Systems and Methods for Remote Building Security and Automation

ABSTRACT

A system and method for remotely monitoring and controlling building security are provided. A controller is communicatively coupled to security devices of a building and can communicate an activity event detected by one of the security devices to a remote user device. The controller can then establish a communication session between the remote device and a security device via the controller, thereby allowing the user to communicate with any visitors. Video from a security device can be transmitted by the controller to the user device or an alternative user-device. Access instructions can be provided by the user, in response to which the controller can deactivate various building security measures. Security measures can be reactivated by the controller automatically or in response to a user command. Additionally, the controller can monitor visitor compliance with the deactivated security measures and activate alarms or notify security agencies if necessary.

FIELD OF THE DISCLOSURE

The present disclosure relates generally to building security, and moreparticularly to remote monitoring and control of building securitysystems.

BACKGROUND

Deliveries and service/repair visits frequently require a homeowner orbuilding manager/supervisor (for simplicity, hereinafter referred to asa homeowner) to be present at the home or building. In many instances,the homeowner is merely required to open the door for the deliveryand/or acknowledge the presence of the service personnel. Often,deliveries and service visits can only be scheduled during weekdays(i.e., normal business days), thus requiring homeowners to be physicallypresent at the building. Homeowners must disrupt their usual schedule orneglect other things that need attention outside the home in order towait at home for a delivery. This causes an increase in frustration andinconvenience of the homeowner as well as a decrease in workerproductivity.

Various building security measures and entrance security devices areknown. However, none adequately addresses the need for a homeowner to bephysically present without unacceptably compromising the security of thehome. For example, some homes/buildings are equipped with a keypad locksuch that anyone that knows the correct combination can gain entry.Alternatively, some locks have a master key that allows entry intomultiple homes. However, these security measures still requirethird-parties to be granted unfettered access to the entire building andrisk the dissemination of the pass-code combination or copies of themaster key to parties without authorization for entry. Alternativesecurity systems include the use of security cameras and/or intercomsystems. However, such existing solutions also require a user to bepresent at the home or building to interact with the security devices.

Additionally, security alarms can be operated with a timer to deactivatealarms during certain times. A user may be able to schedule deactivationof the alarm for the window during which the delivery or repair serviceis scheduled to arrive. Thus, a homeowner is not required to be presentfor the visitor. However, in accordance with this solution, the alarm isdeactivate for all visitors for the scheduled time and thus creates anunacceptable risk.

SUMMARY

In accordance with an embodiment, a method and system for remotelymonitoring and controlling building security is provided. Securitymonitoring devices, connected to a controller, can communicate anactivity event (e.g., detection of a visitor) to the controller. Thecontroller transmits an activity notification to a user's remote device.The controller can then establish a communication session between theremote device and a security communication device by establishing afirst communication channel with the remote device and a secondcommunication channel with the security-communication device, therebyallowing the user to communicate with the security communication devicevia the controller. Access instructions can then be provided to thecontroller (e.g., from the user or the user device), in response towhich the controller can deactivate various building security measures.

In a further aspect of an embodiment, the controller can communicatewith a remote video-capable user device to transmit video from one ofthe security monitoring devices. The remote video-capable device can beincluded in the first remote device or a separate device (e.g., a usercomputer). Additionally, the controller can establish anothercommunication channel with the video capable device or, if possible,transmit the video data over the existing communication channel to theremote user device.

In yet a further aspect of an embodiment, security measures can bereactivated by the controller. In one embodiment, the user can remotelycontrol the security measures by way of a command that is transmitted tothe controller. Alternatively, the controller can automaticallyreactivate security measures after a period of time. Additionally, ifnecessary, either the user or the controller can alert a securityagency.

These and other advantages of the invention will be apparent to those ofordinary skill in the art by reference to the following detaileddescription and the accompanying drawings.

BRIEF DESCRIPTION OF THE DRAWINGS

FIG. 1 illustrates an operational environment of a remote monitoringsystem in accordance with an embodiment;

FIG. 2 is a flow diagram of a process in accordance with an embodiment;and

FIG. 3 is a high-level block diagram of a computer in accordance with anembodiment.

DETAILED DESCRIPTION

By way of overview and introduction, and in accordance with anembodiment, a user can control and interact with various building orhome security features from a remote device. For example, in onescenario, a homeowner may be expecting delivery of a package while atwork. Rather than missing the delivery, the homeowner can configure amonitoring system, implemented in accordance with an embodiment, tonotify the homeowner when someone rings the doorbell to the house.Additionally, the monitoring system can be configured to establish acommunication channel with the user's remote device (e.g., a cellulartelephone) and establish a communication channel with a securitycommunication device in the home (e.g., an intercom at the front door),so as to enable the user to talk to and/or listen to whoever is at thedoor of the home. Optionally, the user can be provided with video orstill pictures of the person at the door obtained by a security cameraconnected to the monitoring system. If the user determines that thevisitor is the delivery person, the user can instruct the monitoringsystem to unlock the front door to allow the delivery person to leavethe package inside the house. Once the delivery person leaves, the doorcan be re-locked by the monitoring system, either automatically or inresponse to a user-command. Additional aspects and features of variousembodiments are described below with reference to the Figures.

FIG. 1 illustrates an operational environment 100 of the monitoringsystem in accordance with an embodiment. A building 110 is provided withvarious security devices including security communication devices andsecurity monitoring devices. Security communication devices typicallyenable an authorized person(s) to communicate (e.g., audibly or visibly)with other parties (e.g., visitors, intruders, or other personnel) inand around the building. Security monitoring devices typically enable anauthorized person(s) to interact with or monitor the status of thebuilding being monitored (e.g., determine which doors or windows areopen, view various camera displays, etc.). For example, the building 110includes a motion detector 145 located by the garage and a securitycamera 130, an intercom 135 and a doorbell 140 near the front door.While illustrated as separate devices, a person of ordinary skill in theart would recognize that the security monitoring devices and securitycommunication devices could be implemented in various combinations in anindividual security device, such as a video-capable intercom 135 havinga ringer (i.e., doorbell 140) or a motion sensor 145 that includes acamera 130.

Each of the security monitoring devices and security communicationdevices are preferably in network communication with controller 120.Communication between the monitoring devices and security communicationdevices can be provided through wired or wireless communication. Inaccordance with one embodiment, the controller 120 is capable ofEthernet (i.e., the IEEE 802.3 standard) and Wireless Ethernet (i.e.,the IEEE 802.11x standard) communications. Thus, the intercom 135,doorbell 140, and camera 130 may be connected to the controller 120through Ethernet cables, and the motion detector 145 can be providedwith a wireless transceiver to wireless communicate with the controller120. Wireless communication can be beneficial for adding securitymonitoring devices or security communication devices without requiringthe installation of additional wiring in buildings. In a furtheralternative, the security monitoring devices and security communicationdevices can communicate over other known wired and wireless protocols.

While the controller 120 is illustrated in FIG. 1 as within the building110 premises, in accordance with a further embodiment, the controller120 can be located remotely, such as at a remote monitoring siteassociated with a contracted security service. If the securitymonitoring devices and security communication devices are capable ofinternet protocol (IP) communication, the security monitoring devicesand security communication devices can be connected to a router withinthe building 110, or a network address translation (NAT) module whichdirects communications between the security monitoring devices andsecurity communication devices and the remotely located controller 120.Alternatively, a simplified sub-controller can be located within thebuilding 110 premises to communicate with the security monitoringdevices and security communication devices using a known protocol, andtranslate or encapsulate those communications for transmission to theremotely located controller 120.

The controller 120 is preferably configured to communicate with remotedevices over one or more wide area networks (e.g., the Internet,cellular telephone networks, etc.). FIG. 1 illustrates a single network150 only for simplified exemplary purposes. A person of ordinary skillin the art would understand that the convergence of telephone networksand computer networks is rapidly enabling devices using one protocol tocommunicate with other devices using another protocol (e.g., cellulartelephone 160 to internet communications). However, the controller 120can include multiple interfaces to various networks. For example, thecontroller 120 can include an interface to a public switched telephonenetwork (PSTN), a cellular telephone network, and/or an IP network.Therefore, as illustrated, the controller 120 can communication with auser's cellular telephone 160, a computer 170, a set-top box 180 (e.g.,a cable television receiver), or other device.

FIG. 2 is a flow diagram of a process 200 in accordance with anembodiment that operates within the environment described above withrespect to FIG. 1. Process 200 enables users to remotely monitorbuilding security, interact with visitors, and remotely control varioussecurity aspects of the building 110. Additionally, based on thedescription and Figures contained herein, a person of ordinary skill inthe art would understand that the process 200 can operate with a subsetor superset (i.e., additional or multiples) of the security monitoringdevices and security communication devices illustrated in FIG. 1, aswell as a subset of superset of the remote user devices (i.e., computer170, set top box 180, cellular telephone 160).

Accordingly, at step 210 of process 200, the controller 120 receives anevent from one of the security monitoring devices. The event can includea network-based message or interrupt from one of the security monitoringdevices in response to an external trigger, such as a detection ofmotion by the motion detector 145 or the press of the doorbell 140. Thecontroller 120 can determine what type of event occurred and transmit anactivity notification to a user's remote device at step 215. Optionally,the activity notification may include additional details about theevent. For example, if the motion detector 145 detects motion, thecontroller 120 can instruct a nearby security camera 130 to record astill picture of video clip of the event cause. The picture or videoclip can then be transmitted along with, or as part of, the eventnotification. In a further example, a set of computer instructions atthe intercom 135, or at the controller 120 controlling the intercom 135,can request that a visitor state his or her name. The visitor's responseis recorded and transmitted along with, or as part of, the eventnotification.

The remote device can include the user's cellular telephone 160,computer 170, set-top box 180, or other such device. The controller 120can be configured to communicate with the various devices based on auser selection, a configuration file specifying which device to contactat predefined times (e.g., a type of find me follow me service), or byconcurrently attempting to contact multiple devices. The controller 120can communicate with each user device using an appropriate communicationprotocol and transmission medium. For example, if the controller 120contacts the user's cellular telephone 160, the communications can bemade via a telephone call or via a packet data service (e.g., GPRS orEDGE). If the activity notification is sent to the user's computer 170,communications can be sent over the Internet via an IP protocol.

The user can be provided with the option of responding to the activitynotification. If the user is busy or does not recognize the optionalaccompanying audio or still image transmitted along with the activitynotification, the user can simply ignore the activity notification.Thus, at decision 220, the controller 120 determines whether it hasreceived a response from the user's remote device. If no response hasbeen received, the process 200 ends.

However, if the user indicates, via the remote device, a desire tocommunicate with the visitor that prompted the activity notification, atstep 220, the process 200 establishes communication between the remotedevice and one of the security communication devices. That is, thecontroller 120 establishes communication with the remote device over anappropriate communication channel (e.g., cellular telephonecommunication channel) at step 230 and establishes another communicationpath with a security communication device over an appropriatecommunication channel at step 235. Thus, the user can communicate withthe visitor via the controller 120. Communication can be one-way ortwo-way in accordance with limitations of the security communicationdevice or remote device.

At decision 240, the controller 120 determines whether video or stillimages (hereinafter referenced as images) can or should be transmittedto the user. The determination to transmit images can be based on one ormore parameters. In one scenario, the user can instruct the controller120 to begin transmission of the images, for example by visiting aparticular uniform resource locator (URL) address on a computer webbrowser, interacting with a software program on the user's computer 170or cellular telephone 160, sending a text message (e.g., Short MessageService (SMS)), voice command, or pressing a specific sequence oftelephone keys to produce a predetermined sequence of dual-tone multifrequency (DTMF) tones. Alternatively, the user can be prompted by thecontroller 120 whether to transmit images and to where to transmit them.In a further alternative, the controller 120 can automate the decisionby gathering information about the capabilities of the user's remotedevice and the configuration of the security monitoring devices and bytransmitting images to the user's remote device if image data isavailable from the security system and capable of displaying on theuser's remote device.

Images can be transmitted to a cellular telephone 160 preferably viadata link, to a computer 170 via an IP-based link, or to a set-top box180. Additionally, images can be transmitted to the same device to whichthe controller 120 sent the activity notification or to an additionalremote user device. For example, if the controller 120 calls the user ona cellular telephone 160 to notify the user of the activity, thecontroller 120 can also transmit the images to the cellular telephone160 or open the second communication channel with a computer 170 andtransmit the images to the computer 170 while optionally maintaining theconnection with the user's cellular telephone 160.

If the controller 120 determines that images should be transmitted atstep 240, at step 250 the controller 120 connects with the video deviceand transmits images at step 255. As described above, connecting to thevideo device at step 250 can merely include signaling the remote deviceover an already-existing communication channel that image transmissionwill begin. Alternatively, connecting to the video device can requireestablishing a second communication channel between the controller 120and a remote device. The second communication channel can be over thesame transmission medium as the existing communication channel or adifferent transmission medium.

The process 200 can also continue without transmission of images. Thus,if at decision 240, the controller 120 determines images should not betransmitted, the process 200 proceeds to step 260.

By way of the audio and/or image communication established between thesecurity monitoring devices of the building 110 and the remote userdevices, the homeowner, or other responsible party, can determinewhether the visitor should be provided access to the building 110. Forexample, if the visitor is a delivery person, the homeowner may want togrant the visitor access for the building 110 for a limited period oftime (e.g., enough time to deliver the package). In a further example,the homeowner may recognize the visitor as their teenage child whoforgot his or her keys to the home. In either of the above scenarios,the remote user may instruct the controller 120 to allow the visitoraccess to the building 110.

At step 260, the controller 120 determines whether access instructionshave been received from the remote user. Access instructions can bereceived in a variety of the ways such as those described above withrespect to step 240 and receiving instructions to provide video. Thatis, instructions can be provided by signaling through a computerapplication, DTMF tones, SMS, or voice command.

Access instructions typically specify deactivation of certain securityfeatures of the building 110. For example, access instructions mayspecify that the controller 120 disable the building 110 alarm andunlock the front door at step 270. More detailed instructions may alsobe supported such that specific alarms and locks can be deactivated. Forexample, the user can specify that only the front door alarm bedeactivated. Additionally, access instructions may specify a period oftime over which the alarm is deactivated and/or the door unlocked. Thus,if after being granted access the visitor lingers inside the building110 too long, the alarm will be automatically reactivated andpotentially sound.

At step 280, the controller 120 can determine whether alarm instructionshave been received. As discussed above with respect to accessinstructions and video instructions, alarm instructions can be providedby signaling through a computer application, DTMF tones, SMS, or voicecommand. Additionally, alarm instructions can be generated automaticallyby the controller 120. For example, in the example discussed above inwhich the visitor lingers beyond the specified period of time duringwhich the alarm was disabled, the controller 120 may automaticallygenerate alarm instructions that are performed by the controller 120 atstep 285 so as to alert security (e.g., a security monitoring company orthe or police) and optionally sound an audible alarm. Additionally, ifthe user is no longer monitoring the visitor's access to the building110 (e.g., the user granted access and ended the communication from thecontroller 120), the controller 120 can notify the user that the visitorhas violated the access granted by the access instructions and furtherinform the user of whatever other security measures (e.g., alarm and/orpolice call) are being taken.

It should be noted that alarm instructions can be received regardless ofwhether access instructions were received or provided. Thus, if a remoteuser is notified at step 215 of certain activity, and the userdetermines, based on the images transmitted along with the activitynotification, that the activity is ill intentioned, the user canremotely activate alarms at step 285 including an audible alarm and aninteractive or automated call to the police or security company.

At step 290, if alarm instructions have not been received or as part ofthe alarm instruction process, security measures can be reactivated. Theuser can manually instruct the controller 120 to reactivate securitymeasures or the security measures may be reactivated automatically aftera configurable elapsed time. Thus, the security system continues tomonitor the various monitoring devices.

The above-described methods for providing building security can beimplemented on a computer using well-known computer processors, memoryunits, storage devices, computer software, and other components. Ahigh-level block diagram of such a computer is illustrated in FIG. 3.Computer 300 contains a processor 310 which controls the overalloperation of the computer 300 by executing computer program instructionswhich define such operations. Controller 120 can be implemented using acomputer as described herein. The computer program instructions may bestored in a storage device 320, or other computer readable medium (e.g.,magnetic disk, CD ROM, etc.), and loaded into memory 330 when executionof the computer program instructions is desired. Thus, the method stepsof FIG. 2 and/or operations of controller 120 of FIG. 1 can be definedby the computer program instructions stored in the memory 330 and/orstorage 320 and controlled by the processor 310 executing the computerprogram instructions. For example, the computer program instructions canbe implemented as computer executable code programmed by one skilled inthe art to perform an algorithm defined by the method steps of FIG. 2.Accordingly, by executing the computer program instructions, theprocessor 310 executes an algorithm defined by the method steps of FIG.2. The computer 300 also includes one or more network/communicationinterfaces 340 for communicating with other devices via a network 150.The computer 300 also includes input/output devices 350 that enable userinteraction with the computer 300 (e.g., display, keyboard, mouse,speakers, buttons, etc.) One skilled in the art will recognize that animplementation of an actual computer could contain other components aswell, and that FIG. 3 is a high level representation of some of thecomponents of such a computer for illustrative purposes.

The foregoing Detailed Description is to be understood as being in everyrespect illustrative and exemplary, but not restrictive, and the scopeof the invention disclosed herein is not to be determined from theDetailed Description, but rather from the claims as interpretedaccording to the full breadth permitted by the patent laws. It is to beunderstood that the embodiments shown and described herein are onlyillustrative of the principles of the embodiments, and that variousmodifications may be implemented by those skilled in the art withoutdeparting from the scope and spirit of the invention. Those skilled inthe art could implement various other feature combinations withoutdeparting from the scope and spirit of the invention. The variousfunctional modules that are shown are for illustrative purposes only,and may be combined, rearranged and/or otherwise modified.

1-20. (canceled)
 21. A method for providing building securitycomprising: transmitting an activity notification to a remote clientdevice associated with a user; receiving access instructions from theremote client device; and transmitting a notification to the remoteclient device indicating that a visitor has violated access granted bythe access instructions.
 22. The method of claim 21, further comprising:establishing a first communication with the remote client device over afirst communication channel and a second communication with asecurity-communication device over a second communication channel so asto enable communication between the security-communication device andthe remote client device, wherein the access instructions from theremote client device are received over the first communication channel.23. The method of claim 21, further comprising: sending a deactivationcommand to a security measure in response to the access instructions.24. The method of claim 23, further comprising: reactivating thesecurity measure automatically after a period of time.
 25. The method ofclaim 23, further comprising: reactivating the security measure inresponse to a command from the remote client device.
 26. The method ofclaim 21, further comprising: alerting a security agency in response toan alert command from the remote client device.
 27. The method of claim21, further comprising: receiving an activity indication from amonitoring device, wherein the activity notification is transmitted inresponse to receiving the activity indication.
 28. A controller for abuilding security system comprising: a processor; and a memorycommunicatively coupled to the processor, the memory storing computerprogram instructions, the computer program instructions when executed onthe processor cause the processor to perform operations comprising:transmitting an activity notification to a remote client deviceassociated with a user; receiving access instructions from the remoteclient device; and transmitting a notification to the remote clientdevice indicating that a visitor has violated access granted by theaccess instructions.
 29. The controller of claim 28, the operationsfurther comprising: establishing a first communication with the remoteclient device over a first communication channel and a secondcommunication with a security-communication device over a secondcommunication channel so as to enable communication between thesecurity-communication device and the remote client device, wherein theaccess instructions from the remote client device are received over thefirst communication channel.
 30. The controller of claim 28, theoperations further comprising: sending a deactivation command to asecurity measure in response to the access instructions.
 31. Thecontroller of claim 30, the operations further comprising: reactivatingthe security measure automatically after a period of time.
 32. Themethod of claim 30, further comprising: reactivating the securitymeasure in response to a command from the remote client device.
 33. Thecontroller of claim 28, the operations further comprising: alerting asecurity agency in response to an alert command from the remote clientdevice.
 34. The controller of claim 28, the operations furthercomprising: receiving an activity indication from a monitoring device,wherein the activity notification is transmitted in response toreceiving the activity indication.
 35. A computer readable mediumstoring computer program instructions for initiating setup of a circuit,the computer program instructions, when executed on a processor, causethe processor to perform operations comprising: transmitting an activitynotification to a remote client device associated with a user; receivingaccess instructions from the remote client device; and transmitting anotification to the remote client device indicating that a visitor hasviolated access granted by the access instructions.
 36. The computerreadable medium of claim 35, the operations further comprising:establishing a first communication with the remote client device over afirst communication channel and a second communication with asecurity-communication device over a second communication channel so asto enable communication between the security-communication device andthe remote client device, wherein the access instructions from theremote client device are received over the first communication channel .37. The computer readable medium of claim 35, the operations furthercomprising: sending a deactivation command to a security measure inresponse to the access instructions.
 38. The computer readable medium ofclaim 37, the operations further comprising: reactivating the securitymeasure automatically after a period of time.
 39. The computer readablemedium of claim 37, the operations further comprising: reactivating thesecurity measure in response to a command from the remote client device.40. The computer readable medium of claim 35, the operations furthercomprising: receiving an activity indication from a monitoring device,wherein the activity notification is transmitted in response toreceiving the activity indication.