Portable alarm and methods of transmitting alarm data

ABSTRACT

A portable alarm system includes a wireless receiver configured to receive signals from remote wireless devices and a processor in communication with the wireless receiver, wherein the processor is configured to receive the signals from the wireless receiver. The system further includes an intelligent communications interface in communication with the processor, the intelligent communications interface being configured to receive and translate into wireless digital data at least a portion of the signals from the processor, and transmit the wireless digital data to an external location.

CROSS REFERENCE TO RELATED APPLICATIONS

This application is a Continuation-in-Part of U.S. Ser. No. 10/867,124,with a filing date of Jun. 14, 2004, which is related to U.S. Ser. No.60/477,998, with a filing date of Jun. 11, 2003, which applications arehereby incorporated by reference in their entirety.

BACKGROUND

Alarm systems of various types have been in existence for many years.Alarm systems play in integral part in protecting assets within as wellas the safety of those within monitored premises. Alarm systems are nowavailable for automobiles as well as for building structures, such ashomes, businesses, and the like.

In home alarm systems are usually hard-wired throughout a home, with thewiring usually terminating at a control panel located somewhere withinthe home. One of the main drawbacks to a hard-wired alarm system is thatthe system is permanently installed in the home and offers nothing tothe original purchaser when he or she moves to another home. Further,the installation of hard-wired alarm systems is labor intensive, andtherefore, requires significant expense to pay for the installation.Still further, via their reliance on hard-wired telephone systems, suchconventional alarm systems are easy targets for savvy intruders who knowhow to quickly and easily dismantle the systems by cutting the telephonelines on which the alarm systems rely.

The conventional security alarm system market does not offeralternatives for the millions of citizens that live, for example, inapartments, hotel rooms, leased office space, and short term warehousingin which a person would not intend to stay for a relatively long periodof time, and thus, would not wish to invest significant expense in apermanent alarm system. It is exactly these types of environments wherecrime is often the highest.

Home alarm systems are frequently connected to the home's telephonewiring to automatically place a call to a monitoring station at somedistance away from the home to warn those at the monitoring station thata possible illegal entry has occurred at the home. This, in theory,enables those at the monitoring station to either send a securityofficer to the home or to place a call to the police to have a policeofficer inspect the home where the alarm was activated. A drawback ofthis type of system is that sophisticated burglars are knowledgeable ofsuch systems and will cut the telephone wires prior to entry into thehome, thereby rendering the security monitor station useless becausewhen the illegal entry occurs, the system will not function to place theautomatic call to the security monitor station.

Typically, alarm systems that transmit an alarm signal to a locationoutside of the premises being monitored do so via transmission to acentral monitoring station. Often the owner of the premises is notinformed of an alarm until further time has elapsed. Once notified, thepremise's owner or their agent is only then able to intervene asdesired. Further, central monitoring stations and the resources thatthey dispatch (e.g., police, fire, etc.) charge considerable amounts ofmoney for the services that they provide to the owner of the premises.While the owner may feel that these costs are justified in certaincircumstances such as when critical information (e.g., notification of afire or intruder in the premises being monitored) is transmitted, manyowners have experienced frustration with the costs associated with“false alarms” or transmission of non-critical information. Further,there are situations in which the owner may be able to respond morequickly and effectively than the resources that may otherwise bedispatched by the central monitoring station. Thus, it is desirable foralarm systems to be portable, cost-efficient, and resistant to disarmingby savvy intruders. There is also a need for further alarm transmissionmethods and devices associated with the same. In order to alleviate thefrustrations and costs associated with the same, notifying the premise'sowner or his or her agent promptly when an alarm signal is generatedwould be highly desirable in many situations.

BRIEF DESCRIPTION OF THE DRAWINGS

The foregoing brief description will be understood more completely fromthe following detailed description of the exemplary drawings, in which:

FIG. 1 is a perspective view of an exemplary alarm system according toan embodiment;

FIG. 2 is a schematic illustration of an exemplary alarm systemaccording to an embodiment;

FIG. 3 is a flow diagram illustrating an exemplary flow of alarminformation to and from a digital device; and

FIG. 4 is a flow diagram illustrating an exemplary flow of alarminformation with an interactive alarm processor.

DETAILED DESCRIPTION

FIG. 1 is a perspective view of an exemplary alarm system 10 containedin a portable enclosure 12. The alarm system 10 may have a keypad 14 forinputting information to the system 10 and a strobe light 16 mounted onthe outside of the portable enclosure 12.

Referring now to FIG. 2, a schematic view of the alarm system 10 andsensors 25 separate from the portable alarm enclosure 12 areillustrated. It will be understood that any suitable portable alarmsystem may be used in conjunction with alarm system 10, including butnot limited to, alarm systems illustrated in U.S. Pat. Nos. 6,441,731;6,049,273; 5,850,180; 5,777,551; and 5,587,701, which are incorporatedby reference herein. The alarm system 10 has a processor 20 such as amicroprocessor that controls the alarm system 10. The microprocessor 20receives alarm data and may be a microcomputer based control panel. Forexample, the microprocessor 20 may be a commercially available alarmboard or any other suitable type of microprocessor board. Themicroprocessor 20 processes data received from various inputs and sendsappropriate signals to other components of the alarm system 10 accordingto the received inputs as discussed below.

In one embodiment, keypad 14 is electrically connected to themicroprocessor 20. For example, the keypad 14 may be wired to clock,data, and communications inputs of the microprocessor 20. The keypad 14may be used to program the alarm system 10 according to specific userneeds and may be capable of multiple user codes, which can be inputtedto arm or disarm the alarm system 10. Additionally, the keypad 14 may beused to activate a panic feature that allows the user to activate analarm sequence by the push of one, two, or more buttons. Additionally,the panic feature may be provided remotely from the keypad 14. Forexample, a remote panic button may be worn on a necklace of the user.

The keypad 14 may also be used to send a silent distress signal byactuating predetermined code numbers on the keypad 14. The keypad 14also allows the user to program and configure the alarm system 10 in anysuitable manner. For example, the user may program the alarm system 10to monitor or bypass all or specific intruder zones or program specificalarm parameters. A wireless receiver 24 may be contained within theenclosure 12 and electrically connected to the microprocessor 20. Thewireless receiver 24 may receive alarm signals from remote wirelessdevices (not shown) that may be used to monitor windows, doors, or maybe motion sensors, wireless smoke detectors, and the like. If a signalis received by the wireless receiver 24 that indicates an alarm, themicroprocessor 20 will cause an alarm.

The microprocessor 20 may be connected to a power transformer 52 toprovide current to the microprocessor 20 from a source such as aconventional wall outlet. The AC inputs of the microprocessor 20 may bewired to the transformer 52. A battery 42 may act as a back-up powersupply to the transformer 52, and the battery 42 may be recharged byreceiving a trickle charge from the transformer 52.

The portable alarm enclosure 12 may have a motion sensor or sensors 50.The motion sensor 50 may be any suitable motion sensor and may be wiredto any appropriate input location, such as a communications terminal ofthe microprocessor 20. The motion sensor 50 will send an activationsignal to the microprocessor 20 when the sensor 50 is activated. Themicroprocessor 20 is programmed to recognize input signals from themotion sensor 50 and to cause an alarm when such signals are received.

The portable alarm enclosure 12 may also include a miniaturesurveillance camera 43. Any suitable camera 43 may be used. For example,a model TVX-01 camera available from TVX, Inc. in Broomfield, Colo. maybe used. The camera 43 is electrically connected to the microprocessor20. The alarm system 10 may have a siren 54 that is electricallyconnected to the microprocessor 20 and that may be activated by a signalfrom the microprocessor 20. It will be understood that the portablealarm system 10 may have more components or fewer components thanillustrated and that the alarm system is not limited to the illustratedcomponents.

The alarm system 10 has an intelligent communications interface 72 thatcomprises an intelligent communications board 74 and a radio component76. The intelligent communications interface is connected to themicroprocessor 20. The intelligent communications interface 72 may beany suitable interface that may receive alarm data from themicroprocessor 20 and translate the alarm data to wireless digital data.For example, the intelligent communications interface 72 may have amicroprocessor board 74 that is programmed to receive alarm data andtranslate any desired portion of the alarm data to wireless digitaldata.

The intelligent communications interface 72 may be programmed totranslate any desired alarm data to any suitable type of wirelessdigital data for further transmission as discussed further herein. Forexample, the wireless digital data may comprise textual digital datasuch as short message service (SMS) type data. SMS was created when itwas incorporated into the Global System for Mobiles (GSM) digital mobilephone standard. That technology, which is now widely available and used,provides the ability to send and receive text messages to and from, forexample, mobile telephones. The text can comprise words or numbers or analphanumeric combination. When the wireless digital data comprises SMStype data, the intelligent communications interface 72 may convert thealarm data to a text based command set, such as an AT command set, forSMS type transmission. In another example, the alarm data may beconverted to multimedia messaging service (MMS) type data or generalpacket radio services (GPRS) type data. One of ordinary skill in the artunderstands that any type of wireless digital data can be used and thatthe radio component 76 is selected to utilize one or all of these datapacket transport methods. In other words, the type, configuration andselection of the radio component 76 depends in part on the data packetmethod used to transport the wireless digital data across third partynetworks (e.g. Sprint, Verizon, Nextel, AT&T, etc.). These third partynetworks employ various types of wireless network solutions, including,but not limited to, Universal Mobile Telecommunications Systems (UTMS),Code Division Multiple Access (CDMA) Wideband Division Multiple Access(W-CDMA), General Packet Radio Services (GPRS) and High-Speed DownlinkPacket Access (HSDPA) to name a few. The alarm system 10, and morespecifically, the intelligent communications interface 72 and the radiocomponent 76, are configured to be compatible with any data packettransport method or any wireless network solution.

The intelligent communications interface radio component 76 may be anysuitable type of radio. The radio 74 is selected to be capable oftransmitting and receiving the desired type of wireless digital data.For example, the radio 74 may be a cell phone that may transmit andreceive SMS type data. The radio 74 may transmit the wireless digitaldata to any suitable type of service station as discussed furtherherein.

The alarm system 10 may additionally have a call feature that isactivated by the microprocessor 20 that places a call to a centralmonitoring center in addition to the transmission of the wirelessdigital data by the intelligent communications interface 72. Suitablesystems for placing such a call by landline, cell phone, and Cellemetryare disclosed in U.S. Pat. Nos. 6,441,731; 6,049,273; 5,850,180;5,777,551; and 5,587,701, which are incorporated by reference herein.

Referring now to FIGS. 2 and 3, the transmission of the wireless digitaldata in accordance with one embodiment will be discussed. It will beunderstood that although the wireless digital data is illustrated asbeing of SMS type data, but may be of any type. Upon receipt of alarmdata from the microprocessor 20, the intelligent communicationsinterface 72 determines what alarm data should be converted to wirelessdigital alarm data, and converts the data to SMS type data.Additionally, the intelligent communications interface 72 determineswhere the data should be sent based on the programming of theintelligent communications interface 72, and the intelligentcommunications interface 72 transmits the wireless digital alarm datavia the radio 76 to a radio tower 110. It will be understood that theintelligent communications interface may transmit the data to as manylocations as desired.

The wireless digital alarm data is received by the tower 110 andtransmitted to a carrier switch 112. The wireless digital alarm data isthen transmitted via a signaling cloud 114 to a service center 116 suchas a short message service center (SMSC). The wireless digital alarmdata may be transmitted via any suitable type of network signal. Forexample, the data may be transmitted via the SS7 (Signal System 7)generic data transmission network conventionally used in the UnitedStates and available through companies such as VeriSign Inc. (MountainView, Calif.) and TSI Telecommunications Services Inc. (Tampa, Fla.)),the C7 network that is the data transmission network comparable to SS7that is conventionally used in European countries, and/or the IF(internet protocol) transmission network, or any other similar datatransmission networks.

The service center 116 then transmits the wireless digital alarm data inthe form of a text message to the appropriated digital device 118, andan acknowledgement of receipt of the data may be sent back to the alarm10 either from the service center 116 or from the tower 110. The digitaldevice 118 may be any suitable device capable of receiving SMS typedata, or any wireless digital data. For example, the digital device 118may be a cell phone, personal digital assistant, internet enabledcomputer, or the like. In this manner, the alarm user may receive anotification of the alarm on the digital device 118. Although thedigital device 118 is illustrated as being in direct communication withthe service center 116, communications between digital device 118 andthe service center 116 may effected in a variety of ways, such as via asignaling cloud 114 and transmission tower, such as tower 110.

Additionally, control data may be sent by the digital device 118 to theintelligent communications interface 72. The control data may be in theform of an SMS text message that is received by the service center 116and transmitted to the portable alarm system 10 via any desired network.Once the control data is received by the intelligent communicationsinterface 72, the intelligent communications interface 72 may translatethe control data into the appropriate data format and transmit the datato the microprocessor 20 so that the alarm 10 may be controlledremotely. The interactive alarm processor 72 may be programmed to allowany suitable type of alarm control such as arming or disarming via aremote device.

Referring now to FIGS. 2 and 4, an alternative embodiment is illustratedwherein the intelligent communications interface 72 may transmit datadirectly to a digital device 118 as discussed above in accordance withthe embodiment illustrated in FIG. 3. In addition to or instead of thetransmission of the wireless digital alarm data being transmitted to adigital device 118 via the service station 116, the intelligentcommunications interface 72 may be programmed to transmit the wirelessdigital alarm data to an interactive alarm processor 124 for processingand further transmittal as discussed herein. The service station 116 maytransmit the wireless digital alarm data to the interactive alarmprocessor 124 in any suitable manner. For example, the wireless digitalalarm data may be transmitted to an email server 120 and thentransmitted via the internet 122 to the interactive alarm processor 124.

The interactive alarm processor 124 is any suitable device that iscapable of receiving the information transmitted from intelligentcommunications interface 72 and rerouting that information as desired toone or more of the locations as discussed herein. For example, asschematically illustrated in FIG. 4, the interactive alarm processor 124may be a remotely hosted, internet accessible, user-configurable routingdevice. In one embodiment, a wide variety of commercially availablecomputer servers can be used in conjunction with appropriate software tofunction as the interactive alarm processor 124. Those of ordinary skillin the art of computer programming can readily design such software if asuitable alternative is not found to be commercially available. LINUXand e++, for example, are able to be so adapted to affect desiredreceipt and rerouting of information received from the alarm system 10.

The interactive alarm processor 124 may be programmed to confirmsuccessful receipt of data transmitted from the intelligentcommunications interface 72, and a confirmation or acknowledgement ofthe successful receipt of the wireless digital alarm data may beprovided by the interactive alarm processor 124 to the intelligentcommunications interface 72. Based on the receipt, or lack thereof, ofsuch a confirmation, the intelligent communications interface 72 canresend the information or send the information to one or morealternative destinations, based on its programming.

Once the interactive alarm processor 124 has received the wirelessdigital alarm data, the interactive alarm processor 124 may process andtransmit the data in accordance with its programming. In one example,the wireless digital alarm data may be processed into alarm informationfor dispersal to further locations as discussed herein. For example, theinteractive alarm processor 124 may be initially programmed with anidentification of the portable alarm 10 and with information about whatalarm information to send and where to send alarm information in theevent of the receipt of wireless digital alarm data from a particularportable alarm 10.

In one embodiment, the interactive alarm processor 124 may be programmedto transmit the alarm information derived from the alarm data to atleast one device 128. The interactive alarm processor 124 formats thealarm data. For example, the interactive alarm processor 124 maytranslate the alarm data into alarm information having the necessaryformat for further transmission to the at least one device 128 via anysuitable network 126. Examples of suitable networks 126 include, but arenot limited to, wireless networks, email/internet networks, PSTN/voicenetworks, and/or paging networks. The interactive alarm processor 124then transmits the alarm information to at least one device 128 via theappropriate network 126. The device 128 may be any suitable device suchas wired, wireless, portable, or static device. For example, the device128 may be a cellular telephone, pager, personal digital assistant, aninternet server, public switched telephone network (PSTN), or e-mailaccount of the premise's owner or agent. The alarm information may beformatted and sent to a plurality of devices 128.

The device 128 may receive any suitable notification from theinteractive alarm processor 124 such as alarm information indicatingthat an alarm has occurred. The device 128 may send control data to thealarm system 10 via the interactive alarm processor 124 and the servicecenter 116 as illustrated. Thus, the portable alarm 10 may be remotelycontrolled via the interactive alarm processor 124. For example, thealarm 10 may be disarmed remotely. Additionally, the status of the alarm10 may be checked remotely from the device 128.

The interactive alarm processor 124 may additionally format and sendalarm information to a conventional central monitoring station 130. Thecentral monitoring station 130 may further send out alarm information toemergency personnel 132, such as the police, fire department, oremergency medical services. The central monitoring station 130 may alsosend control data or any other type of information to the interactivealarm processor 124, and the central monitoring station 130 may remotelycontrol the alarm 10 in the same manner as the device 128.

The interactive alarm processor 124 may be configured by a user toprovide alarm information in any desired manner. For example, theinteractive alarm processor 124 could be accessed via the internet by auser, and the interactive alarm processor 124 could be programmed tosend a notification in the event of an alarm to any number or usersupplied devices 128. Additionally, the interactive alarm processor 124may be accessed or programmed to assist in alarm troubleshooting.

It will be obvious to those skilled in the art that various changes maybe made without departing from the scope of the invention, which is notto be considered limited to what is described in the specification. Theappended claims have been particularly shown and described withreference to the foregoing embodiments, which are merely illustrative ofthe best modes for carrying out the invention defined by the appendedclaims. It should be understood by those skilled in the art that variousalternatives to the embodiments described herein may be employed inpracticing the invention defined by the appended claims withoutdeparting from the spirit and scope of the invention as defined inclaims. The embodiments should be understood to include all novel andnon-obvious combinations of elements described herein, and claims may bepresented in this or a later application to any novel and non-obviouscombination of these elements. Moreover, the foregoing embodiments areillustrative, and no single feature or element is essential to allpossible combinations that may be claimed in this or a laterapplication.

With regard to the processes, methods, heuristics, etc. describedherein, it should be understood that although the steps of suchprocesses, etc. have been described as occurring according to a certainordered sequence, such processes could be practiced with the describedsteps performed in an order other than the order described herein. Itfurther should be understood that certain steps could be performedsimultaneously, that other steps could be added, or that certain stepsdescribed herein could be omitted. In other words, the descriptions ofprocesses described herein are provided for illustrating certainembodiments and should in no way be construed to limit the appendedclaims.

Accordingly, it is to be understood that the above description isintended to be illustrative and not restrictive. Many embodiments andapplications other than the examples provided would be apparent to thoseof skill in the art upon reading the above description. The scope of theinvention should be determined, not with reference to the abovedescription, but should instead be determined with reference to theappended claims, along with the full scope of equivalents to which suchclaims are entitled. It is anticipated and intended that futuredevelopments will occur in the arts discussed herein, and that thedisclosed systems and methods will be incorporated into such futureembodiments. In sum, it should be understood that the invention iscapable of modification and variation and is limited only by thefollowing claims.

All terms used in the claims are intended to be given their broadestreasonable constructions and their ordinary meanings as understood bythose skilled in the art unless an explicit indication to the contraryis made herein. In particular, use of the singular articles such as “a,”“the,” “said,” etc. should be read to recite one or more of theindicated elements unless a claim recites an explicit limitation to thecontrary.

1. A portable alarm system, comprising: a wireless receiver configured to receive signals from remote wireless devices; a processor in communication with said wireless receiver, said processor being configured to receive said signals from said wireless receiver; and an intelligent communications interface in communication with said processor, said intelligent communications interface being configured to receive and translate into wireless digital data at least a portion of said signals from said processor, and transmit said wireless digital data to an external location.
 2. The alarm system of claim 1, wherein said intelligent communications interface includes a radio component configured to transmit and receive one or more types of wireless digital data.
 3. The alarm system of claim 2, wherein said wireless digital data is configured to transmit across any wireless network.
 4. The alarm system of claim 2, wherein said radio component utilizes at least one data packet transport method.
 5. A portable alarm system, comprising: a processor configured to receive alarm signals; and an intelligent communications interface in communication with said processor, said intelligent communications interface being configured to receive and translate into wireless digital data at least a portion of said alarm signals from said processor, and transmit said wireless digital data to an external location; wherein said intelligent communications interface is configured to receive control data from said external location to remotely control said portable alarm system.
 6. The alarm system of claim 5, wherein said intelligent communications interface includes a radio component configured to transmit and receive one or more types of wireless digital data.
 7. The alarm system of claim 6, wherein said wireless digital data is configured to transmit across any wireless network.
 8. The alarm system of claim 6, wherein said radio component utilizes at least one data packet transport method.
 9. A method for transmitting alarm data using a portable alarm system, comprising: receiving alarm data from at least one remote wireless device; transmitting said alarm data from a processor to an intelligent communications interface; translating at least a portion of said alarm data into one or more types of wireless digital data using said intelligent communications interface; transmitting said wireless digital data to an external device.
 10. The method of claim 9, wherein transmitting said wireless digital data includes utilizing at least one data packet transport method.
 11. The method of claim 9, wherein said wireless digital data is transported across any wireless network.
 12. A method for transmitting alarm data using a portable alarm system, comprising: receiving alarm data from at least one remote device; transmitting said alarm data from a processor to an intelligent communications interface; translating at least a portion of said alarm data into at least one type of wireless digital data using said intelligent communications interface; transmitting said wireless digital data to an external device; receiving control data from said external device to remotely control said portable alarm system.
 13. The method of claim 12, wherein transmitting said wireless digital data includes utilizing at least one data packet transport method.
 14. The method of claim 12, wherein said wireless digital data is transported across any wireless network. 