Mobile security system

ABSTRACT

A mobile security system is described herein. A detector communicates with a mobile device if an event has occurred. The event may be various types of events, such as fire or motion. Once the mobile device receives the communication of the event occurrence, the mobile device may, among others, sound an alarm or communicate with a central monitoring system to notify emergency services of the occurrence. The mobile device may also communicate with another communication device, such as another cell phone or a computer, using various forms of communication. The detector may be an integral part of the mobile device, i.e. fixed part of the mobile device, or may be detachable. The detector may also be wholly separate.

BACKGROUND

It is often desirable to secure a room or an enclosure from intrusion byan unauthorized person, such as a burglar. At a basic level, a door orremovable entryway may be used to provide a minimal level of security,blocking the site of contents of the room from prying eyes, and thus,reducing the risk of a break-in by removing immediate knowledge of thecontents. While perhaps effective at some level, the placement of asimple barrier to viewing becomes irrelevant if the intruder has priorknowledge, or some belief, that the room contains something of value.Additional security measures are often used, usually in the form of alock to the door or removable entryway, creating an additional barrierto entry. Locks range in complexity and effectiveness, from simpleclasps to hardened metal bolts. While door locks may provide aneffective means for securing a room or enclosure, there are a myriad ofways available to a person to break into the enclosure. Additionally,because they are a physical structure, door locks do not represent animpossible barrier to the clever or determined intruder.

In order to provide for some level of security beyond a door and doorlock, a two part security system is often used, one of prevention anddetection. The purpose of the door and the door lock is to attempt toprevent the entry of the intruder by placing some physical barrierbetween the room and the intruder. Thus, the intruder has to exert somelevel of force to enter into the room when secured by a lockingmechanism. The other part of the security equation is detection. If theintruder knows that their entrance is either detectable or has beendetected, even if the intruder is able to enter the secured space, thethreat of capture by the police and prosecution in a court of law worksto erect a mental barrier to entry.

Perhaps the most common detection system is an alarm system. In thecontext of a house, the alarm is typically connected to all doors andwindows on the ground level. If anyone of the doors or windows is openedwhile the alarm is activated, an audible alarm will typically sound. Inmost home alarm systems, the alarm is also connected to a centralmonitoring system. If the alarm is tripped, a signal is sent, typicallythrough the telephone land line, to the central monitoring system. Ifthe owner of the home does not respond to a callback from the centralmonitoring system in a proper way, either by answering the callback orrepeating a pre-determined password, the central monitoring systemusually will notify police of the potential intrusion.

While somewhat effective in protecting a home or office from intrusion,the security system is typically immobile and is setup for a specificuse, i.e. the home or office. Because people are becoming more mobilewhile the threat of crime is not significantly diminishing, the singlepurpose security system is of no use to an individual other than thelocation of installation. When traveling, safety is often a primaryconcern of the individual, often influencing the location the personstays as well as the location within the location the person stays. Forexample, for personal safety reasons, it may not be preferable to book ahotel room in an area of a city notorious for crime. Additionally, aperson may wish to request a hotel room a significant distance from thefire escape stairwell, as studies show a significant portion ofbreak-ins occur next to the stairwell.

Even though an individual may take these and other precautions whentraveling, such as locking the door, the feeling of security when a roomor dwelling is protected by an alarm system may be desirable even whentraveling. Thus, there is a need to provide for a security system thatis mobile and convenient for travel.

SUMMARY

Electronic devices that are carried by an individual when traveling orwhen moving from place to place are combined with detection systems fordetecting intruders. For example, a cell phone may have a motiondetector. An individual, when wishing to secure a room, may place thecell phone in a configuration that allows the detector to detectmovement coming from a doorway or other likely entry point.Additionally, the cell phone may be integrated with a central monitoringsystem that may monitor the detector, determine possible intrusions, andreport the possible intrusions to police. Various detectors may be used,including motion, heat, light, sound and vibration. Additionally, thedetector may be an integral part of the electronic device or may be aseparate component in communication with the device.

An exemplary and non-limiting embodiment may include a mobile devicehaving a detector configured to detect an unauthorized presence. Inanother exemplary and non-limiting embodiment, the electronic device maybe in communication with a detector that is either temporarily orpermanently detachable from the electronic device or is a separatecomponent from the electronic device. In another exemplary andnon-limiting embodiment, the electronic device is configured toautonomously communicate an alarm.

This Summary is provided to introduce a selection of concepts in asimplified form that are further described below in the DetailedDescription. This Summary is not intended to identify key features oressential features of the claimed subject matter, nor is it intended tobe used as an aid in determining the scope of the claimed subjectmatter.

BRIEF DESCRIPTION OF THE DRAWINGS

The foregoing summary, as well as the following detailed description ofpreferred embodiments, is better understood when read in conjunctionwith the appended drawings. For the purposes of illustration, there isshown in the drawings exemplary embodiments; however, these embodimentsare not limited to the specific methods and instrumentalities disclosed.In the drawings:

FIG. 1 illustrates an exemplary GSM/GPRS/IP multimedia networkarchitecture;

FIG. 2 is an exemplary and non-limiting diagram illustrating anelectronic device having an integrated sensor for use in a mobilesecurity system;

FIG. 3 is an exemplary and non-limiting diagram illustrating anelectronic device having a detached sensor;

FIG. 3 a is an exemplary and non-limiting diagram illustrating alternatemeans of communication between a sensor and an electronic device;

FIG. 4 is an exemplary and non-limiting diagram illustrating anelectronic device having an integrated sensor and video camera;

FIG. 5 is an exemplary and non-limiting diagram illustrating a mobilesecurity system in communication with a cellular network;

FIG. 6 is an exemplary and non-limiting diagram of a mobile securitysystem in use to secure a room with a wireless device having anintegrated detector; and

FIG. 7 is an exemplary and non-limiting diagram of a mobile securitysystem in use to secure a room using a wireless device having a detacheddetector.

DETAILED DESCRIPTION

The subject matter of the described embodiments is described withspecificity to meet statutory requirements. However, the descriptionitself is not intended to limit the scope of this patent. Rather, theinventors have contemplated that the claimed subject matter might alsobe embodied in other ways, to include different steps or elementssimilar to the ones described in this document, in conjunction withother present or future technologies. Moreover, although the term “step”may be used herein to connote different aspects of methods employed, theterm should not be interpreted as implying any particular order among orbetween various steps herein disclosed unless and except when the orderof individual steps is explicitly described. It should be understoodthat the explanations illustrating data or signal flows are onlyexemplary. The following description is illustrative and non-limiting toany one aspect.

Network Architecture Overview

FIG. 1 shows a GSM/GPRS/IP multimedia network architecture 100 whichincludes a GSM core network 101, a GPRS network 130 and an IP multimedianetwork 138. The GSM core network 101 includes a Mobile Station (MS)102, at least one Base Transceiver Station (BTS) 104 and a Base StationController (BSC) 106. The MS 102 is physical equipment or MobileEquipment (ME), such as a mobile phone or a laptop computer that is usedby mobile subscribers, with a Subscriber identity Module (SIM). The SIMincludes an International Mobile Subscriber Identity (IMSI), which is aunique identifier of a subscriber. The BTS 104 is physical equipment,such as a radio tower, that enables a radio interface to communicatewith the MS. Each BTS may serve more than one MS. The BSC 106 managesradio resources, including the BTS. The BSC may be connected to severalBTSs. The BSC and BTS components, in combination, are generally referredto as a base station (BSS) or radio access network (RAN) 103.

The GSM core network 101 also includes a Mobile Switching Center (MSC)108, a Gateway Mobile Switching Center (GMSC) 110, a Home LocationRegister (HLR) 112, Visitor Location Register (VLR) 114, anAuthentication Center (AuC) 118, and an Equipment Identity Register(EIR) 116. The MSC 108 performs a switching function for the network.The MSC also performs other functions, such as registration,authentication, location updating, handovers, and call routing. The GMSC110 provides a gateway between the GSM network and other networks, suchas an Integrated Services Digital Network (ISDN) or Public SwitchedTelephone Networks (PSTNs) 120. In other words, the GMSC 110 providesinterworking functionality with external networks.

The HLR 112 is a database that contains administrative informationregarding each subscriber registered in a corresponding GSM network. TheHLR 112 also contains the current location of each MS. The VLR 114 is adatabase that contains selected administrative information from the HLR112. The VLR 114 contains information necessary for call control andprovision of subscribed services for each MS currently located in ageographical area controlled by the VLR. The HLR 112 and the VLR 114,together with the MSC 108, provide the call routing and roamingcapabilities of GSM. The AuC 116 provides the parameters needed forauthentication and encryption functions. Such parameters allowverification of a subscriber's identity. The EIR 118 storessecurity-sensitive information about the mobile equipment.

To gain access to GSM services, such as speech, data, and short messageservice (SMS), the MS first registers with the network to indicate itscurrent location by performing a location update and IMSI attachprocedure. The MS 102 sends a location update including its currentlocation information to the MSC/VLR, via the BTS 104 and the BSC 106.The location information is then sent to the MS's HLR. The HLR isupdated with the location information received from the MSC/VLR. Thelocation update also is performed when the MS moves to a new locationarea. Typically, the location update is periodically performed to updatethe database as location updating events occur.

The GPRS network 130 is logically implemented on the GSM core networkarchitecture by introducing two packet-switching network nodes, aserving GPRS support node (SGSN) 132 and a Gateway GPRS support node(GGSN) 134. The SGSN 132 is at the same hierarchical level as the MSC108 in the GSM network. The SGSN controls the connection between theGPRS network and the MS 102. The SGSN also keeps track of individualMS's locations and security functions and access controls. The GGSN 134provides a gateway between the GPRS network and a public packet network(PDN) or other IP networks 136. That is, the GGSN provides interworkingfunctionality with external networks, and sets up a logical link to theMS through the SGSN. When packet-switched data leaves the GPRS network,it is transferred to an external TCP-IP network 136, such as an X.25network or the Internet. In order to access GPRS services, the MS firstattaches itself to the GPRS network by performing an attach procedure.The MS then activates a packet data protocol (PDP) context, thusactivating a packet communication session between the MS, the SGSN, arcthe GGSN.

In a GSM/GPRS network, GPRS services and GSM services can be used inparallel. The MS can operate in one three classes: class A, class B, andclass C. A class A MS can attach to the network for both GPRS servicesand GSM services simultaneously. A class A MS also supports simultaneousoperation of GPRS services and GSM services. For example, class Amobiles can receive GSM voice/data/SMS calls and GPRS data calls at thesame time.

A class B MS can attach to the network for both GPRS services and GSMservices simultaneously. However, a class B MS does not supportsimultaneous operation of the GPRS services and GSM services. That is, aclass B MS can only use one of the two services at a given time.

A class C MS can attach for only one of the GPRS services and GSMservices at a time. Simultaneous attachment and operation of GPRSservices and GSM services is not possible with a class C MS.

A GPRS network 130 can be designed to operate in three network operationmodes (NOM1, NOM2 and NOM3). A network operation mode of a GPRS networkis indicated by a parameter in system information messages transmittedwithin a cell. The system information messages dictates a MS where tolisten for paging messages and how signal towards the network. Thenetwork operation mode represents the capabilities of the GPRS network.In a NOM1 network, a MS can receive pages from a circuit switched domain(voice call) when engaged in a data call. The MS can suspend the datacall or take both simultaneously, depending on the ability of the MS. Ina NOM2 network, a MS may not received pages from a circuit switcheddomain when engaged in a data call, since the MS is receiving data andis not listening to a paging channel In a NOM3 network, a MS can monitorpages for a circuit switched network while received data and vise versa.

The IP multimedia network 138 was introduced with 3GPP Release 5, andincludes an IP multimedia subsystem (IMS) 140 to provide rich multimediaservices to end users. A representative set of the network entitieswithin the IMS 140 are a call/session control function (CSCF), a mediagateway control function (MGCF) 146, a media gateway (MGW) 148, and amaster subscriber database, called a home subscriber server (HSS) 150.The HSS 150 may be common to the GSM network 101, the GPRS network 130as well as the IP multimedia network 138.

The IP multimedia system 140 is built around the call/session controlfunction, of which there are three types: an interrogating CSCF (I-CSCF)143, a proxy CSCF (P-CSCF) 142, and a serving CSCF (S-CSCF) 144. TheP-CSCF 142 is the MS's first point of contact with the IMS 140. TheP-CSCF 142 forwards session initiation protocol (SIP) messages receivedfrom the MS to an SIP server in a home network (and vice versa) of theMS. The P-CSCF 142 may also modify an outgoing request according to aset of rules defined by the network operator (for example, addressanalysis and potential modification).

The I-CSCF 143, forms an entrance to a home network and hides the innertopology of the home network from other networks and providesflexibility for selecting an S-CSCF. The I-CSCF 143 may contact asubscriber location function (SLF) 145 to determine which HSS 150 to usefor the particular subscriber, if multiple HSS's 150 are present. TheS-CSCF 144 performs the session control services for the MS 102. Thisincludes routing originating sessions to external networks and routingterminating sessions to visited networks. The S-CSCF 144 also decideswhether an application server (AS) 152 is required to receiveinformation on an incoming SIP session request to ensure appropriateservice handling. This decision is based on information received fromthe HSS 150 (or other sources, such as an application server 152). TheAS 152 also communicates to a location server 156 (e.g., a GatewayMobile Location Center (GMLC)) that provides a position (e.g.,latitude/longitude coordinates) of the MS 102.

The HSS 150 contains a subscriber profile and keeps track of which corenetwork node is currently handling the subscriber. It also supportssubscriber authentication and authorization functions (AAA). In networkswith more than one HSS 150, a subscriber location function providesinformation on the HSS 150 that contains the profile of a givensubscriber.

The MGCF 146 provides interworking functionality between SIP sessioncontrol signaling from the IMS 140 and ISUP/BICC call control signalingfrom the external GSTN networks (not shown). It also controls the mediagateway (MGW) 148 that provides user-plane interworking functionality(e.g., converting between AMR- and PCM-coded voice). The MGW 148 alsocommunicates with other IP multimedia networks 154.

Mobile Security Device

A mobile security system preferably has a detector and means forcommunicating a detected event. That communication may be of varioustypes, including, but not limited to, and audible alarm or acommunication sent to a pre-determined destination. To detect anintrusion, a detector is used that preferably detects a change in theroom, such as sound, heat, light, infrared, vibration, etc. There areseveral ways in which to detect a disturbance. The present disclosure isnot limited to any particular type of detector, but rather, may use anyone or combination of detectors to detect an intrusive event.

Shown in FIG. 2 is exemplary mobile security device 200. Becausecellular telephones are so pervasive and are commonly used whentraveling, the cellular telephone may be one platform to support mobilesecurity device 202. Other mobile devices may be acceptable as well,including, but not limited to, a personal computer or a personal dataassistant. For the purposes of the following description, the mobileplatform of a cellular telephone is used. Thus, in FIG. 2, shown iscellular telephone 202, which provides for both a mobile platform, anddepending upon the configuration, communication capabilities asdiscussed above.

To detect an intrusive event, cellular telephone 202 has detector 204.As previously discussed, there are several ways in which to detect anintrusive event. For the purpose of the following description only,detector 204 is a passive infrared motion sensor. This type of sensordoes not emit signals, but rather, detects changes in temperature causedby heat emitting objects, such as a human body, passing within range ofits sensors. Because a cellular telephone has limited battery life, apassive sensor may be a preferable option, though active sensors such asultrasonic or microwave may also be configured for use. In FIG. 2,detector 204 is integrated with cellular telephone 202, i.e. detector204 is a fixed component of cellular telephone 202.

A detachable or wholly separate detector may be preferable in situationswhere the user wishes to position the mobile device away from adetection area or keep the mobile device on their person. Additionally,a detachable or separate sensor may be preferable when more than onesensor is needed or desired to secure an enclosure. FIG. 3 illustratesan exemplary mobile security system utilizing a detachable ornon-integrated sensor. Mobile security system 300 has detector 304 incommunication with cellular telephone 302. Detector 304, though shown asa separate component of system 300, may be detachable from cellulartelephone 302. For example, cellular telephone 302 may have a slot orrecess (not shown) in which to receive detector 304 for the purpose ofstorage. Additionally, when inserted into the recess, detector 304 mayalso be configured to operate while inserted, thus allowing a usesimilar to the security system described in FIG. 2 above.

In another example, detector 304 may be wholly separate from cellulartelephone 302. For example, a user which has purchased cellulartelephone 302 may want to utilize the capabilities of detector 304. Theuser may go to a store and purchase detector 304. Additionally, if morethan one detector is needed or desired, the user may purchase additionaldetectors to supplement or augment a single detector, as described morefully in FIG. 7 below.

There are a myriad of ways in which detector 304 may communicate withcellular phone 300. For example, if cellular telephone is within acertain distance, detector 302 may be in communication with cellulartelephone 300 via the use of a Bluetooth® or 802.x connection. If thedetector and the mobile device are outside of certain ranges, thedetector may communicate with the mobile device using other protocols ofcommunication. FIG. 3 a is illustrative of a device outside of a rangethat allows for direct communication between the detector and a mobiledevice. In this example, the detector may have been positioned outsideof direct communication range or lost a direct communication link due toeither physical barriers erected or communication faults.

To maintain communication between the detector and the mobile device,shown are cellular telephone 322 and sensor 324, both with cellularcapabilities. If sensor 324 is in a position that does not allow fordirect communication between sensor 324 and cellular telephone 322,sensor 324 may be configured to automatically switch communication fromdirect to indirect via an alternate means. In FIG. 3 a, sensor 324 isconfigured with cellular capabilities that allow it to attempt tocommunicate with cellular telephone 322 if an event is detected. Sensor324 may be programmed to establish communication with a pre-determineddevice, such as cellular telephone 322.

The communication path may be established under various circumstances,including, but not limited to, a loss of direct communication withcellular telephone 324, a detected event, or upon initial configuration,i.e. the sensor is positioned in a location that does not permit directcommunication. In FIG. 3 a, detector communicates with cellulartelephone 322 via transceivers 326 and 330 vis-á-vis cellular network320. The communication path between cellular telephone 322 and sensor324 may be permanent or temporary. In other words, to increase batterylife, sensor 324 may attempt to revert back to, if previouslyestablished, or use direct communication first. If unsuccessful inopening a direct communication path, sensor 324 may attempt to use anindirect communication path, such as the one described above.

The use may wish to augment a sensor with additional capabilities, oruse various sensors for multiple purposes. For example, is a sensordetects an event, the user may wish to record video or take pictures ofthe area in which the event occurred. FIG. 4 is illustrative of anexemplary mobile security device that facilitates supplementalcapabilities. Shown is cellular telephone 400 with detector 402.Cellular telephone 400 also has camera 404. An exemplary scenario inwhich the device of FIG. 4 may be used is in a home. The user will placecellular telephone 400 in a position so that detector 402 may sense anintrusive event. Upon detection of an intrusive event, cellulartelephone 400 is configured to place camera 404 in an operational statusto take video of the area. The video may be stored in memory on cellulartelephone 400 or may be automatically transmitted to a remote location,such as a central storage locker provided by a cellular network. Theuser may be able to use the video to determine who or what caused theintrusive event and possibly use the video for enforcement purposes. Aswith FIGS. 2 and 3 above, sensor 402 and camera 404 may be physicallyintegrated with cellular telephone 400, as shown by example in FIG. 2,or may be detachable or wholly separate, as shown by example in FIG. 3.

Although detection and recording of intrusive events may be useful, theuser may also want to report such events to local authorities, such asthe police. In a home security system, upon the detection of an event,such as a door opening or a window breaking, when the security system isactive, commonly the detected event will cause the system to communicatethe occurrence of the event with a central monitoring station. FIG. 5 isan exemplary mobile security system that utilizes a monitoring serviceto provide additional security measures. Mobile security device 500 hasan integrated sensor used to detect intrusive events, such as a dooropening or a heat emitting body moving within range. Mobile securitydevice 500 also has cellular communication capabilities to communicationover a cellular network. Although mobile security device 500 may be ofvarious types, for the purposes of this example only, mobile securitydevice 500 is a cellular telephone with an integrated sensor, similar tothe device described in FIG. 2 above.

Upon the detection of an event, mobile security device 500 opens acommunication channel with monitoring service 506 via cellular network504 and cellular transceiver 502. Once the communication channel isestablished, mobile security device 500 sends a detection signal tomonitoring service 506. Upon receipt of the detection signal, monitoringservice may verify the authenticity of the detection signal. Variousmethods may be used, including a call back to a telephone number,including mobile security device 500. If the alarm is authentic, orcontact with mobile security device 500, or other contact means, isunsuccessful, monitoring service 506 may notify emergency services 508,such as the police. Emergency services 508 may also include a firedepartment if the detector of mobile security device 500 is configuredto detect smoke or a fire.

Although it may be preferable to alert authorities immediately when anevent is detected, a user may wish to be notified before, with, or inlieu of notification of emergency services 508. Second communicationdevice 510 is provided as an additional, alternate or primarycommunication recipient resulting from the receipt of a detectionsignal. Communication device 510 may be another cell phone, wired phone,or computer. Additionally, the communication may take several formsbecause the user of communication device 510 may wish to know additionalinformation beyond the notification of the detection of an event. Suchadditional information may be the time and type of detected event. Forexample, the communication may be a text message to communication device510 stating that the detected event occurred at a certain time and thatthe detected event was a fire. The communication may also be amultimedia message sent to communication device 510. for example, ifsecurity device 500 is configured to record video upon the detection ofan event, the video may be sent to communication device 500.

FIG. 6 is illustrative of a setup to monitor a door for intrusiveactivity. A user may want to secure enclosure 600, which may be a dormroom, a house, or hotel room, against unauthorized entry through door604. To secure the room, the user may, in addition to locking door 604and taking other security measures, may wish to monitor any movementcoming from door 604. For example, if the user is sleeping in room 600,the user may not be aware of a silent opening of door 604. Thus, theuser may need a secondary means, other than their own senses, to detectthe opening of door 604. The user thus places mobile security device 602in a position on table to sense movement coming from door 604. Mobilesecurity device 602 has a sensor, such as a type described above, whichis positioned to detect movement from the door, preferable throughpassive reception of sound waves 608. Upon detection of movement, mobilesecurity device 602 may be configured to sound an audible alarm and/orsend a signal to a pre-determined location.

FIG. 7 is illustrative of an alternate mobile security arrangement usingdetached detectors. Shown is enclosure 700, which again may be ofvarious types including a home, dorm room, etc. Enclosure 700, which forpurposes of this explanation only is a room, may have door 704 andwindow 702. Unless mobile security device 706 is configured to have morethan one integrated sensor capable of monitoring two or more areas, afeature within the scope of the present disclosure, it may be preferableto use two remote detectors to detect an intrusive event at both door704 and window 702. Therefore, the user may place detector 708 on table710 to monitor door 704 as well as detector 712 on table 714 to monitorwindow 702. Detectors 708 and 712 may be of various types, such aslight, head, laser, infrared, microwave, etc., and may also communicatewith mobile security device 706 through various communicative means,such as Bluetooth®, 802.x, radio, cellular, etc. Additionally, thedetectors may also be in communication with each other, so if onedetector senses an intrusive event, it sends a signal to the otherdetector to also alarm, thus creating redundancy.

The various techniques described herein may be implemented with hardwareor software or, where appropriate, with a combination of both. Thus, themethods and apparatus of the disclosed embodiments, or certain aspectsor portions thereof, may take the form of program code (i.e.,instructions) embodied in tangible media, such as floppy diskettes,CD-ROMs, hard drives, or any other machine-readable storage medium,wherein, when the program code is loaded into and executed by a machine,such as a computer, the machine becomes an apparatus for practicing thedisclosed embodiments. In the case of program code execution onprogrammable computers, the computer will generally include a processor,a storage medium readable by the processor (including volatile andnon-volatile memory and/or storage elements), at least one input device,and at least one output device. One or more programs are preferablyimplemented in a high-level procedural or object-oriented programminglanguage to communicate with a computer system. However, the program(s)can be implemented in assembly or machine language, if desired. In anycase, the language may be a compiled or interpreted language andcombined with hardware implementations.

The described methods and apparatus may also be embodied in the form ofprogram code that is transmitted over some transmission medium, such asover electrical wiring or cabling, through fiber optics, or via anyother form of transmission, wherein, when the program code is receivedand loaded into and executed by a machine, such as an EPROM, a gatearray, a programmable logic device (PLD), a client computer, a videorecorder, or the like, the machine becomes an apparatus for practicingthe present disclosure. When implemented on a general-purpose processor,the program code combines with the processor to provide a uniqueapparatus that operates to perform the processing of the disclosedembodiments.

While the embodiments have been described in connection with thepreferred embodiments of the various figures, it is to be understoodthat other similar embodiments may be used or modifications andadditions may be made to the described embodiment for performing thesame function without deviating therefrom. Therefore, the disclosedembodiments should not be limited to any single embodiment but rathershould be construed in breadth and scope in accordance with the appendedclaims.

1. A mobile security system comprising: a mobile security devicecomprising a cellular transceiver, wherein the mobile security device isconfigured to communicate with a cellular network; and a first detectordetachable from the mobile security device configured to detect a firstindication of an event, wherein the first detector is configured tocommunicate with the mobile security device, wherein the first detectoris configured to send a first event signal indicative of the firstindication of the event to the mobile security device if the firstdetector detects an event, wherein the first detector is configured todirectly communicate with the mobile security device and indirectlycommunicate with the mobile security device.
 2. The mobile securitysystem of claim 1, wherein the mobile security device is one of acellular telephone, a personal digital assistant, and a laptop computer.3. The mobile security system of claim 1, wherein the first detector isdetachable from the mobile security device.
 4. The mobile securitysystem of claim 1, wherein direct communication comprises the firstdetector transmitting the first event signal directly to the mobilesecurity device, and wherein indirect communication comprises the firstdetector transmitting the first event signal to a cellular network,wherein the first event signal is thereafter transmitted to the mobilesecurity device via the cellular network.
 5. The mobile security systemof claim 1, wherein the first detector is configured to detect at leastone of sound, heat, light, infrared, or vibration.
 6. The mobilesecurity system of claim 1, wherein the first detector sends the firstevent signal using one of a Bluetooth, cellular, and 802.x wirelesscommunication protocol.
 7. The mobile security system of claim 1,wherein the event is one of motion and fire.
 8. The mobile securitysystem of claim 1, wherein the mobile security device further comprisesa camera to record one of video and picture.
 9. The mobile securitysystem of claim 8, wherein the camera is configured to activate andbegin recording when the first detector sends the first event signal tothe mobile security device.
 10. The mobile security system of claim 9,wherein the recording is stored on the mobile security device ortransmitted to the cellular network.
 11. The mobile security system ofclaim 1, further comprising a second detector, wherein the seconddetector is configured to send a second event signal to the mobilesecurity device and the first detector if the second detector detectsthe event, wherein the first detector is configured to retransmit thesecond event signal to the mobile security device.
 12. The mobilesecurity system of claim 11, wherein the first detector is configured todetect fire and the second detector is configured to detect motion. 13.The mobile security system of claim 11, wherein the first detector andthe second detector are configured to detect both motion and fire.
 14. Amobile security apparatus capable of communicating with a cellularnetwork, the mobile security apparatus comprising: a cellular telephonecomprising a detachable detector, wherein the detector is configured todetect an event, wherein the detector is further configured to generatean event signal if the detector detects an event, wherein the cellulartelephone activates an alarm upon generation of the event signal,wherein the detector is configured to provide a direct communicationwith the mobile security apparatus and an indirect communication withthe mobile security apparatus.
 15. The mobile security apparatus ofclaim 14, wherein the detector is configured to detect at least one ofsound, heat, light, infrared, or vibration.
 16. The mobile securityapparatus of claim 14, wherein the event is one of motion and fire. 17.The mobile security apparatus of claim 14, wherein the alarm is sound.18. The mobile security apparatus of claim 14, further comprising acamera to record one of video and picture.
 19. The mobile securityapparatus of claim 18, wherein the camera is configured to activate andbegin recording when the detector sends a signal to the mobile device.20. The mobile security apparatus of claim 19, wherein the recording isstored on the mobile device or transmitted to the cellular network. 21.The mobile security apparatus of claim 14, wherein the cellulartelephone is further configured to communicate the occurrence of thegenerated event signal to a central monitoring station.
 22. The mobilesecurity apparatus of claim 21, wherein the central monitoring stationis configured to contact at least one of a fire department or a policestation if the generated event signal is verified.
 23. The mobilesecurity apparatus of claim 14, wherein the cellular telephone isfurther configured to communicate the occurrence of the generated eventsignal to a second communication device.
 24. The mobile securityapparatus of claim 23, wherein the second communication device is one ofa second cellular telephone, a computer, and a personal data assistant.25. The mobile security apparatus of claim 23, wherein the communicationof the occurrence of the generated event signal to a secondcommunication device is one of email, text message, multimedia message,and a telephonic communication.