WO2022243373A2 - Procédés et installations de sécurité - Google Patents

Procédés et installations de sécurité Download PDF

Info

Publication number
WO2022243373A2
WO2022243373A2 PCT/EP2022/063440 EP2022063440W WO2022243373A2 WO 2022243373 A2 WO2022243373 A2 WO 2022243373A2 EP 2022063440 W EP2022063440 W EP 2022063440W WO 2022243373 A2 WO2022243373 A2 WO 2022243373A2
Authority
WO
WIPO (PCT)
Prior art keywords
security
visitor
premises
event
controller
Prior art date
Application number
PCT/EP2022/063440
Other languages
English (en)
Other versions
WO2022243373A3 (fr
Inventor
Pablo TORRES MONTERO
Juan Jose CARRASCOSA PULIDO
Maider Patricia AGUINAGA ACHUCARRO
Encarnacion SERRANO CASTILLO
Alvaro URIEN AYALA
Rafael José SCHWARTZ SOLÉ
Russell Gwynfryn MORGAN
Johan Zander
Christoffer LARSSON
Joakim Pettersson
Original Assignee
Verisure Sàrl
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Verisure Sàrl filed Critical Verisure Sàrl
Priority to PE2022003071A priority Critical patent/PE20240839A1/es
Priority to EP22730693.3A priority patent/EP4154228A2/fr
Publication of WO2022243373A2 publication Critical patent/WO2022243373A2/fr
Publication of WO2022243373A3 publication Critical patent/WO2022243373A3/fr

Links

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/30Individual registration on entry or exit not involving the use of a pass
    • G07C9/32Individual registration on entry or exit not involving the use of a pass in combination with an identity check
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00896Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys specially adapted for particular uses
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/20Individual registration on entry or exit involving the use of a pass
    • G07C9/22Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C2209/00Indexing scheme relating to groups G07C9/00 - G07C9/38
    • G07C2209/08With time considerations, e.g. temporary activation, valid time window or time limitations
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00571Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by interacting with a central unit
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/20Individual registration on entry or exit involving the use of a pass
    • G07C9/27Individual registration on entry or exit involving the use of a pass with central registration
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/30Individual registration on entry or exit not involving the use of a pass
    • G07C9/38Individual registration on entry or exit not involving the use of a pass with central registration

Definitions

  • the present invention relates to security installations to secure at least part of a perimeter of premises and to monitor premises, the security installation including an electrically controlled lock on an exterior closure, e.g. door, of the premises, and to methods performed by the system and by controllers of the system.
  • Security installations that are or include security monitoring systems for monitoring premises, often referred to as alarm systems, typically provide a means for detecting the presence and/or actions of people at the premises, and reacting to detected events.
  • alarm systems typically provide a means for detecting the presence and/or actions of people at the premises, and reacting to detected events.
  • Such systems include sensors to detect the opening and closing of doors and windows to provide a secure perimeter to the premises, creating one or more protected interior spaces, movement detectors to monitor spaces (both within and outside buildings) for signs of movement, microphones to detect sounds such as breaking glass, and image sensors to capture still or moving images of monitored zones.
  • Such systems may be self-contained, with alarm indicators such as sirens and flashing lights that may be activated in the event of an alarm condition being detected.
  • Such installations typically include a control unit (which may also be termed a central unit), generally mains powered, that is coupled to the sensors, detectors, cameras, etc. (“nodes”), and which processes received notifications and determines a response.
  • the central unit may be linked to the various nodes by wires, but increasingly is instead linked wirelessly, rather than by wires, since this facilitates installation and may also provide some safeguards against sensors/detectors effectively being disabled by disconnecting them from the central unit.
  • the nodes of such systems typically include an autonomous power source, such as a battery power supply, rather than being mains powered.
  • a security monitoring system may include an installation at a premises, domestic or commercial, that is linked to a Central Monitoring Station (CMS) where, typically, human operators manage the responses required by different alarm and notification types.
  • CMS Central Monitoring Station
  • the central unit at the premises installation typically processes notifications received from the nodes in the installation, and notifies the Central Monitoring Station of only some of these, depending upon the settings of the system and the nature of the detected events.
  • the central unit at the installation is effectively acting as a gateway between the nodes and the Central Monitoring Station.
  • the central unit may be linked by wires, or wirelessly, to the various nodes of the installation, and these nodes will typically be battery rather than mains powered.
  • Such security monitoring systems contribute to the safety and wellbeing of occupants of the protected premises, as well as safeguarding articles within the protected perimeter - which may of course not simply be limited to a house or dwelling, but may also extend to the grounds of the house, protected by a boundary fence and gate, for example.
  • Embodiments of the present invention seek to provide enhanced security monitoring systems, and corresponding apps, methods and other implementations that improve the scope of security monitoring systems to address aspects of the problem of parcel theft, as well as providing new functionality and methods.
  • any of the inventions disclosed herein, in in any or all of their/its aspects may also be used to provide a first code to pass through a first protected perimeter, and a second code to pass through a second perimeter. So, for example, a first code may be provided to unlock a garden gate, and a second code may be provided to unlock to door or other closure of a house, flat, garage or strong box.
  • a first code may be provided to gain access to the interior of an apartment block, condominium, or other building containing multiple separate units, and a second code given to gain access to the interior or part of the interior of one of the units.
  • the first code may be provided to gain access through a door or other closure protected by something like an intercom (as found on condominiums and apartment blocks), while the second code is used to unlock a smart lock of a unit within. This may involve dealing with two different security systems, with one code specific to a first security system, and another code specific to a second security system.
  • a customer/user may provide delivery instructions specifying which code is to be used at which stage, and entered in which way via which interface.
  • An app (software application), possibly provided by or linked to the supplier or operator of a security system that protects a customer’s dwelling, office, garden, garage or other protected space or premises, may be configured to generate two or more security codes according to the number and nature of the closures/portals that need to be traversed in order to effect delivery, so that these may all be generated in a single operation or in a series of linked operations.
  • the back end of a system supporting the app is configured to communicate each of the plurality of security codes to the respective systems, or system controllers.
  • the app maybe run on a smartphone or other device of the user, or run on a server or otherwise in the cloud.
  • the codes and associated instructions may be passed by the user to the supply company (with whom the order is placed) or with a delivery agent responsible for arranging delivery, by the user filling in an appropriate form.
  • this functionality may be linked to an ordering system of a supplier or delivery agent for example affiliated with the company supplying or operating one or more of the security systems involved (often this may be the supplier or operator (who may be the same entity or part of a group of affiliated companies), so that secure delivery as herein described, in any variant, can be selected as a delivery option.
  • delivery situation e.g.
  • the functionality may be arranged not only to generate unique or particular codes for each of the portals or closures that must be passed in order to deliver to the target delivery zone, but also to communicate these codes to the controller or relevant controllers of the various systems.
  • the agent when an agent makes a delivery to such a zone or location, the agent is able to enter the appropriate code at the right location or right interface, and the relevant controller is able to recognise that the correct code has been entered - so that the relevant portal is unlocked and the agent is able to pass through each of the portals.
  • a security monitoring system to secure at least part of a perimeter of premises, the premises including: a portal in the secure perimeter giving access to a protected interior space at or of the premises; an electrically controlled lock for the portal; an actuator for a visitor to indicate their presence at the portal or more generally at the premises; and a controller, the controller being configured to: receive details of a scheduled event that will involve granting a visitor access to the protected interior space by opening the portal, the details including a scheduled time window and a security code specific to the scheduled event; and upon receiving, within the scheduled time window, an indication from the actuator that a visitor is present at the portal, to: prompt the visitor to confirm that they are present for the purpose of the event, and upon receiving such confirmation from the visitor, prompt the visitor to input a security code; receive from the visitor a security code, and if the received security code matches the security code specific to the scheduled event, to cause the unlocking of the electrically controlled lock to give the visitor access to the protected interior space at the premises for the scheduled event.
  • a user can selectively provide a visitor with access to the premises while maintain the security of the premises and without the user needing to be present at the premises - although the user may use the same arrangement to maintain their personal safety while at the premises, by remotely allowing access without needing to appear at the door or other portal in order to grant access.
  • a delivery person can be given access to the premises, or to a secure delivery zone of the premises without a user needing to be present.
  • the controller may be a controller of a video entry arrangement. In this way a self- contained and potentially very simple solution is made possible.
  • the video entry arrangement may be configured to prompt the visitor using audio prompts.
  • delivery agents are familiar with interacting with video doorbells and the like that provide audio prompts - albeit that these prompts may often be provided in real time by a user at the other end of a one-way video link.
  • the video entry arrangement may be configured to prompt the visitor using voiced prompts using pre-stored messages. In this way visitors can be guided through a desired set of behaviours or actions without the need for the guidance to be provided in real time, and hence without the need for user involvement.
  • the controller of the video entry arrangement may be arranged to cause the unlocking of the electrically controlled lock by signalling to a processor of a security monitoring system that forms part of the security installation.
  • a security monitoring system to control the electrically controlled lock enables the benefits of safeguards provided by the security monitoring system, such as potentially the observation of the visitor from multiple vantage points, and the monitoring for movement or presence in “out of bounds” areas.
  • the processor of the security monitoring system may be configured to supply the details of the scheduled event to the controller of the video entry arrangement. In this way some of the tasks of the security monitoring system controller may be devolved to the video entry arrangement, possibly speeding up processing, and reducing interaction times.
  • the video entry arrangement may be a video doorbell.
  • managed delivery or more generally managed access
  • video doorbells By adding the managed delivery (or more generally managed access) functionality to the convenience, small form- factor, and easy placement of video doorbells it is possible to greatly increase user convenience with a minimum of extra equipment.
  • the usual placement of video doorbells means that typically a good view is obtained of a visitor’s facial features, and delivery drivers and other habitual visitors are accustomed to interacting with video doorbells - meaning that “system failures” occasioned by human error are less likely to occur.
  • the controller may be a processor of a security monitoring system that forms part of the security installation, the processor being configured to supply a remote monitoring centre with the received details of the scheduled event, and optionally also the received security code.
  • the processor may also be configured to only unlock the electrically controlled lock to give the visitor access to the protected interior space at the premises (or more commonly only to part of the protected space - the rest remaining off-limits and monitored by the security monitoring system) for the scheduled event if confirmation is received from the remote monitoring centre that the received security code matches the security code specific to the scheduled event. For example, a visitor may be given access to an entry hall of the premises, but the security of the rest of the premises maintained by motion/presence sensors, cameras, etc.
  • the security monitoring system may further comprise an audio interface to enable audio communication with a visitor at the closure, wherein the processor is configured to enable the remote monitoring centre to use the audio interface to speak to the visitor.
  • staff at the remote monitoring centre may warn/advise visitors in real time that they are under surveillance, providing the ability to react to any apparent intent on the part of a visitor to stray from the zone to which they have been granted access.
  • the security monitoring system may further comprise a first video camera arranged to observe a space in front of the exterior of the portal, the processor being configured to enable the remote monitoring centre to use the first video camera to observe the visitor.
  • the first video camera is a video doorbell.
  • the video doorbell includes the audio interface. In this way the approach of a visitor may be observed, and the appearance of visitors may be considered before they are granted access: if the “delivery man” looks surprisingly scruffy, or if a visitor expected to arrive in livery appears in ordinary street clothes they may eb denied access - or at least further efforts taken to establish their credentials and bona rides.
  • the security monitoring system may further comprise a second video camera arranged to observe the protected interior space behind the portal, the processor being configured to enable the remote monitoring centre to use the second video camera to observe the visitor within the protected interior space.
  • a video camera may be arranged to observe the entrance hall to which delivery drivers are admitted. Personnel in the remote monitoring station are then able to observe visitors and their behaviour - permitting rapid intervention if required - as well as enabling capture of video evidence of any misdemeanours, something of which visitors can be made aware in real time!
  • the processor may be configured to unlock the electrically controlled lock to give the visitor access to the protected interior space of the premises for the scheduled event only if the security code is received from the visitor while the security monitoring system is in an armed state.
  • the security monitoring system is likely to be disarmed whenever the premises are occupied, i.e. someone is at home: under such circumstances it may be undesirable to enable visitors access on any automatic basis. For example, a child or children may be home from school, awaiting the return of a parent - and it may obviously be less than ideal to grant a delivery driver access to the home under these circumstances. Whereas, if the security monitoring system is armed - at least if it is in an “armed away” state, granting visitors access is unlikely to give rise to the same issues.
  • the controller may be configured, in the event that the security code received from the visitor matches the security code previously received by the controller, not to react to any signals or notifications received from a status sensor associated with the closure for a predetermined period, while maintaining the security monitoring system in an armed state. In this way, the security monitoring system can continue to monitor the rest of the perimeter. In other words, a secured perimeter may be maintained with the exception of the sensor(s) for the portal that is unlocked to permit controlled access.
  • a dedicated delivery zone is defined, all the sensors for which are effectively “disarmed” temporarily during the drop-off while the rest of the premises is still fully protected.
  • the controller is further configured not to react to any signals or notifications received from a status sensor associated with the area of the protected interior space to which the visitor is admitted for a predetermined period, while maintaining the security monitoring system in an armed state - so that, for example, other areas of the protected interior space can continue to be monitored for unauthorised entry - and an alarm raised, and or the central monitoring station involved, according to the settings of the system.
  • the predetermined period may be until the visitor has been observed to vacate the interior space.
  • An operator in the central monitoring station may continue to observe the visitor as long as he or she is on the premises, using for example an interior camera (s) that observes all of the interior space to which the visitor is admitted.
  • a method performed by a controller of a security installation configured to secure at least part of a perimeter of premises, the premises including: an exterior closure in the secure perimeter giving access to a protected interior space of the premises; an electrically controlled lock for the exterior closure; an actuator for a visitor to indicate their presence at the perimeter; and a controller, the method comprising: receiving at the controller details of a scheduled event that will involve granting a visitor access to the protected interior space by opening the exterior closure, the details including a scheduled time window and a security code specific to the scheduled event; receiving at the controller, within the scheduled time window, an indication from the actuator that a visitor is present at the premises: prompting the visitor to confirm that they are present for the purpose of the event, and upon receiving such confirmation from the visitor, prompting the visitor to input a security code; receiving from the visitor a security code, and if the received security code matches the security code specific to the scheduled event, unlocking the electrically controlled lock to give the visitor access to the protected interior space of the premises for the scheduled event
  • the method may further comprise providing the prompts the visitor using audio prompts.
  • the voiced prompts may be generated using pre-stored messages.
  • the method may further comprise causing unlocking of the electrically controlled lock by signalling from the controller to a processor of a security monitoring system that forms part of the security installation.
  • the method may further comprise supplying the details of the scheduled event to the controller of the video entry arrangement from the processor of the security monitoring system.
  • the method according to the second aspect may further comprise, when the controller is a processor of a security monitoring system that forms part of the security installation, supplying the received details of the scheduled event, and the received security code, to a remote monitoring centre; unlocking the electrically controlled lock to give the visitor access to (optionally to admit the visitor to) the protected interior space at the premises for the scheduled event only upon receiving confirmation from the remote monitoring centre that the received security code matches the security code specific to the scheduled event.
  • the method may further comprise using the processor to enable audio communication between the remote monitoring centre and the visitor at the premises.
  • the method may further comprise enabling the remote monitoring centre to use a first video camera to observe the visitor in front of the exterior of the closure.
  • the first video camera is a video doorbell.
  • the video doorbell includes the audio interface.
  • the method may further comprise enabling the remote monitoring centre to use a second video camera to observe the visitor within the protected interior space behind the closure.
  • the method may further comprise only unlocking the electrically controlled lock to give the visitor access to the protected interior space at (e.g. of) the premises for the scheduled event in the event that the security code is received from the visitor while the security monitoring system is in an armed state.
  • the method further comprises, in the event that the security code received from the visitor matches the security code previously received by the controller, ignoring any signals or notifications received from a status sensor associated with the closure for a predetermined period, while maintaining the security monitoring system in an armed state.
  • the predetermined period is until the visitor has been observed to vacate the interior space.
  • a method of enabling an event involving granting a visitor access to an interior space of premises, the interior space protected by a perimeter secured by a security installation, the perimeter including a closure provided with an electrically controlled lock comprising: sharing with the visitor an access code, and a scheduled time window, specific to the event; providing the access code, and the scheduled time window, to a controller (optionally a controller of the security monitoring system or of a video entry arrangement of the installation), and storing the provided access code; subsequently, within the time window and while the security installation is in an armed condition, determining the presence of a visitor at the premises; prompting the visitor at the premises to supply an access code; and in the event that the supplied access code matches the stored access code, unlocking the electrically controlled lock to give the visitor access to the interior space without raising an alarm.
  • an app for a security monitoring system to generate a one-time code (OTC) which can be used subsequently to disarm the security monitoring system
  • the app sending the OTC to a controller of the security monitoring system, the controller forwarding the OTC to a central monitoring station (CMS) (also sometimes referred to as an Alarm Receiving Centre, ARC) that monitors the security monitoring system (or the app may send the OTC to the CMS directly rather than through the controller)
  • CMS central monitoring station
  • ARC Alarm Receiving Centre
  • the CMS subsequently making a decision to disarm the security monitoring system upon being presented with a code that has been presented at an interface associated with the security monitoring system, the interface preferably being at the premises protected by the security monitoring system.
  • an app for a security monitoring system to generate a one-time code (OTC) which can be used subsequently to disarm the security monitoring system, the app sending the OTC to a controller of the security monitoring system, the controller forwarding the OTC to a video entry arrangement at premises protected by the security monitoring system, with a processor of the video entry arrangement subsequently making a decision to cause the unlocking of a lock of a closure in a perimeter of the premises upon being presented with a code that has been presented at an interface associated with the security monitoring system, the interface preferably being at the premises protected by the security monitoring system.
  • OTC one-time code
  • an app for a premises security monitoring system being configured to: generate securely a one-time-passcode which can be used to disarm the premises security monitoring system; and share the one-time-passcode with a controller of the security monitoring system.
  • a method of controlling a security monitoring system comprising: generating a one-time-passcode in an app for the security monitoring system; and communicating the one-time-passcode to a controller of the security monitoring system for subsequent use in disarming the security monitoring system.
  • a method of controlling a security monitoring system comprising: receiving at a controller of the security monitoring system a one-time-passcode generated by an app for the security monitoring system run on a device other than the controller; and subsequently, while the security monitoring system is in an armed state, disarming the security monitoring system in response to receiving the one-time-passcode via a user interface.
  • the method of the seventh aspect may further comprise receiving at the controller a time window of validity for the one-time passcode, and disarming the security monitoring system only in response to receiving the one-time-passcode via a user interface within the time window of validity.
  • the user interface is an audio interface, or a keypad, optionally located at the premises protected by the security monitoring system.
  • a method of enabling an event involving granting a visitor access to an interior space of premises, the interior space protected by a perimeter secured by a security monitoring system, the perimeter including a closure provided with an electrically controlled lock comprising: sharing with the visitor an access code, and a scheduled time, specific to the event; providing the access code, and the scheduled time, to a controller of the security monitoring system, and storing the provided access code; subsequently, while the security monitoring system is in an armed condition, determining the presence of a visitor at the premises; prompting the visitor at the premises to supply an access code; and in the event that the supplied access code matches the stored access code, unlocking the electrically controlled lock to give the visitor access to the interior space without raising an alarm.
  • the method of the eighth aspect may further comprise disarming the security monitoring system in the event that the supplied access code matches the stored access code.
  • the method of the eighth aspect may further comprise, in the event that the supplied access code matches the stored access code, configuring a controller of the security monitoring system not to react to any signals or notifications received from a status sensor associated with the closure for a predetermined period, while maintaining the security monitoring system in an armed state.
  • the predetermined period is until the visitor has been observed to vacate the interior space.
  • the closure or portal e.g. door
  • an automatic closing mechanism such as a door spring, to ensure that when a delivery person leaves the premises, after completing a delivery, the door (or gate or whatever) closes correctly, so that the electrically controlled lock is once again effective to protect against unlawful entry.
  • a security installation to secure at least part of a perimeter of premises, the premises including: a portal in the secure perimeter giving access to a protected interior space at the premises; an electrically controlled lock for the portal; an actuator for a visitor to indicate their presence at the premises; and a controller, the controller being configured to: receive details of an event that will involve granting a visitor access to the protected interior space by opening the portal, the details including a security code specific to the event; and upon receiving an indication from the actuator that a visitor is present at the premises or at the portal, to: prompt the visitor to confirm that they are present for the purpose of the event, and upon receiving such confirmation from the visitor, prompt the visitor to input a security code; receive from the visitor a security code, and if the received security code matches the security code specific to the scheduled event, to cause the unlocking of the electrically controlled lock to give the visitor access to the protected interior space of the premises for the event.
  • the security installation of the tenth aspect may be arranged so that the premises include a first portal giving access to a first protected interior space at the premises; an electrically controlled lock for the first portal; an actuator for a visitor to indicate their presence at the premises; and a controller, the controller being configured to: receive details of an event that will involve granting a visitor access to the first protected interior space by opening the first portal, the details including a first security code for opening the first portal specific to the event; and upon receiving an indication from the actuator that a visitor is present at the premises or at the first portal, to: prompt the visitor to confirm that they are present for the purpose of the event, and upon receiving such confirmation from the visitor, prompt the visitor to input a security code; receive from the visitor a security code, and if the received security code matches the security code for opening the first portal specific to the scheduled event, to cause the unlocking of the electrically controlled lock to give the visitor access to the first protected interior space of the premises for the event.
  • the security installation of the first variant of the tenth aspect may be configured so that the premises include a second portal protected by a second electrically controlled lock, the second portal giving access to a second protected interior space at the premises, the second electrically controlled lock being controlled by a further controller, the further controller being configured to: receive details of an event that will involve granting a visitor access to the second protected interior space by opening both the first and the second portals, the details including a second security code for opening the second portal specific to the event; and upon receiving an indication from the actuator that a visitor is present within the first protected interior space or at the second portal, to: prompt the visitor to confirm that they are present for the purpose of the event, and upon receiving such confirmation from the visitor, prompt the visitor to input a security code; receive from the visitor a security code, and if the received security code matches the second security code for opening the second portal specific to the scheduled event, to cause the unlocking of the second electrically controlled lock to give the visitor access to the protected interior space of the premises for the event.
  • access may safely be granted to, for example a delivery person, to enter an outer protected space - for example a protected communal space of a condominium development, to which access is required to enable access to the portal of another protected space - such as an individual unit or apartment of the condominium.
  • an arrangement gives the owner/resident of a unit of a condominium (or gated development) the freedom to provide access to a protected space of the unit just as though the unit were freely accessible (in other words, as if the exterior secured perimeter were absent or unsecured).
  • the premises may be an apartment block or condominium and the first protected interior space at the premises is an communal area of the premises, and the second protected interior space at the premises is a unit, dwelling, or office within the premises.
  • the premises may be an office or a domestic home and the first protected interior space at the premises is a garden or courtyard of the premises: and the second protected interior space at the premises is an interior space of the office or domestic home unit, or a secure enclosure within the garden or courtyard.
  • Figure 1 is a schematic drawing showing a front elevation of stylised building with an external space which is monitored by a security monitoring system according to an embodiment of the invention
  • Figure 2 is a schematic part plan view of premises protected by a security monitoring system, together with other elements of the system;
  • Figure 3a shows a timing diagram of a first part of a method according to an aspect of the invention
  • Figure 3b shows a timing diagram of a second part of a method according to an aspect of the invention
  • Figure 4 shows a timing diagram of a method according to an aspect of the invention
  • Figure 5 shows schematically an architecture including a security monitoring system, a video entry arrangement, and an electrically controlled lock
  • Figure 6 is a schematic block diagram of a video entry arrangement
  • Figure 7 is a timing diagram of a method according to another aspect of the invention.
  • Figure 8 illustrates aspects of a monitored in-home delivery process
  • Figure 9 illustrates aspects of a monitored in-home delivery process
  • Figure 10 illustrates aspects of a monitored in-home delivery process
  • Figure 11 illustrates aspects of a monitored in-home delivery process
  • Figure 12 illustrates aspects of a monitored in-home delivery process
  • Figure 13 illustrates aspects of a monitored in-home delivery process
  • Figure 14 illustrates aspects of a monitored in-home delivery process with an integrated retailer
  • Figure 15 illustrates aspects of a self-monitored out-of-home delivery process with an integrated retailer
  • Figure 16 illustrates aspects of a self-monitored in-home delivery process
  • Figure 17 illustrates aspects of a self-monitored in-home delivery process.
  • FIG. 1 shows a view of the front of a premises 100 protected by a security monitoring system according to an aspect of the present invention.
  • the premises here in the form of a house, have an exterior door, here front door, 102.
  • the door gives access to a protected interior space.
  • the security monitoring system secure at least part of a perimeter to the premises (100), and the door constitutes an exterior closure 102 in the secure perimeter giving access to a protected interior space 200 of the premises.
  • a lock 104 on the exterior door is electrically controlled so that it can be locked and unlocked remotely.
  • a first video camera in the form of a video doorbell 106 which looks out from the fa9ade of the premises so that anyone approaching the door along the path 108 can be seen, and in particular when they stand at the door their face should clearly be visible.
  • the video doorbell includes an actuator, e.g. a push button, for a visitor to indicate their presence at the closure.
  • the video doorbell also includes an audio interface to enable bidirectional audio communication with a visitor at the closure 102.
  • the video doorbell includes an infrared light source to illuminate whatever is in front of the video doorbell.
  • the fa ade of the house also carries an external keypad 110 with which a user can disarm the security monitoring system, and unlock the lock 104.
  • an optional second video camera 112 which is coupled to a movement detector, such as a PIR sensor 114, which, when the security monitoring system is armed, may be arranged to capture video of the front of the house and the private area, e.g. the garden, in front of the house.
  • the second video camera is preferably provided with an audio interface 116 to enable bidirectional audio communication with anyone observed by the second video camera.
  • the house may be surrounded by a perimeter fence, the fence including a security gate.
  • the security monitoring system may also be used to secure that perimeter, the gate forming an exterior closure in the secure perimeter giving access to a protected interior space of the premises, and a further video doorbell and another external keypad may be provided and with which a user can disarm the security monitoring system, and unlock a lock securing the gate, and thereby gain admittance to the protected grounds of the house.
  • FIG. 2 is a schematic part plan view of a premises 100 protected by security monitoring system according to an aspect of the invention, together with other elements of the system, corresponding generally to the premises of figure 1.
  • the front door 102 with electrically controlled lock 104, leads into the protected interior space 200 of the premises.
  • Each of the windows 202, and the rear door 204 is fitted with a sensor 206 to detect when they are opened.
  • Each of the sensors 206 includes a radio transceiver to report events to a controller , or central unit, 208 of the security monitoring system. If one of the sensors 206 is triggered when the system is armed, a signal is sent to the central unit 208 which in turn may signal an alarm event to a central monitoring station 210.
  • the central unit 208 is connected to the central monitoring station 210 via the Internet 212, either via a wired or a wireless connection. Also wirelessly coupled to the central unit 208 are the video doorbell 106, the electrically controlled lock 104, and if present the second video camera 112 its associated movement sensor 114 (although the latter may be integral with the second video camera 112) and the audio interface 116. These items, and the sensors 206, are preferably coupled to the central unit 208 using transceivers operating in the industrial scientific and medical (ISM) bandwidths, for example a sub- gigahertz bandwidth such as 868 MHz, and the communications are encrypted preferably using shared secret keys.
  • ISM industrial scientific and medical
  • the security monitoring system may also include other sensors within the protected interior space, such as an interior video camera 214 and associated movement detector 216 (which again may be integral with the camera 214), and each of the interior doors 218 may also be provided with a sensor 206 to detect the opening/closing of the door. Also shown in figure 2 are a user device 220, preferably loaded with an appropriate app - as will be described later, and a public land mobile network (PLMN) by means of which the central monitoring station 210, and the central unit 208, may communicate with the user device 220.
  • PLMN public land mobile network
  • the security monitoring system app is installed on a user device 220, here shown as a smartphone, although of course it could be almost any kind of electronic device, such as a laptop or desktop computer, a tablet such as an iPad, a smart watch, or even a television.
  • the security monitoring system app may be used to schedule a delivery following for example the placing of an order for goods from an online or bricks and mortar retailer. Possibly the security monitoring system app may provide the option of ordering goods or services from selected retailers or service providers, so that relevant order details, as will be explained below, may be seamlessly transferred between an ordering process and the scheduling of an event with the security monitoring service.
  • Figure 3a is a timing diagram of the first part of a method according to an aspect of the invention.
  • a user places an order and schedules a delivery with a supply company 250.
  • the user may place an order with the supply company and only subsequently schedule a delivery, and even conceivably may schedule delivery with the supply company before placing the order for the goods or services.
  • the same method and systems may be used when arranging collection of something from the premises, for example laundry or dry-cleaning, or a pet which needs to be taken for a walk or taken to the vet.
  • the user then at 302 uses the security system app, for example on device 220, to log the delivery with the controller 208 of the security monitoring system.
  • the user In logging the delivery with the controller 208, the user provides the scheduled time window that was agreed with the supply company 250, for example June 21 st between 1 PM and 3 PM.
  • the user also provides an identifier for the delivery, which will act as a security code specific to the scheduled event, for example the last six or more digits of the order number. There is a balance to be drawn between the need for security and the desire of the user to correctly enter a possibly alphanumeric sequence.
  • Amazon (RTM) order numbers currently take the form of 3 digits followed by - followed by 7 digits - followed by a further 7 digits, and it may be considered too onerous or potentially error prone to require the full 17 digits, plus hyphens, to be entered. Smaller scale suppliers may well operate with much shorter order numbers, but the risk of bad actors gaining entrance illegitimately is probably too great to rely on a code of three digits or less.
  • the security monitoring system app may be configured to generate secure one time codes, and the user of the app can, when scheduling the delivery with the Supply Co. may trigger the app to generate a secure one-time code of six or more characters which is provided to the Supply Co at step 300, and then to the central unit 208 at step 304.
  • the central unit passes the concierge delivery schedule and authentication data, e.g. the pass code, to the central monitoring station 210.
  • the central monitoring station passes the concierge delivery schedule and authentication data, e.g. the pass code, to the central monitoring station 210.
  • this communication is encrypted and passes either through a wired data connection or wirelessly between the central unit and a central monitoring station.
  • the reason for wanting to provide a central monitoring station with the details of the scheduled delivery (or collection) is so that the central monitoring station can be sure to have a human operator on standby for the relevant period.
  • the scheduled delivery window 309 shown by the pair of dotted lines in figure 3a is expected to be at a time when the security monitoring system has a status of “armed away” - which is a status typically used when the premises are unoccupied.
  • the “scheduled concierge service” provided by the security monitoring system will not be needed if the user is expecting to be at home at the time of schedule delivery.
  • the user may configure the system, using the security monitoring system app, or an appropriate interface for the central unit or some other control terminal of the security monitoring system, to allow the scheduled concierge service to operate even when the security monitoring system is set in an “armed at home” status, or even a disarmed status.
  • the delivery person hears an announcement along the lines of “If you are here for delivery press the button again to acknowledge”, although of course the dialogue may require more than one additional button press.
  • This dialogue can be provided from within the video doorbell 106, or it may be provided from the central unit 208, or possibly, but less preferably from the central monitoring station.
  • the announcement 320 is provided from the central unit 208 (but may equally be provided directly by the doorbell if it is so configured).
  • Figure 3 a also shows the possibility of connecting the doorbell video camera to the central unit 208 upon detecting the first bell push within the scheduled delivery window, and optionally coupling that doorbell video to the central monitoring station 210, at step 314 the central monitoring station may at that stage send a voice link request 316 to the central unit, which leads a central unit to connect 318 audio from the audio interface of video doorbell 106 (or audio interface 116 if the video is coming from second video camera 112) to the central monitoring station 210.
  • the central monitoring station is only connected to the doorbell video and audio after the delivery person has confirmed that they are indeed present for the purpose of the scheduled event, but this is less preferable because of the risk of missing the security code input as result of a delayed completion of the connection to the central monitoring station.
  • the delivery person receives, preferably over the audio interface, a prompt to input the security code which was agreed between the user and the Supply Co. at step 300.
  • a visual interface for example a display on the external keypad 110
  • the delivery person then provides the security code, preferably by speaking the security code into the audio interface, but possibly by keying the code into the external keypad 110.
  • the code input as speech is received at the central monitoring station where it is heard by a human operator, who confirms that it corresponds to the previously registered code for the scheduled event.
  • the human operator has also been observing the delivery person, and the space in front of the exterior closure, e.g.
  • the human operator sends an unlock instruction 336 to the central unit which also has the effect of causing an activation command 338 to be sent to an interior video camera 214 which observes the door, and the space behind the door - i.e. part of the protected interior space of the premises. Images from the interior video camera 214 then transmitted 340 to the central unit 208, and then forwarded 342 to the central monitoring station 210.
  • the central unit 208 is configured to ignore any signals or notifications received from for example the sensor 206 the detects the status of the door 102 and also from the movement sensor 216 in the interior space, e.g. the entry hall, into which the delivery person needs to go to deposit the package.
  • the security monitoring system is in the expected armed away state, the other sensors 206 on the exterior doors and windows, and on internal doors 218, and any other internal motion sensors are still active, and the central unit 208 will continue to respond in the usual way to any incidents reported by the sensors.
  • the other sensors protecting the perimeter and interior of the premises remain active, and any breach of these, such as for example entry into an internally secured area, will trigger an alarm event that will be signalled to the to the central unit and onwards to the central monitoring station.
  • Figure 3b shows the continuation of the process begun in figure 3a.
  • the central unit 208 transmits an unlock instruction 344 to the electronically controlled lock 104 which then unlocks.
  • the delivery person is then able to open the door, if it is not automatically opened already, to deposit the delivery (or alternatively to collect whatever needs collecting).
  • the operator in the central monitoring station 210 is observing images from the interior video camera 214, which are being passed via the central unit 208, to ensure that the delivery person’s behaviour is appropriate.
  • the delivery person then leaves the protected interior space, closing the door behind them.
  • the lock 104 sends a lock status update 350 to the central unit 208, which then forwards this to the central monitoring station, so that the operator can speak 358 to the delivery person via the audio interface if the door has not been closed correctly - the operator basically telling the delivery person to close the door properly before they leave.
  • the central monitoring station may then send the confirmation to the central unit that the scheduled event has been completed, or the central unit may be configured to recognise this fact based on receiving the correct lock status update at step 350.
  • the controller of the security monitoring system then reverts to its previous status.
  • the described security monitoring system provides a secure perimeter to premises, the premises including: an exterior closure , such as door 102, in the secure perimeter giving access to a protected interior space 200 of the premises.
  • An electrically controlled lockl04 is provided for the exterior closure or door 102.
  • An actuator for example a bell push, is provided for a visitor to indicate their presence at the door.
  • the security monitoring system includes a controller 208 coupled to the lock, and the controller is configured to: receive details of a scheduled event that will involve granting a visitor (such as a delivery person) access to the protected interior space by opening the exterior closure, the details including a scheduled time window and a security code specific to the scheduled event.
  • the controller upon receiving, within the scheduled time window, an indication from the actuator that a visitor is present at the closure, is configured to: prompt the visitor to confirm that they are present for the purpose of the event, and upon receiving such confirmation from the visitor, prompt the visitor to input a security code; receive from the visitor a security code, and if the received security code matches the security code specific to the scheduled event, to unlock the electrically controlled lock to admit the visitor to the protected interior space of the premises for the scheduled event.
  • the security of delivered items is improved, while maintaining the security of the premises, and without requiring that anyone be at the premises to receive the delivery.
  • An approved user of the system e.g. a member of the household, can use the system to schedule secure delivery or collection at the time they order goods or services, safe in the knowledge that the goods that are ordered will be safe from “porch pirates” and other opportunists.
  • the controller may be configured to share with a remote monitoring centre (210) the received details of the scheduled event, and the received security code, and only unlock the electrically controlled lock to admit the visitor to the protected interior space of the premises for the scheduled event if confirmation is received from the remote monitoring centre that the received security code matches the security code specific to the scheduled event.
  • a remote monitoring centre (210) the received details of the scheduled event, and the received security code
  • only unlock the electrically controlled lock to admit the visitor to the protected interior space of the premises for the scheduled event if confirmation is received from the remote monitoring centre that the received security code matches the security code specific to the scheduled event.
  • the security monitoring system may further comprising an audio interface to enable audio communication with a visitor at the closure, the controller being configured to enable the remote monitoring centre to use the audio interface to speak to the visitor.
  • an operator in the central monitoring station is able to clarify any uncertainties, as well as guiding the visitor in what they have to do and where they have to leave the package (or collect the package).
  • the security monitoring system preferably further comprises a first video camera arranged to observe a space in front of the exterior of the closure, the controller being configured to enable the remote monitoring centre to use the first video camera to observe the visitor.
  • a first video camera arranged to observe a space in front of the exterior of the closure
  • the controller being configured to enable the remote monitoring centre to use the first video camera to observe the visitor.
  • first video camera may be a video doorbell, which is convenient both in terms of the location of the camera, and the co-location of the video and audio interfaces, along with the actuator, and in terms of the visual performance of the camera - as video doorbells are typically very well placed to capture images of people at the door.
  • the video doorbell includes the audio interface, as this is likely to be well located from the point of view of performance, and it may also reduce installation complexity and time.
  • the security monitoring system further comprising a second video camera arranged to observe the protected interior space behind the closure, the controller being configured to enable the remote monitoring centre to use the second video camera to observe the visitor within the protected interior space.
  • the security monitoring system may be configured to only unlock the electrically controlled lock to admit the visitor to the protected interior space of the premises for the scheduled event if the security code is received from the visitor while the security monitoring system is in an armed state. In this way, the risk of admitting a stranger to the premises when the premises are occupied is reduced. This risk may be further reduced by restricting the scheduled concierge service to times when the security monitoring system is in armed away mode.
  • the controller of the security monitoring system may be configured, in the event that the security code received from the visitor matches the security code previously received by the controller, not to react to any signals or notifications received from a status sensor associated with the closure for a predetermined period, while maintaining the security monitoring system in an armed state.
  • the security monitoring system can continue to monitor the rest of the periphery, and the interior of the premises, while securely admitting the visitor and without an alarm condition being caused by correct behaviour of the visitor.
  • the predetermined period may be until the visitor has been observed to vacate the interior space.
  • Figure 4 corresponds generally to figure 3 a, but shows a sequence of events where the visitor at the doorbell does not confirm that they are present for the purpose of the scheduled event.
  • the announcement 320 there is no subsequent bell push.
  • the audio interface may be used to make an announcement to the effect that the visitor should wait while the system tries to connect them with the occupant of the house.
  • the central monitoring station transmits a handover instruction 422 to the central unit which causes the central unit to transmit doorbell ring instruction to the doorbell app, either directly or through the doorbell itself - the doorbell been connected typically via Wi-Fi to the Internet.
  • the user resident of the house will typically have an appropriate doorbell app on their phone or other device, and this will receive the doorbell ring and, typically the video and audio from the doorbell.
  • the user can then use the doorbell app in a conventional manner to speak to the visitor at the door.
  • the user can then use the security system app to send instructions to the central unit 208 causing the central unit to unlock the electrically controlled lock 104, so that the visitor can be admitted.
  • the central unit also sends an activation command 432 to the interior video camera, which provides interior video images to the central unit which then passes them on to the security system app, so that the user can observe the entrance of the visitor and the closing of the door.
  • the actuator, the external video source, and the external audio interface may all be provided in free-standing components to implement embodiments of the invention.
  • the first video camera if used, to be the video camera of a video doorbell, because of the generally ideal location of such a camera in terms of surveying the space in front of the front door 102, it is also possible to use a different video camera installation, such as that shown as 112, which also observes the space in front of the front door.
  • a video camera installation such as that shown schematically in figures 1 and 2 as 112 may provide a view not only of the space in front of the front door, but also of the door.
  • the video camera installation 112 includes, or has an associated, motion detector 114, such as a PIR sensor, with the camera 112 typically only being turned on when the movement sensor detects movement.
  • motion detector 114 such as a PIR sensor
  • a surveillance camera installation does not require a movement sensor, rather when the surveillance cameras activated it may continuously monitor a surveilled area, typically streaming images continuously or every few seconds to a monitoring location.
  • Such a surveillance camera may also operate under the control of a security monitoring system according to an aspect of the invention, the controller 208 of the security monitoring system transmitting a signal to cause the surveillance camera to capture images at transmit the captured images to the controller 208, and to forward the captured images for checking remotely, e.g. at the central monitoring station 210 or at a user device 220.
  • a completely separate area e.g. annex or garage
  • FIG. 5 shows schematically an architecture in which a security monitoring system, shown generally as 500, is coupled to a video entry arrangement 510, an electrically controlled lock, such as the lock 104 of figures 1 to 4, and a remote monitoring station 210.
  • the security monitoring system 500 includes a security monitoring system controller 208, together with a collection of various sensors 520, including an external video camera 112, an internal video camera 214, a closure status sensor 206 for the closure (e.g.
  • admittance zone sensor 216 an example of which is the motion sensor 216 shown in figure 2, but more generally this is a sensor of any form to detect presence within a zone to which a delivery person, or the like, may be admitted using a system as described in this patent application.
  • FIG. 6 is a schematic block diagram of a video entry arrangement 510, such as that shown in figure 5.
  • the video entry arrangement 510 may take the form of a video doorbell.
  • the video entry arrangement 510 includes a video entry arrangement controller, 600, including a processor 602, and a memory 604.
  • an audio interface 610 preferably comprising both an input device 612, and an output device 614, a video camera, 620, and an actuator, or bell push, 630.
  • Figure 7 is a timeline illustrating schematically a scheduled delivery taking place using an installation such as that shown in figure 5, , in which the central monitoring station effectively provides backup, but the bulk of the processing is handled by the video entry arrangement 510, e.g. video doorbell) using for example pre-recorded announcements.
  • the installation automatically handles communication with the delivery person, with the operator and the central monitoring station taking a more passive role, perhaps simply monitoring the delivery on screen and being ready to take action if something goes wrong.
  • This approach has the merit of probably being rather cheaper to run.
  • the pass code should be one generated by the system, for example by the system security app 220, or by corresponding functionality in the cloud for example, rather than simply the last four digits of the order number.
  • a user places an order when schedules are deliver it with a supply company 250.
  • the user may place an order with the supply company and only subsequently schedule a delivery and even conceivably may schedule delivery with the supply company before actually placing the order for the goods or services (users of supermarket delivery services in these times of Covid will have experienced the difficulty of securing a delivery slot at a desired time, and know that it is sometimes better to book a delivery slot first, and then place the order for goods).
  • the user uses for example the security system app 220 on their smart phone or other device to log the delivery with the controller 208 of the security monitoring system.
  • this logging of the delivery with the controller 208 may be done (705) using a user interface device of the security monitoring system, rather than remotely using a security system app or website.
  • the controller 208 In logging the delivery with the controller 208, the controller 208 is provided with the scheduled time window that was agreed with the supply company 250 for example, June 21 between 1 PM and 3 PM.
  • the controller 208 is also provided with an identification, e.g. a code, for the delivery, which will act as a security code specific to the scheduled event.
  • an identification e.g. a code
  • the one-time code can be provided to the supply company by completing a field on a form provided by the supply company as part of the ordering process.
  • the central unit is preferably automatically provided with the delivery schedule and the relevant one-time pass code by the security system app or equivalent.
  • the user may use a user interface device of the security monitoring system to provide the scheduled delivery time and the pass code to the central unit 208.
  • the central unit 208 may receive a “flag” indicating use of the scheduled concierge service.
  • the central unit 208 has the schedule delivery window and one-time code, these are passed at 706 to the video entry arrangement 510.
  • the details of the schedule delivery are stored in memory 604, and the VEA controller 600 primed to switch operating mode for the scheduled delivery window.
  • the VEA controller 600 automatically starts a routine specific to the scheduled concierge .
  • the video entry arrangement 510 may be configured to transmit 712 images captured by the video camera 620, and preferably sounds captured by audio interface 610, to the central unit 208 of the security monitoring system, from where they are onwards transmitted 714 to the central monitoring station 210.
  • the installation may be configured so that under ordinary circumstances, that is outside scheduled delivery windows, the video entry arrangement 510 behaves just like a conventional stand-alone video doorbell, with video images shared with a user via a video doorbell app and not with the security monitoring system.
  • the video entry arrangement may be arranged as an integral part of the security monitoring system.
  • the video entry arrangement 510 plays a pre-recorded announcement to ask the person who activated the actuator 630 to confirm whether they are present for the scheduled concierge service, for example “if you’re here to make a delivery, please press the button once more”(although clearly a different number of extra presses could be specified) .
  • the video entry arrangement may be configured to play a ringing tone, music or provide another message, such as “one moment please, I’ll try to connect you”, followed by musical ringing tone, and otherwise behaving in the conventional way to connect the video entry arrangement to a designated user via a video entry arrangement app, for example. But if the instructions from the pre-recorded announcement are followed, and the button is pressed twice, 722, the video entry arrangement recognises this as a trigger to play another pre-recorded announcement, 728.
  • Pre-recorded announcement 728 tells the delivery person what they need to do in order to provide the code for the delivery, for example, speaking the code (if the video entry arrangement includes speech recognition functionality to recognise all the permitted characters for one-time codes, e.g. all the numerals, or all the alphanumerics), or keying the code into a keyboard (which may be provided so that householders can disarm the security monitoring system, and unlock a door, to gain admittance), or displaying some identifier - such as a QR code to the video camera 620.
  • the video entry arrangement 510 communicates successful code entry to the central unit 208.
  • this causes the central unit 208 to activate at 738 a video camera, such as interior camera 214, to observe the delivery person once they have opened the closure (e.g. door 102), and he central unit may then begin to supply images from the video camera to the central monitoring station 210.
  • the central unit 208 sends an unlock instruction 744 to the electrically controlled lock 104.
  • the video entry arrangement 510(and optionally central monitoring station 210) may also receive confirmation from the central unit 208 that the lock has been unlocked, and in any event the video entry arrangement preferably makes another announcement to the effect that the delivery person is now free to enter through the relevant closure, e.g.
  • an operator at the central monitoring station 210 observes 748 the delivery. If the operator decides that the delivery person’s behaviour is wrong, or suspicious, he may involve security personnel such as the local police, or security guard - or even activate a smoke producing device to prevent the delivery person from being able to see to steal anything (this is of course also an option with all the other embodiments described). When the delivery person leaves, he closes the door behind him, allowing the lock 104 to lock itself again automatically - or under the control of the central unit 208, depending upon the setup.
  • a motion or presence detector for example a PIR in the video entry arrangement (e.g. a video doorbell), to detect the presence of someone at the door (or wherever else the arrangement covers), rather than relying on the bell push 710 to trigger the playing of the announcement 720.
  • the central unit could be configured to couple the doorbell video to the central monitoring station at the commencement of the schedule delivery window, so that an operator in the central monitoring station 210 may react to the presence of someone (who perhaps looks like a delivery person) rather than relying on 310.
  • the video entry arrangement 510 e.g. video doorbell
  • the video entry arrangement 510 could be programmed to give detailed instructions, e.g. how to enter a PIN code on an outdoor PIN pad.
  • the protected interior space may not be a room or hall of a dwelling, or a garage or outbuilding, or even a space large enough to accommodate a person - it could instead be an enclosure such a locker or cubby hole, large enough to receive and contain parcels and most other common deliveries.
  • the inputting of the security code may be in any manner: audibly (using speech or some other sound), physically using key presses, visually (using a QR code or other visual representation), or by presentation of a specially coded token.
  • one-time access may be granted without the constraint of a scheduled time window.
  • a one-time code is valid once granted, for one use, unless the right of access is cancelled prior to being used. It will be appreciated that all the earlier embodiments may also be operated without the constraint of scheduling - that is with one-time-codes that are valid at any time - unless the right of access is cancelled, or blocked (as it may be for specific times of day, dates or periods, or some combination of these).
  • CMS central monitoring station
  • ARC alarm receiving centre
  • the in-home delivery option involves giving a delivery person access to the home (or business, or other enclosed premises).
  • the out-of-home option does not involve giving a delivery person access to the home (or the like), but instead delivery is made to a secure enclosure - such as a secure box, outside of the home (or the like), which can be opened in a manner as previously described, and with the delivery being supervised over a video link.
  • a customer chooses a traditional delivery method in the retail platform, he represented as selecting “home delivery” (with delivery in 1 to 3 working days), here choosing between two alternative delivery agents.
  • the customer orders are delivery through any retailer (here shown as “Zara” RTM) and selects a traditional home delivery method at the checkout.
  • no data is registered with the supplier of the security monitoring system.
  • the customer At step two, the customer generates a temporary PIN (such as a one-time code) using a security monitoring system app (e.g. on the use a user’s smart phone, tablet, or other computer) and copy-pastes the message with instructions in the free text box when filling the delivery address in the retail platform. So, for example on the retailers website in the field with the caption “do we need additional instructions to find this address?”, The customer inserts “SecureCo protected delivery, enter PIN: 123456 at keypad. See how at SecureCo.com/pinhome”.
  • the PIN code is good for a single use only , and should preferably have a limited lifetime (e.g. last no more than 7 days).
  • step three the Courier arrives at the delivery address and enters the temporary PIN for delivery in the external keypad.
  • the external keypad communicates with the central unit of the security monitoring system, which in turn communicates with the ARC.
  • the ARC receives the courier’s request, sends a signal to the central unit of the security monitoring system to unlock the electrically controlled lock and to disarm the sensors in the entrance area.
  • the courier delivers the package before the alarm delivery mode ends, and then leaves. That is, with the door unlocked, the courier leaves the package next to the front door for example in the hall.
  • An operator in the ARC can let the delivery person know that he is being monitored, and the alarm will be activated in X seconds, via an audio interface in the delivery area (possibly an audio interface on an internal disarm node for the security monitoring system).
  • An operator in the ARC monitors every step of the process.
  • the ARC may also send a message to the customer (possibly via text or other message, preferably with an embedded link which the customer can click to see a video of the delivery, optionally in real time, or via the security monitoring system app, again with an embedded link that gives access to a video feed of the event).
  • the courier if the courier leaves the property, the customer receives a notification with the link for the event.
  • the ARC locks the smart lock and resets the alarm for the delivery area. If the courier doesn’t leave the property, an intrusion event is triggered. That is, in the event the delivery person goes beyond the authorised area, or doesn’t leave the property, the ARC first warns him via the audio interface and then calls a security guard and/or the police. If the security monitoring system includes a smoke generation device in an area unlawfully entered by the delivery person, the ARC may send a signal to the central unit of the security monitoring system to trigger the smoke device.
  • Figure 9 shows in more detail some aspects of the option discussed with reference to Figure 8.
  • the courier arrives at the customer’s door she read the label. If this includes, as shown, a field for additional delivery instructions, she will see the message SecureCo protected delivery, enter PIN: 123456 at keypad. See how SecureCo.com/pinhome. As we can see, this information may also be provided on the courier’s smartphone, including a link to the landing page for the website. If it’s the courier’s first time of using SecureCo protected delivery, she will click the link to go to the SecureCo landing page, where she will find a tutorial guiding her through the process that she needs to follow.
  • the tutorial may, for example explain how to use the external keypad - for example, here we see that the courier is presented (on her smart phone or other device) with an explanation of how to enter the digits 0-9 using the 5 buttons of the external keypad “Next to each button you will find two numbers, pressing one time will dial the first number, pressing twice will dial the second number”.
  • the explanation provided to the courier via her smartphone or other device may also explain that “each time you enter one number you will see a white visual feedback in the top of the device. If the inserted number is correct, you will receive a green visual feedback. If it’s incorrect you will receive a red visual feedback.
  • the PIN code entered is OK (green lights) a request to open will be sent to our Alarm Receiving Centre. It can take 1 minute to open. Then you will be monitored, so please leave the package and depart. In case of misbehaviour we will expel intruders.”.
  • the courier should see a notice containing a warning about the presence of a security monitoring system.
  • This notice preferably contains a QR code, and or a telephone number to call. Scanning the QR code with her smart phone the courier is taken to a landing page with the field to enter the PIN, which is provided with a label such as “enter protected access PIN to open the door”.
  • the QR code encodes an identity (VSID) for the installation, so that the backend system can associate the QR connection with the right premises for the relevant delivery, so that when the provided PIN is entered, the ARC will receive the information necessary for the operator to send an instruction to unlock the door.
  • VSID identity
  • the courier makes a phone call to the provided number, and identifies herself as the delivery agent delivering to the relevant address (saying the identity (the VSID) for the installation which the customer will have provided when placing the order - for example in response to ta prompt on the order page for “any additional delivery instructions?”)
  • the ARC agent is able to link the PIN number to the relevant pre-booked supervised delivery slot for the installation corresponding to the installation identity (VSID) provided, and again the agent knows enough to unlock the door.
  • Figure 10 illustrates a similar approach to that shown in Figure 9, but in this case the main flow option is to use a near field communication (NFC) link, rather than a PIN.
  • NFC near field communication
  • the information on the address label and on the courier’s smart phone includes a SecureCo link with a PIN for NFC access, together with an ID (VSID) for the security monitoring system installation at the premises - in this case A1B2C3..
  • VSID ID
  • the couriers first time, she will read the entire instructions, which include instructions to click on a link to download and NFC card, to her smartphone or other device, to open the customer’s door, and instructions to use the NFC card with the outdoor keypad (which includes an NFC antenna) to access the property.
  • the courier uses the NFC card, she will get visual feedback from the device. If the NFC card is correct, she will receive green visual feedback. If it’s incorrect, she will receive red visual feedback. And if she receives red visual feedback she should follow the deterrent instructions (which will be described below).
  • the explanation also tells the courier that “when the pin code entered is okay (green LEDs) you will send a request to open to our alarm receiving centre. It can take one minute to open. Then, you will be monitored, so please leave the package and leave immediately. In case of misbehaviour we will expel intruders”.
  • Figure 10 also illustrates a backup flow which again involves the courier reading of the deterrent label next the customer’s door and either scanning a QR code, or calling a telephone number provided. This time the courier needs to enter/say both the VSID A1B2C3 and the PIN code.
  • FIG. 11 illustrates in more detail the main flow for the option using the NFC link.
  • the customer again chooses the traditional delivery method in the retail platform (here “Zara” RTM, with selection between multiple delivery agents).
  • the customer orders are delivery through any retailer, and select traditional home delivery at the checkout.
  • no data is registered it in the SecureCo system.
  • the customer generates a temporary PIN for delivery and inserts this into the optional delivery instructions box.
  • the customer generates a temporary PIN that is incorporated into a smart link which will be delivered from the SecureCo app, and copy and paste the message with instructions into the free text box (additional delivery instructions) when filling the delivery address in the retail platform.
  • the courier arrived at the premises, she uses the link to download an NFC card to her smartphone or other suitable device, which she then uses with the outdoor keypad.
  • the NFC card only works for one use, and optionally only in a prescheduled delivery window.
  • the ARC ensures that the courier has the specified note (information) from the retail company.
  • the ARC receives the courier request unlocks the door and disarm the entrance area (by sending appropriate instruction to the controller of the security monitoring installation).
  • the courier delivers the package before the alarm delivery mode ends, and then leaves. Once again, with the door unlocked, the courier is free to leave the package in the delivery area for example in the hall behind the front door.
  • the operator in the ARC lets the delivery person know that she is being monitored, by means of an audio interface device such as an internal disarm node for the security monitoring system, and that the alarm will be activated in a certain number of seconds.
  • the operator in the ARC monitors every step, and again the customer can optionally watch also (having optionally been notified by the ARC of the arrival of the courier).
  • the courier leaves the property, the customer receives a notification with a link to the event, which the customer can use to view the whole delivery video footage.
  • the operator in the ARC locks the smart lock and re-activates the alarm (again by appropriately instructing the controller of the security monitoring installation). If the courier doesn’t leave the property, an intrusion event is triggered. In the event that the courier enters an unauthorised area, or doesn’t leave the property, the operator in the ARC first warns the courier, optionally triggers a smoke device, and calls a security guard and/or the police.
  • Figure 12 shows another backup alternative, in this case a PIN code inserted in a webpage (the webpage accessed on the courier’s device by scanning the QR code using the device). This could be used if the courier doesn’t understand how the external keypad works.
  • the customer chooses the traditional delivery method in the retail platform, with the customer ordering delivery through any retailer (once again Zara, RTM, in this example), and selecting traditional home delivery at the checkout. No data is yet registered in the SecureCo system.
  • step two the customer registers and “expecting delivery from Zara” in the SecureCo app.
  • the customer generates a temporary PIN for delivery from the SecureCo app and copy-paste the message with instructions in the free text box (and with the code (VSID) that identifies the customer’ s security monitoring system installation) when filling in the delivery address on the retail platform order page.
  • VSID code that identifies the customer’ s security monitoring system installation
  • the courier arrives she sees the deterrent notice that the door, which includes a QR code. She scans the QR code using her smart phone or other device, and enters the temporary PIN and the customer installation number in the fields of the page that opens on her device. If the courier doesn’t understand what to do she can use the displayed telephone number to call the ARC.
  • the ARC receives the courier’s request, checks with an external video camera (such as from a video doorbell), unlocks the door and disarm the entrance area.
  • the courier leaves the package in the delivery zone.
  • the operator in the ARC lets the delivery person know, by means of the internal audio interface, that she is being monitored, and that the alarm will be activated in a number of seconds. The operator monitors every step, and the customer once again can optionally watch also. The remaining behaviour is as previously.
  • Figure 13 provides another alternative backup, in this case with the PIN code spoken to the ARC via a voice call. Once again this may be useful if the courier doesn’t understand how the external keypad works.
  • the first step is as previously.
  • the customer registers and “expecting delivery from Amazon” (Amazon acting as the delivery agent for Zara)” in the SecureCo app.
  • the customer generates a temporary PIN for delivery using the SecureCo app, the PIN appearing in a message that also includes the installation ID (VSID).
  • VSID installation ID
  • the customer then, for example, copies and pastes this message with instructions into the “additional delivery instructions” free text box, thereby also providing the installation ID (here A1B2C3) that will identify the customer, when filling the delivery address on the order page on the retail platform.
  • the courier identifies herself and gives the PIN and the customer code, A1B2C3 (both of which the courier has as part of the order information provided to the courier by her employer Amazon).
  • the recipient of the call (an operator in the ARC) confirms that there is an expected delivery, as this information is on the security system management company system, and the operator in the ARC unlocks the door and disarms the entrance area.
  • the remaining steps are as previously.
  • Figure 14 introduces monitored in-home delivery with an integrated retailer.
  • the customer visits a certified retailer, who is associated with the company behind the security monitoring system, and selects items for delivery.
  • a certified retailer who is associated with the company behind the security monitoring system, and selects items for delivery.
  • the customer is presented with the option of “secure home delivery” from SecureCo, and selecting this option results in the delivery ID being registered in the integrated platform.
  • the customer will receive push notifications on the arrival date with the estimated delivery time, and when the courier is arriving.
  • the customer is also given the option of “cancel in-home delivery” to let the courier know that she cannot enter and has to call.
  • the delivery person is provided with a one-time access code for use in sending an access request to the ARC (the one-time access code serving to identify the courier as authorised by the certified/integrated retailer).
  • the courier authenticates herself in the outdoor keypad using the one-time access code provided (optionally this may be done using NFC, for example using an app in the courier’s device): in this way the operator in the ARC will know that the courier comes from the integrated company.
  • the courier then inserts the temporary PIN for delivery in the outdoor keypad. If the PIN is correct, the security monitoring system will send a home delivery signal to the ARC.
  • the ARC receives the courier request, unlocks the door and disarms the entrance area.
  • the remaining steps of the process are as previously, except that because the retailer is integrated, the retailer/delivery company assumes liability for its employees, reducing the risk of bad behaviour.
  • Figure 15 introduces supervised out-of-home delivery with an integrated partner.
  • Step one again provides a customer with the option to select secure home delivery (meaning delivery by a courier working for an integrated partner company). Selecting secure home delivery at checkout results in the delivery ID being registered on the integrated platform.
  • step two the customer again receives push notifications on the arrival date with the estimated delivery time, and also again when the courier is arriving.
  • step three when the courier arrives for the customers she inserts the PIN in the outdoor keypad (and may also as before have a one-time access code as well as a single-use PIN, or only the PIN may be required). In this way the ARC ensures that the courier comes from an integrated company.
  • the PIN is checked by the security monitoring system at the premises (the PIN having been sent from the integrated platform to the central unit of the security monitoring system, and the PIN entered at the external keypad having been sent from the keypad to the central unit). If the PIN is correct, the central unit will send a home delivery signal to the ARC. The ARC then sends an unlock signal to the central unit of the security monitoring system installation, which in turn transmits an unlock command to the lock of a secure enclosure (e.g. a parcel drop box in the grounds of the premises) so that the courier can deposit the delivery.
  • a secure enclosure e.g. a parcel drop box in the grounds of the premises
  • the operator in the ARC Centre then sends a lock command to the central unit of the security monitoring system installation resulting in the secure closure being locked and the system armed again.
  • the customer receives a notification of the delivery, the notification either including a video clip or a clickable link by means of which the customer can access a video recording.
  • the operator in the ARC will call security/the police.
  • the retailer/delivery company assumes responsibility for the courier, the risk of malfeasance is reduced.
  • kits-of-parts including a smart lock, and external keypad, two video cameras - one for mounting externally to observe visitors at the door to which the smart lock will be fitted, and the other for mounting internally to view the space into which accesses to be granted for the deposit of deliveries, and a central unit which connects wirelessly to the other components and which provides functionality when coupled to an app in a user’s smart phone or other device.
  • the app and the central unit together meaning that a user will get a notification in the app when the delivery person presses the doorbell (one of the functions of the external keypad), to be able to see and speak to the delivery person directly from the app, using a voice interface in one or other of the video cameras, to unlock the door directly from the app to let the delivery person in to drop off the package inside the premises.
  • the second camera in the hallway or garage, or wherever it is decided that delivery drops will be made enables the user to supervise the package drop off in the premises directly from the user’s phone. After the delivery the user can again use the app in her smart phone to communicate with the central unit which in turn commands the smart lock to lock again. Operation of such a system will now be described with reference to Figure 16.
  • step one the customer places an order through any retailer, and selects traditional home delivery at the checkout. No data are registered with SecureCo system at this stage.
  • step two the customer generates a temporary PIN for delivery using the SecureCo app on her smart phone. This is copied and pasted with instructions into the free text box (additional delivery instructions) when completing the delivery address on the order page of the retail platform.
  • step three the courier inserts the temporary PIN for delivery in the outdoor keypad. This temporary PIN is again only good for one use.
  • the central unit of the security monitoring system checks the PIN entered by the courier against that generated earlier by the customer using the app (this having been communicated to the central unit by the (e.g. cloud-based) backend of the system).
  • the central unit If the check by the central unit indicates that the PIN is correct, the central unit causes a message to be sent to the customer explaining that the home delivery PIN has been inserted correctly, and requesting the customer to unlock the door to permit home delivery.
  • the central unit on receiving a request from the customer to unlock the door to permit home delivery, in effect disarms the security monitoring system for the door and the delivery area, so that entry of the courier through the door and into the delivery space will not trigger an alarm.
  • the courier deposits the package while the customer monitors the courier’s behaviour captured by one or other of the video cameras and displayed on the customer’s smart phone or other device.
  • the video cameras are configured to play out an automated message at this stage, warning the courier that the property is protected by the security monitoring system, that the courier is being watched, and where the package should be left.
  • the automated message may also provide a countdown to the reconnection of the alarm.
  • the customer locks the door, by sending a command from the app to the central unit. The central unit then in effect re-arms the system. If the courier doesn’t leave the customer can trigger a smoke dispenser, a fitted, and also can trigger an intrusion event with high priority to the ARC who will call security guard or the police.
  • Figure 17 is similar to Figure 16 except that it relates to self-monitored out-of-home delivery.
  • the first three steps are the same as for Figure 16.
  • the central unit sends to the customer request to unlock the external package delivery container (e.g. a secure dropbox).
  • the external package delivery container e.g. a secure dropbox
  • any of these embodiments, examples or inventions in in any or all of their/its aspects may also be used to provide a first code to pass through a first protected perimeter, and a second code to pass through a second perimeter. So, for example, a first code may be provided to unlock a garden gate, and a second code may be provided to unlock to door or other closure of a house, flat, garage or strong box.
  • a first code may be provided to gain access to the interior of an apartment block, condominium, or other building containing multiple separate units, and a second code given to gain access to the interior or part of the interior of one of the units.
  • the first code may be provided to gain access through a door or other closure protected by something like an intercom (as found on condominiums and apartment blocks), while the second code is used to unlock a smart lock of a unit within. This may involve dealing with two different security systems, with one code specific to a first security system, and another code specific to a second security system.
  • a customer/user may provide delivery instructions specifying which code is to be used at which stage, and entered in which way via which interface.
  • An app possibly provided by or linked to the supplier or operator of a security system that protects a customer’s dwelling, office, garden, garage or other protected space or premises, may be configured to generate two or more security codes according to the number and nature of the closures/portals that need to be traversed in order to effect delivery, so that these may all be generated in a single operation or in a series of linked operations.
  • the back end of a system supporting the app is configured to communicate each of the plurality of security codes to the respective systems, or system controllers.
  • the app maybe run on a smartphone or other device of the user, or run on a server or otherwise in the cloud.
  • the codes and associated instructions may be passed by the user to the supply company (with whom the order is placed) or with a delivery agent responsible for arranging delivery, by the user filling in an appropriate form.
  • this functionality may be linked to an ordering system of a supplier or delivery agent for example affiliated with the company supplying or operating one or more of the security systems involved (often this may be the supplier or operator (who may be the same entity or part of a group of affiliated companies), so that secure delivery as herein described, in any variant, can be selected as a delivery option.
  • an ordering system of a supplier or delivery agent for example affiliated with the company supplying or operating one or more of the security systems involved (often this may be the supplier or operator (who may be the same entity or part of a group of affiliated companies), so that secure delivery as herein described, in any variant, can be selected as a delivery option.
  • delivery situation e.g.
  • the functionality may be arranged not only to generate unique or particular codes for each of the portals or closures that must be passed in order to deliver to the target delivery zone, but also to communicate these codes to the controller or relevant controllers of the various systems.
  • the agent when an agent makes a delivery to such a zone or location, the agent is able to enter the appropriate code at the right location or right interface, and the relevant controller is able to recognise that the correct code has been entered - so that the relevant portal is unlocked and the agent is able to pass through each of the portals.
  • the present application contains a number of self-evidently inter-related aspects and embodiments, generally based around a common set of problems, even if many aspects do have broader applicability.
  • the logic and control methods whilst not necessarily limited to operating with the hardware disclosed and may be more broadly applied, are all particularly suited to working with the hardware of the various hardware aspects and the preferred variants thereof. It will be appreciated by the skilled person that certain aspects relate to specific instances of other features and the preferred features described or claimed in particular aspects may be applied to others.

Landscapes

  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Lock And Its Accessories (AREA)
  • Alarm Systems (AREA)

Abstract

L'invention concerne un système de surveillance de sécurité pour fournir un périmètre sécurisé à des locaux, les locaux comprenant : une fermeture extérieure dans le périmètre sécurisé donnant accès à un espace intérieur protégé des locaux ; un verrou à commande électrique pour la fermeture extérieure ; un actionneur pour un visiteur afin d'indiquer leur présence au niveau de la fermeture ; et un dispositif de commande couplé au verrou, le dispositif de commande étant configuré pour : recevoir des détails d'un événement qui impliquera l'octroi d'un accès de visiteur à l'espace intérieur protégé au moyen de l'ouverture de la fermeture extérieure, les détails comprenant un code de sécurité spécifique à l'événement planifié ; et après réception d'une indication en provenance de l'actionneur qu'un visiteur est présent au niveau de la fermeture, pour : inviter le visiteur à confirmer qu'il est présent dans le but de l'événement, et après réception d'une telle confirmation de la part du visiteur, inviter le visiteur à saisir un code de sécurité ; recevoir du visiteur un code de sécurité, et si le code de sécurité reçu correspond au code de sécurité spécifique à l'événement, déverrouiller le verrou à commande électrique afin de laisser entrer le visiteur dans l'espace intérieur protégé du local pour l'événement.
PCT/EP2022/063440 2021-05-20 2022-05-18 Procédés et installations de sécurité WO2022243373A2 (fr)

Priority Applications (2)

Application Number Priority Date Filing Date Title
PE2022003071A PE20240839A1 (es) 2021-05-20 2022-05-18 Instalaciones y procedimientos de seguridad
EP22730693.3A EP4154228A2 (fr) 2021-05-20 2022-05-18 Procédés et installations de sécurité

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
ESP202130465 2021-05-20
ES202130465 2021-05-20

Publications (2)

Publication Number Publication Date
WO2022243373A2 true WO2022243373A2 (fr) 2022-11-24
WO2022243373A3 WO2022243373A3 (fr) 2023-01-05

Family

ID=82067440

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/EP2022/063440 WO2022243373A2 (fr) 2021-05-20 2022-05-18 Procédés et installations de sécurité

Country Status (5)

Country Link
EP (1) EP4154228A2 (fr)
AR (1) AR125879A1 (fr)
CL (1) CL2022003824A1 (fr)
PE (1) PE20240839A1 (fr)
WO (1) WO2022243373A2 (fr)

Family Cites Families (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1152376A3 (fr) * 2000-05-02 2004-01-21 Kevin Dennis Burley Dispositif permettant la livraison et/ou collecte sécurisée de biens utilisant des codes d'accès à usage unique
US20180061154A1 (en) * 2016-05-27 2018-03-01 SkyBell Technologies, Inc. Doorbell package detection systems and methods
US10861265B1 (en) * 2017-01-23 2020-12-08 Vivint, Inc. Automated door lock
US10347063B1 (en) * 2017-03-01 2019-07-09 Alarm.Com Incorporated Authorized smart access to a monitored property
US11210878B2 (en) * 2018-01-08 2021-12-28 Comcast Cable Communications, Llc Premises access system
WO2019167291A1 (fr) * 2018-02-27 2019-09-06 アイホン株式会社 Sonnette de porte, système de gestion de clé, et interphone

Also Published As

Publication number Publication date
PE20240839A1 (es) 2024-04-22
AR125879A1 (es) 2023-08-23
CL2022003824A1 (es) 2023-06-23
EP4154228A2 (fr) 2023-03-29
WO2022243373A3 (fr) 2023-01-05

Similar Documents

Publication Publication Date Title
US10706703B1 (en) Service entrance alarm system and methods of using the same
US20220301401A1 (en) Control access utilizing video analytics
US11729014B2 (en) Modular intelligent door and frame
US20190317462A1 (en) Managing barrier and occupancy based home automation system
US7397371B2 (en) Security system access control and method
US20140019768A1 (en) System and Method for Shunting Alarms Using Identifying Tokens
US10560664B2 (en) Entranceway or foyer-based, communication apparatus and system
US20170181559A1 (en) Delivery freight deposit box and method for receiving delivery freight using the same and method for certificatting password
EP2933783B1 (fr) Système et procédé pour accéder l'accès à un système de sécurité pour des utilisateurs temporaires à l'aide d'une application mobile
US20130214902A1 (en) Systems and methods for networks using token based location
US7772971B1 (en) Method for the proactive verification of alarm signals from the protected premise location
KR101801200B1 (ko) 스마트 초인종 시스템
JP4311215B2 (ja) 戸締まり確認システム
US11380153B2 (en) System for receiving delivery items and method therefor
CN108665591B (zh) 基于身份识别的治安防盗系统
EP4154228A2 (fr) Procédés et installations de sécurité
JP2008025278A (ja) 出入管理システム及び方法
US20220327881A1 (en) System for receiving delivery items and method therefor
EP4154226A1 (fr) Installations et procédés de sécurité
JP2006079236A (ja) 集合住宅における通行人管理システム
US20240112555A1 (en) Multifaceted security system
JP7426795B2 (ja) 在宅管理システム
JP7426580B2 (ja) 制御システム、及び、制御方法
JP6708871B1 (ja) ドアの施解錠システム
WO2024068038A1 (fr) Agencement d'entrée vidéo, et système et procédé associés

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 22730693

Country of ref document: EP

Kind code of ref document: A2

ENP Entry into the national phase

Ref document number: 2022730693

Country of ref document: EP

Effective date: 20221220

NENP Non-entry into the national phase

Ref country code: DE