the camera. We could ask them to show the delivery slip on the package for the camera (which automatically scans the delivery code).
Alternative embodiments will now be described with reference to figures 5 to 7. Figure 5 shows schematically an architecture in which a security monitoring system, shown generally as 500, is coupled to a video entry arrangement 510, an electrically controlled lock, such as the lock 104 of figures 1 to 4, and a remote monitoring station 210. The security monitoring system 500 includes a security monitoring system controller 208, together with a collection of various sensors 520, including an external video camera 112, an internal video camera 214, a closure status sensor 206 for the closure (e.g. door 102) which is locked by electrically controlled lock 104, and an admittance zone sensor 216 - an example of which is the motion sensor 216 shown in figure 2, but more generally this is a sensor of any form to detect presence within a zone to which a delivery person, or the like, may be admitted using a system as described in this patent application.
Figure 6 is a schematic block diagram of a video entry arrangement 510, such as that shown in figure 5. Conveniently, the video entry arrangement 510 may take the form of a video doorbell. The video entry arrangement 510 includes a video entry arrangement controller, 600, including a processor 602, and a memory 604. Also provided are an audio interface 610, preferably comprising both an input device 612, and an output device 614, a video camera, 620, and an actuator, or bell push, 630.
Figure 7 is a timeline illustrating schematically a scheduled delivery taking place using an installation such as that shown in figure 5, , in which the central monitoring station effectively provides backup, but the bulk of the processing is handled by the video entry arrangement 510, e.g. video doorbell) using for example pre-recorded announcements. In this way the installation automatically handles communication with the delivery person, with the operator and the central monitoring station taking a more passive role, perhaps simply monitoring the delivery on screen and being ready to take action if something goes wrong. This approach has the merit of probably being rather cheaper to run. In this implementation the pass code should be one generated by the system, for example by the system security app 220, or by corresponding functionality in the cloud for example, rather than simply the last four digits of the order number. It will be recognised that figure 7 corresponds generally to figures 3 a and 3B corresponds generally to figures 3a and 3b. So, as a first step 700, a user places an order when schedules are deliver it with a supply company 250. As before, although shown as a single step, the user may place an order with the supply company and only subsequently schedule a delivery and even conceivably may schedule delivery with the supply company before actually placing the order for the goods or services (users of supermarket delivery services in these times of Covid will have experienced the difficulty of securing a delivery slot at a desired time, and know that it is sometimes better to book a delivery slot first, and then place the order for goods). Also, as before although here we describe a delivery, it will be appreciated that essentially the same method and systems may be used when arranging collection of something from the premises, for example laundry or dry-cleaning, or a pet which needs to be taken for a walk or taken to the vet.
Having placed the order and scheduled the delivery, the user then at 702 uses for example the security system app 220 on their smart phone or other device to log the delivery with the controller 208 of the security monitoring system. As with previously described embodiments, this logging of the delivery with the controller 208 may be done (705) using a user interface device of the security monitoring system, rather than remotely using a security system app or website. In logging the delivery with the controller 208, the controller 208 is provided with the scheduled time window that was agreed with the supply company 250 for example, June 21 between 1 PM and 3 PM. The controller 208 is also provided with an identification, e.g. a code, for the delivery, which will act as a security code specific to the scheduled event. As noted previously, in this case we preferably avoid using an order number or other identifier provided by the supply company 250. Rather, in this case we want to use a code or password which is generated by the system - for example by the security system app 220, a security system server, or some cloud-based entity associated with the security system. So, here we are effectively creating a one-time code or PIN, which we provide to the supply company 250 for the delivery person to use when making the delivery, and which we also provide to the security monitoring system controller, or central unit 208. Conveniently, the one-time code can be provided to the supply company by completing a field on a form provided by the supply company as part of the ordering process. Preferably, if the user is using a security system app 220, on their smart phone or other device, or some online equivalent, then the central unit is preferably automatically provided with the delivery schedule and the relevant one-time pass code by the security system app or equivalent. Alternatively, the user may use a user interface device of the security monitoring system to provide the scheduled delivery time and the pass code to the central unit 208. In any event, the central unit 208 may receive a “flag” indicating use of the scheduled concierge service.
Once the central unit 208 has the schedule delivery window and one-time code, these are passed at 706 to the video entry arrangement 510. At the video entry arrangement 510 the details of the schedule delivery are stored in memory 604, and the VEA controller 600 primed to switch operating mode for the scheduled delivery window. In this way, when the actuator 630 is activated within the scheduled delivery window, the VEA controller 600 automatically starts a routine specific to the scheduled concierge. In this routine or mode, the video entry arrangement 510 may be configured to transmit 712 images captured by the video camera 620, and preferably sounds captured by audio interface 610, to the central unit 208 of the security monitoring system, from where they are onwards transmitted 714 to the central monitoring station 210. Typically, the installation may be configured so that under ordinary circumstances, that is outside scheduled delivery windows, the video entry arrangement 510 behaves just like a conventional stand-alone video doorbell, with video images shared with a user via a video doorbell app and not with the security monitoring system. Conversely, of course the video entry arrangement may be arranged as an integral part of the security monitoring system.
At step 720 the video entry arrangement 510 plays a pre-recorded announcement to ask the person who activated the actuator 630 to confirm whether they are present for the scheduled concierge service, for example “if you’re here to make a delivery, please press the button once more” (although clearly a different number of extra presses could be specified).
If the button remains unpressed, the video entry arrangement may be configured to play a ringing tone, music or provide another message, such as “one moment please, I’ll try to connect you”, followed by musical ringing tone, and otherwise behaving in the conventional way to connect the video entry arrangement to a designated user via a video entry arrangement app, for example. But if the instructions from the pre-recorded announcement are followed, and the button is pressed twice, 722, the video entry arrangement recognises this as a trigger to play another pre-recorded announcement, 728. Pre-recorded announcement 728 tells the delivery person what they need to do in order to provide the code for the delivery, for example, speaking the code (if the video entry arrangement includes speech recognition functionality to recognise all the permitted characters for one-time codes, e.g. all the numerals, or all the alphanumerics), or keying the code into a keyboard (which may be provided so that householders can disarm the security monitoring system, and unlock a door, to gain admittance), or displaying some identifier - such as a QR code to the video camera 620.
At 735, if the code input was correct, the video entry arrangement 510 communicates successful code entry to the central unit 208. Preferably, this causes the central unit 208 to activate at 738 a video camera, such as interior camera 214, to observe the delivery person once they have opened the closure (e.g. door 102), and he central unit may then begin to supply images from the video camera to the central monitoring station 210. The central unit 208 sends an unlock instruction 744 to the electrically controlled lock 104. The video entry arrangement 510(and optionally central monitoring station 210) may also receive confirmation from the central unit 208 that the lock has been unlocked, and in any event the video entry arrangement preferably makes another announcement to the effect that the delivery person is now free to enter through the relevant closure, e.g. door 102, to deposit the package, or collect the goods, or whatever. Meanwhile, an operator at the central monitoring station 210 observes 748 the delivery. If the operator decides that the delivery person’s behaviour is wrong, or suspicious, he may involve security personnel such as the local police, or security guard - or even activate a smoke producing device to prevent the delivery person from being able to see to steal anything (this is of course also an option with all the other embodiments described). When the delivery person leaves, he closes the door behind him, allowing the lock 104 to lock itself again automatically - or under the control of the central unit 208, depending upon the setup.
In this and other of the described embodiments we could use a motion or presence detector, for example a PIR in the video entry arrangement (e.g. a video doorbell), to detect the presence of someone at the door (or wherever else the arrangement covers), rather than relying on the bell push 710 to trigger the playing of the announcement 720. In this way we can provide a contactless delivery process, which clearly has its attractions in these times of Covid. Similarly, in the embodiment described with reference to figures 3a and 3b, the central unit could be configured to couple the doorbell video to the central monitoring station at the commencement of the schedule delivery window, so that an operator in the central monitoring station 210 may react to the presence of someone (who perhaps looks like a delivery person) rather than relying on 310.
The video entry arrangement 510 (e.g. doorbell) could be programmed to give detailed instructions, e.g. how to enter a PIN code on an outdoor PIN pad.
Scan a QR code with the mobile phone camera which would pop up a virtual keyboard on the mobile.
It will also be appreciated that the protected interior space may not be a room or hall of a dwelling, or a garage or outbuilding, or even a space large enough to accommodate a person - it could instead be an enclosure such a locker or cubby hole, large enough to receive and contain parcels and most other common deliveries.
For each of the described embodiments, the inputting of the security code may be in any manner: audibly (using speech or some other sound), physically using key presses, visually (using a QR code or other visual representation), or by presentation of a specially coded token.

Claims

Claims
1. A security installation to secure at least part of a perimeter of premises (100), the premises (100) including: an exterior closure (102) in the secure perimeter giving access to a protected interior space (200) at the premises; an electrically controlled lock (104) for the exterior closure (102); an actuator for a visitor to indicate their presence at the premises; and a controller, the controller being configured to: receive details of a scheduled event that will involve granting a visitor access to the protected interior space (200) by opening the exterior closure, the details including a scheduled time window and a security code specific to the scheduled event; and upon receiving, within the scheduled time window, an indication from the actuator that a visitor is present at the closure, to: prompt the visitor to confirm that they are present for the purpose of the event, and upon receiving such confirmation from the visitor, prompt the visitor to input a security code; receive from the visitor a security code, and if the received security code matches the security code specific to the scheduled event, to cause the unlocking of the electrically controlled lock (104) to give the visitor access to the protected interior space (200) of the premises for the scheduled event; wherein the controller is a processor (208) of a security monitoring system that forms part of the security installation, the processor being configured to: supply a remote monitoring centre (210) with the received details of the scheduled event, and the received security code; only unlock the electrically controlled lock (104) to give the visitor access to the protected interior space (200) of the premises for the scheduled event if confirmation is received from the remote monitoring centre (210) that the received security code matches the security code specific to the scheduled event.
2. The security installation of claim 1, further comprising an audio interface to enable audio communication with a visitor at the closure (102), wherein the processor (208) is configured to enable the remote monitoring centre (210) to use the audio interface to speak to the visitor.
3. The security installation of claim 1 or claim 2, further comprising a first video camera (106) arranged to observe a space (108) in front of the exterior of the closure (102), the processor (208) being configured to enable the remote monitoring centre (210) to use the first video camera (106) to observe the visitor.
4. The security installation of claim 3, wherein the first video camera (106) is a video doorbell.
5. The security installation of claim 4 as dependent on claim 2, wherein the video doorbell includes the audio interface.
6. The security installation of any one of the preceding claims, further comprising a second video camera (106) arranged to observe the protected interior space behind the closure (102); and the controller being configured to enable the remote monitoring centre (210) to use the second video camera (214) to observe the visitor within the protected interior space.
7. The security installation of any one of the preceding claims, wherein the controller (208) is configured only to cause the unlocking of the electrically controlled lock (104) to give the visitor access to the protected interior space (200) of the premises for the scheduled event if the security code is received from the visitor while the security monitoring system is in an armed state.
8. The security installation of claim 7, wherein the controller (208) is configured, in the event that the security code received from the visitor matches the security code previously received by the controller, not to react to any signals or notifications received from a status sensor associated with the closure for a predetermined period, while maintaining the security monitoring system in an armed state.
9. The security installation of claim 8, wherein the predetermined period is until the visitor has been observed to vacate the interior space.
10. A method in a security installation configured to secure at least part of a perimeter to premises (100), the premises (100) including: an exterior closure (102) in the secure perimeter giving access to a protected interior space (200) at the premises; an electrically controlled lock (104) for the exterior closure (102); an actuator for a visitor to indicate their presence at the premises; and a controller, the method comprising: receiving at the controller details of a scheduled event that will involve granting a visitor access to the protected interior space (200) by opening the exterior closure, the details including a scheduled time window and a security code specific to the scheduled event; receiving at the controller, within the scheduled time window, an indication from the actuator that a visitor is present at the closure: prompting the visitor to confirm that they are present for the purpose of the event, and upon receiving such confirmation from the visitor, prompting the visitor to input a security code; receiving from the visitor a security code, and if the received security code matches the security code specific to the scheduled event, unlocking the electrically controlled lock (104) to give the visitor access to the protected interior space (200) of the premises for the scheduled event; wherein the controller is a processor (208) of a security monitoring system that forms part of the security installation, the method further comprising supplying the received details of the scheduled event, and the received security code, from the processor (208) to a remote monitoring centre (210); unlocking the electrically controlled lock (104) to give the visitor access to the protected interior space (200) of the premises for the scheduled event only upon receiving confirmation from the remote monitoring centre (210) that the received security code matches the security code specific to the scheduled event.
11. The method of claim 10, further comprising using the processor (208) to enable audio communication between the remote monitoring centre (210) and the visitor at the premises.
12. The method of claim 10 or claim 11, further comprising enabling the remote monitoring centre (210) to use a first video camera (106) to observe the visitor in front of the exterior of the closure (102).
13. The method of claim 12, wherein the first video camera (106) is a camera of a video doorbell.
14. The method of claim 13 as dependent on claim 11, wherein audio communication is provided over an audio interface of the video doorbell.
15. The method of any one of claims 10 to 14, further comprising enabling the remote monitoring centre (210) to use a second video camera (106) to observe the visitor within the protected interior space behind the closure (102).
16. The method of any one of claims 10 to 15, further comprising only unlocking the electrically controlled lock (104) to give the visitor access to the protected interior space (200) at the premises for the scheduled event in the event that the security code is received from the visitor while the security monitoring system is in an armed state.
17. The method of claim 16, further comprising, in the event that the security code received from the visitor matches the security code previously received by the controller, ignoring any signals or notifications received from a status sensor associated with the closure for a predetermined period, while maintaining the security monitoring system in an armed state.
18. The method of claim 16 or 17, as dependent on any one of claims 12 to 15, wherein the predetermined period is until the visitor has been observed to vacate the interior space.
PCT/EP2022/063409 2021-05-20 2022-05-18 Security installations and methods WO2022243359A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
EP22729585.4A EP4154226A1 (en) 2021-05-20 2022-05-18 Security installations and methods

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
ES202130464 2021-05-20
ESP202130464 2021-05-20

Publications (1)

Publication Number Publication Date
WO2022243359A1 true WO2022243359A1 (en) 2022-11-24

Family

ID=82019177

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/EP2022/063409 WO2022243359A1 (en) 2021-05-20 2022-05-18 Security installations and methods

Country Status (4)

Country Link
EP (1) EP4154226A1 (en)
AR (1) AR125878A1 (en)
CL (1) CL2022003730A1 (en)
WO (1) WO2022243359A1 (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP2698774A1 (en) * 2012-08-14 2014-02-19 Securitas Direct AB A method and a device for controlling a security system
US20190213817A1 (en) * 2018-01-08 2019-07-11 Comcast Cable Communications, Llc Premises Access System
EP3540704A1 (en) * 2018-03-13 2019-09-18 Verisure Sàrl A monitoring unit for a surveillance system and a surveillance system comprising such a monitoring unit
US10861265B1 (en) * 2017-01-23 2020-12-08 Vivint, Inc. Automated door lock

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP2698774A1 (en) * 2012-08-14 2014-02-19 Securitas Direct AB A method and a device for controlling a security system
US10861265B1 (en) * 2017-01-23 2020-12-08 Vivint, Inc. Automated door lock
US20190213817A1 (en) * 2018-01-08 2019-07-11 Comcast Cable Communications, Llc Premises Access System
EP3540704A1 (en) * 2018-03-13 2019-09-18 Verisure Sàrl A monitoring unit for a surveillance system and a surveillance system comprising such a monitoring unit

Also Published As

Publication number Publication date
CL2022003730A1 (en) 2023-04-28
AR125878A1 (en) 2023-08-23
EP4154226A1 (en) 2023-03-29

Similar Documents

Publication Publication Date Title
US20220301401A1 (en) Control access utilizing video analytics
US7106193B2 (en) Integrated alarm detection and verification device
US20190317462A1 (en) Managing barrier and occupancy based home automation system
US10332383B1 (en) Connected door hinge
US7132941B2 (en) System for monitoring an environment
US7120232B2 (en) Lifestyle multimedia security system
US11182989B1 (en) Controlled indoor access using smart indoor door knobs
WO2008056320A1 (en) A security system
GB2325548A (en) Security alarm systems
KR101676104B1 (en) Security System
EP3142089B1 (en) System arm notification based on ble position
JPS5843097A (en) Security system with plurality of access levels
KR100891010B1 (en) Smart digital doorlock system for home automation
US9847016B2 (en) System and method of communicating data from an alarm system to emergency services personnel
US20090295578A1 (en) Portable security system and method thereof
WO2022243359A1 (en) Security installations and methods
JP2864205B2 (en) Remote monitoring system
EP4154228A2 (en) Security installations and methods
TW202044204A (en) Event management and control method and event management and control apparatus being executed by the event management and event management and control apparatus
WO2024068038A1 (en) Video entry arrangement, and system and method related thereto
WO2024068032A1 (en) Security installations and methods
JP7426795B2 (en) Home management system
WO2024068031A1 (en) Method and apparatus for authentication in a security system
JP7426580B2 (en) Control system and control method
JP2019028580A (en) Monitoring system

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 22729585

Country of ref document: EP

Kind code of ref document: A1

ENP Entry into the national phase

Ref document number: 2022729585

Country of ref document: EP

Effective date: 20221219

NENP Non-entry into the national phase

Ref country code: DE