Communication and monitoring system

ABSTRACT

An audio-video communication system comprises a wireless exterior module located proximate an entrance, a computerized controller running a software application, and a remote peripheral device. The wireless exterior module includes a proximity sensor for detecting a person at the entrance, a video camera for recording an image of the person at the entrance, a microphone for recording the person at the entrance, a speaker for playing audio to the person at the entrance, a transmitter for communicating sounds and images of the person at the entrance, and a receiver for receiving communications at the wireless exterior module. The computerized controller is disposed in wireless electronic communication with the wireless exterior module via the transmitter and the receiver of the wireless exterior module. The remote peripheral device is configured to electronically communicate with the computerized controller for viewing an image from the video camera communicated from the wireless exterior module.

CROSS REFERENCE TO RELATED APPLICATIONS

The present patent application is a U.S. continuation patent applicationof, and claims the benefit under U.S.C. §120 to, U.S. patent applicationSer. No. 15/238,393, filed Aug. 16, 2016, which is a U.S. continuationpatent application of, and claims the benefit under U.S.C. §120 to, U.S.patent application Ser. No. 15/238,228, filed Aug. 16, 2016, which is aU.S. continuation patent application of, and claims the benefit underU.S.C. §120 to, U.S. patent application Ser. No. 15/237,933, filed Aug.16, 2016, which is a U.S. continuation patent application of, and claimsthe benefit under U.S.C. §120 to, U.S. patent application Ser. No.15/237,797, filed Aug. 16, 2016, which is a U.S. continuation patentapplication of, and claims the benefit under U.S.C. §120 to, U.S. patentapplication Ser. No. 15/237,222, filed Aug. 15, 2016, which is a U.S.continuation patent application of, and claims the benefit under U.S.C.§120 to, U.S. patent application Ser. No. 15/201,559, filed Jul. 4,2016, which is a U.S. continuation patent application of, and claims thebenefit under U.S.C. §120 to, U.S. patent application Ser. No.14/968,491, filed Dec. 14, 2015, which is a U.S. continuation patentapplication of, and claims the benefit under U.S.C. §120 to, U.S. patentapplication Ser. No. 14/962,749, filed Dec. 8, 2015, which is acontinuation patent application of U.S. patent application Ser. No.14/794,299, filed Jul. 8, 2015, which is a continuation of U.S. patentapplication Ser. No. 14/670,044, filed Mar. 26, 2015, which is acontinuation patent application of U.S. patent application Ser. No.14/338,525, filed Jul. 23, 2014, and which is a U.S. continuation patentapplication of, and claims the benefit under U.S.C. §120, U.S. patentapplication Ser. No. 13/453,100, filed Apr. 23, 2012, published as U.S.patent application no. US 2012/0262581, now abandoned, and which the'100 application is a U.S. continuation patent application of, andclaims priority under 35 U.S.C. §120 to, U.S. patent application Ser.No. 11/929,464, filed Oct. 30, 2007, now granted as U.S. Pat. No.8,164,614, and which '464 application is a U.S. continuation patentapplication of, and claims priority under 35 U.S.C. §120 to, U.S. patentapplication Ser. No. 11/618,615, filed Dec. 29, 2006, which granted asU.S. Pat. No. 8,154,581, and which '615 application is a U.S.continuation-in-part patent application of, and claims priority theunder 35 U.S.C. §120 to, U.S. patent application Ser. No. 10/682,185,filed Oct. 9, 2003, published as U.S. patent application publication no.US 2005/0285934 AI, and now granted as U.S. Pat. No. 7,193,644, whichpatent application is a nonprovisional patent application of U.S. patentapplication Ser. No. 60/418,384, filed on Oct. 15, 2002, expired. Eachof these patent applications, patent application publications, andpatent is hereby incorporated herein by reference.

BACKGROUND

There are numerous problems presently associated with receiving visitorsat a home or office. When the resident of the home or occupant of theoffice (hereinafter generally referred to as either resident oroccupant) is absent, there is often no message for the visitors, nomeans to leave an interactive message for the resident, and no means toensure that unwanted access is not obtained. Moreover, answering thecall of someone at a door of a dwelling can present certain securityrisks to an occupant therein. This situation can be especiallyinconvenient when, for example, a delivery or repair person arrives andthe resident is not present. When the resident is present, on the otherhand, there are also problems associated with receiving visitors. Somevisitors may be unwelcome, for example, and it is often not evident thata visitor is a threat or an annoyance until after the door is open.

There are many types of systems for receiving a person by an occupant orresident and/or on the behalf of the occupant or resident. Such systemsinclude those disclosed in each of: U.S. Pat. No. 5,148,468 titled “DoorAnswering System”, which issued Sep. 15, 1992 to Marrick et al; U.S.Pat. No. 5,303,300 titled “Security Door Phone Device,” which issuedApr. 12, 1994 to Eckstein; U.S. Pat. No. 5,406,618 titled “VoiceActivated, Hands Free Telephone Answering Device,” which issued Apr. 11,1995 to Knuth, et al.; and U.S. Pat. No. 5,657,380 titled “InteractiveDoor Answering and Messaging Device with Speech Synthesis,” which issuedto Mozer on Aug. 12, 1997. Nevertheless, a need remains for furtherimprovement in such a system.

SUMMARY

The present disclosure includes many aspects and features. Moreover,while many aspects and features of the present disclosure relate to, andare described in, the context of a system for receiving a person at anentrance, such as, an entrance to a home or business, the presentdisclosure is not limited to use only in such context and may be usedand has applicability in other contexts as well.

In one aspect of the present disclosure, an audio-video communicationsystem comprises a wireless exterior module located proximate anentrance, a computerized controller running a software application and aremote peripheral device. The wireless exterior module includes aproximity sensor for detecting a person at the entrance, a video camerafor recording an image of the person at the entrance, a microphone forrecording sound of the person at the entrance, a speaker for playingaudio to the person at the entrance, a transmitter for communicatingsounds and images of the person at the entrance, and a receiver forreceiving communications at the wireless exterior module. Thecomputerized controller is disposed in wireless electronic communicationwith the wireless exterior module via the transmitter and the receiverof the wireless exterior module. The computerized controller isconfigured to control recording of communications with the wirelessexterior module and playback of such recording, and the softwareapplication includes a graphic user interface that enables a user toview images from the video camera communicated from the wirelessexterior module. The remote peripheral device is configured toelectronically communicate with the computerized controller for viewingan image from the video camera communicated from the wireless exteriormodule.

In a feature of the first aspect, the audio-video communication systemfurther comprises a second wireless exterior module located proximate anentrance, with the second wireless exterior module having a proximitysensor for detecting a person at the entrance, a video camera forrecording an image of the person at the entrance, a microphone forrecording sound of the person at the entrance, a speaker for playingaudio to the person at the entrance, a transmitter for communicatingsounds and images of the person at the entrance, and a receiver forreceiving communications at the wireless exterior module. Thecomputerized controller running the software application is furtherdisposed in wireless electronic communication with the second wirelessexterior module via the transmitter and the receiver of the secondwireless exterior module.

In another feature of this aspect, the remote peripheral device isconfigured to remotely actuate the camera of the wireless exteriormodule. In an additional feature, the graphic user interface enables auser to view streaming video with the remote peripheral device. In yetanother feature, the remote peripheral device comprises a cell phone. Instill yet another feature, the remote peripheral device comprises avideo phone. In further features, the remote peripheral device comprisesa computer and a personal digital assistant.

In an additional feature, the entrance comprises an entrance of abusiness. In another additional feature, the entrance comprises anentrance of a residence. In a further feature, the wireless exteriormodule includes a display screen. In still a further feature, thewireless exterior module includes a keypad comprising a touch screen ora keyboard. In yet a further feature, the wireless exterior module isportable and includes a locking mechanism and an electrical receptaclefor quickly attaching to a source of electricity.

In another feature, the wireless exterior module has a portable energysource and is secured in a holster. In yet another feature, thecomputerized controller comprises a personal computer. In still yetanother feature, the computerized controller is disposed in electroniccommunication with a public switching telephone network (PSTN).

In a further feature, the computerized controller is disposed inelectronic communication with the Internet. In an additional feature,the audio-video communication system further comprises an electronicallyactuated lock that is configured to be unlocked by the computerizedcontroller. In another feature, the system further comprises a voicerecognition system.

In still a further feature, a transceiver includes the transmitter forcommunicating sounds and images of the person at the entrance and thereceiver for receiving communications at the wireless exterior module.In yet another feature, the computerized controller includes an imagerecognition module for identifying at least one of faces, eyes, andfingerprints.

In a second aspect of the present disclosure, a method for two-wayaudio-video communications between a first person at an entrance and asecond person comprises the steps of (a) detecting, with a proximitysensor located proximate an entrance, the presence of a first person atthe entrance; and (b) providing real time audio-video communicationsbetween the first person at the entrance and a second person using awireless handheld device. Step (b) is done by (i) transmitting, to thewireless handheld device of the second person, video of the first personat the entrance recorded using a camera located proximate the entrance,(ii) transmitting, to the wireless handheld device of the second person,audio of the first person at the entrance recorded using a microphonelocated proximate the entrance, and (iii) transmitting, to a speakerlocated proximate the entrance for playing to the first person at theentrance, audio of the second person recorded using the wirelesshandheld device.

In a feature of this aspect, the transmitting includes wirelesscommunications between both the camera and microphone located proximatethe entrance and a computerized controller running a softwareapplication including a graphic user interface by which the audio-videocommunications between the first person and the second person areestablished. In another feature, the method further comprises the stepof playing a recorded greeting to the first person at the entrance uponthe detection of the first person at the entrance with the proximitysensor. With regard to this feature, the method further comprisesdetermining, by a user with a remote peripheral device, the recordedgreeting that is played through a graphical user interface. With furtherregard to this feature, the recorded greeting is selected by the userfrom a plurality of recorded greetings. It accordance with this feature,the recorded greetings are seasonal greetings. It is preferred that therecorded greeting includes audio and video.

In an additional feature, the method further comprises the step ofposting, by the user from a remote peripheral device, a video greetingfor presentation to a first person at the entrance. In further features,the wireless handheld device comprises a cell phone, a video phone, anda personal digital assistant.

In yet another feature, the entrance comprises an entrance of abusiness. In still a further feature, the entrance comprises an entranceof a residence. In another feature, the method further comprises thestep of saving a recording of the two-way audio-communications in adatabase for later playback. In yet another feature, the method furthercomprises transmitting, to a video display located proximate theentrance for presentation to the first person at the entrance, video ofthe second person recorded using the wireless handheld device.

In an additional feature, the transmitting includes communications overthe Internet. In further features, the transmitting includescommunications over a cellular network and over a satellite network. Inyet another feature, the method further comprises remotely actuating thecamera located proximate the entrance using the wireless handhelddevice. In still further features, the step of remotely actuating thecamera includes zooming an image of the first person at the entrance andremotely moving the camera to change the view of the camera.

In a third aspect of the present disclosure, a method for receiving aperson at an entrance comprises the steps of (a) detecting, with aproximity sensor located proximate an entrance, the presence of a personat the entrance; (b) transmitting, to a computerized controller runninga software application, video of the person at the entrance recordedusing a camera located proximate the entrance; and (c) providing, withthe application software running at the computerized controller, agraphic user interface to a remote peripheral device by which a user ofthe remote peripheral device may view the video of the person at theentrance.

In a feature of this aspect, the method further comprises the step ofsaving, in accordance with the application software running at thecomputerized controller, the video of the person at the entrance in adatabase in association with a timestamp. In other features, the videois viewed using the remote peripheral device in real-time, viewed usingthe remote peripheral device after the person at the entrance has left,and is streamed to the remote peripheral device.

In an additional feature, the method further comprises the step oftransmitting, to the computerized controller running the softwareapplication, audio of the person at the entrance recorded using amicrophone located proximate the entrance; wherein the graphic userinterface provided to the remote peripheral device further enables auser of the remote peripheral device to hear the audio of the person atthe entrance. In another feature, the method further comprises the stepof playing a recorded greeting to the person at the entrance upon thedetection of the person at the entrance with the proximity sensor.

In another feature, the method further comprises determining, by a userwith the remote peripheral device, the recorded greeting that is playedthrough a graphical user interface. With regard to this feature, therecorded greeting may be selected by the user from a plurality ofrecorded greetings, the recorded greetings may be seasonal greetings,and the recorded greeting may include audio and video.

In yet another feature, the method further comprises the step ofposting, by the user from the remote peripheral device, a video greetingfor presentation to a person at the entrance. In other features, theremote peripheral device comprises a cell phone, a video phone, acomputer, and a personal digital assistant. In still other features, theentrance comprises an entrance of a business and an entrance of aresidence.

In still another feature, the method further comprises remotelyactuating the camera located proximate the entrance using the remoteperipheral device. In further features, the step of remotely actuatingthe camera includes zooming an image of the person at the entrance andremotely moving the camera to change the view of the camera.

In addition to the aforementioned aspects and features of the presentdisclosure, it should be noted that the present disclosure furtherencompasses the various possible combinations of such aspects andfeatures.

BRIEF DESCRIPTION OF THE DRAWINGS

One or more preferred embodiments of the present disclosure now will bedescribed in detail with reference to the accompanying drawings.

FIG. 1 is a schematic diagram of a system in accordance with a preferredembodiment of the present disclosure.

FIG. 2 is a planar view of the font of a DVMS module of the system ofFIG. 1

FIG. 3 is a planar view of the front of a DVMS transceiver of the systemof FIG. 1.

FIG. 4 is a block diagram overview of a method in accordance with apreferred embodiment of the present disclosure.

FIG. 5 a block diagram extension of the method of FIG. 4.

FIG. 6 is a schematic diagram of a system in accordance with anotherpreferred embodiment of the present disclosure.

FIG. 7 is a perspective view of the front of a wireless network cameraof the system of FIG. 6.

FIG. 8 is a side view of the wireless network camera of FIG. 7.

FIG. 9 is a perspective view of the rear of the wireless network cameraof FIG.

FIG. 10 is a representative screen view of a wireless command center ofthe system of FIG. 6, wherein various parameter settings forconfiguring, e.g., the audio, video, server, and cell phone options areillustrated.

FIG. 11 is a screen view of the normal operating mode interface of thewireless command center of FIG. 10, wherein a user is able todynamically control a wireless network camera, view video imagesgenerated by the wireless network camera, listen and send bothpre-canned and live audio files, and review archived system events.

FIG. 12 is a dialog box screen view of the text-to-voice synthesizermodule of the wireless command center of FIG. 10.

FIG. 13 is a dialog box screen view of the recorded voice synthesizermodule of the wireless command center of FIG. 10.

FIG. 14 is a planar view of the front of a wireless pocket PC that isconnected to a wireless network, wherein a user of the wireless pocketPC is able to dynamically control the wireless network camera, viewvideo images generated by the wireless network camera, listen and sendboth pre-canned and live audio files, and review archived system eventsin the system of FIG. 6.

DETAILED DESCRIPTION

As a preliminary matter, it will readily be understood by one havingordinary skill in the relevant art (“Ordinary Artisan”) that the presentdisclosure has broad utility and application. Furthermore, anyembodiment discussed and identified as being “preferred” is consideredto be part of a best mode contemplated for carrying out the presentdisclosure. Other embodiments also may be discussed for additionalillustrative purposes in providing a full and enabling disclosure of thepresent disclosure. Moreover, many embodiments, such as adaptations,variations, modifications, and equivalent arrangements, will beimplicitly disclosed by the embodiments described herein and fall withinthe scope of the present disclosure.

Accordingly, while the present disclosure is described herein in detailin relation to one or more embodiments, it is to be understood that thisdisclosure is illustrative and exemplary of the present disclosure, andis made merely for the purposes of providing a full and enablingdisclosure of the present disclosure. The detailed disclosure herein ofone or more embodiments is not intended, nor is to be construed, tolimit the scope of patent protection afforded the present disclosure,which scope is to be defined by the claims and the equivalents thereof.It is not intended that the scope of patent protection afforded thepresent disclosure be defined by reading into any claim a limitationfound herein that does not explicitly appear in the claim itself.

Thus, for example, any sequence(s) and/or temporal order of steps ofvarious processes or methods that are described herein are illustrativeand not restrictive. Accordingly, it should be understood that, althoughsteps of various processes or methods may be shown and described asbeing in a sequence or temporal order, the steps of any such processesor methods are not limited to being carried out in any particularsequence or order, absent an indication otherwise. Indeed, the steps insuch processes or methods generally may be carried out in variousdifferent sequences and orders while still falling within the scope ofthe present disclosure. Accordingly, it is intended that the scope ofpatent protection afforded the present disclosure is to be defined bythe appended claims rather than the description set forth herein.

Additionally, it is important to note that each term used herein refersto that which the Ordinary Artisan would understand such term to meanbased on the contextual use of such term herein. To the extent that themeaning of a term used herein—as understood by the Ordinary Artisanbased on the contextual use of such term—differs in any way from anyparticular dictionary definition of such term, it is intended that themeaning of the term as understood by the Ordinary Artisan shouldprevail.

Furthermore, it is important to note that, as used herein, “a” and “an”each generally denotes “at least one,” but does not exclude a pluralityunless the contextual use dictates otherwise. Thus, reference to “apicnic basket having an apple” describes “a picnic basket having atleast one apple” as well as “a picnic basket having apples.” Incontrast, reference to “a picnic basket having a single apple” describes“a picnic basket having only one apple.”

When used herein to join a list of items, “or” denotes “at least one ofthe items,” but does not exclude a plurality of items of the list. Thus,reference to “a picnic basket having cheese or crackers” describes “apicnic basket having cheese without crackers”, “a picnic basket havingcrackers without cheese”, and “a picnic basket having both cheese andcrackers.” Finally, when used herein to join a list of items, “and”denotes “all of the items of the list.” Thus, reference to “a picnicbasket having cheese and crackers” describes “a picnic basket havingcheese, wherein the picnic basket further has crackers,” as well asdescribes “a picnic basket having crackers, wherein the picnic basketfurther has cheese.”

Referring now to the drawings, one or more preferred embodiments of thepresent disclosure are next described. The following description of oneor more preferred embodiments is merely exemplary in nature and is in noway intended to limit the disclosure, its applications, or uses.

The System of FIG. 1

FIG. 1 is a schematic diagram of a system 100 in accordance with apreferred embodiment of the present disclosure. For purposes ofproviding an enabling description, the system 100 is described in thecontext of a door answering system for receiving a person at a home oroffice and is capable of controlling access to the home or office. InFIG. 1, the exterior of the home or office is differentiated from theinterior by demarcation line 115, which represents a wall or othersimilar structure. The wall 115 includes an entrance in the form of adoor 114 and an electronically actuated lock 116 for selectively lockingand unlocking the door 114.

A computerized controller in the form of a personal computer 80 isdisposed in the interior and is configured to selectively actuate thelock 116. The personal computer 80 preferably includes a DVD-R/W 84, aCD-ROM R/W 92, and a hard drive 86. One or more of these components84,92,86 of the personal computer 80 preferably are utilized forrecording video and audio communications that are transmitted to andfrom the DVMS module 10 (described in further detail below) and forplaying video and audio communications that are stored via the personalcomputer 80.

The personal computer 80 also may include a voice generator 90 for usein generating prompts, which either exists as pre-recorded messages orare generated by a voice synthesizer. Each of these components84,92,86,90 of the personal computer 80 may be separately disposed fromthe personal computer and connected, for example, by a switch 88, or mayform part of the personal computer 80 and be disposed in electroniccommunication with a bus of the personal computer 80 within the housingthereof.

A speaker 44 is disposed in electronic communication with the personalcomputer 80. The speaker 44 is not shown as being wireless, but couldbe. Moreover, one speaker 44 is shown, but additional speakers could beused in the system 100. Furthermore, speaker 44 in FIG. 1 is representedas being separate from the personal computer 80, however, the speaker 44could alternatively form part of the personal computer 80.

The personal computer 80 preferably is disposed in electroniccommunication with the Internet. The connection with the Internetpreferably is accomplished by a broadband connection such as aconnection 81 provided by a satellite modem, a DSL model, or a cablemodem, or any combination thereof.

The personal computer 80 also preferably is connected to a publicswitching telephone network (PSTN) 70, which enables communication byand with the personal computer 80 via standard telephone lines.

The personal computer 80 preferably has a battery backup as well as ameans for detecting a loss in electrical power such that, whenelectrical power is lost the battery backup will provide sufficientoperating time for the personal computer 80 to notify someoneresponsible for the maintenance of the system that there has been a lossof electricity. Notification of the loss of electricity can beimportant, since the loss of electrical power can be an indication of aburglary. Additionally, if there is no electricity, then appliances,such as refrigerators, air conditioners, and heaters, cannot functionand significant damage can results if the electrical failure goesundetected for a substantial period of time.

The personal computer 80 runs a software application that includes aDVMS Database Application 82 and graphic user interfaces (GUIs). Thepersonal computer 80, in accordance with the software application,controls communication in the system 100, coordinates multiplecommunication devices in the system 100, and is used to define responsesto prompts and events in the system 100. The DVMS Database Application82 and its uses are described in greater detail below.

The system 100 further includes a wireless router 42 located in theinterior. The wireless router 42 in FIG. 1 is represented as beingseparate from the personal computer 80, however, the wireless router 42could alternatively form part of the personal computer 80. The wirelessrouter 42 is used to establish a wireless network and is disposed inelectronic communication with the personal computer 80.

The system 100 also includes a DVMS module 10 located on the exterior ofthe home or office proximate the door 114. The DVMS module 10 isconfigured for use in the exterior of the home or office, which mayinclude outdoor use in external residential or commercial locations. TheDVMS module 10 is disposed in wireless communication with the wirelessnetwork, including the personal computer 80, via the wireless router 42.

With reference to FIG. 2, the DVMS module 10 preferably includes: avideo camera 22; speakers 12; a proximity sensor 26; a microphone 20; anLCD display 16; a quick connect electrical receptacle 24; and aradiofrequency receiver/transmitter represented by antenna 18. Theproximity sensor 26 activates the camera 22 upon detection of movement,which in turn relays an image or streaming video to the personalcomputer 80 where it is saved by the personal computer 80 in a databasein association with a timestamp. Operation of the system is described infurther detail below.

The DVMS module 10 optionally includes a small portable energy source,such as a battery that is rechargeable via the quick connect electricalreceptacle 24, for portable use as well as for use in the event of apower failure.

The LCD display 16 screen preferably is a low energy screen reducingenergy consumption. The LCD display 16 preferably comprises a touchscreen and can be used to send and receive text similar to a keypad.Alternatively, or in addition thereto, the DVMS module 10 includes akeypad 14. In either case, the DVMS module 10 enables text messaging bya person at the exterior, which in turn enables a private non-audibleconversation to be had and eliminates risks of eavesdropping by apasserby.

The DVMS module 10 also includes a locking mechanism 28 for receipt in amounting holster (not shown). The locking mechanism 28 enables the DVMSmodule 10 to be installed securely wherever holstered, or to be moved tosome other remote location, as desired. The DVMS module 10 thus isportable, much like a cell phone, and can be securely mounted andquickly connected to an electrical source.

It is anticipated that there could be multiple entrances to the home oroffice and, similarly, multiple DVMS modules similar to DVMS module 10of FIG. 2 could be utilized, each disposed in wireless communicationwith the wireless network via the wireless router 42.

The system optional includes one or more DVMS transceivers 60. The DVMStransceivers 60 is configured for use in the interior of the home oroffice. As illustrated in FIG. 1, a DVMS transceivers 60 may be disposedin wireless communication with the wireless network, including thepersonal computer 80, and the DVMS module 10, via the wireless router42. Additionally or alternatively, a DVMS transceivers 60 may beconfigured to wirelessly communicate directly with the DVMS module 10,thus bypassing communications through the wireless router 42.

With reference to FIG. 3, each DVMS transceiver 60 is portable and, likethe DVMS module 10, the DVMS transceiver 60 communicates by short-rangeradiofrequency transmissions. The DVMS transceiver 60 includes: speakers62; a microphone 63; an LCD display 66; a quick connect electricalreceptacle 65; and a radiofrequency receiver/transmitter represented byantenna 68. The DVMS transceiver 60 optionally includes a small portableenergy source, such as a battery that is rechargeable via the quickconnect electrical receptacle 65, for portable use as well as for use inthe event of a power failure. The DVMS transceiver 60 further includes amute switch 61, which cuts-off the microphone 63, thus assuring a userof the DVMS transceiver 60 that a visitor can be monitored using theDVMS transceiver 60 without inadvertently sending an audible signal fromthe user.

The LCD display 66 screen preferably is a low energy screen reducingenergy consumption. The LCD display 66 preferably comprises a touchscreen and can be used is used to send and receive text similar to akeypad. Alternatively, or in addition thereto, the DVMS transceiver 60includes a keypad 64. In either case, the DVMS module 60 enables textmessaging by a user of the DVMS transceiver 60 with a person at theexterior using the DVMS module 10, which in turn enables a privatenon-audible conversation to be had and eliminates risks of eavesdroppingby a passerby.

The system 100 further includes one or more remote peripheral devices.Such devices generally include video phones 72; in-car communicationsystems such as the well known ONSTAR system 74 currently found in GMcars; telephones 76; cell phones 77; personal computers 78;smartphones/personal digital assistants (PDAs) 79; and other similarcommunication devices. Each remote peripheral device is configured forelectronic communication with the personal computer 80 via at least thePSTN connection 70 or the broadband connection 81.

As mentioned above, the personal computer 80 runs a software applicationthat includes a DVMS Database Application 82 and graphic user interfaces(GUIs). The software application is configured and maintained by anadministrator, who defines users thereof. The users in the system 100are referred to as “occupants” reflecting their relation to the home oroffice.

Preferably, the occupants have various levels of access to the softwareapplication, depending on the privileges set by the administrator. Theadministrator may also set a level of security under which the system isto operate, particularly with respect to connections made using remoteperipheral devices.

Other examples of configuration settings of the software applicationthat are determined by the administrator include: aliases for a declaredoccupant such as, e.g., “Daddy” or “Momma”; passwords to access thesoftware application; access codes to actuate the electronic lockcontrolled by the computerized controller; a number or other identifierthat corresponds to an occupant's name; and at least one telephonenumber by which an occupant can be reached. The administrator alsopreferably defines a preferred hierarchy of storage of audio and videodata, the location and number of backup devices, and whetherreplications of the database are to be kept.

Additionally, when setting up the software application, theadministrator chooses, inter alia: a prompt for greeting a visitor;chooses an announcement that is to be given over a speaker within theinterior when a visitor arrives; a prompt for requesting informationfrom a visitor; a request instructing a visitor as to their choices inleaving a message or contacting a declared user; and the action that isto be performed by the computerized controller based on the input by thevisitor.

The administrator also tailors the security/premise monitoring responseby, inter alia: designating telephone numbers that the computerizedcontroller calls when, for example, there is a loss of power; anddesignating telephone emergency numbers (e.g., telephone numbers for thepolice, the fire department, relatives, private security companies) thatthe computerized controller calls when an emergency is detected. Thecomputerized controller also conducts self checks to confirm that allthe components of the system are operational and keeps a log of the selfchecks, and the computerized controller preferably calls one or moredesignated numbers when a self check indicates a failure or otherwiseimproper operation.

The software application also can be configured to play background musicor videos at different times of the year and/or different times of theday to reflect seasonal holidays, birthdays, and events. For instance,on Halloween the administrator may wish to have scary music and howlsissuing from the DVMS module for receiving a person at that time.Furthermore, utilizing the computerized controller, the administratorcan choose to use default prompts for interacting with a visitor orcreate customized prompts.

As hardware is added, such as the number of the DVMS modules and DVMStransceivers, the administrator can update both the network to includethe additional devices and the computerized controller to accommodatethe additional devices.

The software application also is configured to send voice, text, andvideo messages via email. The administrator can further set up redundantsubsystems of the system 100.

The system 100, in use, enables secure and effective monitoring andinteracting with a visitor at a residence or business, including, interalia: the detection of the presence of a visitor at the exterior of thehome or office via the proximity sensor 26, the interactivecommunication with the visitor, whether an occupant is present or absentfrom the home or office, the enablement of automated entry into the homeor office by the visitor, and personalization of the process ofreceiving a visitor.

An exemplary method of use in the system 100 includes greeting andcommunicating with visitors of a business or residence. In accordancewith the method, the presence of a visitor is detected via the proximitysensor 26 of the DVMS module 10, where the DVMS module 10 is mounted ator near an entrance to the business or residence. Upon the detection ofthe visitor by the proximity sensor 26, a message is communicated to thepersonal computer 80 from the DVMS module 10 indicating the detection ofa visitor at the entrance. A recording is actuated by the personalcomputer 80, and the recording is stored in a computer-readable mediumsuch as a database along with a beginning time-stamp. The arrival of avisitor is broadcast over a speaker within the home or office, such asspeaker 44. An occupant can view the visitor on a display on the DVMStransceiver 60 or on a display of the personal computer 80, and theoccupant can initiate a conversation at any time. The DVMS module 10issues a greeting to the visitor and instructs the visitor to select anumber from the keypad 14 of the DVMS module 10 in order to designatethe occupant being visited. The entered number is communicated from theDVMS module 10 to the personal computer 80, where the softwareapplication confirms that the number corresponds to an occupant “y” whois “officially” present. An error message is generated if no individualcorresponds to the number entered by the visitor. If no individualcorresponds to the number entered by the visitor, then the visitor isprompted to select and press another number on the keypad 14 againdesignating the occupant being visited. The method then lists thechoices again.

While this is going on, the door may be answered at any time, therebyresetting the software application to look for another visitor. Thesoftware application keeps track of the number of times a wrong numberis entered and can generate a variety of responses to pranks, includingcalling the police, issuing warnings and/or a loud noise, or justthanking the visitor and asking him to return another time.

If appropriate, when the number designated by the visitor matches anoccupant who is officially on the home or office, the speaker broadcaststhat the visitor is here to see occupant “y”. Occupant “y” can signalthe personal computer 80 to take a message, or occupant “y” may chooseto use the DVMS transceiver 60 to speak directly with the visitor, oroccupant “y” can answer the door.

If appropriate, the DVMS module 10 issues a prompt stating that occupant“y” is not available and asks the visitor if they wish to speak tooccupant “y” or to leave a message.

If appropriate, at any time the software application can initiate a callto occupant “y” via a remote peripheral device for communication betweenoccupant “y” and the visitor, and the software application can recordboth sides of the conversation between occupant “y” and the visitor. Theoccupant can view the visitor or initiate a conversation, as theoccupant desires. A visitor never knows where the occupant is, unlessthe occupant tells the visitor of the occupant's location. A visitoralso never knows if the occupant can be contacted, or if the occupanthas just instructed the application to take a message. Using the methodthe conversation or messages can be relayed to the selected occupantwithout the visitor ever knowing where the location of the occupant.Only the occupant can disclose such location to the visitor as desired.

If the visitor elects to leave a message, then the method prompts thevisitor to begin his message and then, optionally, offers him a chanceto review and approve his message. The message or call is stored incomputer readable medium, such as database, by the personal computer 80in association with a beginning timestamp and an ending timestamp alongwith the occupant's mailbox number. At the end of the call or message,the software application can issue a closing statement and return tobackground music, if programmed to do so.

When the visitor departs, and is out of the range of the proximitysensor 26, all recording is stopped and saved in the database record,along with an ending timestamp. The occupant “y” can selectively sort toview the entire recorded visit, or just the message.

If the proximity sensor 26 indicates that there is another visitor, themethod cycles back to the greeting step.

If the system has an electronically actuated lock, then the method alsomay include the steps of checking the number entered by the visitor todetermine if it is a valid access code. The electronically actuated lockmay be unlocked by entering an access code either at the DVMS module 10or remotely therefrom. If the number is valid, then the lock isactuated, and if the number is not valid, then a prompt is maderequested that the code be re-entered. Optionally, the prompt mayfurther request a number be entered that corresponds to one of theoccupants if assistance is needed and, if an occupant is selected, thencalling the selected occupant. The method also may include tracking howmany times the wrong code is entered; checking if the maximum allowednumber of wrong entries have been made; and, when the maximum number ofwrong entries is reached, either automatically calling a designatedparty and/or removing access privileges.

An occupant preferably has the option of remotely entering the accesscode, thereby actuating the electronically actuated lock, or instructingthe GUI database application to go to a new high security level, whereinthe lock cannot be accessed and notifying the visitor that the accesscode is not operational.

In the method, upon the entering of a valid access code assigned to adeclared occupant, the software application optionally notifies theadministrator or his designated representative that the declaredoccupant has now entered the home or office. The administrator wouldknow who the individual should be. The administrator thus can confirm,by remotely viewing the recorded video, that the actual person whoentered the access code is the declared occupant, and/or make afollow-up telephone call to the home or office. The system 100 alsoprovides the options of allowing the visitor to converse with theoccupant, leaving a message, or calling a remote peripheral device forcommunication with the occupant when he is either not present or isunavailable. The entrance is recorded and time stamped for sorting orviewing either in real time or at a later date.

The system 100 further enables the administrator or a declared occupantto, at any time, to turn on a camera and view images, access therecorded the video images, or post a video image from a remoteperipheral device to computerized controller including associatedcomponents.

The system 100 preferably is inherently extensible in both form andfunction and is designed so that the system can be expanded to includemultiple peripheral devices, both in direct and indirect communicationwith the computerized controller. Due to the use of the computerizedcontroller and its interconnectivity, the disclosed system 100 can beconfigured to accommodate communications having a range of complexity.

As will be apparent from the foregoing, the system 100 provides anaudio-video communication and answering system that provides real timecommunication between an exterior of a business or residence and aninterior of the business or residence as well as a location remotelylocated to the business or residence.

As will be apparent from the foregoing, the system 100 provides anaudio-video communication and answering system that provides real timecommunication between two or more rooms at a home or office and a remotelocation.

As will be apparent from the foregoing, the system 100 provides anaudio-video communication and answering system that provides the abilityto leave messages at a centralized location from a local or remotelocation.

In addition to the foregoing description of a method, FIG. 4 shows ablock diagram illustrating an example of the use of a system of thepresent disclosure as a door answering and messaging system at aresidence. Furthermore, FIG. 5 shows a block diagram illustrating anexample of the use of a system of the present disclosure as a dooranswering and messaging system at a residence, wherein the systemincludes an electronically actuated lock. In the example, an occupant isattempting to gain access to the home or office.

As will now be apparent, systems in accordance with the presentdisclosure achieve one or more of the foregoing benefits and featuresyet remain intuitive and easy to use.

In addition to the foregoing, it further is anticipated that, in certaindeployments of the present disclosure, voice recognition would beuseful, particularly when the system enables access to a home or office.Voice recognition adds another layer of security, and can be used tofacilitate those individuals who are unable to press a keypad.Similarly, image recognition of faces, eyes and fingerprints can also beincluded in the system for authentication, security, and access. Thesoftware application thus alternatively utilizes voice recognitionand/or image recognition.

Furthermore, while no camera is shown located within the home or office,any number of cameras could be utilized on the interior.

It will also be appreciated that a business may be a tenant locatedwithin a building shared by other businesses. A DVMS module for thebusiness thus would be utilized on the exterior of the business, i.e.,at the “front door” of the business, which would be located within theinterior of the common building.

In variations of systems of the present disclosure, it should further benoted that one or more devices having the functionality of DVMS modulescould be utilized in the interior for securing entrance to a room orgroup of rooms.

The System of FIG. 6

FIG. 6 is a schematic diagram of a system 2100 in accordance withanother preferred embodiment of the present disclosure. The system 2100includes: a local area network 2200; a wireless digital camera 210; anda computerized controller in the form of a personal computer 240(identified as the “Wireless Command Computer” in FIG. 6). The linesindicate communications between member devices and components of thesystem 2100 and such communications may be wired, wireless, or acombination of both wired and wireless. For purposes of providing anenabling description, the system 2100 is described in the context of adoor answering system for receiving a person at a home or office and iscapable of controlling access to the home or office. In FIG. 6, theexterior of the home or office is differentiated from the interior by awall 2112 or other similar structure. The wall 2112 includes an entrancein the form of a door 2116 and an electronically actuated lock 2114 forselectively locking and unlocking the door 2116.

The personal computer 240 is disposed in the interior and is configuredto selectively actuate the lock 2114. The personal computer 240 includesone or more components utilized for recording video and audiocommunications and for playing video and audio communications. Thepersonal computer 240 also may include a voice generator for use ingenerating prompts, which either exists as pre-recorded messages or isgenerated by a voice synthesizer. Each of these components of thepersonal computer 240 may be separately disposed from the personalcomputer and connected, for example, by a switch, or may form part ofthe personal computer 240 and be disposed in electronic communicationwith a bus of the personal computer 240 within the housing thereof. Aspeaker 248 is disposed in electronic communication with the personalcomputer 240. Moreover, one speaker 248 is shown, but additionalspeakers could be used in the system 2100. Furthermore, speaker 248 inFIG. 6 is represented as being separate from the personal computer 240,however, the speaker 248 could alternatively form part of the personalcomputer 240.

The personal computer 240 preferably is disposed in electroniccommunication with the Internet. The connection with the Internetpreferably is provided by a broadband connection through, for example, awireless router 250. Such broadband connection may be accomplished by asatellite modem, a DSL model, or a cable modem, or any combinationthereof. The personal computer 240 also preferably is connected to apublic switching telephone network (PSTN) 70, which enablescommunication by and with the personal computer 240 via standardtelephone lines.

The personal computer 240 preferably has a battery backup as well as ameans for detecting a loss in electrical power such that, whenelectrical power is lost the battery backup will provide sufficientoperating time for the personal computer 240 to notify someoneresponsible for the maintenance of the system that there has been a lossof electricity. Notification of the loss of electricity can beimportant, since the loss of electrical power can be an indication of aburglary. Additionally, if there is no electricity, then appliances,such as refrigerators, air conditioners, and heaters, cannot functionand significant damage can results if the electrical failure goesundetected for a substantial period of time.

With regard to the wireless router 250, it is represented as beingseparate from the personal computer 240, however, the wireless router 42could alternatively form part of the personal computer 240. The wirelessrouter 42 is used, inter alia, to establish a wireless network and isdisposed in electronic communication with the personal computer 240. Therouter 250 is Wi-Fi compliant, and operates using a standardizedprotocol such as, for example, 802.11(b) and/or 802.11(g).

The wireless router 250 facilitates two-way communication over the localarea network 2200 among the member devices and components of thewireless network 2200. Furthermore, the wireless router 250 preferablyis disposed in electronic communication with the Internet andfacilitates two-way communication between the member devices andcomponents of the wireless network 2200 and remote devices communicatingover the Internet. Such remote devices generally include video phones275; in-car communication systems, such as the well known ONSTAR system274 currently found in GM cars; telephones 276; cell phones 277;personal computers 278; smartphones/personal digital assistants (PDAs)279; and other similar communication devices. Each remote devicepreferably is configured for electronic communication with one or moreof the member devices and components of the wireless network 2200 via atleast the PSTN connection 270 or a broadband Internet connection.Additionally, a remote device may be configured to communicate with oneor more of the member devices and components of the wireless network2200 via direct wireless communications with the wireless router 250when such remote device is within communications range of the wirelessrouter 250. Such direct wireless communications with the wireless router250 is illustrated with the cell phone 277 in FIG. 6.

The wireless command computer includes a digital video systemapplication (“DVS App”) 242 and a monitoring application 244. The DVSApp 242 provides a set of customizable operating parameters for thewireless digital camera 210. The set of digital video operatingparameters may include parameters selected from the group of: a defaultcamera position; a number of frames per second; sensitivity andthreshold of a motion sensor; length of a session; frequency of motiondetection; and sensitivity and threshold of the motion detector. Theseparameters are conveyed to the camera operation application, discussedin further detail below. The monitoring application 244 includes acamera control screen that displays the camera webpage; and an operatingscreen that displays a set of operating parameters. The set of operatingparameters may include parameters selected from the group of: a cardfile for cross-referencing MAC ID'S with cameras and pocket PCs on thewireless network; paths for logging and archiving files received fromthe camera; camera webpage addresses; email addresses for users;telephone numbers for cell phones; a designated greeting when a motionsensor is triggered; and security parameters. The monitoring application244 further includes an audio library screen that displays the contentsof a library of pre-recorded audio files. Typically, at least onepre-recorded audio file is a greeting audio file. In the context of thesystem 2100, the audio file can be sent over the local area network2200, and can include, for instance, sounds, music, voice recordings,synthesized noises, and the like. The means of generating an audio filecan be a microphone that feeds to an AID converter, which creates adigital audio file, such as a way file or MP3 file, or a voicesynthesized digital audio file. The monitoring application 244 generallyincludes a means of generating an audio file, and a command computerwebsite that provides a command webpage with graphic controls forreviewing archived files. The monitoring application can further includea set of monitoring parameters that define the criteria for keeping ordeleting a video file in memory, wherein the criteria includes availablememory on system, age of file, and priority. The monitoring applicationalso can further include an option to designate that the digital cameratransmit video and audio data to more than one member device of thewireless network, and/or to split up audio and video data to two or moremember devices. This feature is desirable if, for instance, it ispreferred that either audio or video not be sent, or if a network memberdevice—for instance a cell phone—is not configured to process both audioand video data. The monitoring application 244 also can include settingsfor notifying one or more designated individuals or a security serviceif an alarm is activated or if a predetermined condition is otherwisedetected by a sensor. Such sensors may include, for example, smokedetectors, carbon monoxide detectors, laser beam detectors, brokenwindow detectors, temperature detectors, radiation detectors, radondetectors, open window, door detectors, or a combination thereof.Moreover, such sensors may communicate via the local area network 2200.

The system 2100 includes a wireless digital camera 210 located on theexterior of the home or office proximate the door 2116. The wirelessdigital camera 210 includes a website application 246 and a cameraoperation application 247. The wireless digital camera 210 is shown infurther detail in FIGS. 7-9. The wireless digital camera 210 preferablycreates a series of images that are stored as a series of jpeg fileswhich are displayed on a webpage of a website application 246 that isunique to a given camera 210. The camera 210 also includes a microphone218, and the sound recorded by the microphone is digitized as an audiofile, such as a .wav file or an MP3 file, that is transmitted along withthe video as an audio file. This camera 210 preferably has a splashresistant body 225, a lens cover 238 over lens 216, and a wirelesstransceiver for audio 2-way audio communication. Furthermore, thiscamera 210 can pan, tilt, or move to a pre-set position. The camera 210includes a motion sensor that triggers video recording with surveillanceimage quality, refreshing its image 30 frames per second, and includes acharge coupled device sensor to compensate for low light conditions.Communications via the wireless camera 210 also preferably areencrypted. The splash resistant body 225 allows the camera 210 to beused indoors or outdoors. The camera 210 also supports IPv6 (InternetProtocol Version 6). The audio feature of the camera 210 uses a Javaapplet that is installed during the installation. The camera 210 has amemory card 222 that is protected by a sealing door 224, a proximitydetector or motion sensor 220, a microphone 218, a power input 226, anexternal microphone port 230, a LAN port 236, and a speaker port 232.The illustrated camera 210 has four mounting legs 234 and a mountingstand hole 235. The antenna 214 projects from the rear of the camera. Asuitable wireless digital camera that has weather resistance is thecamera currently sold in the United States by Panasonic under the partnumber BB-HCM371.

Every camera in the system 2100 preferably can be uniquely identified bya media access control (MAC) address that enables the personal computer240, and each device in the system 2100 having a web browser, such as,e.g., a Windows Internet Explorer browser, or a Firefox browser, to bein wireless communication with camera 210 through the wireless router250. While only one camera 210 is shown in FIG. 6, multiple cameras canbe included in the system 2100, each with its own unique websiteaccessible by multiple devices in the system 2100 having Internetbrowsers. In addition to displaying the video and audio on the camera'swebpage, the website application 246 of the camera 210 displays graphiccontrols for actuating the camera 210, such as panning right and left,up and down, zoom in and zoom out, and adjustments for the amount ofambient light. These controls are illustrated in FIG. 11.

As previously stated, the camera 210 has a motion sensor 220 fordetecting the presence of a person or a moving object with an adjustablelevel of sensitivity and a trigger threshold for initiating videorecording, and, optionally issuing a verbal response, such as agreeting. The verbal response is an audio file, which can reside in thecamera's memory as well as in the personal computer, in which case theverbal response can be transmitted, via the local area network 2200, tothe camera 210. The camera 210 typically has a pre-set or defaultposition, which can be static or dynamic. For instance, the camera 210can be programmed to pan back and forth through a pre-set cycle or tozoom in and out, or any combination thereof. The motion sensor 220 hasparameters for setting the sensitivity and a trigger threshold forinitiating video recording. Upon initiation, the camera automaticallystarts recording video, which is displayed on the camera webpage in theform of video images, typically in serial form. The recording furthercan be transmitted to the personal computer 240 for saving for laterviewing. In an alternative embodiment, the camera does not include amotion sensor 220 in the form of an additional piece of hardware but,instead, detects motion via a software application that analyzes thevideo images. In this alternative, the camera 210 records images on aroutine basis and, when motion is detected, a video recording isinitiated and a verbal response optionally is provided. Such softwarecan be executed at the personal computer 210 or can be executed at thecamera 210 and form part of the camera application 247.

The website application 246 of the digital camera 210 provides a webpagewith graphic controls for operating the camera and a viewing area forviewing video images. When activate for recording the camera 210provides digital video images that are displayed on the webpage. Thecamera 210 can be activated manually or self-activated by the motionsensor 220 that detects the presence of a person or a moving object. Themotion sensor 220 has an adjustable level of sensitivity and a triggerthreshold for initiating video recording. The camera 210 has a memorycache for saving a designated number or series of transmitted videoimages. Typically, when activated for video recording, the camera alsoactivates audio recording, which provides audio files on the webpagegenerated by the digital camera's microphone 218. The camera 210 alsoincludes means including the speaker 218 for playing received audiofiles.

Referring to FIG. 10, the screen 2200 for setting the parameters of theDVS application 242 is illustrated. Communications over the local areanetwork 2200 between the camera 210 and command computer 240 areestablished using a MAC address of the camera 210 and/or an IP address2224 for the camera. The default port 2226 for communications is 80. Thecamera 210 recognizes an encrypted username and password 2202. The DVSapplication 242 encrypts the username 2224 and the password 2222, usingthe generator 2203, resulting in the encrypted version 2202. Thehierarchical structure of the member devices of the wireless network isdefined in 2220, 2219 and 2205. The command computer 240 designated isnamed “Server”, as shown in the Username textbox 2221. The client portfor uploading audio files 2219 is given as port 5999. An example of aclient is a pocket PC 260 or cell phone 277 having a web browser. Thelistener port 2205 for down loading audio files is port 5998. The camera210 has access to the audio files in a network-shared folder having adesignated path 2220. When a greeting/verbal response is triggered bythe motion sensor 220, the file is read from the shared folder 2220.Audio files received by the command computer 240 from the camera 210 aresaved in the audio capture folder 2218. The received audio files can beaccessed by the client, pocket PC 260, or cell phone 277, as well as thecommand computer 240. The door reset time 2216 is a parameter thatdesignates the length of time in seconds that must pass after the motionsensor 220 no longer detects a visitor before a recording is stopped.The door audio record timer 2212 is the length of a visitor's message inseconds. The default video archived frames 2209 is the number of imagesor frames that are saved as an archived file. The archived video file2216 can be played back at various speeds. The archived video loop framerate 2216 is in frames per millisecond. Recall that the camera iscapable of generating 30 frames, or 30,000 frames per millisecond. Thisfeature 2216 allows the video to be slowed down. If the administratorwishes to cut off archiving audio files, the administrator can selectthis in box 2213. If the administrator wishes to cut off archiving videofiles, the administrator can select this in box 2209. The audio filescan be turned off completely by using the audio playback parameter 2215.The DVS application 242 can be set to send a message to a cell phone oranother computer. The phone email trigger 2207 sets this parameter, andthe email address is entered into phone email address parameter 2207.The DVS enables different greetings/verbal responses to issue dependingon pre-set criteria. The time of day is one criterion. As shown in FIG.10, there are three audio files: “cats.wav” 2208 a, “creek.wav” 2208 band “dracwelcome.wav” 2208 c, each of which will be triggered dependingon the time of day. Pairs of boxes 2210 a are set from 7 to 12, textboxes 2210 b are set from 13 to 17, and text boxes 2210 c are set from18 to 6. At 13 hours, or 1 PM, the greeting switches from “cats.wav”2208 a to “creek.wavfl 2208 b, and at 6 PM the greeting switches from“creek.wav” 2208 b to “dracwelcome.wav” 2208 c. As will be discussedbelow, additional options also exist for playing the audio files.

As shown in FIG. 11, the camera's webpage is incorporated as a screen inthe monitoring application 244 of the wireless command computer 240. Inthe screenshot of the monitoring application 2300 of FIG. 11, the lowermain screen 2301 displays the camera webpage. The camera webpage iscomprised of the streaming video images 2301, an icon 2322 for taking asnapshot, an icon 2323 enabling the user to talk via the camera usingthe command computer's microphone, an icon 2324 enabling the user tohear sound picked up by the camera's microphone 218, and icon 2325enabling the user to zoom in and out. Additionally the webpage hasgraphic controls for remotely positioning the camera, adjustingbrightness and automatic panning. The cross-shaped icon on the side hasleft arrow 2319 for turning the lens left, a right arrow 2317 forturning the lens right, an up arrow 2318 for turning the lens up, a downarrow 2320 for turning the lens down, and a center button 2321, whichreturns the camera to its default position. On the bottom of the webpageis an icon 2310 a for increasing the brightness when the light is low,and icon 2310 b for decreasing the brightness when the light is high.Icon 2312 sets the brightness to the default position, and icon 2316 isa reset button that returns all parameters to the factory settings. Thecamera automatically pans back and forth when button 2313 is clicked,and pans up and down when button 2315 is clicked. Panning is stopped byre-clicking the pan icons. The double curved arrow icon 2316 refreshesthe camera controls. The audio library screen 2330 contains a list ofall the currently recorded audio files. A scroll bar 2331 enables theuser to quickly move down the list. To play a selection, a file isselected with the cursor, and then arrow icon 2332 is clicked. The checkicon 2333 designates a file as a greeting/verbal response file. Thesquare icon 2334 is the stop button, the plus icon 2335 initiates amodule for adding a new audio file, the X icon 2336 deletes a selectedaudio file, the double arrow icon 2337 causes all checked audio files tobe played in random order, and the icon 2338 is a reset button. The topscreen 2308 contains a number of options, including starting and runningthe DVMS service. Large button 2341 turns the program off when clicked,and on when clicked again. Clicking on the lock icon 2342 actuates thedoor lock. Screen 2343 contains information about what is occurring atthe camera, and other system performance information. Drop down icon2344 opens a dialog box mapping all the sounds and multimediaproperties. Drop list icon 2345 displays a list of input devices, suchas the microphone on the command computer 240, when talking directly tothe camera 210, which needs to be selected to conduct real timeconversations. The connected devices screen 2351 displays a list of thewireless network deices, and whether they are currently available. Thearchives button 2346 activates a screen that lists all the archivedvideo and audio files, and a timestamp for when they were created. Theoptions button 2347 activates the DVS screen 2200 for configuring theapplication.

The camera has a software package that is run when initializing a new oran addition camera, where communication is established using the MACaddress and the subsequent assignment of an IP address. Clicking thecamera button 2348 starts that software. The about button 2349 hasgeneral information about the version of the DVMS system and contactinformation. The status button 2350 clears screen 2351.

When recording an audio file, the user can use a synthesizer module orvoice recording module. The synthesizer module is a dialog box 2400shown in FIG. 12, and the voice recording module is a dialog box 2500shown in FIG. 13. The synthesizer module and the voice recording modulesare Microsoft open source modules. In the voice synthesizer module, textis entered into screen 402 and then saved in path 404. An animatedcharacter/agent pops up on the command computer when the audio file isplayed, and characteristics of the agent are selected using screens2406, 2408, 2410. For instance, a wizard can be selected as the MSAgent, and the wizard flies quickly, and speaks loudly with a low pitch.In FIG. 13, the user can record his or another's voice, or some sound,music, or other audible sound.

The local area network 2200 optionally includes one or more portabledevices such as the pocket PC 260 represented in FIG. 6 and shown indetail in FIG. 14. The pocket PC 260 is configured with a client DVMSapplication. The pocket PC 260 is wireless, having antenna 262 thatcommunicates with the personal computer 240 and the wireless digitalcamera 210 via wireless modem 250. Similar to the personal computer 240,the pocket PC 260 includes a display screen 2802 for viewing streamingvideo from the digital camera 210, an “Image” icon 2822 for saving asnapshot, a listen icon 2824 which plays audio from the camera, and atalk icon 2823 for transmitting audio to the camera. The audio volume isadjusted using thumb wheel 261. The pocket PC 260 further includescontrols for pointing the camera in the desired direction including:menu selection 2819 for left, menu selection 2818 for up, menu selection2817 for right, menu selection 2820 for down, and menu selection 2821 toreturn to the camera 210 the default position. The door lock is unlockedfor access using menu selection 2808, which transmits an access code inthe form of text to the locking mechanism 2114. The lower screen 2843displays the status of member devices in the local area network 2200.The library of audio files is accessible through the set button 2830,and the play button 2833 selects the audio file to be played.

While not explicitly shown, it is anticipated that the system 2100 mayinclude voice recognition and image recognition for additional securityin authentication and access.

The system provides the options of allowing the visitor to converse withthe occupant, leave a message, or call a remote peripheral device forcommunication with the occupant when he is either not present orunavailable. The visit is recorded and time stamped for sorting orviewing either in real time or at a later date. The system achievesthese features, while still presenting a system that is intuitive andeasy to use. The digital video monitoring system is extensible,scalable, and flexible in that the number of members of the wirelessnetwork can be readily expanded, the system provides and audio and videorecord of events, and a number of the components are currentlyoff-the-shelf computerized devices that can be configured for thesystem. Finally, the system allows the users to achieve a high level ofsecurity and anonymity.

As will be apparent from the foregoing, the system 2100 enables wirelessaudio-video communication by all the member devices with each digitalcamera and the command computer; the system 2100 enables the option ofhaving a visitor converse with an occupant, leave a message, or contacta remote device for communication with a member of the network that isoffsite; the system 2100 enables a wireless digital camera to generateand audio and video recording of a visitor upon the sensing that avisitor is proximate the door, with the recording being viewed in realtime, or at a later time, either locally or remotely; the system 2100 ishighly extensible and can be easily adapted to control many cameras, theimages of which can be simultaneously viewed by multiple individuals bymerely browsing the individual camera's website that is unique to eachcamera. The system 2100 also is highly scalable due to the incorporationof a wireless network in the local area network 2200; the system 2100enables an alarm and or automated calls to designated institutions andindividuals when there is a security breach detected; the system 2100allows users having the proper privileges to remotely permit entrance toa building; the system 2100 can be customized to reflect holidays,special occasions, and various levels of security.

Based on the foregoing description, it will be readily understood bythose persons skilled in the art that the present disclosure issusceptible of broad utility and application. Many embodiments andadaptations of the present disclosure other than those specificallydescribed herein, as well as many variations, modifications, andequivalent arrangements, will be apparent from or reasonably suggestedby the present disclosure and the foregoing descriptions thereof,without departing from the substance or scope of the present disclosure.Accordingly, while the present disclosure has been described herein indetail in relation to one or more preferred embodiments, it is to beunderstood that this disclosure is only illustrative and exemplary ofthe present disclosure and is made merely for the purpose of providing afull and enabling disclosure. The foregoing disclosure is not intendedto be construed to limit the present disclosure or otherwise exclude anysuch other embodiments, adaptations, variations, modifications orequivalent arrangements, the present disclosure being limited only bythe claims appended hereto and the equivalents thereof.

The invention claimed is:
 1. A method for receiving a person at anentrance, said method comprising: (a) providing a software applicationon a remote peripheral device, comprising a cell phone, that isconfigured to display digital video of the person located proximate theentrance, wherein the digital video is transmitted wirelessly by anexterior device comprising a keypad, a microphone, a speaker, aproximity sensor and a battery, the exterior device located proximatethe entrance; (b) receiving the digital video and audio wirelessly bythe software application on the remote peripheral device from theexterior device after one or more buttons of the keypad is activated ordetection by the proximity sensor occurs; (c) providing a graphical userinterface through the software application on the remote peripheraldevice by which a user of the remote peripheral device can view thedigital video and audio in real time from the exterior device andreceive a message after the keypad is pressed; (d) providing livestreaming video on the graphical user interface when an event occursthat is separate and apart from either pressing of the one or morebuttons of the keypad or detection by the proximity sensor of the personat the entrance; (e) providing an image associated with entrance on thegraphical user interface; (f) providing recorded video associated withthe entrance on the graphical user interface and playing recorded videoon the graphical user interface; (g) providing a defined hierarchy ofstorage on a remote computer for storing recorded digital video andaudio; (h) storing recorded digital and audio from the exterior devicepursuant to the defined hierarchy of storage; (i) displaying a time,date or any combination thereof associated with a visitor historyassociated with the exterior device; (j) storing video and audio databased upon a timestamp in a database; and (k) creating a redundantsystem of computers for execution of the database.
 2. The method ofclaim 1 further comprising: providing an interior device with a displayscreen, a microphone, a speaker, and a transceiver configured tocommunicate with the exterior device.
 3. The method of claim 1 furthercomprising: creating prompts, by an administrator, that define thebehavior of one or more of the exterior device and the remote peripheraldevice; and providing a second message associated with the exteriordevice on the graphical user interface based upon a second event.
 4. Themethod of claim 1 further comprising: designating at least one secondaryexterior device for monitoring a location that is not proximate theentrance, the at least one secondary exterior device comprising acamera, a microphone, a speaker, an RF receiver, an RF transmitter, anda proximity detector.
 5. The method of claim 4 further comprising:configuring the at least one secondary exterior device to wirelesslystream digital video data to the software application.
 6. The method ofclaim 4 further comprising: assigning a network designation to eachsecondary exterior device; providing on the graphical user interface animage, access to recorded video, and a timestamp of an event associatedwith the entrance at the same time; providing an electrical connectionon the exterior device; and displaying a notification on the graphicaluser interface when the proximity detector detects the presence of theperson at the entrance.
 7. The method of claim 1 further comprising:configuring a secondary interior device to wirelessly stream digitalvideo data to the remote peripheral device.
 8. The method of claim 1further comprising: controlling an electronically actuated lock remotelyby the remote peripheral device.
 9. The method of claim 1 furthercomprising: configuring the software application with multiple controlsettings, wherein the multiple control settings include emergencynumbers that are to be called.
 10. The method of claim 1 furthercomprising: deploying voice recognition capabilities.
 11. The method ofclaim 1 further comprising: administering user access on the softwareapplication.
 12. The method of claim 1 further comprising: allowingvoice input by the user on the software application such that anactuated door lock associated with the entrance can be actuated; andreceiving instructions from the exterior device on the softwareapplication executing on the peripheral device regarding an event at theentrance.
 13. The method of claim 12 further comprising: creatingvarious passwords for access to a database and including at least onetelephone number to be called upon one or more events occurring at theentrance.
 14. The method of claim 1 further comprising: designating acomputer as the remote peripheral device.
 15. The method of claim 1further comprising: storing the digital video with a time-stamp on ahard drive that communicates wirelessly with the exterior device. 16.The method of claim 1 further comprising: coordinating multiplecommunication devices to define responses to events.
 17. The method ofclaim 16 further comprising: tailoring premise monitoring responsesbased the events of at least one of the multiple communication devices.18. The method of claim 1 further comprising: recording audio and videoassociated with the exterior device, the audio and video having abeginning timestamp.
 19. The method of claim 1, further comprising:transmitting live streaming video from a second exterior devicecomprising a video camera.