Security focused system for smart windows

ABSTRACT

A smart window-based security system is provided. The system includes a plurality of smart windows, each smart window of the plurality of smart windows having at least one electrochromic window and at least one sensor integrated into the smart window. The plurality of smart windows are coupled together in a system having at least one processor configured to detect a personal or property security threat, such as an intruder or fire based, on information from sensors of the plurality of smart windows.

BACKGROUND

Electrochromic devices, in which optical transmissivity is electricallycontrolled, are in current usage in building windows and in dimmableautomotive rearview mirrors. Generally, electrochromic windows for abuilding are controlled with a driver and a user input, e.g., a dimmercontrol. Electrochromic rearview mirrors in automotive usage often havea light sensor aimed to detect light from headlights of automobiles, andare user-settable to engage an auto-dim function that adjusts the tintof the mirror based on input from the light sensor. There is a need inthe art for a control system for electrochromic devices which goesbeyond such basic settings and functions.

SUMMARY

In some embodiments, a smart window-based security system is provided.The system includes a plurality of smart windows, each smart window ofthe plurality of smart windows having at least one electrochromic windowand at least one sensor integrated into the smart window. The pluralityof smart windows are coupled together in a system having at least oneprocessor configured to detect a personal or property security threatbased on information from sensors of the plurality of smart windows.

In some embodiments, a security system with smart windows is provided.The system includes a plurality of smart windows networked to form asystem having at least one processor. The plurality of smart windowseach integrates therein one or more sensors and at least oneelectrochromic window. The at least one processor is configured tocontrol transmissivity of the at least one electrochromic window of eachof the plurality of smart windows, based on information from theplurality of smart windows and the at least one processor is configuredto sense a personal or property security threat, responsive to theinformation from the plurality of smart windows.

In some embodiments, a method of operating a security system havingsmart windows, performed by at least one processor, is provided. Themethod includes receiving sensor information from a plurality of smartwindows each having at least one electrochromic window and at least onesensor, wherein the at least one electrochromic window is operated inaccordance with the at least one sensor. The method includes detecting asecurity event, based on the sensor information.

Other aspects and advantages of the embodiments will become apparentfrom the following detailed description taken in conjunction with theaccompanying drawings which illustrate, by way of example, theprinciples of the described embodiments.

BRIEF DESCRIPTION OF THE DRAWINGS

The described embodiments and the advantages thereof may best beunderstood by reference to the following description taken inconjunction with the accompanying drawings. These drawings in no waylimit any changes in form and detail that may be made to the describedembodiments by one skilled in the art without departing from the spiritand scope of the described embodiments.

FIG. 1 is a system diagram of a smart window system that has adistributed device network control system architecture in accordancewith some embodiments.

FIG. 2 is a system diagram of a smart window that has an electrochromicwindow and a window frame with an embedded module in accordance withsome embodiments.

FIG. 3 is a system diagram of an intelligent window controller/driver,from the smart window system of FIG. 1 in accordance with someembodiments.

FIG. 4 is a system diagram of a command and communication device, fromthe smart window system of FIG. 1 in accordance with some embodiments.

FIG. 5 is a block diagram showing aspects of the distributed devicenetwork control system architecture of FIG. 1 in accordance with someembodiments.

FIG. 6 is a system action diagram showing actions of a security focusedsystem for smart windows, in an embodiment of the smart window system ofFIG. 1 in accordance with some embodiments.

FIG. 7 is a system diagram of an embodiment of a smart window withvarious sensors suitable for the security focused system of FIG. 6 inaccordance with some embodiments.

FIG. 8 is a diagram of a variation of the smart window of FIG. 7 inaccordance with some embodiments.

FIG. 9 is a scenario diagram showing the security focused system forsmart windows detecting an intruder in accordance with some embodiments.

FIG. 10 is a scenario diagram showing the security focused system forsmart windows detecting a fire in accordance with some embodiments.

FIG. 11A depicts the security focused system for smart windows directingmaximum optical transmissivity of the smart windows, and turning on thelights, as a response to a security event in accordance with someembodiments.

FIG. 11B depicts the security focused system for smart windows directingthe smart windows to cycle transmissivity, as a response to a securityevent in accordance with some embodiments.

FIG. 11C depicts the security focused system for smart windows directingminimum optical transmissivity of the smart windows, as a nighttime orprivacy tint function in accordance with some embodiments.

FIG. 12 depicts the security focused system for smart windows directinglights off and minimum transmissivity of all smart windows in aspecified “safe room”, and directing all other lights on and maximumtransmissivity of all other smart windows elsewhere in the system, as aresponse to a security event in accordance with some embodiments.

FIG. 13 is a flow diagram of a method of operating a smart window-basedsecurity system, which can be practiced on or using embodiments of thesmart window system in accordance with some embodiments.

FIG. 14 is an illustration showing an exemplary computing device whichmay implement the embodiments described herein.

DETAILED DESCRIPTION

A smart window system, disclosed herein, has a distributed devicenetwork control system architecture that can distribute control ofoptical transmissivity of smart windows across the smart windows,intelligent window controller/drivers, a command and communicationdevice, and one or more resources on a network. A smart window withinsuch a system can be defined as a window with some local and/or externalor remote computer processing capabilities and which is connectable tothe internet. In some embodiments the window is an electrochromic windowbut this is not meant to be limiting as non-electrochromic windows maybe smart windows as described herein. Electrochromic andnon-electrochromic windows may be integrated into the same system insome embodiments. The smart window may function as a glass partition insome embodiments and be within an interior of a structure rather thanhave one surface facing an exterior in some embodiments. The smartwindow system combines input from sensors integrated with the smartwindows, user input, and information and direction from the network tocontrol the smart windows in an interactive, adaptive manner. Controlcan shift from one component to another, be shared across multiplecomponents, or be overridden by one component of the system, in variousembodiments. The distributed nature of the architecture and the controlsupport various system behaviors and capabilities. FIGS. 1-5 showvarious embodiments of a smart window system and the distributed devicenetwork control system architecture. FIGS. 6-13 illustrate a securityfocused system for smart windows, with system behaviors and capabilitiesinclusive of those described above but also featuring specializedbehaviors and capabilities dedicated to detecting and reacting tosecurity events. These embodiments have various mechanisms for detectinga personal or property security threat such as an intrusion or anintruder, a fire or smoke, carbon monoxide, chemical or other hazardousair quality, etc., and for controlling transmissivity of smart windowsso as to prove advantageous to occupants or emergency personnel.

FIG. 1 is a system diagram of a smart window system that has adistributed device network control system architecture in accordancewith an embodiment of the present disclosure. The system is both modularand distributed, and is suitable for installation in various living,working or commercial spaces, such as an apartment, house, an office, abuilding, a store, a mall, etc. Modularity allows for replacement ofindividual components, upgrades, expansion, linking of two or moresystems, and communication in the system and among multiple systems.Wireless couplings, wired couplings, and combinations thereof aresupported by the smart window system. Although antennas 124 are shownfor the wireless coupling, further embodiments could use infraredcoupling.

Control is distributed across one or more first control systems 114,with one in each smart window 102, one or more second control systems116, with one in each intelligent window controller/driver 104, a thirdcontrol system 118 in a command and communication device 106, and afourth control system 120 in a server 108 coupled to a network 110. Eachsmart window 102 has an antenna 124 and is thereby wirelessly connectedto a nearby intelligent window controller/driver 104, also with anantenna 124. In further embodiments, a wired connection could be used.Each intelligent window controller/driver 104 is wirelessly connected tothe command and communication device 106, which has an antenna 124. Infurther embodiments, a wired connection could be used. The command andcommunication device 106 is coupled to a network 110, such as the globalcommunication network known as the Internet. This coupling could be madevia a wireless router (e.g., in a home, office, business or building),or a wired network connection. User devices 136 (e.g., smart phones,computers, various computing and/or communication devices) can couple tothe command and communication device 106, for example by a directwireless connection or via the network 110, or can couple to the server108 via the network 110, as can other systems 138 and big data 112. Insome embodiments, the server 108 hosts an application programminginterface 140. The server 108 could be implemented in or include, e.g.,one or more physical servers, or one or more virtual servers implementedwith physical computing resources, or combinations thereof.

Modularity of the system supports numerous layouts and installations.For example, each windowed room in a building could have one or moresmart windows 102 and a single intelligent window controller/driver 104for that room. An intelligent window controller/driver 104 could controlsmart windows 102 in part of a room, an entire room, or multiple rooms.The intelligent window controller/driver(s) 104 for that floor of thebuilding, or for a portion of or the entire building in someembodiments, could tie into a single command and communication device106, which is coupled to the network 110 and thereby coupled to theserver 108. In a small installation, one or more smart windows 102 couldcouple to a single intelligent window controller/driver 104 for localdistributed control, or a single command and communication device 106for both local and network distributed control. Or, an intelligentwindow controller/driver 104 could be combined with the command andcommunication device 106, in a further embodiment for small systems thatuse both local control and network information. Large systems, e.g., formultiple occupant buildings, could have multiple command andcommunication devices 106, e.g., one for each occupant or set ofoccupants, or each floor or level in the building, etc. Upgrades orexpansions are readily accommodated by the addition of furthercomponents according to the situation.

In one embodiment as shown in FIG. 1, the command and communicationdevice 106 has a wireless interface 128, a wired interface 130, acontrol system 118, a rules engine 132, a network interface 134, and auser I/O (input/output) module 142. The wireless interface 128 and/orthe wired interface 130 are used for coupling to the intelligent windowcontroller/driver(s) 104. The network interface 134 is used forconnecting to the network 110. For example, the network interface 134could connect to a wireless router or Wi-Fi, e.g., via the wirelessinterface 128, or to a wired network via the wired interface 130. Insome embodiments, the wireless interface 128 and/or the wired interface130 can couple to third-party devices for sensing, input and/or output(see, e.g., description regarding FIG. 3). The rules engine 132 usesinformation from the network 110, which can include direction from thefourth control system 120 in the server 108, and can include informationfrom user devices 136, other systems 138, or big data 112, to create,populate, modify, or adapt various rules for operation of the smartwindows 102. The user I/O module 142 accepts user input, e.g., viabuttons, a touchscreen, etc., and displays user output, e.g., via adisplay screen or with LEDs or other lamps, etc. Some embodiments maylack the user I/O module 142, or have a user input module or an outputmodule. In keeping with the nature of this distributed control system,the third control system 118 of the command and communication device 106can direct operation of the smart windows 102, the second control system116 of the intelligent window controller/driver(s) 104 can directoperation of the smart windows 102, the fourth control system 120 of theserver 108 can direct operation of the smart windows 102, and/or thefirst control system 114 of each smart window 102 can direct operationof that smart window 102, in various combinations. Some embodiments havea failover mechanism, in which control and/or communication are routedaround a failed device in the system.

As shown by the dashed lines, communication can proceed amongst variousmembers of the smart window system over various paths, in variousembodiments. In some embodiments, a message or other communication ispassed along a chain, such as from a smart window 102, to an intelligentwindow controller/driver 104, or via the intelligent windowcontroller/driver 104 to the command and communication device 106, andvice versa. In some embodiments, a device can be bypassed, either bydirect communication between two devices or by a device acting as arelay. For example, a smart window 102 could communicate directly with acommand and communication device 124 wirelessly via the wirelessinterface 128 or via the wired interface 130. Or, an intelligent windowcontroller/driver 104 could relay a message or other communication, ascould the command and communication device 106. In some embodiments,messages or communications can be addressed to any component or devicein the system, or broadcast to multiple devices, etc. This could beaccomplished using packets for communication, and in some embodimentsany of the control systems 114, 116, 118, 120 can communicate with thecloud, e.g., the network 110.

FIG. 2 is a system diagram of a smart window 102 that has anelectrochromic window 204 and a window frame 202 with an embedded module206. The embedded module 206 could be positioned at the bottom, top, toone or both sides, or distributed around the window frame 202 in variousembodiments. The embedded module 202 has one or more sensors 212, whichcould include temperature, light, audio/acoustic (i.e., sound),vibration, video or still image, motion, smoke detection, chemical,humidity or other sensors, and which could be facing inwards, i.e., intoa room, or outwards, i.e., to the exterior of the room or building, invarious embodiments. The wireless interface 128 has an antenna 124,which is used for coupling to the intelligent windowcontroller/driver(s) 104, the command and communication device 106,and/or one or more user devices 136 (e.g., a smart phone, a userwearable device, etc.). A wired interface 130 could also be included, orcould be used in place of a wireless interface 128. The control system114, shown as the first control system 114 in FIG. 1, provides localcontrol for the electrochromic window 204 via the voltage or currentdriver 208. Alternatively, the control system 114 participates indistributed control. Some embodiments have a rules engine 132 in themodule 206. The voltage or current driver 208 sends voltage or currentto bus bars of the electrochromic window 204, as directed by one or moreof the control systems 114, 116, 118, 120, to control transmissivity ofthe electrochromic window 204. In some embodiments, to changetransmissivity of the electrochromic window 204, the voltage or currentdriver 208 provides constant current until a sense voltage of theelectrochromic window 204 is reached. Then, the voltage or currentdriver 208 provides a current that maintains the sense voltage at aconstant voltage, until a total amount of charge is transferred to theelectrochromic window 204 for the new transmissivity level. The embeddedmodule 206 also includes an input device 214, or a user I/O module 142,through which user input can be entered at the smart window 102. In someembodiments, user input can also be entered through the wirelessinterface 128, e.g., from a smart phone.

FIG. 3 is a system diagram of an intelligent window controller/driver104, from the smart window system of FIG. 1. The intelligent windowcontroller/driver 104 includes a wireless interface 128 with an antenna124, a wired interface 130, a user I/O module 142, and a control system116, which is shown as the second control system 116 in FIG. 1. Someembodiments have a rules engine 132. The wireless interface 128 couplesto one or more smart windows 102 via the wireless interface 128, asshown in FIG. 1, although the wired interface 130 could be used infurther embodiments. Either the wireless interface 128 or the wiredinterface 130 can be used to couple to the command and communicationdevice 106, in various embodiments. In some embodiments, the wirelessinterface 128 and/or the wired interface 130 can couple to furtherdevices, such as third-party devices for input information, sensing orcontrol output. For example, the system could control or interact withlighting controllers, HVAC (heating, ventilation and air-conditioning,e.g., by coupling to a thermostat), burglar and/or fire alarm systems,sound system, desktop, smart phones, or other systems or devices, orreceive further input from further sensors, cameras, etc. It should beappreciated that the wireless interface 128 and/or the wired interface130 may accommodate voice commands through I/O module 142 or some otherinput device. In some embodiments, non-control output and informationexchange can be completed with a third party device for analyticalpurposes. The user I/O module 142 could include buttons, a touchpad, atouchscreen, a display screen, etc., for user input to the system and/oroutput from the system. The second control system 116 participates indistributed control with the first control system 114 of the smartwindow 102, or can override the first control system 114. In someembodiments, the second control system 116 relays direction from thethird control system 118 of the command and communication device, or thefourth control system 120 of the server 108, to one or more smartwindows 102. It should be appreciated that the location of theintelligent window controller/driver 104 may be integrated with thewindow or wall mounted proximate to a window or windows. In addition,the intelligent window controller/driver 104 may be utilized to controlother home systems, such as lights, home entertainment systems, etc.

FIG. 4 is a system diagram of a command and communication device 106,from the smart window system of FIG. 1. Since the command andcommunication device 106 is coupled to the network 110, in someembodiments the command and communication device 106 has variousprotections against unauthorized access. Here, the command andcommunication device 106 has a firewall 104, a malware protection engine408, an authentication engine 402, and a certificate repository 406. Thefirewall 104 is applied in a conventional manner, to communicationsarriving via the wired interface 130 or the wireless interface 128 (seeFIG. 1).

The authentication engine 402 can be applied to authenticate anycomponent that is coupled to or desires to couple to the command andcommunication device 106. For example, each smart window 102 could beauthenticated, each intelligent window controller/driver 104 could beauthenticated, and the server 108 could be authenticated, as could anyuser device 136 or other system 138 attempting to access the smartwindow system. The command and communication device 106 can authenticateitself, for example to the server 108. To do so, the command andcommunication device 106 uses a certificate from the certificaterepository 406 for an authentication process (e.g., a “handshake”)applied by the authentication engine 402.

The malware protection engine 408 can look for malware in any of thecommunications received by the commanded communication device 106, andblock, delete, isolate or otherwise handle suspected malware in a mannersimilar to how this is done on personal computers, smart phones and thelike. Updates, e.g., malware signatures, improved malware detectionalgorithms, etc., are transferred to the malware protection engine 408via the network 110, e.g., from the server 108 or one of the othersystems 138 such as a malware protection service.

FIG. 5 is a block diagram showing aspects of the distributed devicenetwork control system architecture of FIG. 1. Although thisarchitecture lends itself to hierarchical control, which can beperformed by overrides or blocking from components higher up in thechain, or by weighting inputs, votes, or commands, it should beappreciated that control is generally distributed across and movableamong the first control system(s) 114, the second control system(s) 116,the third control system 118 and the fourth control system 120, i.e.,distributed across and movable among the server 108, the command andcommunication device 106, the intelligent window controller/drivers 104,and the smart windows 102. Smart windows 102 can be operatedindividually, or in various groups (e.g., facing in a particulardirection, installed at a common location (height or wall area) orassociated with a particular room or group of rooms, or level or floorof a house or other building, subsets or groupings of windows, and soon) using this distributed control architecture. Generally, each controlsystem 114, 116, 118, 120 controls or directs one or more of the smartwindows 102, in cooperation with other members of the system. Eachcontrol system 114, 116, 118, 120 has respective rules, e.g., the firstcontrol system 114 has first rules 502, the second control system hassecond rules 504, the third control system 118 has third rules 506, thefourth control system 120 has fourth rules 508. Each control system 114,116, 118, 120 operates according to its local rules, which mayincorporate rules distributed from other devices, unless overridden byanother device in the system. Rules can include cooperation with otherdevices, and rules can include instructions allowing for when anoverride is permissible. For example, an intelligent windowcontroller/driver 104 could override a smart window 102, the command andcommunication device 106 could override an intelligent windowcontroller/driver 104 or a smart window 102, the server 108 couldoverride the command and communication device 106, an intelligent windowcontroller/driver 104, or a smart window 102, or user input at one ofthe devices or from a user device 136 or software or applicationresident on the device could override one or more of these. Informationfrom the sensors 212 of the smart window(s) 102 enters the systemthrough the first control system(s) 114, and can be routed or directedto any of the further control systems 116, 118, 120. Information 510from the network enters the system through the fourth control system120, i.e., the server 108, and/or the third control system 118, i.e.,the command and communication device 106, and can be routed or directedto any of the further control systems 114, 116. User input can enter thesystem through the smart windows 102, e.g., through user input at thatsmart window 102 or wireless user input from a user device 136 to thesmart window 102. User input can also enter the system through theintelligent window controller/driver(s) 104, e.g., through user input atthe intelligent window controller/driver 104 or wireless user input froma user device 136. User input can enter the system through the thirdcontrol system 118, e.g., through a wireless coupling from a user device136 or via the network connection, e.g., from a user device 136. Userinput can enter the system through the fourth control system 120, e.g.,via the server 108. From any of these entry points, the user input canbe routed to any of the control systems 114, 116, 118, 120. Each of thecontrol systems 114, 116, 118, 120 can communicate with each othercontrol system 114, 116, 118, 120, and can update respective rules 502,504, 506, 508 as self-directed or directed by another one or combinationof the control systems 114, 116, 118, 120. Control can be cooperative,voted, directed, co-opted, overridden, local, distributed, hierarchical,advisory, absolute, and so on, in various combinations at various timesduring operation of the system, in various embodiments. It should beappreciated that user inputs can include pre-programmed rules,agent-programmed rules, user programmed rules, and artificialintelligence that acts based on rules or makes statistical or analyticalbased decisions.

In some embodiments, the smart window system operates the smart windows102 in a continuous manner, even if there is a network 110 outage (e.g.,there is a network outage outside of the building, a server is down, ora wireless router for the building is turned off or fails, etc.). Thefirst control system 114, the second control system 116 and/or the thirdcontrol system 118 can direct the smart windows 102 without informationfrom the network, under such circumstances. In various combinations,each of the control systems 114, 116, 118, 120 can create, store, shareand/or distribute time-bound instructions (e.g., instructions with goalsto perform a particular action at or by a particular time), and thesetime-bound instructions provide continuity of operation even when one ormore devices, or a network, has a failure. When the network 110 isavailable, the third control system 118 obtains weather information fromthe network, either directly at the third control system 118 or withassistance from the server 108. For example, the third control system118 could include and apply cloud-based adaptive algorithms. With these,the third control system 118 can then direct operation of the smartwindows 102 based on the weather information. One or a combination ofthe control systems 114, 116, 118, 120 can direct operation of the smartwindows 102 based on sensor information, such as from light, image,sound or temperature sensors of the smart windows 102. For example, ifthe weather information indicates cloud cover, or sensors 212 arepicking up lowered light levels, the system could direct an increase intransmissivity of the smart windows 102, to let more natural light in tothe building. If the weather information indicates bright sun, orsensors 212 are picking up increased or high light levels, the systemcould direct a decrease in transmissivity of the smart windows 102, todecrease the amount of natural light let in to the building. The systemcan modify such direction according to orientation of each window, sothat windows pointing away from the incidence of sunlight are directeddifferently than windows pointing towards incidence of sunlight. Ifweather information indicates sunlight, and temperature sensors indicatelow temperatures, the system could direct increased transmissivity ofthe smart windows 102, in order to let in more natural light andincrease heating of a building interior naturally. Or, if thetemperatures sensors indicate high temperatures, the system could directdecreased transmissivity of the smart windows 102, to block naturallight and thereby hold down the heating of the interior of the buildingby sunlight.

FIG. 6 is a system action diagram showing actions 614 of a securityfocused system for smart windows 102, in an embodiment of the smartwindow system of FIG. 1. Emphasis in embodiments of the security focusedsystem is on detecting security events, such as a break-in, an intruder,a fire, etc. One or more sensors 212 in the distributed device network602 (see depictions in FIGS. 1 and 5, and variations thereof) providesensor data which the system can use to detect a security event, andthen take action 614 and/or send alerts 626. In some embodiments, theaction 614 may be triggered by a third party device, user or cloudsignal. Distributed sensors 212 are embedded in the smart window system,specifically as embedded in smart windows 102 (see FIG. 2) and/orcoupled to intelligent window controller/drivers 104 (see FIG. 1) in thedistributed device network 602. The sensors 212 thus form one or moresmart window perimeters and a window sensor network, which becomes thedistributed intelligence of a building security system.

Sensors 212 in the system could include temperature sensors 602, cameras604, audio sensors 606, carbon dioxide sensors 608, carbon monoxidesensors 610, smoke sensors 612, chemical or hazardous air qualitysensors and so on, in various forms and combinations. Embodiments ofsensors embedded in smart windows 102 are further described withreference to FIGS. 7 and 8, and scenarios in which the sensors 212 areused to detect security events are further described with reference toFIGS. 9 and 10.

Actions 614 that the security focused system could perform, in variouscombinations, in response to a security event include an action 616 toset maximum transmissivity for smart windows (or increasedtransmissivity, as a variation), an action 618 to light path lights, anaction 620 to self-break one or more windows, an action 622 to blinklights, or an action 624 to turn off or dim lights. The above actionsare described with reference to FIGS. 11A-12. Further actions, 614 suchas opening/closing and lock/unlock windows are readily devised inkeeping with the teachings herein.

Alerts 626 that the security focused system could send, in variouscombinations, in response to a security event include a burglar orintruder alert 628, a smoke alert 630, a fire alert 632, or an email634. The system could send a text message to a user device 136, an audiomessage, a fax message, a video message (e.g., live streaming from oneor more cameras 604, or recorded video), etc. In some embodiments, auser device 136 receiving an alert 626 could then select a camera 604 oran audio sensor 606 and receive a live or recorded stream from thatdevice, or a mosaic of images or other presentation of still images,video or audio, on the user device 136 for monitoring. The user wouldthen have the option of contacting authorities or a neighbor, etc. Insome embodiments, such a live or recorded stream or other presentationcould be directed to or archived in the server 108 (see FIG. 1), whichcould aid in criminal prosecution or insurance recovery, etc.

FIG. 7 is a system diagram of an embodiment of a smart window 102 withvarious sensors 212 suitable for the security focused system of FIG. 6.In various embodiments, each smart window 102 could have one or more ofthese or other sensors 212. In some embodiments, some smart windows 102have some sensors 212, other smart windows 102 have differing sensors212, and all smart windows 102 do not necessarily have the same sensors212. Some embodiments have one or more sensors 212 embedded in a frameof the smart window 102. A thermocouple or other temperature sensingdevice could be employed as a temperature sensor 602. A video camera, astill camera or other image capturing device could be used as a camera604, which could have various lenses and/or mirrors. There could be morethan one camera 604. An acoustic or vibration sensor 702 could be usedas an audio sensor 606. For example, a piezoelectric device in thevicinity of or contacting the electrochromic window 204 can serve todetect vibration of the electrochromic window 204, and may act as amicrophone with the electrochromic window 204 as a diaphragm in someembodiments. Or, a vibration transducer, with a separate diaphragm, orwith the electrochromic window 204 as a diaphragm, could be used. Amicrophone 704 could be used as an audio sensor 606. Variousgas/chemical detection sensors, such as the carbon monoxide sensor 610and the carbon dioxide sensor 608 can be used for detecting elevatedlevels of selected gases as associated with a fire. There are varioustypes of smoke detectors and sensors 612, e.g., optical detectors,particulate detectors, and one or more of these could be used as asensor 212.

Some embodiments of the smart window 102 have a window self-break module706. This is used to break the electrochromic window 204, as a responseto a security event. For example, a mechanism similar to an automotiveairbag deployment module, with an electrically triggered chemicalreaction, could be used, as could a small explosive charge.Alternatively, an electrically heated resistive element could crack theelectrochromic window 204. In embodiments with double pane glass orplastic or the electrochromic window 204, such a chemical reactiondevice or small explosive charge could be placed in the sealed interiorof the electrochromic window 204, between the two panes, and energizedto “blow the hatch”. This could allow a person to escape a fire, byclimbing out a window. Or, it could distract an intruder, in a homeinvasion event. In case of a fire it may be beneficial to actively closeall windows mechanically and unlock the windows. The breaking of thewindow may be triggered by a knock on the window when a fire is detectedin some embodiments.

FIG. 8 is a diagram of a variation of the smart window 102 of FIG. 7.Here, the camera 604 embedded in the smart window 102 has an outwardfacing camera view 802 (e.g., facing to the exterior of the room orbuilding) and/or an inward facing camera view 804 (e.g., facing to theinterior of the room or building). This can be accomplished with onecamera appropriately mounted, two cameras, one facing inward, one facingoutward, one camera with mirrors and a split view, wide orultra-wide-angle lenses, compound lenses, etc. The outward facing cameraview 802 could be useful in detecting a possible intruder approaching asmart window 102, for example with the intent of observing a potentialtarget or breaking in. The inward facing camera view 804 could be usefulin detecting an intruder or occupant in the interior of a room orbuilding. In related matters, other sensors 212 could be mounted outwardfacing or inward facing.

FIG. 9 is a scenario diagram showing the security focused system forsmart windows 102 detecting an intruder 902. Various embodiments employa single mechanism or multiple mechanisms to detect an intrusion or anintruder 902. One mechanism is broken glass detection 906, in which anacoustic/vibration sensor 702, or a microphone 704 or other audio sensor606 detects the sound or vibration of glass breaking, as could occur ifa burglar or other intruder 902 breaks a window to get in to a house orother building. Alternatively, the system could detect that operation ofan electrochromic window 204 has suddenly changed, for example theelectrochromic window 204 no longer sustains a constant or variedcurrent during transmissivity changes, has a very different (e.g., outof a normal or expected) voltage reading across sense terminals or busbars, or the electrochromic window 204 has a sudden change in measuredresistance, etc.

One mechanism for intruder detection 902 is video detection. The outwardfacing camera view 802 could be used to detect a possible intruder 902exterior to the room or building, and this could be compared with aninward facing camera view 804 to see if the possible intruder 902 hasbecome an actual intruder 902 in the interior of the room or building.The system could be set to an “away” mode, in which detection of anymoving, human-sized object in the interior of a room or building isindicative of an intruder 902. Audio sensors 606 could be similarlyemployed. The system can then relay sensor information from the smartwindows 102 to the intelligent window controller/driver 104, and thenceto the command and communication device 106. Since the system hasdistributed processing and intelligence, analysis of video information,audio information, or other sensor information can take place at one ormore of the smart windows 102, the intelligent windowcontroller/driver(s) 104 and/or the command and communication device106, in various combinations and embodiments. For example, there couldbe distributed processing of such information, with each componentperforming part of the analysis, or components could relay rawinformation and the command and communication device 106 could performthe heavyweight analysis, etc. As an example suitable for the scenariodepicted in FIG. 9, one smart window 102 could perform broken glassdetection 906, another smart window 102 could perform video or audioverification of presence of an intruder 902, and the intelligent windowcontroller/driver 104 and/or the command and communication device 106could track movement of the intruder 902 and issue one or more alerts626 or perform one or more actions 614. The command and communicationdevice 106 could send alerts to a monitor service 906 (e.g., an alarmmonitoring service that has authorization to dispatch fire, police orother emergency personnel), the user device 136, and/or an authorizedsecondary user device 136 (e.g., that of a neighbor, relative or othertrusted person). Intruders 902 have various entry strategies, andvarious algorithms are readily developed to address these strategies andimplemented in accordance with embodiments described herein.

FIG. 10 is a scenario diagram showing the security focused system forsmart windows 102 detecting a fire 1002. One or more sensors 212 of oneor more smart windows 102 detect a fire 1002 and/or smoke 1012. Sensorinformation is relayed from the smart window(s) 102 to the intelligentwindow controller/driver(s) 104 and the command and communication device106. For example, fire could be detected by a temperature sensor 602, acamera 604, a light sensor, or an audio sensor 606 (e.g., listening forthe crackle of a fire or falling timbers). Smoke could be detected by asmoke detector/sensor 612, elevated levels of carbon dioxide could besensed by a carbon dioxide sensor 608, or elevated levels of carbonmonoxide could be sensed by a carbon monoxide sensor 610. Processing ofsensor information could be performed in various components or in adistributed manner as described above with reference to intruderdetection in FIG. 9. The command and communication device 106 sendsalerts 626 to a monitor service 906, a user device 136 and/or anauthorized secondary user device 136.

In some embodiments, the command and communication device 106, or infurther embodiments the intelligent window controller/driver(s) 104,couples to and communicates with a heating ventilation or airconditioning unit (HVAC) 1004 and/or a lighting controller 1006. Forexample, the command and communication device 106 is shown with a wiredconnection to the heating, ventilation or air conditioning unit 1004,although in further embodiments a wireless connection could be used. Theintelligent window controller/driver 104 is shown with a wiredconnection to a lighting controller 1006, although in furtherembodiments a wireless connection could be used. Or, a lightingcontroller 1006 could be integrated into an intelligent windowcontroller/driver 104 or the command and communication device 106. Incase of a fire 1002, and in response to detecting this as a securityevent, the command and communication device 106 directs the heating,ventilation or air conditioning unit 1004 to turn off all fans in orderto prevent smoke 1012 or fire 1002 from spreading. The command andcommunication device 106 could direct the intelligent windowcontroller/driver 104, or the intelligent window controller/driver 140could decide, to operate lighting in various ways when so coupled to alighting controller 1006. The intelligent window controller/driver 104could direct the lighting controller 1006 to turn on emergency lighting1010, turn on other lights 1008, or flash some or all of the lights1008, or operate lighting in various further ways.

FIG. 11A depicts the security focused system for smart windows 102directing maximum optical transmissivity of the smart windows 102, andturning on the lights 1008, as a response to a security event. The smartwindows 102 are shown transitioning from various optical states oftransmissivity to maximum transmissivity (or, increased transmissivity)at the direction of the intelligent window controller/driver 104. Theintelligent window controller/driver 104 is also coupled to the lightingcontroller 1006, and directs the lighting controller 1006 to turn on thelights 1008, or flash the lights 1008, etc. This response to a securityevent could be useful to show responding personnel the condition of theinterior of the house or other building in an emergency. For example, incase of a fire, the firefighters can see in through the increased ormaximum transmissivity smart windows 102, to a well-lit interior, andperform rescue duties as appropriate. In case of an intruder 902,responding police personnel can see in through the increased or maximumtransmissivity smart windows 102, to a well-lit interior, and see theintruder 902. In variations, if the system detects a fire or an intruder902 in one room, or detects a fire anywhere in the house and presence ofa person in one room, the system could direct the lighting controller1006 to flash the lights 1008 in that room to draw attention to thatsituation. Further variations of this scenario and the response to thesecurity event are readily devised and implemented in embodiments of thesmart window system.

FIG. 11B depicts the security focused system for smart windows 102directing the smart windows 102 to cycle transmissivity, as a responseto a security event. A single smart window 102 is shown cycling frommaximum transmissivity (at far left) to minimum transmissivity (atsecond to the left) and back to maximum transmissivity (in the middle),etc. In variations, reduced or increased transmissivity settings couldbe used. Transmissivity cycling could be used as an external indicatorwith or without flashing lights 1008 as described above with referenceto FIG. 11A.

FIG. 11C depicts the security focused system for smart windows 102directing minimum optical transmissivity of the smart windows 102, as anighttime or privacy tint function. A group of smart windows 102 isshown transitioning from various states of transmissivity to minimumtransmissivity. Alternatively, reduced transmissivity could be used. Thenighttime or privacy tint function could be used in a scheme or profile,set to a specific time of day, or varied according to seasonal daylightvariation, or activated in response to user input. The system would thenoverride this setting in response to detecting a security event, asdescribed above.

FIG. 12 depicts the security focused system for smart windows 102directing lights off and minimum transmissivity of all smart windows 102in a specified “safe room” 1202, and directing all other lights on andmaximum transmissivity of all other smart windows 102 elsewhere in thesystem, as a response to a security event. This is applicable to a hotprowl or home invasion scenario, in which the system detects an intruder902 while other people may be present. The smart window system performsintruder detection as described above (see FIG. 9), and then in responsedirects a nighttime or privacy tint function (see FIG. 11C) for theselected smart windows 102 as configured for the safe room 1202. Thesmart window system also directs a lighting controller 1006 (see FIG.10) to turn off lights in the designated safe room 1202. Meanwhile, thesmart window system directs maximum transmissivity (see FIG. 11A) ofsmart windows 102 other than the smart windows 102 of the designatedsafe room 1202, and directs either the same lighting controller 1006 ora further lighting controller 1006 to turn on lights 1008 other than anylights 1008 of the designated safe room 1202. This allows people to hidein a darkened safe room 1202, while the other rooms are highlightedinternally and externally by lighting and maximum transmissivity smartwindows 102 so that responding police or security personnel can morereadily identify and apprehend an intruder 902. In a further embodiment,the system could activate a lock for the safe room 1202, or activateother security measures.

FIG. 13 is a flow diagram of a method of operating a smart window-basedsecurity system, which can be practiced on or using embodiments of thesmart window system. The method can be practiced by one or moreprocessors of the smart window system. Variations of the method, withfewer actions, more actions, differing sequences for actions, and/oractions dependent upon conditions such as whether the security event isa fire or an intruder detection, etc., are readily devised in keepingwith the teachings herein.

In an action 1302, sensor information is obtained from sensors of asmart window system. Embodiments of the distributed device network, asdescribed herein, have a distributed sensor network defining a securityperimeter, and are suitable for gathering the sensor information. In anaction 1304, the sensor information is analyzed. Analysis can take placein one or more components, or be distributed across multiple componentsof a smart window system. Transmissivity of smart windows is controlled,in an action 1306. The transmissivity settings, and operation of thesystem can be based on user input, the sensor information, and/orcloud-based learning. In a decision action 1308, it is determinedwhether a security event is detected. This determination is based on theanalysis of the sensor information. If there is no security eventdetected, flow branches back to the action 1302, in order to obtainfurther sensor information, continue analysis of sensor information, andcontinue controlling transmissivity of the smart windows. If there is asecurity event detected, flow proceeds to the action 1310.

In the action 1310, transmissivity of first smart windows is increased.The transmissivity could be set to a maximum. This direction comes fromthe smart window system, and could be absolute or conditional dependingupon what type of security event is detected. Selection of which smartwindows are in which group of smart windows should be made, for example,during set up or installation, or at a later time but prior to thedetection of a security event. In an action 1312, transmissivity ofsecond smart windows is decreased. The transmissivity could be set to aminimum. This direction comes from the smart window system, and could beabsolute or conditional depending upon what type of security event isdetected. For example, selection of which smart windows are in the groupof second windows could be in accordance with selection or designationof a safe room, and direction to decrease the transmissivity of thesesmart windows could be conditioned upon detection of an intruder orbreak-in. In an action 1314, transmissivity of third smart windows iscycled. This direction comes from the smart window system, and could beabsolute or conditional depending upon what type of security event isdetected. For example, smart windows in a room that has a fire, or has aperson present, could be cycled to highlight this situation.

In an action 1316, first lights are turned on. In an action 1318, secondlights are turned off. In an action 1320, third lights are flashed. Thisdirection relies on the smart window system coupling to or integrating alighting controller, and could be conditional depending on what type ofsecurity event is detected, or applied in various combinations tovarious groups of lights. In an action 1322, one or more alerts aresent. These could be sent via the network to which the smart windowsystem is coupled, and could go out to a monitor service, or one or moreof several user devices, etc. It should be appreciated that the alertmay be sent at any point in the method upon determination of a securityevent being detected.

It should be appreciated that the methods described herein may beperformed with a digital processing system, such as a conventional,general-purpose computer system. Special purpose computers, which aredesigned or programmed to perform only one function may be used in thealternative. FIG. 14 is an illustration showing an exemplary computingdevice which may implement the embodiments described herein. Thecomputing device of FIG. 14 may be used to perform embodiments of thefunctionality for the security focused system for smart windows inaccordance with some embodiments. The computing device includes acentral processing unit (CPU) 1401, which is coupled through a bus 1405to a memory 1403, and mass storage device 1407. Mass storage device 1407represents a persistent data storage device such as a floppy disc driveor a fixed disc drive, which may be local or remote in some embodiments.Memory 1403 may include read only memory, random access memory, etc.Applications resident on the computing device may be stored on oraccessed via a computer readable medium such as memory 1403 or massstorage device 1407 in some embodiments. Applications may also be in theform of modulated electronic signals modulated accessed via a networkmodem or other network interface of the computing device. It should beappreciated that CPU 1401 may be embodied in a general-purposeprocessor, a special purpose processor, or a specially programmed logicdevice in some embodiments.

Display 1411 is in communication with CPU 1401, memory 1403, and massstorage device 1407, through bus 1405. Display 1411 is configured todisplay any visualization tools or reports associated with the systemdescribed herein. Input/output device 1409 is coupled to bus 1405 inorder to communicate information in command selections to CPU 1401. Itshould be appreciated that data to and from external devices may becommunicated through the input/output device 1409. CPU 1401 can bedefined to execute the functionality described herein to enable thefunctionality described with reference to FIGS. 1-13. The code embodyingthis functionality may be stored within memory 1403 or mass storagedevice 1407 for execution by a processor such as CPU 1401 in someembodiments. The operating system on the computing device may be MSDOS™, MS-WINDOWS™, OS/2™, UNIX™, LINUX™, or other known operatingsystems. It should be appreciated that the embodiments described hereinmay also be integrated with a virtualized computing system that isimplemented with physical computing resources.

Detailed illustrative embodiments are disclosed herein. However,specific functional details disclosed herein are merely representativefor purposes of describing embodiments. Embodiments may, however, beembodied in many alternate forms and should not be construed as limitedto only the embodiments set forth herein.

It should be understood that although the terms first, second, etc. maybe used herein to describe various steps or calculations, these steps orcalculations should not be limited by these terms. These terms are onlyused to distinguish one step or calculation from another. For example, afirst calculation could be termed a second calculation, and, similarly,a second step could be termed a first step, without departing from thescope of this disclosure. As used herein, the term “and/or” and the “/”symbol includes any and all combinations of one or more of theassociated listed items.

As used herein, the singular forms “a”, “an” and “the” are intended toinclude the plural forms as well, unless the context clearly indicatesotherwise. It will be further understood that the terms “comprises”,“comprising”, “includes”, and/or “including”, when used herein, specifythe presence of stated features, integers, steps, operations, elements,and/or components, but do not preclude the presence or addition of oneor more other features, integers, steps, operations, elements,components, and/or groups thereof. Therefore, the terminology usedherein is for the purpose of describing particular embodiments only andis not intended to be limiting.

It should also be noted that in some alternative implementations, thefunctions/acts noted may occur out of the order noted in the figures.For example, two figures shown in succession may in fact be executedsubstantially concurrently or may sometimes be executed in the reverseorder, depending upon the functionality/acts involved.

With the above embodiments in mind, it should be understood that theembodiments might employ various computer-implemented operationsinvolving data stored in computer systems. These operations are thoserequiring physical manipulation of physical quantities. Usually, thoughnot necessarily, these quantities take the form of electrical ormagnetic signals capable of being stored, transferred, combined,compared, and otherwise manipulated. Further, the manipulationsperformed are often referred to in terms, such as producing,identifying, determining, or comparing. Any of the operations describedherein that form part of the embodiments are useful machine operations.The embodiments also relate to a device or an apparatus for performingthese operations. The apparatus can be specially constructed for therequired purpose, or the apparatus can be a general-purpose computerselectively activated or configured by a computer program stored in thecomputer. In particular, various general-purpose machines can be usedwith computer programs written in accordance with the teachings herein,or it may be more convenient to construct a more specialized apparatusto perform the required operations.

A module, an application, a layer, an agent or other method-operableentity could be implemented as hardware, firmware, or a processorexecuting software, or combinations thereof. It should be appreciatedthat, where a software-based embodiment is disclosed herein, thesoftware can be embodied in a physical machine such as a controller. Forexample, a controller could include a first module and a second module.A controller could be configured to perform various actions, e.g., of amethod, an application, a layer or an agent.

The embodiments can also be embodied as computer readable code on atangible non-transitory computer readable medium. The computer readablemedium is any data storage device that can store data, which can bethereafter read by a computer system. Examples of the computer readablemedium include hard drives, network attached storage (NAS), read-onlymemory, random-access memory, CD-ROMs, CD-Rs, CD-RWs, magnetic tapes,and other optical and non-optical data storage devices. The computerreadable medium can also be distributed over a network coupled computersystem so that the computer readable code is stored and executed in adistributed fashion. Embodiments described herein may be practiced withvarious computer system configurations including hand-held devices,tablets, microprocessor systems, microprocessor-based or programmableconsumer electronics, minicomputers, mainframe computers and the like.The embodiments can also be practiced in distributed computingenvironments where tasks are performed by remote processing devices thatare linked through a wire-based or wireless network.

Although the method operations were described in a specific order, itshould be understood that other operations may be performed in betweendescribed operations, described operations may be adjusted so that theyoccur at slightly different times or the described operations may bedistributed in a system which allows the occurrence of the processingoperations at various intervals associated with the processing.

In various embodiments, one or more portions of the methods andmechanisms described herein may form part of a cloud-computingenvironment. In such embodiments, resources may be provided over theInternet as services according to one or more various models. Suchmodels may include Infrastructure as a Service (IaaS), Platform as aService (PaaS), and Software as a Service (SaaS). In IaaS, computerinfrastructure is delivered as a service. In such a case, the computingequipment is generally owned and operated by the service provider. Inthe PaaS model, software tools and underlying equipment used bydevelopers to develop software solutions may be provided as a serviceand hosted by the service provider. SaaS typically includes a serviceprovider licensing software as a service on demand. The service providermay host the software, or may deploy the software to a customer for agiven period of time. Numerous combinations of the above models arepossible and are contemplated.

Various units, circuits, or other components may be described or claimedas “configured to” perform a task or tasks. In such contexts, the phrase“configured to” is used to connote structure by indicating that theunits/circuits/components include structure (e.g., circuitry) thatperforms the task or tasks during operation. As such, theunit/circuit/component can be said to be configured to perform the taskeven when the specified unit/circuit/component is not currentlyoperational (e.g., is not on). The units/circuits/components used withthe “configured to” language include hardware—for example, circuits,memory storing program instructions executable to implement theoperation, etc. Reciting that a unit/circuit/component is “configuredto” perform one or more tasks is expressly intended not to invoke 35U.S.C. 112, sixth paragraph, for that unit/circuit/component.Additionally, “configured to” can include generic structure (e.g.,generic circuitry) that is manipulated by software and/or firmware(e.g., an FPGA or a general-purpose processor executing software) tooperate in manner that is capable of performing the task(s) at issue.“Configured to” may also include adapting a manufacturing process (e.g.,a semiconductor fabrication facility) to fabricate devices (e.g.,integrated circuits) that are adapted to implement or perform one ormore tasks.

The foregoing description, for the purpose of explanation, has beendescribed with reference to specific embodiments. However, theillustrative discussions above are not intended to be exhaustive or tolimit the invention to the precise forms disclosed. Many modificationsand variations are possible in view of the above teachings. Theembodiments were chosen and described in order to best explain theprinciples of the embodiments and its practical applications, to therebyenable others skilled in the art to best utilize the embodiments andvarious modifications as may be suited to the particular usecontemplated. Accordingly, the present embodiments are to be consideredas illustrative and not restrictive, and the invention is not to belimited to the details given herein, but may be modified within thescope and equivalents of the appended claims.

What is claimed is:
 1. A window system, comprising: a plurality ofwindows in communication with each other; the plurality of windows eachintegrating therein one or more sensors into a frame of at least onewindow; and at least one processor configured to sense a security event,responsive to information from the plurality of windows, wherein the atleast one processor is configured to increase and decreasetransmissivity responsive to input received from the one or moresensors.