WO2024068032A1 - Security installations and methods - Google Patents

Security installations and methods Download PDF

Info

Publication number
WO2024068032A1
WO2024068032A1 PCT/EP2022/087985 EP2022087985W WO2024068032A1 WO 2024068032 A1 WO2024068032 A1 WO 2024068032A1 EP 2022087985 W EP2022087985 W EP 2022087985W WO 2024068032 A1 WO2024068032 A1 WO 2024068032A1
Authority
WO
WIPO (PCT)
Prior art keywords
doorbell
person
speech
authentication token
access
Prior art date
Application number
PCT/EP2022/087985
Other languages
French (fr)
Original Assignee
Verisure Sàrl
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Verisure Sàrl filed Critical Verisure Sàrl
Publication of WO2024068032A1 publication Critical patent/WO2024068032A1/en

Links

Classifications

    • GPHYSICS
    • G10MUSICAL INSTRUMENTS; ACOUSTICS
    • G10LSPEECH ANALYSIS OR SYNTHESIS; SPEECH RECOGNITION; SPEECH OR VOICE PROCESSING; SPEECH OR AUDIO CODING OR DECODING
    • G10L17/00Speaker identification or verification
    • G10L17/22Interactive procedures; Man-machine interfaces
    • G10L17/24Interactive procedures; Man-machine interfaces the user being prompted to utter a password or a predefined phrase
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M11/00Telephonic communication systems specially adapted for combination with other electrical systems
    • H04M11/02Telephonic communication systems specially adapted for combination with other electrical systems with bell or annunciator systems
    • H04M11/025Door telephones
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00563Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys using personal physical data of the operator, e.g. finger prints, retinal images, voicepatterns
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms
    • G08B13/02Mechanical actuation
    • G08B13/08Mechanical actuation by opening, e.g. of door, of window, of drawer, of shutter, of curtain, of blind
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms
    • G08B13/18Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength
    • G08B13/189Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems
    • G08B13/194Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems
    • G08B13/196Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
    • G08B13/19695Arrangements wherein non-video detectors start video recording or forwarding but do not generate an alarm themselves
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B25/00Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems
    • G08B25/008Alarm setting and unsetting, i.e. arming or disarming of the security system

Definitions

  • the present disclosure relates to access devices and security installations to secure devices or at least part of a perimeter of premises, and to methods performed by the access devices and controllers of the security installations.
  • Security installations that are or include security monitoring systems for monitoring premises, often referred to as alarm systems, typically provide a means for detecting the presence and/or actions of people at the premises, and reacting to detected events.
  • alarm systems typically provide a means for detecting the presence and/or actions of people at the premises, and reacting to detected events.
  • Such systems include sensors to detect the opening and closing of doors and windows to provide a secure perimeter to the premises, creating one or more protected interior spaces, movement detectors to monitor spaces (both within and outside buildings) for signs of movement, microphones to detect sounds such as breaking glass, and image sensors to capture still or moving images of monitored zones.
  • Such systems may be self-contained, with alarm indicators such as sirens and flashing lights that may be activated in the event of an alarm condition being detected.
  • Such installations typically include a control unit (which may also be termed a central unit), generally mains powered, that is coupled to the sensors, detectors, cameras, etc. (“nodes”), and which processes received notifications and determines a response.
  • the central unit may be linked to the various nodes by wires, but increasingly is instead linked wirelessly, rather than by wires, since this facilitates installation and may also provide some safeguards against sensors/detectors effectively being disabled by disconnecting them from the central unit.
  • the nodes of such systems typically include an autonomous power source, such as a battery power supply, rather than being mains powered.
  • these monitoring systems shall not activate any alarms when the person or people performing some action are authorised to do so, and the systems shall allow the person or people to actually perform such action or actions.
  • a security monitoring system may include an installation at a premises, domestic or commercial, that is linked to a remote Central Monitoring Station (CMS) where, typically, human operators the responses required by different alarm and notification types.
  • CMS Central Monitoring Station
  • the central unit at the premises installation typically processes notifications received from the nodes in the installation, and notifies the Central Monitoring Station of only some of these, depending upon the settings of the system and the nature of the detected events.
  • the central unit at the installation is effectively acting as a gateway between the nodes and the Central Monitoring Station.
  • the central unit may be linked by wires, or wirelessly, to the various nodes of the installation, and these nodes will typically be battery rather than mains powered.
  • Such security monitoring systems contribute to the safety and wellbeing of occupants of the protected premises not only by safeguarding articles within the protected perimeter - which may of course not simply be limited to a house or dwelling, but may also extend to the grounds of the house, protected by a boundary fence and gate, for example -, but also by allowing or not allowing certain actions depending on the person or people taking them.
  • the present disclosure seeks to provide enhanced security access devices, security and monitoring systems, methods and other implementations that improve the scope of security access devices and systems to address aspects of the problem of authenticating a person trying to have access to certain functions or tasks that are behind a security system.
  • an access device for giving or not giving access to a person to certain functions or tasks, thereby securing access to one or more devices or premises.
  • the access device includes: an audio recording device; at least one memory; and at least one processor, which may optionally be integrated together.
  • the access device may be, for example but without limitation, a doorbell, a video doorbell, an alarm controller, a lock or door controller, etc.
  • doorbell and “video doorbell” include any device that provides respective functionality, whether or not the device also provides additional functionality, for example, access device functionality for a security system and/or detector functionality for a security system.
  • the access device is configured, by way of the at least one memory and the at least one processor, to cause the access device to: process recorded first speech of a person to determine if said person is among a set of one or more authorised people; generate an authentication token associated with the person at least when the determination is positive.
  • the access device is further configured to do one or more of transmit the authentication token to at least one access privilege management device; receive one or more allowed actions from the at least one access privilege management device; and enable the received one or more allowed actions.
  • the access device which may be arranged e.g. on a wall of a building, adjacent to a door, etc., attempts to authenticate users at least by means of their voice, which may enable hands-free operation of the access device.
  • the authentication may rely, for example, on codewords and how they are pronounced by the user so that the determination of whether the user is in a list of authorised users, or biometric voice data resulting from the processing of the first speech with biometric voice modelling matches with predetermined biometric voice data of an authorised user.
  • Some exemplary possible actions are arming at least one alarm device, disarming the at least one alarm device, locking at least one door and/or window, unlocking at least one door and/or window, etc. It will be noted that other actions are possible within the scope of the present disclosure.
  • a building comprising one or more doorbells as described in the first aspect.
  • a security installation or a security system for securing one or more devices or at least part of a perimeter of premises.
  • the installation or system includes at least one access device as described in the first aspect.
  • the installation or system also includes at least one security device communicatively coupled with the at least one doorbell and/or a proximity detection device communicatively coupled with the at least one doorbell and/or at least one access privilege management device communicatively coupled with each of the at least one access device.
  • the at least one access privilege management device includes a database at least relating authentication tokens to one or more allowed actions per authentication token.
  • a (e.g. automated) method that enables authentication of users for gaining access to certain functions or tasks if the users have the corresponding access privileges, namely allowed actions.
  • the method may be carried out on an access device, optionally an access device of a preceding aspect.
  • the method includes: recording first speech of a person with an audio recording device of an access device; the access device processes the recorded first speech to determine if said person is among a set of one or more authorised people, generates an authentication token when the determination is positive.
  • the method may further include transmitting the authentication token to at least one access privilege management device.
  • the method may further optionally include receiving one or more allowed actions from the at least one access privilege management device, and enabling the received one or more allowed actions.
  • a data processing device or system comprising means for carrying out a method as described in the fourth aspect.
  • the processing device or system can be an access device that is, for example but without limitation, a doorbell, a video doorbell, an alarm controller, a lock or door controller, etc.
  • a computer program product including instructions which, when the program is executed by a data processing device, including an access device, cause the data processing device to carry out a method as described in the fourth aspect.
  • the computer program may be embodied in a non-transitory computer-readable storage medium or a data carrier signal.
  • Figure 1 is a schematic drawing showing a front elevation of a stylised building with an external space which is secured with an access device and/or a security installation according to some embodiments.
  • Figure 2 is a schematic part plan view of premises protected by an access device and/or a security installation according to some embodiments, together with other elements of the installation.
  • FIG. 3 shows schematically an access device 106 in accordance with embodiments.
  • Figure 4 shows schematically a method in accordance with embodiments.
  • Figure 5 shows schematically an architecture including a security installation, a video entry arrangement, and an electrically controlled lock.
  • Figure 6 is a schematic block diagram of a video entry arrangement.
  • FIG. 1 shows a view of the front of a premises 100 protected by an access device and/or a security installation according to some aspects and embodiments.
  • the premises here in the form of a house, have an exterior door, here front door, 102.
  • the door gives access to a protected interior space.
  • the security monitoring system secures at least part of a perimeter to the premises 100, and the door constitutes an exterior closure 102 in the secure perimeter giving access to a protected interior space 200 of the premises.
  • a lock 104 on the exterior door is optionally electrically controlled so that it can be locked and unlocked remotely.
  • an access device 106 in the form of a video doorbell including a first video camera which looks out from the facade of the premises so that anyone approaching the door along the path 108 can be seen, and in particular when a visitor stands at the door their face should clearly be visible.
  • the video doorbell includes an actuator, e.g. a push button, for a visitor to indicate their presence at the closure.
  • the video doorbell also includes an audio interface to enable bidirectional audio communication with a visitor at the closure 102.
  • the video doorbell preferably includes an infrared light source to illuminate whatever is in front of the video doorbell.
  • the facade of the house also carries an external keypad 110 by means of which a user may additionally introduce a passcode that might also be required by the access device to authenticate the user, for instance for the user to be able to unlock the lock 104.
  • the keypad 110 could likewise be part of the access device 106, in this case the video doorbell.
  • an optional second video camera 112 which is coupled to a presence and/or movement detector 114.
  • the detector may optionally be a thermal detector, for example a PIR sensor.
  • the second video camera 112 may be arranged when the security system is armed, to capture video of the front of the house and the private area, e.g. the garden, in front of the house and signal an alarm event to a controller of the security monitoring system.
  • the second video camera is preferably provided with an audio interface 116 to enable bidirectional audio communication with anyone observed by the second video camera.
  • the first video camera is illustrated in the form of a video doorbell, the first video camera may additionally or alternatively have the features described above for the second video camera, whether or not plural video cameras are used.
  • FIG. 2 is a schematic part plan view of a premises 100 protected by an access device and/or a security installation according to some aspects and embodiments, together with other elements of the installation, corresponding generally to the premises of figure 1.
  • the front door 102 with electrically controlled lock 104, leads into the protected interior space 200 of the premises.
  • Each of the windows 202, and the rear door 204 is fitted with a sensor 206 to detect when they are opened.
  • Each of the sensors 206 includes a radio transceiver to report events to a controller, or central unit, 208 of a security monitoring system. If one of the sensors 206 is triggered when the system is armed, a signal is sent to the central unit 208 which in turn may signal an alarm event to a remote central monitoring station 210.
  • the central unit 208 is connected to the remote central monitoring station 210 via the Internet 212, either via a wired or a wireless connection.
  • wirelessly coupled to the central unit 208 may be the access device 106, e.g. the video doorbell, the electrically controlled lock 104, and if present the second video camera 112, its associated presence and/or movement detector 114 (although the latter may be integral with the second video camera 112) and the audio interface 116.
  • These items, and the sensors 206 are preferably coupled to the central unit 208 using transceivers operating in the industrial scientific and medical (ISM) bandwidths, for example a subgigahertz bandwidth such as 868 MHz, and the communications are encrypted preferably using shared secret keys.
  • ISM industrial scientific and medical
  • the security monitoring system may also include other sensors within the protected interior space, such as an interior video camera 214 and associated movement detector 216 (which again may be integral with the camera 214), and each of the interior doors 218 may also be provided with a sensor 206 to detect the opening/closing of the door.
  • sensors within the protected interior space such as an interior video camera 214 and associated movement detector 216 (which again may be integral with the camera 214), and each of the interior doors 218 may also be provided with a sensor 206 to detect the opening/closing of the door.
  • Operation of the security monitoring system may be adjusted by a person having privileges for operating said system.
  • at least one access privilege management device 250 that may be remote or within the premises but is generally at a safe location, has data indicative of what users are allowed to perform certain tasks, and which tasks those are, for example, disarm the security monitoring system, reconfigure the security monitoring system, arm the security monitoring system, or even other tasks not directly on the system, for example, locking and unlocking the lock 104.
  • the user may first be authenticated by the access device, which in turn checks the privileges that the user has once authenticated by communicating with the at least one access privilege management device 250.
  • the security monitoring system may also include an audio interface to enable audio communication with a visitor at the closure, the controller 208 being configured to enable the remote monitoring centre 210 to use the audio interface to speak to the visitor.
  • the security monitoring system preferably also includes a first video camera arranged to observe a space in front of the exterior of the closure, the controller 208 being configured to enable the remote monitoring centre 210 to use the first video camera to observe the visitor.
  • the first video camera may be a video doorbell, which is convenient both in terms of the location of the camera, and the co-location of the video and audio interfaces, along with the actuator, and in terms of the visual performance of the camera - as access devices 106 such as video doorbells are typically very well placed to capture images of people at the door.
  • the access device 106 includes the audio interface, as this is likely to be well located from the point of view of performance, and it may also reduce installation complexity and time.
  • the security monitoring system further includes a second video camera arranged to observe the protected interior space behind the closure, the controller being configured to enable the remote monitoring centre to use the second video camera to observe any visitor within the protected interior space.
  • the actuator, the external video source, and the external audio interface may all be provided in free-standing components to implement embodiments of the present disclosure.
  • the first video camera if used, to be the video camera of a video doorbell, because of the generally ideal location of such a camera in terms of surveying the space in front of the front door 102, it is also possible to use a different video camera installation, such as that shown as 112, which also observes the space in front of the front door.
  • a video camera installation such as that shown schematically in figures 1 and 2 as 112 may provide a view not only of the space in front of the front door, but also of the door.
  • the video camera installation 112 includes, or has an associated, presence and/or motion detector 114, such as a PIR or other thermal sensor, with the camera 112 typically only being turned on when the sensor detects movement and/or a presence within its field of view. It is also possible to make use of a different form of video camera installation, such as a surveillance camera installation.
  • a surveillance camera installation does not require a movement/presence sensor, rather when the surveillance camera is activated it may continuously monitor the area under surveillance, typically streaming images continuously or every few seconds to a monitoring location.
  • a surveillance camera may also operate under the control of a security installation or security monitoring system according to embodiments and an aspect of the disclosure, the controller 208 of the security monitoring system transmitting a signal to cause the surveillance camera to capture images and transmit the captured images to the controller 208, and to forward the captured images for checking remotely, e.g. at the central monitoring station 210 or at a user device 220.
  • FIG. 3 shows schematically an access device 106 in accordance with embodiments.
  • the access device 106 includes an audio recording device 150 that, at least in part, may be used by a person for authentication thereof.
  • the access device 106 also includes at least one memory 152 and at least one processor 154 that may optionally be integrated together.
  • the at least one memory may store instructions or computer program code that, upon execution by the at least one processor 154, enables the access device 106 to perform authentication of a person and give access to the person for actuating one or more devices.
  • the access device 106 includes in some embodiments, one or more of: at least one access control security device 156, and a proximity detection device 158.
  • the at least one access control security device 156 may produce security data also necessary for authentication of the person, and the at least one device 156 may comprise, for example, one or more of: a face recognition device, a fingerprint recognition device, a tag recognition device, and a keypad.
  • the proximity detection device 158 may comprise, for example, one or more of: a presence detector and an image recording device.
  • the image recording device may be a video camera.
  • the access device is a doorbell and the proximity detection device 158 includes the video camera, the doorbell is a video doorbell as previously described.
  • no access control security device 156 or proximity detection device 158 is provided or, alternatively, any one of these devices 156, 158 is part of a security installation and is/are communicatively coupled with the access device 106.
  • Figure 4 shows schematically a method 400 in accordance with embodiments.
  • An access device according to the present disclosure e.g. the access device 106 as described with reference to figure 4, may be configured to carry out the method too, either alone or in combination with at least one access privilege management device.
  • steps shown with dashed blocks take place in some embodiments only, particularly one, some or all steps of the dashed blocks can take place in different embodiments.
  • the method 400 includes, in some embodiments, a step whereby an access device processes 402 speech of a person recorded by an audio recording device of the access device to: set up one or more codewords within the speech as a predetermined model associated with the person, the predetermined model at least including the one or more codewords and a pronunciation of the one or more codewords; and/or provide biometric voice data upon processing the detected speech with biometrical voice modelling to set up the predetermined biometric voice data associated with the person.
  • biometric voice data By setting up the codeword(s) and/or the biometric voice data, which is/are stored in e.g. at least one memory of the access device or in a storage device remote therefrom by communicatively coupled with the access device, said codeword(s) and/or data will be subsequently used for authentication of the person.
  • the method 400 also includes, in some embodiments, a step whereby the access device records 404 speech of a person with an audio recording device of an access device. The recorded speech may then be used for authentication of the person.
  • the method 400 also includes, in some embodiments, a step whereby the access device processes 406 input data of at least one access control security device (e.g. the access control security device 156 described in relation to the access device of figure 3) to determine whether the input data matches or cooperates with predetermined securing data.
  • the predetermined securing data is associated with the person of a set of one or more authorised people and/or associated with the at least one access control security device.
  • the cooperation may consist in cooperation such as that of e.g. private and public keys to name an example.
  • the method 400 also includes a step whereby the access device processes 408 recorded first speech of the person.
  • the processing 408 is such that the access device detects one or more codewords within the first speech, and determines whether the one or more detected codewords have been pronounced by a person of a set of one or more authorised people by comparing the one or more detected codewords with a predetermined model associated with the person that is stored in at least one memory of the access device or remote therefrom but communicatively coupled with the access device. Additionally or alternatively, the processing 408 is such that the access device determines whether the detected first speech has been pronounced by a person of the set of one or more authorised people by providing biometric voice data upon processing the detected first speech with biometric voice modelling and comparing the biometric voice data with predetermined biometric voice data associated with the person. The predetermined biometric voice data is stored in at least one memory of the access device or remote therefrom but communicatively coupled with the access device.
  • the recording 404 of the first speech, or the processing 408 of the first speech takes place when: a proximity detection device turns on or indicates presence of a target; and/or the access device processes data registered by the proximity detection device and determines that a target is at a distance from the doorbell less than a predetermined distance.
  • the access device may thus save energy and even increase the security thereof by not recording or processing speech unless a target such as a person is first close to the access device.
  • the method 400 also includes a step whereby the access device generates 410 an authentication token associated with the person at least based on the determination that the first speech of the person has been pronounced by a person of the set of one or more authorised people according to the processing 408.
  • the generation of the authentication token is further based on the determination that the input data matches or cooperates with the predetermined securing data according to the processing 406; that is to say, the authentication is multi-factor for additional layers of security.
  • the generation of the authentication token is only based on the determination that the first speech of the person has been pronounced by a person of the set of one or more authorised people according to the processing 408, namely, the authentication is single factor and based on voice authentication.
  • the method 400 also includes, in some embodiments, a step whereby the access device transmits 412 the authentication token to at least one access privilege management device.
  • the access device transmits 412 the authentication token to at least one access privilege management device.
  • the method 400 also includes, in some embodiments, a step whereby the at least one access privilege management device processes 414 the authentication token considering a database of the at least one access privilege management device that at least relates authentication tokens to one or more allowed actions per authentication token.
  • the processing 414 is such that the at least one access privilege management device retrieves the one or more allowed actions, if any, for the authentication token transmitted 412 by the access device.
  • the one or more allowed actions may be for operating one or more devices.
  • the method 400 also includes, in some embodiments, a step whereby the access device receives 416, from the at least one access privilege management device, the one or more allowed actions for the person associated with the authentication token.
  • the access device does not have the capacity of providing access privileges and simply relies on the access privileges as registered and managed by the at least one access privilege management device. Hence, any user getting access to the access device, cannot alter the access privileges of any user.
  • the method 400 also includes, in some embodiments, a step whereby the access device enables 418 the received one or more allowed actions.
  • the authenticated person thus gets the corresponding access privileges.
  • the access device may inform the user accordingly.
  • the method 400 also includes, in some embodiments, a step whereby the access device processes 420 the first speech and/or second speech of a person recorded by the audio recording device to detect one or more commands therein, and/or user input recorded by a user input device, and/or user input received by the access device.
  • the access device may present the user the allowed action(s) or request an action from the user, for example via a user presenting device including a screen, loudspeakers, etc.
  • the operation of the access device may be hands-free.
  • the user might likewise provide commands for instance through a mobile device that then transmits the commands to the access device, or provide commands by way of a user input device like e.g. a keypad.
  • the method 400 also includes, in some embodiments, a step whereby the access device executes 422 the one or more commands or transmits the one or more commands to at least one device associated with the one or more commands when the one or more commands are comprised in the one or more allowed actions.
  • the method 400 also includes, in some embodiments, a step whereby the access device disables 424 one or more of the received one or more allowed actions when: a proximity detection device turns off or indicates no presence of a target; and/or the at least one processor processes data registered by the proximity detection device and determines that no target is at a distance from the doorbell less than a predetermined distance; and/or one of the one or more allowed actions has been commanded; and/or a timer starting from the enablement of the received one or more allowed actions has exceeded a predetermined time threshold; and/or further speech of a person is recorded by the audio recording device and: o upon repeating the step of processing the speech with the further speech, no authentication token is generated; or o upon repeating the steps of processing the speech with the further speech, generating the authentication token associated with the person of the further speech, transmitting the authentication token associated with the person of the further speech, and receiving one or more allowed actions for the person of the further speech, the one or more actions to be disabled are not within the received one or more allowed actions
  • the access device may change the enabled commands by continuously or intermittently checking whether the user is still authenticated and present, or if the user might have walked away and, thus, the access privileges shall not apply anymore until the user authenticates again, or a different user authenticates and the respective access privileges are retrieved.
  • the access device may be configured to inform the user about recording the voice thereof, processing the voice to obtain biometric voice data, the necessity of user consent to proceed, etc. depending on possible user privacy requirements that there may be in place.
  • FIG. 5 shows schematically an architecture in which a security installation or security monitoring system, shown generally as 500, is coupled to a video entry arrangement 510, an electrically controlled lock, such as the lock 104 of figures 1 and 2, and a remote monitoring station 210.
  • the security monitoring system 500 includes a security monitoring system controller 208, together with a collection of various sensors 520, including an external video camera 112, an internal video camera 214, a closure status sensor 206 for the closure (e.g. door 102) which is locked by electrically controlled lock 104, and an admittance zone sensor 216 - an example of which is the motion sensor 216 shown in figure 2, but more generally this is a sensor of any form to detect presence within a zone to which a visitor such as a delivery person, or the like, may be admitted.
  • a security monitoring system controller 208 together with a collection of various sensors 520, including an external video camera 112, an internal video camera 214, a closure status sensor 206 for the closure (e.g. door 102) which is locked by electrically
  • FIG. 6 is a schematic block diagram of a video entry arrangement 510, such as that shown in figure 5.
  • the video entry arrangement 510 may take the form of an access device like a video doorbell.
  • the video entry arrangement 510 includes a video entry arrangement controller, 600, including a processor 602, and a memory 604, which controls operation of the video entry arrangement - in necessary in association with the central unit 208 (if present) and/or the central monitoring station 210 if present and contactable.
  • An RF transceiver 606 is provided for communication with the central unit 208 (if present), and/or the central monitoring station 210, and optionally with other nodes of the security monitoring system (for example an electronic door lock if fitted).
  • the video entry arrangement 510 also preferably includes a power supply unit which may be mains powered, or D.C. powered from an external source (which itself may be mains powered), and which preferably includes at least battery backup but may be only battery powered. Also provided are an audio interface 610, preferably comprising both an input device 612, and an output device 614, a video camera, 620, and an actuator, or bell push, 630, all of which are operatively coupled to the controller 600.
  • a power supply unit which may be mains powered, or D.C. powered from an external source (which itself may be mains powered), and which preferably includes at least battery backup but may be only battery powered.
  • an audio interface 610 preferably comprising both an input device 612, and an output device 614, a video camera, 620, and an actuator, or bell push, 630, all of which are operatively coupled to the controller 600.

Abstract

An access device comprising: an audio recording device; at least one memory; and at least one processor. The access device is configured, by way of the at least one memory and the at least one processor, to cause the access device to: process recorded first speech of a person to determine if said person is among a set of one or more authorised people; and generate an authentication token associated with the person at least when the determination is positive.

Description

Security installations and methods
Technical field
The present disclosure relates to access devices and security installations to secure devices or at least part of a perimeter of premises, and to methods performed by the access devices and controllers of the security installations.
Background
Security installations that are or include security monitoring systems for monitoring premises, often referred to as alarm systems, typically provide a means for detecting the presence and/or actions of people at the premises, and reacting to detected events. Commonly such systems include sensors to detect the opening and closing of doors and windows to provide a secure perimeter to the premises, creating one or more protected interior spaces, movement detectors to monitor spaces (both within and outside buildings) for signs of movement, microphones to detect sounds such as breaking glass, and image sensors to capture still or moving images of monitored zones. Such systems may be self-contained, with alarm indicators such as sirens and flashing lights that may be activated in the event of an alarm condition being detected. Such installations typically include a control unit (which may also be termed a central unit), generally mains powered, that is coupled to the sensors, detectors, cameras, etc. (“nodes”), and which processes received notifications and determines a response. The central unit may be linked to the various nodes by wires, but increasingly is instead linked wirelessly, rather than by wires, since this facilitates installation and may also provide some safeguards against sensors/detectors effectively being disabled by disconnecting them from the central unit. Similarly, for ease of installation and to improve security, the nodes of such systems typically include an autonomous power source, such as a battery power supply, rather than being mains powered. In addition, these monitoring systems shall not activate any alarms when the person or people performing some action are authorised to do so, and the systems shall allow the person or people to actually perform such action or actions.
As an alternative to self-contained systems, a security monitoring system may include an installation at a premises, domestic or commercial, that is linked to a remote Central Monitoring Station (CMS) where, typically, human operators the responses required by different alarm and notification types. In such centrally monitored systems, the central unit at the premises installation typically processes notifications received from the nodes in the installation, and notifies the Central Monitoring Station of only some of these, depending upon the settings of the system and the nature of the detected events. In such a configuration, the central unit at the installation is effectively acting as a gateway between the nodes and the Central Monitoring Station. Again, in such installations the central unit may be linked by wires, or wirelessly, to the various nodes of the installation, and these nodes will typically be battery rather than mains powered.
Such security monitoring systems contribute to the safety and wellbeing of occupants of the protected premises not only by safeguarding articles within the protected perimeter - which may of course not simply be limited to a house or dwelling, but may also extend to the grounds of the house, protected by a boundary fence and gate, for example -, but also by allowing or not allowing certain actions depending on the person or people taking them.
The present disclosure seeks to provide enhanced security access devices, security and monitoring systems, methods and other implementations that improve the scope of security access devices and systems to address aspects of the problem of authenticating a person trying to have access to certain functions or tasks that are behind a security system.
Summary
According to a first aspect, there is provided an access device for giving or not giving access to a person to certain functions or tasks, thereby securing access to one or more devices or premises.
The access device includes: an audio recording device; at least one memory; and at least one processor, which may optionally be integrated together. The access device may be, for example but without limitation, a doorbell, a video doorbell, an alarm controller, a lock or door controller, etc.
As used herein the terms “doorbell” and “video doorbell” include any device that provides respective functionality, whether or not the device also provides additional functionality, for example, access device functionality for a security system and/or detector functionality for a security system.
The access device is configured, by way of the at least one memory and the at least one processor, to cause the access device to: process recorded first speech of a person to determine if said person is among a set of one or more authorised people; generate an authentication token associated with the person at least when the determination is positive.
Optionally, the access device is further configured to do one or more of transmit the authentication token to at least one access privilege management device; receive one or more allowed actions from the at least one access privilege management device; and enable the received one or more allowed actions.
The access device, which may be arranged e.g. on a wall of a building, adjacent to a door, etc., attempts to authenticate users at least by means of their voice, which may enable hands-free operation of the access device. The authentication may rely, for example, on codewords and how they are pronounced by the user so that the determination of whether the user is in a list of authorised users, or biometric voice data resulting from the processing of the first speech with biometric voice modelling matches with predetermined biometric voice data of an authorised user.
Some exemplary possible actions are arming at least one alarm device, disarming the at least one alarm device, locking at least one door and/or window, unlocking at least one door and/or window, etc. It will be noted that other actions are possible within the scope of the present disclosure.
According to a second aspect, there is provided a building comprising one or more doorbells as described in the first aspect.
According to a third aspect, there is provided a security installation or a security system for securing one or more devices or at least part of a perimeter of premises. The installation or system includes at least one access device as described in the first aspect. The installation or system also includes at least one security device communicatively coupled with the at least one doorbell and/or a proximity detection device communicatively coupled with the at least one doorbell and/or at least one access privilege management device communicatively coupled with each of the at least one access device. The at least one access privilege management device includes a database at least relating authentication tokens to one or more allowed actions per authentication token.
According to a fourth aspect, there is provided a (e.g. automated) method that enables authentication of users for gaining access to certain functions or tasks if the users have the corresponding access privileges, namely allowed actions. The method may be carried out on an access device, optionally an access device of a preceding aspect.
The method includes: recording first speech of a person with an audio recording device of an access device; the access device processes the recorded first speech to determine if said person is among a set of one or more authorised people, generates an authentication token when the determination is positive.
The method may further include transmitting the authentication token to at least one access privilege management device. The method may further optionally include receiving one or more allowed actions from the at least one access privilege management device, and enabling the received one or more allowed actions.
According to a fifth aspect, there is provided a data processing device or system comprising means for carrying out a method as described in the fourth aspect. The processing device or system can be an access device that is, for example but without limitation, a doorbell, a video doorbell, an alarm controller, a lock or door controller, etc.
According to a sixth aspect, there is provided a computer program product including instructions which, when the program is executed by a data processing device, including an access device, cause the data processing device to carry out a method as described in the fourth aspect.
The computer program may be embodied in a non-transitory computer-readable storage medium or a data carrier signal.
Description of Figures
Examples of the disclosure will now be described, by way of example only, with reference to the accompanying drawings, in which:
Figure 1 is a schematic drawing showing a front elevation of a stylised building with an external space which is secured with an access device and/or a security installation according to some embodiments.
Figure 2 is a schematic part plan view of premises protected by an access device and/or a security installation according to some embodiments, together with other elements of the installation.
Figure 3 shows schematically an access device 106 in accordance with embodiments.
Figure 4 shows schematically a method in accordance with embodiments. Figure 5 shows schematically an architecture including a security installation, a video entry arrangement, and an electrically controlled lock.
Figure 6 is a schematic block diagram of a video entry arrangement.
Detailed description
Figure 1 shows a view of the front of a premises 100 protected by an access device and/or a security installation according to some aspects and embodiments. The premises, here in the form of a house, have an exterior door, here front door, 102. The door gives access to a protected interior space. The security monitoring system secures at least part of a perimeter to the premises 100, and the door constitutes an exterior closure 102 in the secure perimeter giving access to a protected interior space 200 of the premises. A lock 104 on the exterior door is optionally electrically controlled so that it can be locked and unlocked remotely.
To the side of the door, on the facade of the house, is an access device 106 in the form of a video doorbell including a first video camera which looks out from the facade of the premises so that anyone approaching the door along the path 108 can be seen, and in particular when a visitor stands at the door their face should clearly be visible. The video doorbell includes an actuator, e.g. a push button, for a visitor to indicate their presence at the closure. The video doorbell also includes an audio interface to enable bidirectional audio communication with a visitor at the closure 102.
As is conventional, the video doorbell preferably includes an infrared light source to illuminate whatever is in front of the video doorbell. Optionally, as shown, the facade of the house also carries an external keypad 110 by means of which a user may additionally introduce a passcode that might also be required by the access device to authenticate the user, for instance for the user to be able to unlock the lock 104. The keypad 110 could likewise be part of the access device 106, in this case the video doorbell. Also shown is an optional second video camera 112 which is coupled to a presence and/or movement detector 114. The detector may optionally be a thermal detector, for example a PIR sensor. The second video camera 112 may be arranged when the security system is armed, to capture video of the front of the house and the private area, e.g. the garden, in front of the house and signal an alarm event to a controller of the security monitoring system. As with the doorbell camera, the second video camera is preferably provided with an audio interface 116 to enable bidirectional audio communication with anyone observed by the second video camera. Although the first video camera is illustrated in the form of a video doorbell, the first video camera may additionally or alternatively have the features described above for the second video camera, whether or not plural video cameras are used.
Figure 2 is a schematic part plan view of a premises 100 protected by an access device and/or a security installation according to some aspects and embodiments, together with other elements of the installation, corresponding generally to the premises of figure 1. The front door 102, with electrically controlled lock 104, leads into the protected interior space 200 of the premises. Each of the windows 202, and the rear door 204 is fitted with a sensor 206 to detect when they are opened. Each of the sensors 206 includes a radio transceiver to report events to a controller, or central unit, 208 of a security monitoring system. If one of the sensors 206 is triggered when the system is armed, a signal is sent to the central unit 208 which in turn may signal an alarm event to a remote central monitoring station 210. The central unit 208 is connected to the remote central monitoring station 210 via the Internet 212, either via a wired or a wireless connection. Also wirelessly coupled to the central unit 208 may be the access device 106, e.g. the video doorbell, the electrically controlled lock 104, and if present the second video camera 112, its associated presence and/or movement detector 114 (although the latter may be integral with the second video camera 112) and the audio interface 116. These items, and the sensors 206, are preferably coupled to the central unit 208 using transceivers operating in the industrial scientific and medical (ISM) bandwidths, for example a subgigahertz bandwidth such as 868 MHz, and the communications are encrypted preferably using shared secret keys. The security monitoring system may also include other sensors within the protected interior space, such as an interior video camera 214 and associated movement detector 216 (which again may be integral with the camera 214), and each of the interior doors 218 may also be provided with a sensor 206 to detect the opening/closing of the door.
Operation of the security monitoring system may be adjusted by a person having privileges for operating said system. To this end, at least one access privilege management device 250 that may be remote or within the premises but is generally at a safe location, has data indicative of what users are allowed to perform certain tasks, and which tasks those are, for example, disarm the security monitoring system, reconfigure the security monitoring system, arm the security monitoring system, or even other tasks not directly on the system, for example, locking and unlocking the lock 104. For that, the user may first be authenticated by the access device, which in turn checks the privileges that the user has once authenticated by communicating with the at least one access privilege management device 250.
The security monitoring system may also include an audio interface to enable audio communication with a visitor at the closure, the controller 208 being configured to enable the remote monitoring centre 210 to use the audio interface to speak to the visitor.
The security monitoring system preferably also includes a first video camera arranged to observe a space in front of the exterior of the closure, the controller 208 being configured to enable the remote monitoring centre 210 to use the first video camera to observe the visitor.
Conveniently, the first video camera may be a video doorbell, which is convenient both in terms of the location of the camera, and the co-location of the video and audio interfaces, along with the actuator, and in terms of the visual performance of the camera - as access devices 106 such as video doorbells are typically very well placed to capture images of people at the door. Conveniently, the access device 106 includes the audio interface, as this is likely to be well located from the point of view of performance, and it may also reduce installation complexity and time.
Preferably, the security monitoring system further includes a second video camera arranged to observe the protected interior space behind the closure, the controller being configured to enable the remote monitoring centre to use the second video camera to observe any visitor within the protected interior space.
Although use of a doorbell video camera for the purpose of observing the visitor, and the doorbell audio interface as a means to speak with a visitor at the door are preferred, it will be appreciated that the actuator, the external video source, and the external audio interface may all be provided in free-standing components to implement embodiments of the present disclosure. Thus, although it is preferred for the first video camera, if used, to be the video camera of a video doorbell, because of the generally ideal location of such a camera in terms of surveying the space in front of the front door 102, it is also possible to use a different video camera installation, such as that shown as 112, which also observes the space in front of the front door. Unlike most video doorbells, which typically do not show a view of the exterior face of the front door itself, a video camera installation such as that shown schematically in figures 1 and 2 as 112 may provide a view not only of the space in front of the front door, but also of the door. As previously described, the video camera installation 112 includes, or has an associated, presence and/or motion detector 114, such as a PIR or other thermal sensor, with the camera 112 typically only being turned on when the sensor detects movement and/or a presence within its field of view. It is also possible to make use of a different form of video camera installation, such as a surveillance camera installation. Typically, a surveillance camera installation does not require a movement/presence sensor, rather when the surveillance camera is activated it may continuously monitor the area under surveillance, typically streaming images continuously or every few seconds to a monitoring location. Such a surveillance camera may also operate under the control of a security installation or security monitoring system according to embodiments and an aspect of the disclosure, the controller 208 of the security monitoring system transmitting a signal to cause the surveillance camera to capture images and transmit the captured images to the controller 208, and to forward the captured images for checking remotely, e.g. at the central monitoring station 210 or at a user device 220.
Figure 3 shows schematically an access device 106 in accordance with embodiments.
The access device 106 includes an audio recording device 150 that, at least in part, may be used by a person for authentication thereof. The access device 106 also includes at least one memory 152 and at least one processor 154 that may optionally be integrated together. The at least one memory may store instructions or computer program code that, upon execution by the at least one processor 154, enables the access device 106 to perform authentication of a person and give access to the person for actuating one or more devices.
Further, as illustrated with dashed blocks, the access device 106 includes in some embodiments, one or more of: at least one access control security device 156, and a proximity detection device 158. The at least one access control security device 156 may produce security data also necessary for authentication of the person, and the at least one device 156 may comprise, for example, one or more of: a face recognition device, a fingerprint recognition device, a tag recognition device, and a keypad. The proximity detection device 158 may comprise, for example, one or more of: a presence detector and an image recording device. The image recording device may be a video camera. When the access device is a doorbell and the proximity detection device 158 includes the video camera, the doorbell is a video doorbell as previously described. In some embodiments, no access control security device 156 or proximity detection device 158 is provided or, alternatively, any one of these devices 156, 158 is part of a security installation and is/are communicatively coupled with the access device 106.
Figure 4 shows schematically a method 400 in accordance with embodiments. An access device according to the present disclosure, e.g. the access device 106 as described with reference to figure 4, may be configured to carry out the method too, either alone or in combination with at least one access privilege management device.
For the sake of clarity only, steps shown with dashed blocks take place in some embodiments only, particularly one, some or all steps of the dashed blocks can take place in different embodiments.
The method 400 includes, in some embodiments, a step whereby an access device processes 402 speech of a person recorded by an audio recording device of the access device to: set up one or more codewords within the speech as a predetermined model associated with the person, the predetermined model at least including the one or more codewords and a pronunciation of the one or more codewords; and/or provide biometric voice data upon processing the detected speech with biometrical voice modelling to set up the predetermined biometric voice data associated with the person. By setting up the codeword(s) and/or the biometric voice data, which is/are stored in e.g. at least one memory of the access device or in a storage device remote therefrom by communicatively coupled with the access device, said codeword(s) and/or data will be subsequently used for authentication of the person.
The method 400 also includes, in some embodiments, a step whereby the access device records 404 speech of a person with an audio recording device of an access device. The recorded speech may then be used for authentication of the person.
The method 400 also includes, in some embodiments, a step whereby the access device processes 406 input data of at least one access control security device (e.g. the access control security device 156 described in relation to the access device of figure 3) to determine whether the input data matches or cooperates with predetermined securing data. The predetermined securing data is associated with the person of a set of one or more authorised people and/or associated with the at least one access control security device. The cooperation may consist in cooperation such as that of e.g. private and public keys to name an example. The method 400 also includes a step whereby the access device processes 408 recorded first speech of the person. The processing 408 is such that the access device detects one or more codewords within the first speech, and determines whether the one or more detected codewords have been pronounced by a person of a set of one or more authorised people by comparing the one or more detected codewords with a predetermined model associated with the person that is stored in at least one memory of the access device or remote therefrom but communicatively coupled with the access device. Additionally or alternatively, the processing 408 is such that the access device determines whether the detected first speech has been pronounced by a person of the set of one or more authorised people by providing biometric voice data upon processing the detected first speech with biometric voice modelling and comparing the biometric voice data with predetermined biometric voice data associated with the person. The predetermined biometric voice data is stored in at least one memory of the access device or remote therefrom but communicatively coupled with the access device.
In some embodiments, the recording 404 of the first speech, or the processing 408 of the first speech takes place when: a proximity detection device turns on or indicates presence of a target; and/or the access device processes data registered by the proximity detection device and determines that a target is at a distance from the doorbell less than a predetermined distance. The access device may thus save energy and even increase the security thereof by not recording or processing speech unless a target such as a person is first close to the access device.
The method 400 also includes a step whereby the access device generates 410 an authentication token associated with the person at least based on the determination that the first speech of the person has been pronounced by a person of the set of one or more authorised people according to the processing 408. In those embodiments in which the processing 406 is also conducted, the generation of the authentication token is further based on the determination that the input data matches or cooperates with the predetermined securing data according to the processing 406; that is to say, the authentication is multi-factor for additional layers of security. In some embodiments, the generation of the authentication token is only based on the determination that the first speech of the person has been pronounced by a person of the set of one or more authorised people according to the processing 408, namely, the authentication is single factor and based on voice authentication. The method 400 also includes, in some embodiments, a step whereby the access device transmits 412 the authentication token to at least one access privilege management device. By decoupling authentication from access privileges, the security installation is less prone to hacking attacks owing to which some user may gain access privileges that the user does not have. Further, by performing the authentication at the access device and, hence, not transmitting 412 e.g. voice data, securing data, etc. but just authentication tokens, users sniffing the communications between the access device and the at least one access privilege management device cannot get access to such sensitive data. Additionally, there are many privacy concerns and legislation that forbids the transmission of data that might identify individuals, for instance their voice, therefore this problem is also overcome by transmitting the authentication token generated at the access device.
The method 400 also includes, in some embodiments, a step whereby the at least one access privilege management device processes 414 the authentication token considering a database of the at least one access privilege management device that at least relates authentication tokens to one or more allowed actions per authentication token. Thus, the processing 414 is such that the at least one access privilege management device retrieves the one or more allowed actions, if any, for the authentication token transmitted 412 by the access device. The one or more allowed actions may be for operating one or more devices.
The method 400 also includes, in some embodiments, a step whereby the access device receives 416, from the at least one access privilege management device, the one or more allowed actions for the person associated with the authentication token. The access device does not have the capacity of providing access privileges and simply relies on the access privileges as registered and managed by the at least one access privilege management device. Hence, any user getting access to the access device, cannot alter the access privileges of any user.
The method 400 also includes, in some embodiments, a step whereby the access device enables 418 the received one or more allowed actions. The authenticated person thus gets the corresponding access privileges. The access device may inform the user accordingly.
The method 400 also includes, in some embodiments, a step whereby the access device processes 420 the first speech and/or second speech of a person recorded by the audio recording device to detect one or more commands therein, and/or user input recorded by a user input device, and/or user input received by the access device. Once the one or more allowed actions are enabled, the access device may present the user the allowed action(s) or request an action from the user, for example via a user presenting device including a screen, loudspeakers, etc. By providing commands in the form of speech, the operation of the access device may be hands-free. The user might likewise provide commands for instance through a mobile device that then transmits the commands to the access device, or provide commands by way of a user input device like e.g. a keypad.
The method 400 also includes, in some embodiments, a step whereby the access device executes 422 the one or more commands or transmits the one or more commands to at least one device associated with the one or more commands when the one or more commands are comprised in the one or more allowed actions.
The method 400 also includes, in some embodiments, a step whereby the access device disables 424 one or more of the received one or more allowed actions when: a proximity detection device turns off or indicates no presence of a target; and/or the at least one processor processes data registered by the proximity detection device and determines that no target is at a distance from the doorbell less than a predetermined distance; and/or one of the one or more allowed actions has been commanded; and/or a timer starting from the enablement of the received one or more allowed actions has exceeded a predetermined time threshold; and/or further speech of a person is recorded by the audio recording device and: o upon repeating the step of processing the speech with the further speech, no authentication token is generated; or o upon repeating the steps of processing the speech with the further speech, generating the authentication token associated with the person of the further speech, transmitting the authentication token associated with the person of the further speech, and receiving one or more allowed actions for the person of the further speech, the one or more actions to be disabled are not within the received one or more allowed actions for the person of the further speech.
The access device may change the enabled commands by continuously or intermittently checking whether the user is still authenticated and present, or if the user might have walked away and, thus, the access privileges shall not apply anymore until the user authenticates again, or a different user authenticates and the respective access privileges are retrieved.
Finally, the access device may be configured to inform the user about recording the voice thereof, processing the voice to obtain biometric voice data, the necessity of user consent to proceed, etc. depending on possible user privacy requirements that there may be in place.
Figure 5 shows schematically an architecture in which a security installation or security monitoring system, shown generally as 500, is coupled to a video entry arrangement 510, an electrically controlled lock, such as the lock 104 of figures 1 and 2, and a remote monitoring station 210. The security monitoring system 500 includes a security monitoring system controller 208, together with a collection of various sensors 520, including an external video camera 112, an internal video camera 214, a closure status sensor 206 for the closure (e.g. door 102) which is locked by electrically controlled lock 104, and an admittance zone sensor 216 - an example of which is the motion sensor 216 shown in figure 2, but more generally this is a sensor of any form to detect presence within a zone to which a visitor such as a delivery person, or the like, may be admitted.
Figure 6 is a schematic block diagram of a video entry arrangement 510, such as that shown in figure 5. Conveniently, the video entry arrangement 510 may take the form of an access device like a video doorbell. The video entry arrangement 510 includes a video entry arrangement controller, 600, including a processor 602, and a memory 604, which controls operation of the video entry arrangement - in necessary in association with the central unit 208 (if present) and/or the central monitoring station 210 if present and contactable. An RF transceiver 606 is provided for communication with the central unit 208 (if present), and/or the central monitoring station 210, and optionally with other nodes of the security monitoring system (for example an electronic door lock if fitted). The video entry arrangement 510 also preferably includes a power supply unit which may be mains powered, or D.C. powered from an external source (which itself may be mains powered), and which preferably includes at least battery backup but may be only battery powered. Also provided are an audio interface 610, preferably comprising both an input device 612, and an output device 614, a video camera, 620, and an actuator, or bell push, 630, all of which are operatively coupled to the controller 600.

Claims

Claims
1. A doorbell comprising: an audio recording device; at least one memory; and at least one processor; the at least one memory being configured, with the at least one processor, to cause the doorbell to: process first speech of a person recorded by the audio recording device to: detect one or more codewords within the first speech, and determine whether the one or more detected codewords have been pronounced by a person of a set of one or more authorised people by comparing the one or more detected codewords with a predetermined model associated with the person; and/or determine whether the detected first speech has been pronounced by a person of the set of one or more authorised people by providing biometric voice data upon processing the detected first speech with biometric voice modelling and comparing the biometric voice data with predetermined biometric voice data associated with the person; generate an authentication token associated with the person at least based on the determination that the first speech of the person has been pronounced by a person of the set of one or more authorised people.
2. The doorbell of claim 1 , wherein the at least one memory is further configured, with the at least one processor, to cause the doorbell to process input data of at least one access control security device to determine whether the input data matches or cooperates with predetermined securing data, wherein the predetermined securing data is associated with the person of a set of one or more authorised people and/or associated with the at least one access control security device; wherein the generation of the authentication token is further based on the determination that the input data matches or cooperates with the predetermined securing data.
3. The doorbell of claim 2, wherein the doorbell comprises or is communicatively coupled with the at least one access control security device; and wherein the at least one access control security device optionally comprises one or more of: a face recognition device, a fingerprint recognition device, a tag recognition device, and a keypad.
4. The doorbell of claim 1, wherein the generation of the authentication token is only based on the determination that the first speech of the person has been pronounced by a person of the set of one or more authorised people.
5. The doorbell of any one of the preceding claims, wherein the at least one memory is further configured, with the at least one processor, to cause the doorbell to transmit the authentication token to at least one access privilege management device.
6. The doorbell of claim 5, wherein the at least one memory is further configured, with the at least one processor, to cause the doorbell to: receive from the at least one access privilege management device one or more allowed actions for the person associated with the authentication token; and enable the received one or more allowed actions.
7. The doorbell of any one of the preceding claims, wherein the at least one memory is further configured, with the at least one processor, to cause the doorbell to disable one or more of the received one or more allowed actions when: one of the one or more allowed actions has been commanded; and/or a timer starting from the enablement of the received one or more allowed actions has exceeded a predetermined time threshold; and/or further speech of a person is recorded by the audio recording device and: upon repeating the process speech task with the further speech, no authentication token is generated; or upon repeating the process speech task with the further speech, generating the authentication token associated with the person of the further speech, transmitting the authentication token associated with the person of the further speech, and receiving one or more allowed actions for the person of the further speech, the one or more actions to be disabled are not within the received one or more allowed actions for the person of the further speech.
8. The doorbell of any one of the preceding claims, wherein the at least one memory is further configured, with the at least one processor, to cause the doorbell to: process the first speech, and/or second speech of a person recorded by the audio recording device to detect one or more commands therein; and execute the one or more commands or transmit the one or more commands to at least one device associated with the one or more commands when the one or more commands are comprised in the one or more allowed actions.
9. The doorbell of any one of the preceding claims, wherein the at least one memory is further configured, with the at least one processor, to cause the doorbell to process speech of a person recorded by the audio recording device to: set up one or more codewords within the speech as a predetermined model associated with the person, the predetermined model at least including the one or more codewords and a pronunciation of the one or more codewords; and/or provide biometric voice data upon processing the detected speech with biometrical voice modelling to set up the predetermined biometric voice data associated with the person.
10. The doorbell of any one of the preceding claims, wherein the at least one memory is further configured, with the at least one processor, to cause the doorbell to start recording the first speech with the audio recording device or start processing the first speech recorded by the audio recording device when: a proximity detection device turns on or indicates presence of a target; and/or the at least one processor processes data registered by the proximity detection device and determines that a target is at a distance from the doorbell less than a predetermined distance.
11. The doorbell of any one of the preceding claims, wherein the at least one memory is further configured, with the at least one processor, to cause the doorbell to disable one or more of the received one or more allowed actions when: a proximity detection device turns off or indicates no presence of a target; and/or the at least one processor processes data registered by the proximity detection device and determines that no target is at a distance from the doorbell less than a predetermined distance.
12. The doorbell of any one of claims 10-11, wherein the doorbell comprises or is communicatively coupled with the proximity detection device; and wherein the proximity detection device optionally comprises one or more of: a presence detector and an image recording device.
13. The doorbell of any one of the preceding claims, wherein the one or more allowed actions comprise one or more of: arming at least one alarm device, disarming the at least one alarm device, locking at least one door and/or window, and unlocking at least one door and/or window.
14. A security installation comprising: at least one doorbell of any one of the preceding claims; and one or more of: at least one access control security device, a proximity detection device, and/or at least one access privilege management device;
15. The security installation of claim 14, wherein the security installation at least comprises the at least one access privilege management device.
16. The security installation of claim 15, wherein the at least one access privilege management device is communicatively coupled with each of the at least one doorbell, wherein the at least one access privilege management comprises a database at least relating authentication tokens to one or more allowed actions per authentication token.
17. The security installation of any one of claims 14-16, further comprising a building, wherein each of the at least one doorbell is arranged on a wall of the building.
18. An automated method comprising: recording first speech of a person with an audio recording device of a doorbell; processing, by the doorbell, the recorded first speech to: detect one or more codewords within the first speech, and determine whether the one or more detected codewords have been pronounced by a person of a set of one or more authorised people by comparing the one or more detected codewords with a predetermined model associated with the person; and/or determine whether the detected first speech has been pronounced by a person of the set of one or more authorised people by providing biometric voice data upon processing the detected first speech with biometric voice modelling and comparing the biometric voice data with predetermined biometric voice data associated with the person; generating, by the doorbell, an authentication token associated with the person at least based on the determination that the first speech of the person has been pronounced by a person of the set of one or more authorised people.
19. The method of claim 18, further comprising processing input data of at least one access control security device to determine whether the input data matches or cooperates with predetermined securing data, wherein the predetermined securing data is associated with the person of a set of one or more authorised people and/or associated with the at least one access control security device; wherein the step of generating the authentication token is further based on the determination that the input data matches or cooperates with the predetermined securing data.
20. The method of claim 18 or 19, further comprising: transmitting, by the doorbell to at least one access privilege management device, the authentication token.
21. The method of claim 20, further comprising: receiving, by the doorbell from the at least one access privilege management device, one or more allowed actions for the person associated with the authentication token; and enabling, by the doorbell, the received one or more allowed actions.
PCT/EP2022/087985 2022-09-29 2022-12-29 Security installations and methods WO2024068032A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
EP22382899.7 2022-09-29
EP22382899 2022-09-29

Publications (1)

Publication Number Publication Date
WO2024068032A1 true WO2024068032A1 (en) 2024-04-04

Family

ID=83689615

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/EP2022/087985 WO2024068032A1 (en) 2022-09-29 2022-12-29 Security installations and methods

Country Status (1)

Country Link
WO (1) WO2024068032A1 (en)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20180096690A1 (en) * 2016-10-03 2018-04-05 Google Inc. Multi-User Personalization at a Voice Interface Device
US10750128B2 (en) * 2018-04-23 2020-08-18 Kuna Systems Corporation Wireless integration of security camera and door lock
US11238848B2 (en) * 2017-04-20 2022-02-01 Google Llc Multi-user authentication on a device

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20180096690A1 (en) * 2016-10-03 2018-04-05 Google Inc. Multi-User Personalization at a Voice Interface Device
US11238848B2 (en) * 2017-04-20 2022-02-01 Google Llc Multi-user authentication on a device
US10750128B2 (en) * 2018-04-23 2020-08-18 Kuna Systems Corporation Wireless integration of security camera and door lock

Similar Documents

Publication Publication Date Title
US10854067B1 (en) Connected door hinge
AU2018275266B2 (en) Control access utilizing video analytics
US7400242B2 (en) Exit arming delay security system and method
KR101676104B1 (en) Security System
EP2973463A1 (en) Methods for using an image capture device integrated at a building entry with an automation control panel, and systems and devices related thereto
KR100891010B1 (en) Smart digital doorlock system for home automation
Javare et al. Access control and intrusion detection in door lock system using Bluetooth technology
CN112352408A (en) Intruder detection method and device
IT201800005672A1 (en) SCALABLE BIOMETRIC ALARM SYSTEM WITH ARTIFICIAL INTELLIGENCE
US20200095800A1 (en) Apparatus and method for remote opening electronic door lock
WO2024068032A1 (en) Security installations and methods
JP2020530635A (en) Alarm device that distinguishes between legitimate residents and intruders
TWI729657B (en) Security system
US11283642B2 (en) Event management method and event management device
EP4038597A1 (en) A security monitoring system
WO2020096023A1 (en) Open/close device, security server, and security system
KR20150004569U (en) Security System
EP4150599A1 (en) Security monitoring systems and methods
TW202044204A (en) Event management and control method and event management and control apparatus being executed by the event management and event management and control apparatus
WO2024068031A1 (en) Method and apparatus for authentication in a security system
KR102469066B1 (en) Intrusion prevention system using door strike device
KR20190143514A (en) Security robot and security method for manage house with face recognition door lock
KR20190092793A (en) Smart crime prevention door and controlling of the same
CN108364428A (en) Intellectualized Video Monitoring safety and protection system
WO2022243359A1 (en) Security installations and methods