Login| Sign Up| Help| Contact|

Patent Searching and Data


Title:
SECURITY MONITORING SYSTEMS AND METHODS
Document Type and Number:
WIPO Patent Application WO/2022/243355
Kind Code:
A1
Abstract:
There is provided a security monitoring system to secure at least part of a perimeter to premises (100), the premises (100) including: an exterior closure (102) in the secure perimeter giving access to a protected interior space (200) of the premises; an external keypad (110) outside the secure perimeter for disarming the system; at least one monitoring device; and a controller (208) coupled to the external keypad (110), and the at least one monitoring device, the controller (208) being configured, when the system is armed, to: (i) respond to the inputting of a first access code at the external keypad by disarming the system; (ii) respond to the inputting of a second access code, signifying an event, at the external keypad by: notifying a remote monitoring centre (210) of the event, coupling the at least one monitoring device to the remote monitoring centre (210), and disarming the system. A corresponding method is also provided.

Inventors:
TORRES MONTERO PABLO (ES)
CARRACOSA PULIDO JUAN JOSE (ES)
AGUINAGA ACHUCARRO MAIDER PATRICIA (ES)
SERRANO CASTILLO ENCARNACION (ES)
URIEN AYALA ALVARO (ES)
SCHWARTZ SOLÉ RAFAEL JOSÉ (ES)
MORGAN RUSSELL GWYNFRYN (SE)
Application Number:
PCT/EP2022/063397
Publication Date:
November 24, 2022
Filing Date:
May 18, 2022
Export Citation:
Click for automatic bibliography generation   Help
Assignee:
VERISURE SARL (CH)
International Classes:
G08B25/00
Domestic Patent References:
WO2021064029A12021-04-08
Foreign References:
DE102010004762A12011-07-21
US20150221209A12015-08-06
US20190304274A12019-10-03
Attorney, Agent or Firm:
PRINZ & PARTNER MBB PATENT- UND RECHTSANWÄLTE (DE)
Download PDF:
Claims:
Claims

1. A security monitoring system to secure at least part of a perimeter to premises (100), the premises (100) including: an external keypad (110) installed outside the secure perimeter for disarming the system; at least one monitoring device; and a controller (208) coupled to the external keypad (110) and the at least one monitoring device, the controller (208) being configured, when the system is armed, to:

(i) respond to the inputting of a first access code at the external keypad by disarming the system;

(ii) respond to the inputting of a second access code, signifying an event, at the external keypad by: notifying a remote monitoring centre (210) of the event, coupling the at least one monitoring device to the remote monitoring centre (210), and disarming the system.

2. The security monitoring system of claim 1, wherein the at least one monitoring device comprises a two-way audio interface within the protected interior space of the premises.

3. The security monitoring system of claim 1 or claim 2, wherein the at least one monitoring device comprises at least one video camera.

4. The security monitoring system of claim 3, wherein the at least one video camera includes a first video camera (106, 112) configured to capture images including a region outside the secure perimeter.

5. The security monitoring system of claim 4, wherein the first video camera (106) is a doorbell camera.

6. The security monitoring system of claim 5, wherein the at least one monitoring device comprises an audio interface of the doorbell camera (106).

7. The security monitoring system of any one of claims 3 to 6, wherein the at least one video camera includes a second video camera (214) configured to capture images including a region within the secure perimeter.

8. The security monitoring system any one of claims 3 to 6, wherein the at least one video camera (106) is a motion-triggered video camera.

9. The security monitoring system of claim 8, wherein the controller is configured to respond to the inputting of the second access code by causing the motion-triggered video camera (106) to capture images even in the absence of a motion-trigger.

10. The security monitoring system of any one the preceding claims, further comprising an exterior closure (102) in the secure perimeter giving access to a protected interior space (200) of the premises, and an electrically controlled lock (104) for the exterior closure (102), the lock being coupled to the controller.

11. The security monitoring system of claim 10, wherein the controller (208) is configured to cause the unlocking of the electrically controlled lock, allowing access to the protected interior space (200) through the exterior closure, upon disarming the system.

12. The security monitoring system of any one the preceding claims, wherein the controller (208) is configured to send a disarm success indication to the external keypad upon disarming the system in both mode (i) and mode (ii).

13. The security monitoring system of any one the preceding claims, wherein the secure perimeter is provided by a fence or other enclosure about a dwelling, and the protected interior space is provided between the exterior of the dwelling and the enclosure.

14. The security monitoring system of claim 13, wherein a further secure perimeter is provided within the protected interior space, the further secure perimeter being provided by the structure of the dwelling, a further protected interior space being provided within the dwelling.

15. The security monitoring system of claim 14, wherein a further external keypad (110) is installed outside the further secure perimeter but within the protected interior space provided between the exterior of the dwelling and the enclosure for disarming the system, and optionally for unlocking an electrically controlled lock of an external door of the dwelling to gain access to the further protected interior space (200).

16. The security monitoring system of claim 15, wherein the controller is configured, in the event that the second access code is input at the external keypad outside the enclosure, to unlock both an electrically controlled lock (104) for the exterior closure (102) and an electrically controlled lock of the external door of the dwelling.

17. The security monitoring system of claim 15, wherein the controller is configured, in the event that the second access code is input at the external keypad outside the enclosure, to unlock only an electrically controlled lock (104) for the exterior closure (102) but not an electrically controlled lock of the external door of the dwelling.

18. A method performed by a controller (208) of a security monitoring system configured to secure at least part of a perimeter to premises (100), the premises (100) including: an external keypad (110) installed outside the secure perimeter for disarming the system; at least one monitoring device; and a controller (208) coupled to the external keypad (110) and the at least one monitoring device; the method comprising, when the system is armed:

(i) responding to the input of a first access code at the external keypad by disarming the system; or

(ii) responding to the inputting of a second access code, signifying an event, at the external keypad by: notifying a remote monitoring centre (210) of the event, coupling the at least one monitoring device to the remote monitoring centre (210), and disarming the system.

19. The method of claim 18, further comprising transmitting to the remote monitoring centre (210) audio captured by the at least one monitoring device within the protected interior space of the premises.

20. The method of claim 18 or claim 19 further comprising transmitting to the remote monitoring centre (210) images captured by at least one video camera.

21. The method of claim 20, wherein the images transmitted to the remote monitoring centre (210) include images including a region outside the secure perimeter.

22. The method of claim 20 or 21, further comprising capturing with a doorbell camera images that are transmitted to the remote monitoring centre (210).

23. The method of claim 22, further comprising capturing with an audio interface of the doorbell camera audio that is transmitted to the remote monitoring centre (210).

24. The method of any one of claims 20 to 23, further comprising capturing, with a video camera located within the protected interior space (200) of the premises, images that include a region within the secure perimeter.

25. The method of any one of claims 18 to 24, the premises having an exterior closure (102) in the secure perimeter giving access to a protected interior space (200) of the premises, and the method further comprising unlocking an electrically controlled lock for the exterior closure (102, allowing access to the protected interior space (200) through the exterior closure, upon disarming the system.

Description:
Security monitoring systems and methods

Technical field

The present invention relates to security monitoring systems to secure at least part of a perimeter to premises and to monitor premises, and to methods performed by the system and by controllers of the system.

Background

Security monitoring systems for monitoring premises, often referred to as alarm systems, typically provide a means for detecting the presence and/or actions of people at the premises, and reacting to detected events. Commonly such systems include sensors to detect the opening and closing of doors and windows to provide a secure perimeter to the premises, creating one or more protected interior spaces, movement detectors to monitor spaces (both within and outside buildings) for signs of movement, microphones to detect sounds such as breaking glass, and image sensors to capture still or moving images of monitored zones. Such systems may be self-contained, with alarm indicators such as sirens and flashing lights that may be activated in the event of an alarm condition being detected. Such installations typically include a control unit (which may also be termed a central unit), generally mains powered, that is coupled to the sensors, detectors, cameras, etc. (“nodes”), and which processes received notifications and determines a response. The central unit may be linked to the various nodes by wires, but increasingly is instead linked wirelessly, rather than by wires, since this facilitates installation and may also provide some safeguards against sensors/detectors effectively being disabled by disconnecting them from the central unit. Similarly, for ease of installation and to improve security, the nodes of such systems typically include an autonomous power source, such as a battery power supply, rather than being mains powered.

As an alternative to self-contained systems, a security monitoring system may include an installation at a premises, domestic or commercial, that is linked to a Central Monitoring Station (CMS) where, typically, human operators manage the responses required by different alarm and notification types. In such centrally monitored systems, the central unit at the premises installation typically processes notifications received from the nodes in the installation, and notifies the Central Monitoring Station of only some of these, depending upon the settings of the system and the nature of the detected events. In such a configuration, the central unit at the installation is effectively acting as a gateway between the nodes and the Central Monitoring Station. Again, in such installations the central unit may be linked by wires, or wirelessly, to the various nodes of the installation, and these nodes will typically be battery rather than mains powered.

Such security monitoring systems contribute to the safety and wellbeing of occupants of the protected premises, as well as safeguarding articles within the protected perimeter - which may of course not simply be limited to a house or dwelling, but may also extend to the grounds of the house, protected by a boundary fence and gate, for example.

Unfortunately, conventional security monitoring systems are not generally configured to protect against situations where an occupant of premises protected by a security monitoring system is, while admitting themselves to the premises, threatened or coerced into admitting to the premises a bad actor. Regrettably, this is a particular problem for women who live alone. It is sadly not unusual for a woman to discover that she is being followed on her way home, possibly by an ex-partner, possibly by a stranger. The woman then faces a difficult choice between trying to enter her home before her follower can get in, taking refuge with a neighbour or in a nearby commercial outlet. If she attempts to get into her home, her follower may manage to follow her through the door, into the home, before she can prevent it. Once in the home, the bad actor knows that his actions and movements will be unseen by anyone outside the home.

There therefore exists a need to improve the scope of security monitoring systems to address this problem.

Embodiments of the present invention seek to provide enhanced security monitoring systems, and corresponding methods and other implementations that improve the scope of security monitoring systems to address aspects of this problem, as well as providing new functionality and methods.

Summary of the invention

According to a first aspect, there is provided a security monitoring system to secure at least part of a perimeter to premises, the premises including: an external keypad installed outside the secure perimeter for disarming the system; at least one monitoring device; and a controller coupled to the external keypad, and the at least one monitoring device, the controller being configured, when the system is armed, to:

(i) respond to the inputting of a first access code at the external keypad by disarming the system;

(ii) respond to the inputting of a second access code, signifying an event, at the external keypad by: notifying a remote monitoring centre of the event, coupling the at least one monitoring device to the remote monitoring centre, and disarming the system. Preferably, the at least one monitoring device comprises a two-way audio interface within the protected interior space of the premises.

Preferably, the at least one monitoring device comprises at least one video camera.

Optionally, the at least one video camera includes a first video camera configured to capture images including a region outside the secure perimeter. Optionally, the first video camera is a doorbell camera. Optionally, the at least one monitoring device comprises an audio interface of the doorbell camera.

Optionally, the at least one video camera includes a second video camera configured to capture images including a region within the secure perimeter.

Optionally, the at least one video camera is a motion-triggered video camera. Optionally, the controller is configured to respond to the inputting of the second access code by causing the motion-triggered video camera to capture images even in the absence of a motion-trigger.

Optionally, the security monitoring system of the first aspect further comprises an exterior closure in the secure perimeter giving access to a protected interior space of the premises; and an electrically controlled lock for the exterior closure, the lock being coupled to the controller. Optionally the controller may be configured to cause the unlocking of the electrically controlled lock, allowing access to the protected interior space through the exterior closure, upon disarming the system.

Optionally, the controller is configured to send a disarm success indication to the external keypad upon disarming the system in both mode (i) and mode (ii).

Optionally, the secure perimeter is provided by a fence or other enclosure about a dwelling, and the protected interior space is provided between the exterior of the dwelling and the enclosure. Optionally, a further secure perimeter is provided within the protected interior space, the further secure perimeter being provided by the structure of the dwelling, a further protected interior space being provided within the dwelling. Optionally, a further external keypad is installed outside the further secure perimeter but within the protected interior space provided between the exterior of the dwelling and the enclosure for disarming the system, and optionally for unlocking an electrically controlled lock of an external door of the dwelling to gain access to the further protected interior space. Optionally, the controller is configured, in the event that the second access code is input at the external keypad outside the enclosure, to unlock both an electrically controlled lock for the exterior closure and an electrically controlled lock of the external door of the dwelling. The controller may be configured, in the event that the second access code is input at the external keypad outside the enclosure, to unlock only an electrically controlled lock for the exterior closure but not an electrically controlled lock of the external door of the dwelling.

According to a second aspect, there is provided a method performed by a controller of a security monitoring system configured to secure at least part of a perimeter to premises, the premises including: an external keypad installed outside the secure perimeter for disarming the system; at least one monitoring device; and a controller coupled to the external keypad and the at least one monitoring device,; the method comprising, when the system is armed:

(i) responding to the input of a first access code at the external keypad by disarming the system; or

(ii) responding to the inputting of a second access code, signifying an event, at the external keypad by: notifying a remote monitoring centre of the event, coupling the at least one monitoring device to the remote monitoring centre, and disarming the system.

Preferably, the method further comprises transmitting to the remote monitoring centre audio captured by the at least one monitoring device within the protected interior space of the premises. The method may further comprise transmitting to the remote monitoring centre images captured by at least one video camera. The images transmitted to the remote monitoring centre may include images including a region outside the secure perimeter. The method may further comprise capturing with a doorbell camera images that are transmitted to the remote monitoring centre.

The method may further comprise capturing with an audio interface of the doorbell camera audio that is transmitted to the remote monitoring centre.

The method may further comprise capturing, with a video camera located within the protected interior space of the premises, images that include a region within the secure perimeter.

The premises may have an exterior closure in the secure perimeter giving access to a protected interior space of the premises, and the method may further comprise unlocking an electrically controlled lock for the exterior closure, allowing access to the protected interior space through the exterior closure, upon disarming the system.

Description of Figures

Embodiments of the invention will now be described, by way of example only, with reference to the accompanying drawings, in which:

Figure l is a schematic drawing showing a front elevation of stylised building, and an external space, which are monitored by a security monitoring system according to an embodiment of the invention; Figure 2 is a schematic part plan view of premises protected by a security monitoring system, together with other elements of the system;

Figure 3 shows a timing diagram of a first mode of operation according to an aspect of the invention; and

Figure 4 shows a timing diagram of a second mode of operation according to an aspect of the invention.

Specific description

Figure 1 shows a view of the front of a premises 100 protected by a security monitoring system according to an aspect of the present invention. The premises, here in the form of a house, have an exterior door, here front door, 102. The door gives access to a protected interior space. The security monitoring system is operative to secure at least part of a perimeter to premises, optionally providing a secure perimeter to the premises 100, and the door constitutes an exterior closure 102 in the secure perimeter giving access to a protected interior space of the premises. A lock 104 on the exterior door may be electrically controlled so that it can be locked and unlocked remotely. To the side of the door, on the fa9ade of the house, a first video camera may be provided and may be in the form of a video doorbell 106. The video doorbell may look out from the fa9ade of the premises so that anyone approaching the door along the path 108 can be seen, and in particular when they stand at the door their face should clearly be visible. The video doorbell includes an actuator, e.g. a push button, for a visitor to indicate their presence at the closure. The video doorbell also preferably includes an audio interface to enable bidirectional audio communication with a visitor at the closure 102. The video doorbell may also include an infrared light source to illuminate whatever is in front of the video doorbell.

The fa9ade of the house carries an external keypad 110 with which a user can disarm the security monitoring system, and, if present, unlock the electrically-controlled lock 104. Also shown is an optional second video camera 112 which is coupled to a movement detector, such as a PIR sensor 114, which, when the security monitoring system is armed, may be arranged to capture video of the front of the house and the private area, e.g. the garden, in front of the house. As with the doorbell camera, the second video camera is preferably provided with an audio interface 116 to enable bidirectional audio communication with anyone observed by the second video camera.

Optionally, as shown, the house 100 may be surrounded by a perimeter fence 140, the fence including a security gate 142, optionally with another electrically-controlled lock 144. The security monitoring system may also be used to secure that perimeter, the gate forming an exterior closure in the secure perimeter giving access to a protected interior space of the premises, and another external keypad 150, and optionally a further video doorbell , may be provided, as shown, and with which a user can disarm the security monitoring system, and optionally unlock a lock securing the gate, and thereby gain admittance to the protected grounds of the house. As will be described further later, the system may be so configured that the external keypad 150 at the gate 142 may also be used to unlock the electrically-controlled lock 104 (if present) on the door 102 of the house 100.

Figure 2 is a schematic part plan view of a premises or house 100 protected by a security monitoring system according to an aspect of the invention, together with other elements of the system, corresponding generally to the premises of Figure 1. The front door 102, with the optional electrically-controlled lock 104, leads into the protected interior space 200 of the premises. Each of the windows 202, and the rear door 204 is preferably fitted with a sensor 206 to detect when they are opened. Each of the sensors 206 includes a radio transceiver to report events to a controller , or central unit, 208 of the security monitoring system. If one of the sensors 206 is triggered when the system is armed, a signal is sent to the central unit 208 which in turn may, depending upon settings of the system and the location/type of sensor that was triggered, signal an alarm event to a central monitoring station 210. The central unit 208 is connected to the central monitoring station 210 via the Internet 212, either via a wired or a wireless connection. Also wirelessly coupled to the central unit 208 are, if present, the video doorbell 106, the electrically-controlled lock 104, and the second video camera 112 its associated movement sensor 114 (although the latter may be integral with the second video camera 112), and the audio interface 116, together with the corresponding system components - if these are present, at gate 142. These items, and the sensors 206, are preferably coupled to the central unit 208 using transceivers operating in the industrial scientific and medical (ISM) bandwidths, for example a sub gigahertz bandwidth such as 868 MHz, and the communications are encrypted preferably using shared secret keys. The security monitoring system may also include other sensors within the protected interior space, such as an interior video camera 214 and associated movement detector 216 (which again may be integral with the camera 214), and each of the interior doors 218 may also be provided with a sensor 206 to detect the opening/closing of the door. Also shown in Figure 2 are a user device 220, preferably loaded with an appropriate app, and a public land mobile network (PLMN) by means of which the central monitoring station 210, and the central unit 208, may communicate with the user device 220. Further aspects of methods and systems according to embodiments of the invention will now be described with reference to Figures 3 and 4.

Figure 3 is a timing diagram of a first mode of operation. The security monitoring system is in an armed away status, meaning that the monitoring system is “listening to” the sensors of the protected perimeter of the premises, such as door and window sensors 206, along with internal sensors such as those on internal doors 218, and motion sensor 216. This is thus the status into which the security monitoring system is typically placed when the occupants of the premises arm the system when they all leave the premises. Upon returning home, a user approaches one of the external keypads, 110, 150, and at step 302 enters her normal access code - which in this case is 1234. The keypad transmits the pass code, at step 304, to the central unit 208 of the security monitoring system in a message that includes the identity of the keypad (which is relevant if there is more than one keypad and more than one associated closure, e.g. gate or door. At step 306 the central unit 208 changes the status of the security monitoring system to disarmed, and preferably, at step 308, sends a disarmed success signal to the relevant keypad, again including the relevant identity of the keypad in the message for the keypad. The external keypad then provides either or both of an audible or visual confirmation to the user, so that the user knows that she has successfully disarmed the system and optionally unlocked the relevant closure. She then opens the relevant closure and enters the premises.

Figure 4 is a timing diagram of the second mode of operation, a counterpart to the first mode, and which is invoked in the event that the user feels scared or threatened, or is under duress. In this mode the user enters a second access code which she only uses under these circumstances. Conveniently, because it is much easier to remember, the second access code is chosen to be a variant of the first access code - for example, differing only from the first access code by having a final digit value which is just one higher than the final digit value of the first access code. Thus, in this example she enters at step 402 the access code 1235, rather than her normal code of 1234. As before, the external keypad transmits the pass code to the central unit 208, along with the identity of the relevant keypad. The central unit 208 recognises the access code as being the duress access code, and transmits a duress alert 406 to the central monitoring station 210. The central unit also activates at 408 at least one monitoring device, preferably including an internal audio interface 214’ (which may be incorporated into a video camera, such as device 214, an interface device used for controlling the security monitoring system, or free-standing) that includes at least a microphone but which preferably supports two-way communication. Other monitoring devices may, if present, also be activated at this time: e.g. an external video camera, such as doorbell camera 106, an internal video camera e. g. 214„ an external audio interface (which may be part of the video doorbell, but may be a separate unit associated with a different video camera such as camera 112 shown in figure 2), shown by the dotted arrows from the central unit. The corresponding units thereafter supply the central unit 208 with video and/or audio signals which the central unit then streams to the central monitoring station 210. Thus, a human operator at the central monitoring station is able to observe what is happening at the premises, the relevant signals meanwhile being continuously recorded at the central monitoring station or in the cloud. The operator has a microphone with which he could communicate with the premises, but when a duress event is first alerted, the microphone at the central monitoring station is muted. At step 424 the central unit updates the status of the security monitoring system to disarmed, and optionally transmits an unlock command to the relevant smart lock or locks, if present. Preferably the central unit 208 again transmits a disarmed success message 428 to the relevant external keypad, so that the keypad can, as usual, provide the user with positive confirmation of disarmed success. The user then knows that someone at the central monitoring station will be aware, via the at least one monitoring device, of what happens at the premises. If the installation includes an electrically-controlled lock, and if the system is so arranged, the user will be able to open the door/gate to enter the premises, without further delay. If she is able to enter the protected interior space of the premises, and close the door/gate behind her, the video cameras will continue to supply signals to the central monitoring station until the user feel safe enough to speak to the operator in the central monitoring station, confirming that she no longer feel threatened. On the other hand, if the user is unable to enter the premises alone, so that her potential attacker, the source of her threat, enters the premises with her, the operator in the central monitoring station is able to observe how things play out. If necessary the operator can contact the local police, explaining the situation so they may attend the premises if necessary. Alternatively, under some circumstances, the operator may intervene by and muting his microphone and speaking directly to the intruder, warning him that his actions are being captured on video and that the police have been informed. More often, it will be appropriate for the operator to remain silent - at least as long as the user’s life and safety are not seriously threatened: instead of the user knows that the system is capturing evidence, in the form of video and sound recordings, of the event, and of the intruder’s behaviour. These recordings, which will be stored in the cloud, as well as in servers at the central monitoring station, may subsequently be used by the user in legal proceedings against the intruder. In addition, the presence of such a record of the intruder’s behaviour may give the user courage to report to the authorities what may be domestic abuse, including physical threat and/or physical attacks on the user and/or her children.