Methods, apparatuses, and computer program products for implementing remote control processes

ABSTRACT

A method, apparatus, and computer program product for implementing remote control processes is provided. The method includes receiving a request to execute an operation on a target device via selection of a function key on a remote control device. The function key is associated with the operation and the target device that performs the operation for remotely controlling operation of the target device via a signal transmitted from the remote control device to the target device when the function key is selected. The method also includes approving the request to execute the operation when authorization has been secured, and transmitting the signal from the remote control device to the target device in response to the approval.

CROSS REFERENCE TO RELATED APPLICATIONS

This application is related to commonly assigned U.S. patent applicationSer. No. 11/764,919, entitled METHODS, APPARATUSES, AND COMPUTER PROGRAMPRODUCTS FOR DEVICE MANAGEMENT, filed on Jun. 19, 2007. This applicationis also related to commonly assigned U.S. patent application Ser. No.11/764,923, entitled METHODS, APPARATUSES, AND COMPUTER PROGRAM PRODUCTSFOR IMPLEMENTING SITUATIONAL CONTROL PROCESSES, filed on Jun. 19, 2007.These applications are incorporated by reference herein in theirentireties.

BACKGROUND

The present invention relates generally to remote control processes, andmore particularly, to methods, apparatuses, and computer programproducts for providing authorized remote control over safety devices.

First responders and other emergency or management personnel oftentimeshave very limited knowledge about the current conditions present at alocation when an incident is reported. For example, it may be that analarm was activated at a facility, which caused a first respondingentity to be notified. However, the alarm activation itself may notprovide sufficient information as to the nature and/or extent of theconditions within the facility. In fact, most first responders do notfully appreciate the nature and extent of conditions at a facility untilthey are physically present at the facility, and even then, may be notaware of all of the conditions needed to protect themselves and others.

Another disadvantage faced by first responders relates to the operationand procedures followed by various safety devices located throughout afacility. For example, suppose that a first responder detects smoke inone area of the facility. Suppose also that a sprinkler system wasactivated due to a level of heat detected in the area. Sprinkler systemsare typically configured such that the heat of a fire will open asprinkler head. As the fire spreads, additional sprinkler heads open,even those where the fire is no longer present. Alternatively, aconcussion produced via a high-impact explosion has been known to causemany sprinkler heads to simultaneously open. These scenarios may cause areduction in water pressure due to the number of active sprinkler heads.The reduction in water pressure, particularly in locations of thefacility where the water is most needed, may negatively impact the firstresponders' efforts in containing the fire. In addition, if sprinklerheads are still active in an area that does not require the water, thenvaluable equipment, furnishings, and valuables may needlessly becomedamaged.

What is needed, therefore, is way to selectively and remotely operate(e.g., activate/de-activate) various devices in response to knownconditions at a location. What is also needed is a way to control orrestrict this selective operation based upon an authorization scheme.

BRIEF SUMMARY

Exemplary embodiments include a method for implementing remote controlprocesses. The method includes receiving a request to execute anoperation on a target device via selection of a function key on a remotecontrol device. The function key is associated with the operation andthe target device that performs the operation for remotely controllingoperation of the target device via a signal transmitted from the remotecontrol device to the target device when the function key is selected.The method also includes approving the request to execute the operationwhen authorization has been secured, and transmitting the signal fromthe remote control device to the target device in response to theapproval.

Additional exemplary embodiments include an apparatus and computerprogram product for implementing remote control processes.

Other systems, methods, apparatuses, and/or computer program productsaccording to embodiments will be or become apparent to one with skill inthe art upon review of the following drawings and detailed description.It is intended that all such additional systems, methods, apparatuses,and/or computer program products be included within this description, bewithin the scope of the exemplary embodiments, and be protected by theaccompanying claims.

BRIEF DESCRIPTION OF DRAWINGS

Referring now to the drawings wherein like elements are numbered alikein the several FIGURES:

FIG. 1 depicts a system upon which the device management, situationalcontrol processes, and remote control processes may be implemented inexemplary embodiments;

FIG. 2 illustrates a sample safety device configured for use inimplementing device management, situational control processes, andremote control processes in exemplary embodiments;

FIG. 3 illustrates another example of a safety device configured for usein implementing device management, situational control processes, andremote control processes in exemplary embodiments;

FIG. 4 depicts a sample device record generated for use in implementingdevice management and situational control processes in exemplaryembodiments;

FIG. 5 is a flow diagram describing a process for implementing devicemanagement processes in exemplary embodiments;

FIG. 6 depicts a remote safety control device configured for use inimplementing situational control processes and remote control processesin exemplary embodiments;

FIG. 7 illustrates a sample system including safety devices and peerdevices configured for use in implementing situational control processesand remote control processes in exemplary embodiments;

FIG. 8 is a flow diagram describing a process for implementingsituational control processes in exemplary embodiments; and

FIG. 9 is a flow diagram describing a process for implementingconfiguration and operation of a remote safety control device inexemplary embodiments.

The detailed description explains the exemplary embodiments, togetherwith advantages and features, by way of example with reference to thedrawings.

DETAILED DESCRIPTION OF EXEMPLARY EMBODIMENTS

In accordance with exemplary embodiments, device management, situationalcontrol processes, and remote control processes are provided. Devices,e.g., safety devices, provide self-managing functions, such asinspections, testing, and alerts based upon selected rules andconditions. The self-managing functions may include performing one ormore actions with respect to the devices based upon the selectedrules/conditions.

Situational control processes include monitoring the presence ofsafety/peer devices and/or systems, and monitoring conditions present ata location within proximity of the device(s) implementing thesituational control activities. The situational control processesprovide a networked communications system that reacts to conditionsdetected by one or more of the devices that comprise the networkedsystem. The devices may communicate in an ad-hoc, peer-to-peercommunications infrastructure, or may be in communication with oneanother via a centralized host system, or both. In alternativeembodiments, the devices communicate in a combination of networks (e.g.,ad-hoc, centralized networks).

Remote control processes are enabled via a remote safety control devicethat is configured to communicate with one or more devices (e.g., safetydevices) based upon permissions granted to the control device, in orderto activate/de-activate, reset, or otherwise cause an operation to beperformed on the targeted device.

The device management, situational control processes, and remote controlprocesses are described herein with respect to safety devices. However,it will be understood that these services may be implemented for avariety of different devices and/or systems.

Turning now to FIG. 1, a system upon which the device management,situational control processes, and remote control processes may beimplemented in accordance with exemplary embodiments will now bedescribed. The system of FIG. 1 includes safety devices 102, each ofwhich is in communication with one or more peer devices 104 andnetwork(s) 108. A safety device 102 refers to an apparatus that is usedin facilitating the prevention and/or mitigation of conditions that mayunfavorably impact the safety, security, and/or operation of a premisesand/or the well being of individuals at or near the premises.

In exemplary embodiments, safety devices 102 and peer devices 104provide a variety of self-management functions (i.e., device managementprocesses), such as automated testing and inspections, inventorycontrol, and information dissemination. Safety devices 102 may alsoperform situational control processes that are designed to minimize acondition detected at the premises and/or risk of injury that may resultfrom the condition, and/or instruct another device (e.g., a safetydevice, peer device, and/or system) to perform an action. Safety devices102 may include, for example, pull stations, sprinklers, and hazardousmaterials detectors (e.g., smoke, carbon monoxide, chemicals, etc.), toname a few. Safety devices 102 include may include communicationcomponents for communicating with one or more other safety devices 102,peer devices 104, etc., and may also include processors and logic forperforming the device management and situational control processesdescribed herein.

A peer device 104 also refers to an apparatus that is used infacilitating the prevention and/or mitigation of conditions that mayunfavorably impact the safety, security, and/or operation of a premisesand/or the well being of individuals at or near the premises. However,in exemplary embodiments, a peer device 104 serves a more passive rolethan the safety device counterparts described above with respect to thesituational control processes. Peer devices 104 receive instructionsfrom one or more safety devices 102 by way of communication signals andperform actions in accordance with the instructions. Peer devices 104include communication components for sending and receivingcommunications as will be described further herein. Peer devices 104include, for example, recording equipment, emergency exit lights, andsafety lights, to name a few. It will be understood that a peer device104 (e.g., an exit light), if configured with a processor and logic asdescribed above with respect to the safety devices 102, may becomesafety devices themselves. Thus, the peer devices 104 may be defined bytheir limited or lack of information processing capabilities in additionto their functions as a device (e.g., illuminating an emergency exit). Apeer device 104 may be configured to support and perform the requisiteactions that are prompted by a safety device 102 to which it plays asubservient role. For example, the role of a peer device 104 may be tocommunicate its presence to a safety device 102 and become active orinactive at the request of the safety device 102.

Safety devices 102 and peer devices 104 may communicate with one anotherin a peer-to-peer network configuration via wired or wirelesstechnologies (e.g., over-the-air radio signaling, 802.11 protocols,physical cabling, etc.). Safety devices 102 and peer devices 104 mayalso communicate with one another via host system 110 using, e.g., anarea network, such as network 108. The network may be a wireless areanetwork, local area network, etc.).

Also shown in the system of FIG. 1 is a remote safety controller 106.Remote safety controller 106 (also referred to herein as remote safetycontrol device) refers to a wireless portable device that is used inimplementing the remote control processes. Remote safety controller 106is configured to control (e.g., activate/deactivate, reset, override,etc.) a safety device 102, peer device 104, and/or other configuredsystems. In exemplary embodiments, remote safety controller 106 isimplemented by an individual who is tasked with responding to a safetycondition or threat that is present or believed to be present at thepremises. Remote safety controller 106 is described further herein(e.g., in FIG. 6).

Safety devices 102 and/or peer devices 104 may communicate with otherentities over one or more networks (e.g., network(s) 108). As shown inthe system of FIG. 1, a host system 110, storage device 112, circuitpanel 114, heating, ventilation, air conditioning (HVAC) system 116, andinternal systems 118 are each in communication with one another, as wellas safety and/or peer devices over network(s) 108. In addition, one ormore of these devices/systems may communicate with external systems 122over other network(s) 120.

In exemplary embodiments, host system 110 is a high-speed processingdevice (e.g., a computer system) that is capable of handling high volumeactivities conducted via communications devices, such as safety devices102, peer devices 104, remote safety controller 106 and other systems,such as circuit panel 114, HVAC 116, and internal systems 118. Hostsystem 110 may be implemented by a facility (premises) that utilizes thesafety devices 102, peer devices 104 and other systems shown in thesystem of FIG. 1. In the embodiment shown in the system of FIG. 1, byway of non-limiting example, the premises include elements 102 through118. In exemplary embodiments, host system 110 executes a centralizedsafety systems control application 124 for performing a portion of theactivities described herein with respect to device management,situational control processes, and/or remote safety control processes.Centralized safety systems control application 124 is described furtherherein.

In exemplary embodiments, host system 110 is in communication with astorage device 112 via, e.g., network(s) 108. Storage device 112 may beimplemented using memory contained in the host system 110 or it may be aseparate physical device. In exemplary embodiments, the storage device112 is in direct communication with the host system 110 (via, e.g.,cabling). However, other network implementations may be utilized. Forexample, storage device 112 may be logically addressable as aconsolidated data source across a distributed environment that includesone or more networks 108. Information stored in the storage device 112may be retrieved and manipulated via the host system 110. In exemplaryembodiments, storage device 112 stores device records for safety devices102, peer devices 104, and other network systems (e.g., circuit panel114, HVAC 116, internal systems 118, etc.). A sample device record 400is shown and described further in FIG. 4.

As indicated above, various systems may be in communication with one ormore safety devices 102, peer devices 104, and/or host system 110.Circuit panel 114 (also referred to as a circuit breaker panel) refersto an electrical distribution board that provides a central point withina location (e.g., the premises of the system of FIG. 1) for distributingelectricity throughout the location. The circuit panel 114 may be acommercial product utilized for enabling or disabling electricalcircuits, e.g., during an emergency or for testing. In exemplaryembodiments, the circuit panel 114 is equipped with communicationelements for receiving signals from one or more safety devices 102, peerdevices 104, remote safety controller 106, host system 110, or othersystems within, or external to, the premises of FIG. 1. These signals,in turn, may cause circuit panel 114 to perform an action, e.g.,enabling electrical circuits, disabling electrical circuits, orresetting the circuit panel 114. Used in this manner, circuit panel 114becomes a peer device 104 with respect to the situational controlprocesses. These features are described further herein. While only asingle circuit panel 114 is shown in the system of FIG. 1 forillustrative purposes, it will be understood that multiple circuitpanels may be implemented, each servicing a defined area within thelocation.

HVAC system 116 may be a commercial product that controls thetemperature, ventilation, and may control other elements, such ashumidity, pressure, etc. HVAC system 116 may include one or more controlunits dispersed throughout the premises of the system of FIG. 1. Inexemplary embodiments, HVAC system 116 is equipped with communicationelements for receiving signals from one or more safety devices 102, peerdevices 104, remote safety controller 106, host system 110, or othersystems within, or external to, the premises of FIG. 1. These signals,in turn, may cause HVAC system 116 to perform an action, e.g., openingor closing dampers, activating or increasing ventilation (e.g., viafans, exhaust), redirecting airflow, modifying thermostat settings, etc.Used in this manner, HVAC system 116 becomes a peer device 104 withrespect to the situational control processes. These features aredescribed further herein.

Internal systems 118 refer to various control and/or communicationssystems that may be distributed throughout the premises of the system ofFIG. 1. For example, internal systems 118 may include an operationscontrol center, security office, temporary incident command centerestablished in response to a safety issue or incident, etc. Internalsystems 118 may include communications devices (e.g., computers,telephones, cellular phones, pagers, etc.), electronic equipment, etc.,for facilitating operations performed in furtherance of the dutiesprescribed with respect to each of these internal systems 118. Forexample, a security office may include a networked communications systemthat provides a direct link to, e.g., a local fire station, when analarm is activated. Security office may also include video monitors thatreceive signals captured by security camera devices distributedthroughout the premises.

As indicated above, the elements 102 through 118 represent the premisesor facility implementing the device management, situational controlprocesses, and remote control processes. In exemplary embodiments, oneor more of these elements 102-118 are in communication with externalsystems 122 via network(s) 120. External systems 122 refer to entitiesoutside of the premises of the system of FIG. 1, which provide asupporting role to the premises with respect to the safety controlprocesses described herein. For example, external systems 122 mayinclude emergency management entities, such as police, fire, 911,hospital, etc. Other examples of emergency management entities mayinclude environmental hazard control agencies, biological hazard controlagencies, anti-terrorism agencies, or other similar types oforganizations. In yet another example, external systems 122 may includelocal utilities, e.g., gas, water, and/or electrical, that provideinfrastructure services to the premises of the system of FIG. 1.

Security devices 102, peer devices 104, and/or other systems within thepremises provide self-managing functions (e.g., device management) andsituational control processes. Self-management functions may includeinspections, internal testing, component inventory maintenance, andvarious responsive actions as described herein. Situational controlprocesses include presence detection, condition monitoring andreporting, and various responsive actions as described herein. Theinformation derived from these processes may be stored locally on thedevices and/or distributed to other systems within the premises, such asother safety/peer devices, circuit panels, HVAC, internal systems,and/or host system 110, and/or systems outside of the premises, such asexternal systems 122. Two examples of safety devices are shown anddescribed in FIGS. 2 and 3. Safety device 102A of FIG. 2 is describedwith respect to implementation of the device management processes, andsafety device 102B of FIG. 3 is described with respect to implementationof the situational control processes. However, it will be understoodthat each of safety devices 102A and 102B may perform both devicemanagement and situational control processes.

Turning now to FIG. 2, a sample safety device 102A for implementingdevice management functions will now be described in accordance withexemplary embodiments. As an illustrative example, the safety device102A of FIG. 2 refers to an automated external defibrillator (AED). AED102A may be docked at a base station 204 when not in use. AED 102Aincludes logical components 206 (e.g., heart monitor, capacitor storage,and discharge), external components 208 (e.g., display screen, outputindicators, buttons, and pad interfaces), and consumables 210 (e.g.,batteries and pads). The device management activities of safety device102A enable automated inventory control and management of the device102A and its constituent components. For example, device managementactivities may include tracking the age, usage, inspection/testinghistories, physical location, and other factors associated with thedevice 102A and its constituent components (e.g., components 206-210).Device management activities may further include automated testing andinspection of the device 102A and its components.

The safety device 102A includes a processor 212, a device managerapplication 214, memory 216, a communications interface 218, and a radiofrequency identification (RFID) tag 220. Device manager application 214executes via the processor 212 at the safety device 102A. Device managerapplication 214 includes logic for performing the device managementactivities described herein. Device manager application 214 generates adevice record (e.g., record 400 of FIG. 4), which may be storedinternally in memory 216 and/or may be transmitted to other devices orsystems, e.g., host system 110 of FIG. 1. Device records may be used intracking and maintaining devices including component inventorymanagement.

Communications interface 218 enables safety device 102A to communicatewith its base station 204, as well as other devices (e.g., devices 102B,104) or other systems (e.g., circuit panel 114, HVAC 116, internalsystems 118). Communications interface 218 may be implemented usingwireless or wired communications technologies known in the art. Inexemplary embodiments, communications interface 218 is a wirelesscommunications component that receives and transmits communicationsbetween the device itself (i.e., device 102A) and other devices in rangevia an ad-hoc or peer-to-peer network using wireless communicationsprotocols, such as 802.11, Bluetooth™, ultra-wide band (UWB), or othermeans. Communications interface 218 may also include, e.g., a peripheralcomponent interconnect (PCI) card for discovering a network (e.g.,network(s) 108 where network 108 includes a wireless local area network)and communicating with host system 110 or other system elements.Communications interface 218 may further include a radio transceiver orsimilar element for communicating with a radio frequency identification(RFID) tag (e.g., RFID tag 220).

As shown in FIG. 2, RFID tag 220 is affixed to AED device 102A. RFID tag220 may store information about the device 102A and/or its constituentcomponents, such as components 206-210. For example, RFID tag 220 may beencoded with the expiration dates of installed components, such asbatteries and pads (i.e., consumables 210). In exemplary embodiments,base station 204 includes a transponder 222 that communicates withcommunications interface 218 and RFID tag 220. Upon request, orperiodically, the information stored in RFID tag 220 may be provided todevices (e.g., 102, 104) or systems (e.g., host system 110) via, e.g.,communications interface 218. Memory 216 may store one or more devicerecords for the device.

According to an exemplary embodiment, device management functions arefacilitated via configurable rules and conditions provided by the devicemanager 214. For example, device manager 214 may be configured to trackthe location (e.g., presence detection) and/or use of AED 102A viacommunication signals received from transponder 222, which activateswhen the AED 102A is removed from the base station 204. Device manager214 may also be configured to perform automated testing of devices anddevice components, perform component inventory management, and otherfunctions as described further herein (e.g., in the flow diagram of FIG.5).

As indicated above, safety devices 102 facilitate the safety andsecurity of individuals, equipment, and/or overall premises within whichthey operate. Safety devices 102 and peer devices 104 may be configuredto communicate with one another in a peer-to-peer network for providingvarious safety functions. Turning now to FIG. 3, an example of a safetydevice 102B for use in implementing situational control procedures inexemplary embodiments will now be described. The safety device 102Bshown in FIG. 3 refers to a pull station. In exemplary embodiments, andas further shown in FIG. 1, pull station 102B is in communication with apeer device 104B. Pull station 102B may be mounted securely on a wall atthe premises of FIG. 1.

Pull station 102B includes an alarm activation element (not shown) thatis housed in a compartment 302 of the pull station 102B. The compartment302 includes a door 304 that is manipulated via an affixed handle 306.In exemplary embodiments, pull station 102B includes a processor 312, adevice manager 314, memory 316, communications interface 318, andinfrared (IR) detection component 320. The processor 312 andcommunications interface 318 may be implemented in a mannersubstantially similar to that described above with respect to AED 102A.Device manager 314 includes logic for implementing the situationalcontrol activities (as well as the device management processes)described herein. In exemplary embodiments, the pull station 102B isequipped with one or more sensors 308, 310 that are activated by, e.g.,motion, touch, etc., such that when contact is made with the door (e.g.,via sensor 308) or when the door is opened (e.g., as detected by sensor310 placed in the opening of the compartment 302), the pull station 102Btransmits a signal to another device (e.g., another safety device 102 orpeer device 104, 104B). In alternative embodiments, one or more sensors(e.g., motions sensors) may be located a short distance from the pullstation 102B in order to detect conditions present immediately prior toactivation of the pull station (e.g., an individual walking in adirection toward the pull station). In this embodiment, peer device 104Brefers to a recording device, such as a camera.

By communicating with the recording device 104B in response toactivation of the sensor(s), various conditions that are present may becaptured by the recording device 104B as directed by the pull station102B. Suppose, for example, that pull station 102B has been subject tonumerous activations that were subsequently determined to be falsealarms (i.e., unlawful intentional activation). The device manager 314may be configured to signal peer device 104B (i.e., camera recordingdevice) to transmit previously recorded video and continue totransmit/record when one or both sensors 308, 310 have been activated.

These, and other, situational control functions may be facilitated viaconfigurable rules and conditions provided by the device manager 314.For example, device manager 314 may be configured to transmit detectionsignals to other devices that are proximally located (within range) ofthe device executing the device manager 314. These detection signalsoperate to determine the presence of other devices in order tocontinuously assess the operational capabilities of these devices. Rulesand conditions may be established for implementing responsive actionsbased upon the success or failure of the presence detection signals. Infurther exemplary embodiments, configurable rules and conditions may beimplemented for determining conditions present in an area surroundingthe device and determining appropriate responses. These and otherfeatures of the situational control processes are described furtherherein (e.g., in the flow diagram of FIG. 8)

Turning now to FIGS. 4 and 5, a device record 400 and flow diagram,respectively, describing a process for implementing the devicemanagement processes in exemplary embodiments will now be described. Atstep 502, a device record, such as the device record 400, is generatedfor a safety device 102 (e.g., safety device 102A, 102B). The record 400may be created at the time the safety device is installed at thepremises or may be created at the time the device management servicesand/or situational control processes are desired. As shown in FIG. 4,device record 400 includes a field that uniquely identifies each device(DEVICE_ID 402). Device record 400 further includes a DEVICE_LOCATIONfield 404 through which a device may be assigned a location. In manysituations, safety devices are required to be located at specifiedlocations (e.g., near electrical equipment, hazardous materials, orwithin a minimum distance of another safety device). The assignedlocation may be tracked by DEVICE_LOCATION field 404 as describedfurther herein.

The device manager, such as device manager 214 (FIG. 2) and devicemanager 314 (FIG. 3) may include a user interface for facilitating userinputs in selecting from various rules for implementing the devicemanagement processes. The user interface may be facilitated viainput/output elements on the device (e.g., the buttons/display on AEDdevice 102A via external components 208) or by other means if limitedinput/output elements are provided on the device. For example, thedevice manager 214 may be installed and configured for a safety devicevia a computer system, e.g., host system 110, and then transferred tothe device processor (e.g., processor 212 of AED 102A). In furtheralternative embodiments, the device manager 214, 314 may bepre-programmed by, e.g., a manufacturer of the device managerapplication 214, 314).

At step 504, one or more rules and conditions for managing the device102 are configured via the device manager, e.g., 214, 314. Rules includeactions to be performed with respect to the device when a correspondingcondition has been met. Actions available in implementing the devicemanagement process may include, e.g., device inspection, device testing,device activation/de-activation, device reset, and notificationgeneration. These rules may be stored in the record 400 created in step502. As shown in FIG. 4, fields for tracking activities with respect tothese rules include STATUS_FLAG 406, which may be used in presencedetection, inspection fields 408-414, testing fields 416-422, andnotification fields 424-426. The peer device field 428 is used inimplementing the situational control processes described further herein.

At step 506, the device manager, e.g., 214, 314, monitors the state ofthe device in accordance with the rules and conditions. For example, thedevice manager 214 of FIG. 2 may be configured to perform internaltesting of the devices components (e.g., logical components 206, such asheart monitor, capacitor storage, and discharge). The internal testingmay be implemented by a commercial product installed on the device ormay be a proprietary product that is integrated with the device managerapplication 214. The rules available for selection with respect to theinternal testing may include conditions for activating the internaltesting component of the device, such as upon request (e.g., buttonselection, remote signal, etc.), or may be based upon time (e.g.,automatically initiate internal testing of one or more components daily,weekly, monthly, etc.). In addition, the test initiation may beconfigured based upon device usage (e.g., immediately following use ofthe device or removal of the device from its location, etc.) asdetermined by, e.g., a signal generated when the device is removed fromits assigned location. In addition, the device manager 214 may beconfigured to perform an action in response to the testing via theconfigurable rules. For example, the results of the testing may bestored in the record 400 (e.g., TEST_DT 416 for indicating the test dateand LOG_COMPONENT 418 for indicating the results of the testing withrespect to each logical component) and, based upon the results, anotification or alert may be generated by the device manager 214 fornotifying various entities or individuals (e.g., via NOTIFICATION_TYPEfield 424, which specifies the type of alert including component failed,device failed, device missing from assigned location, device in use,etc.) and NOTIFICATION_ADDRESS field 426 which provides an address towhich the notification will be sent.

Configurable rules may also be provided for causing the device tode-activate itself (e.g., removal from service) as a result of testresults. Thus, by way of example, if one or more logical components aretested and a value threshold determined by, e.g., measurements takenduring testing, is reached or exceeded, this may trigger the devicemanager 214 to de-activate the device (via, e.g., OOS_INDICATOR_FLAG420) and, optionally, generate a notification alerting an entity of thesituation.

In addition to testing, configurable rules for inspections may also beimplemented via the device manager 214. As indicated above, the AED 102Aincludes a communications interface 218 and RFID tag 220. Theconfigurable rules may include transmitting expiration dates (e.g., viadate of incorporation into device or labeled expiration date) ofconsumable components 210 via transponder 222 and communicationsinterface 218 when a condition is met (e.g., upon request, time-based,usage information, etc.). For example, component usage or consumption(e.g., remaining battery life) may be tracked via COMPONENT_CONSUMPTIONfield 414 and component expiration dates may be tracked via COMPONENT_DTfield 412. In this manner, components of the device (e.g., inventory,consumption values, life expectancies, etc.) may be tracked in anautomated fashion without human intervention. Various notifications maybe generated for communicating results of the inspections via theconfigurable rules, in a manner similar to that described above withrespect to testing processes.

Tracking the presence of portable safety devices (e.g., AED 102A) may befacilitated via the configurable rules of the device manager 214. Afacility that utilizes AEDs needs to know the location (i.e., presence)of these devices at all times. Currently, an operator of an AED mightnot realize that an AED has been physically removed from its assignedlocation until the operator attempts to use it (i.e., when an emergencyarises). This is not an ideal time to discover this information. Thedevice manager 214 may be configured to track the presence (or absence)of the safety device (e.g., AED 102A) whereby a signal is transmittedbetween the device 102A and transponder 222 at the base station 204 whenthe device 102A has been removed from the base station 204. This signal,in turn, may cause the device manager 214 to initiate a notification fortransmission to a specified entity or individual (e.g., configured viaDEVICE_ID field 402, DEVICE_LOCATION field 404, STATUS_FLAG indicator406, NOTIFICATION_TYPE 424, AND NOTIFICATION_ADDRESS 426 of record 400).In this manner, action can be taken to locate and return the device 102Ato its assigned location specified in the record 400 before the nextemergency arises.

At step 508, it is determined whether a condition has been met. Asindicated above, the conditions may be selected for each rule by anauthorized individual of the premises and may include, e.g., uponrequest, time-based, condition-based, usage-based, etc. as describedabove.

If a condition has been met, an action is executed for the device atstep 510, and results of the execution may be stored in the devicerecord 400 at step 512. As indicated above, the actions may includedevice inspection, device testing, device activation/de-activation,device reset, and notification generation.

If no condition has been met at step 508, the process returns to step506 whereby the device manager, e.g., 214, 314, continues to monitor thestate of the device 102.

Turning now to FIG. 6, a remote safety controller 106 configured for usein implementing situational control processes and remote controlprocesses in exemplary embodiments will now be described. As indicatedabove, the remote safety controller 106 enables an individual, such as afirst responder, to remotely control the operation of various safetydevices 102, peer devices 104, or other systems of FIG. 1. Thesefeatures may be particularly useful when a first responder has limitedinformation about the conditions present at the facility. For example,it may be that an alarm was activated, which caused a communicationstransmission to a first responding entity. However, the alarm itself maynot provide sufficient information as to the nature and/or extent of theconditions within the facility. The remote safety controller 106 enablesthe first responder or other individual to individuallyactivate/de-activate, reset, etc., various devices based upon observedconditions at the premises. For example, suppose that a first responderdetects smoke in one area of the facility. Suppose also that a sprinklersystem was activated due to a level of heat detected in the area. Thesprinkler heads will continue to open as the fire progresses, even whenthe fire is no longer in an area, or the heat column has spread past theactual burning area. This scenario may cause a reduction in waterpressure due to the number of active sprinkler heads. If the firstresponder determines that the smoke/fire is contained in a small areawithin the facility, the responder may utilize the remote safetycontroller 106 to de-activate one or more sprinklers that are not neededin responding to the conditions. This de-activation, in turn, willincrease the water pressure to the active sprinkler heads where thewater is needed. By isolating the operation of selected devices, thefirst responder is better equipped to contain the situation. Inaddition, valuable equipment, such as electronics, may be salvaged bypreventing unnecessary provisions of water to those areas which housethese electronics.

In exemplary embodiments, remote safety controller 106 includes adisplay screen 602, input elements 604 and device options 606. Remotesafety controller 106 also includes a processor 608, programming module610, security module 612 and wireless communications interface 614.

Programming module 610 enables an authorized individual to programselected options available for use with the remote safety controller106. These options may be employed for use in controlling a variety ofoperations with respect to devices, such as safety devices 102, peerdevices 104, and/or other systems, e.g., systems 114-118. The optionsmay include activating/de-activating the devices, resetting the devices,overriding the programmed operations of the devices (e.g., programmedvia situational control processes), or other actions. Various levels ofauthorization may be programmed into the remote safety controller 106via the security module 612. For example, a high ranking responder mayhave authority to override the operational functions of devices 102,104, and/or other systems in the location. The operational functionsrefer to those functions which have been configured, e.g., via devicemanagers 214, 314.

Security module 612 provides limits on the functions otherwise availablevia the remote safety controller 106 using, e.g., encryptiontechnologies. In this manner, security module 612 ensures that theoperational control over safety devices 102, 104 and other systems isonly implemented by authorized individuals via the security module 612of the remote safety controller 106.

Wireless communications interface 614 may be implemented via a radiotransceiver, or similar technology. The wireless communication interface614 communicates with devices, e.g., safety device 102B of FIG. 3, whichin turn, includes a detection element (i.e., infrared detectioncomponent 320) for receiving signals transmitted by the remote safetycontroller 106. Other devices 102, 104, or systems may be configured forcommunicating with remote safety controller 106. For example, peerdevices 104, such as exit lights, safety lights, alarm panels, emergencyexits, etc., may be equipped with a communications interface and IRdetection component for receiving signals from remote safety controller106. Thus, a first responder or other individual may turn on safetylights, turn off alarm panels, unlock emergency exits, etc., as needed.

In alternative embodiments, the programming features described above maybe implemented by the centralized safety systems control application 124at host system 110 or remotely by internal systems (e.g., a computerdevice implemented by a temporary incident command center that isprovisioned with the centralized safety systems control application124), or a combination of the above. For example, remote safetycontroller 106 may be programmed to control various safety devices atthe facility, which may then be modified or overridden by the temporaryincident command center when an individual at the temporary incidentcommand center becomes aware of critical information that may affect thesafety of the first responder, including information of which the firstresponder is not aware. Thus, the shared features of the remote controlprocesses may provide advantages in that various entities with differentperspectives of conditions present at the facility may cooperativelyperform responsive activities in furtherance of containing the situationthroughout the course of the response period. Configuration andoperation of the remote safety controller in performing the remotecontrol processes are described further herein (e.g., FIG. 9).

Turning now to FIG. 7, a detailed embodiment of a system forimplementing the device management, situational control processes, andremote control processes in exemplary embodiments will now be described.The system of FIG. 7 includes a facility 700 comprising three areas, A,B, and C. As shown in FIG. 7, an ad-hoc network of safety devices 102,peer devices 104, and systems 114, 118 are in communication with oneanother, as well as with external systems 122, which include emergencymanagement entity 706, incident command 708, and utilities 710 via anetwork 704. Network 704 may be an inter-network, such as the Internet.

Safety devices 102 include pull station 102B, sprinkler heads 102C,safety lights 102D, exit lights 102E, and detection devices 102F.Detection devices may include smoke detectors, temperature sensors,chemical detectors (carbon dioxide, carbon monoxide, hazardousmaterials, etc.), motion sensors, or any similar type of device. Peerdevices 104 include camera 104B, sprinkler head 104C, and exit lights104D. As indicated above, safety devices 102 are defined, in part, bytheir information processing functions. Thus, for example, an exit lightmay be configured as both a safety device 102E and a peer device 104D.Safety devices 102 may be configured via device manager 214 to performone or more actions in response to an event. These actions may includeinstructing the activation/de-activation, reset, recording,communication, etc., of the device itself or other devices that are inrange (e.g., safety devices 102, peer devices 104, systems 114, 118). Ina sample configuration, pull station 102B may be configured to instructcamera 104B to record in response to a sensor signal indicating, e.g.,smoke, heat, motion, etc. The instruction may include transmitting therecorded information to another device or system configured via thedevice manager 214, 314.

Safety devices 102 may be configured to have a relationship with otherspecified devices or systems. For example, as shown in FIG. 7, one ofdetection devices 102F is linked for communicating with pull station102B, one of sprinkler heads 102C, and internal system 118. This device102F may also indirectly communicate to other devices via the linkedconfiguration to the devices described above. Thus, if detection device102F activates sprinkler head 102C (with which it directlycommunicates), this may cause sprinkler head 102C to notify anotherdetection device 102F (with which the sprinkler head 102C communicates)so that the other detection device 102F may use this information inorder to determine whether a second sprinkler head 102C (that is indirect communication with the other detection device 102F), should beactivated.

In another example, a safety device 102A receives information from oneor more devices in its range and instructs safety lights and exit lights(peer devices) that are located in an area that is designated to be safeto turn on. Likewise, safety lights and exit lights (peer devices) thatare located in an area of the facility that is determined to be unsafemay be instructed to turn off so that occupants may be guided out of thefacility via the safest route. A collection of information received fromvarious devices may be considered by the receiving safety device 102 indetermining which actions, if any, should be taken.

The information received by safety devices 102 may be transmitted to,e.g., internal system 118, and optionally, to incident command 708 whereinformation is gathered and evaluated prior to taken responsive actions.This information, e.g., sensor data, camera recordings, hazardousmaterials measurements, may be useful to individuals at the incidentcommand 708 when programming remote safety controller 106 for use by afirst responder. The information may also be useful in determining abest route (e.g., entrance point to the facility, hallway, etc.) for theresponders. Thus, the information acquired from the safety devices mayprovide sufficient details about the current conditions so thatappropriate actions may be taken. Where multiple conditions exist, thisinformation may provide details that enable incident command members toprioritize responsive action plans.

As indicated above, various systems may be configured to become safetydevices 102 or peer devices, including circuit panel 114, HVAC 116,internal systems 118, etc. This may be useful in performing responsiveactions based upon conditions that affect electrical hazards, airquality hazards, and other situations. For example, if HVAC system 116of FIG. 1 is configured as a peer device 104, a co-located safety device102 may be configured to activate/de-activate various functions providedby the HVAC system 116. Suppose, for example, that a facility utilizedhazardous materials in its daily operations. HVAC system 116 and itscomponents may be configured so that the air flow direction or pressuremay be altered in desired areas of the facility to improve the airquality based upon the information acquired from the safety devices 102,peer devices 104, or other systems. In a similar manner, circuit panel114 may be configured so that electricity is shut off during anemergency. Likewise, safety devices 102 may transmit signals to utilityservice providers (e.g., gas, electricity, water, etc.), such asutilities 710 to activate/de-activate utilities services or simplyprovide information about the conditions present at the facility (e.g.,notifying a gas utilities service provider that a large fire has brokenout at the facility and that neighboring structures may be at risk). Theabove examples are provided for illustration purposes only. It will beunderstood that these, and other, features may be realized via thesituational control processes and remote control processes.

Turning now to FIG. 8, a flow diagram describing a process forimplementing situational control processes in exemplary embodiments willnow be described. At step 802, a safety device 102 transmits a signal.The signal may be transmitted in order to determine the absence orpresence of other devices in range. The signal may alternatively be asignal instructing a peer device or other safety device to activateitself.

At step 804, it is determined whether the safety device 102 has receiveda response signal from another device. If not, the safety device 102performs an action, based upon the rules configured via the devicemanager, e.g., 214, 314, for the device at step 806. The action may beto continue transmitting signals (e.g., flood the network or location)in order to detect any other devices in range for the purpose ofpartnering up with the newly detected device as a back up for thedevice, which was unable to respond. In alternative embodiments, theaction performed at step 806 may be a notification generated andtransmitted to a system, such as host system 110, alerting the systemthat a device may be out of service or is in need of inspection. Oncethis action has been performed, the process returns to step 802 wherebythe device 102 continues to send communication signals.

If, on the other hand, the device has received a response signal from apeer device 104 in range at step 804, the device 102 deciphers thesignal at step 808 to determine whether the signal relates to presencealert and detection or whether an event has occurred. Presence alertsignals refer to those which simply provide notice that a device isactive and operational. An event signal refers to that which indicates acondition or threat (e.g., fire, smoke, heat, toxins, etc.). Thesesignals (e.g., presence alert and event) may be differentiated using anymeans known in the art, such as varying frequencies established for eachsignal type.

If the signal is a presence alert signal (i.e., the signal is not anevent signal) at step 810, the process returns to step 802 whereby thedevice 102 continues to transmit signals to nearby devices. Otherwise,if the response signal is an event signal, the device 102 performs anaction in accordance with the rules specified by device manager, e.g.,214, 314 at step 812. As indicated above, the action may includeinstructing a device to activate/de-activate, reset, record,communicate, etc.

Turning now to FIG. 9, a flow diagram describing a process forconfiguring and operating a remote safety controller 106 will now bedescribed in exemplary embodiments. At step 902, an operation isassociated with a function key on the remote safety controller 106.Operations include, for example, activating/de-activating, resetting,etc., one or more devices 102, 104, and/or systems. The association maybe facilitated via a user interface of the programming module 610, inputkeys 604 and display screen 602 of the remote safety controller 106.Alternatively, some or all of these features may be enabled via thecentralized safety systems control application 124 at host system 110and transmitted over a network (e.g., network 108) to the remote safetycontroller 106. The remote safety controller 106 may also be programmedto operate by authorized individuals or for permitted devices via thesecurity module 612. Once programmed, the remote safety controller 106is ready for use.

At step 904, a request is received to execute an operation. This requestmay be implemented by selecting one of the function keys 606 on theremote safety controller 106 as applicable to the desired operation. Atstep 906, it is determined whether the requested operation has beenapproved. This may be implemented by comparing the requested operationwith the permissions granted via the associations programmed into thecontroller 106. If there is a match, the request is approved.Alternatively, or in combination, the approval may be determined bytransmitting a signal to the centralized safety systems controlapplication 124 or system implementing the centralized safety systemscontrol application 124 (e.g., incident command) whereby authorizationof the requested operation is reviewed or considered by a supervisingindividual. The request may then be granted, if desired, by returning anauthorization signal that enables the selected function key 606.

If the request has not been approved, the request is denied, and theoperation is not performed by the remote safety controller 106 at step908. The process proceeds to step 914 as described below. If, on theother hand, the request is approved at step 906, the operation isenabled on the controller 106 via the function key 606 at step 910, andthe operation is executed at step 912. For example, an RF signal istransmitted from the controller 106 to the targeted device and isreceived at the targeted device via, e.g., IR detection elements. Atstep 914, it is determined whether a new request has been issued. Ifnot, the process ends at step 916. Otherwise, the process returns tostep 906.

As described above, the exemplary embodiments can be in the form ofcomputer-implemented processes and apparatuses for practicing thoseprocesses. The exemplary embodiments can also be in the form of computerprogram code containing instructions embodied in tangible media, such asfloppy diskettes, CD ROMs, hard drives, or any other computer-readablestorage medium, wherein, when the computer program code is loaded intoand executed by a computer, the computer becomes an apparatus forpracticing the exemplary embodiments. The exemplary embodiments can alsobe in the form of computer program code, for example, whether stored ina storage medium, loaded into and/or executed by a computer, ortransmitted over some transmission medium, such as over electricalwiring or cabling, through fiber optics, or via electromagneticradiation, wherein, when the computer program code is loaded into andexecuted by a computer, the computer becomes an apparatus for practicingthe exemplary embodiments. When implemented on a general-purposemicroprocessor, the computer program code segments configure themicroprocessor to create specific logic circuits.

While the invention has been described with reference to exemplaryembodiments, it will be understood by those skilled in the art thatvarious changes may be made and equivalents may be substituted forelements thereof without departing from the scope of the invention. Inaddition, many modifications may be made to adapt a particular situationor material to the teachings of the invention without departing from theessential scope thereof. Therefore, it is intended that the inventionnot be limited to the particular embodiments disclosed for carrying outthis invention, but that the invention will include all embodimentsfalling within the scope of the claims. Moreover, the use of the termsfirst, second, etc. do not denote any order or importance, but ratherthe terms first, second, etc. are used to distinguish one element fromanother. Furthermore, the use of the terms a, an, etc. do not denote alimitation of quantity, but rather denote the presence of at least oneof the referenced item.

1. A method, comprising: receiving a request to execute an operation ona target device via selection of a function key on a remote controldevice, wherein the function key is associated with the operation andthe target device that performs the operation for remotely controllingoperation of the target device via a signal transmitted from the remotecontrol device to the target device when the function key is selected;approving the request to execute the operation when authorization hasbeen secured; and transmitting the signal from the remote control deviceto the target device in response to the approval; wherein the request toexecute the operation via selection of the function key is received by acomputer processor over a network, and the approving the request toexecute the operation when authorization has been secured is performedvia a response signal received from the computer processor based upon anevaluation of conditions determined to impact safety of individuals andproperty, the conditions relating to air quality, heat, water, and fire.2. The method of claim 1, wherein the target device is a safety device,and the operation includes overriding operation settings programmed intothe target device.
 3. The method of claim 1, wherein the request toexecute the operation via selection of the function key is received bythe computer processor via a programming module in the remote controldevice; wherein the approving the request to execute the operation whenauthorization has been secured is performed by permissions rulesconfigured into the remote control device.
 4. The method of claim 1,wherein the target device is a safety device.
 5. The method of claim 4,wherein the safety device is a detection device comprising a motionsensor.
 6. An apparatus, comprising: a remote control device; and aprogramming module executing on the remote control device via a computerprocessor, the programming module performing: receiving a request toexecute an operation on a target device via selection of a function keyon the remote control device, wherein the function key is associatedwith the operation and the target device that performs the operation forremotely controlling operation of the target device via a signaltransmitted from the remote control device to the target device when thefunction key is selected; approving the request to execute the operationwhen authorization has been secured; and transmitting the signal fromthe remote control device to the target device in response to theapproval; wherein the request to execute the operation via selection ofthe function key is received by the computer processor over a network,and the approving the request to execute the operation whenauthorization has been secured is performed via a response signalreceived from the computer processor based upon an evaluation ofconditions determined to impact safety of individuals and property, theconditions relating to air quality, heat, water, and fire.
 7. Theapparatus of claim 6, wherein the target device is a safety device andthe operation includes: resetting the target device.
 8. The apparatus ofclaim 6, further comprising a security module executing on the remotecontrol device via the computer processor; wherein the request toexecute the operation via selection of the function key is received bythe security module in the remote control device; and wherein further,the approving the request to execute the operation when authorizationhas been secured is performed by permissions rules configured into theremote control device via the security module.
 9. The apparatus of claim6, wherein the request to execute the operation via selection of thefunction key is transmitted by the remote control device over a network,wherein the approving the request to execute the operation whenauthorization has been secured is performed via a response signalreceived from the computer processor at the remote control device. 10.The apparatus of claim 6, wherein the function key associated with thetarget device is configured to control operation of the target device,the target device comprising a safety device.
 11. The apparatus of claim10, wherein the safety device is a detection device comprising a motionsensor.
 12. A computer program product, the computer program productincluding instructions for implementing a method, comprising: receivinga request to execute an operation on a target device via selection of afunction key on a remote control device, wherein the function key isassociated with the operation and the target device that performs theoperation for remotely controlling operation of the target device via asignal transmitted from the remote control device to the target devicewhen the function key is selected; approving the request to execute theoperation when authorization has been secured; and transmitting thesignal from the remote control device to the target device in responseto the approval; wherein the request to execute the operation viaselection of the function key is received by a computer processor over anetwork, and the approving the request to execute the operation whenauthorization has been secured is performed via a response signalreceived from the computer processor based upon an evaluation ofconditions determined to impact safety of individuals and property, theconditions relating to air quality, heat, water, and fire.
 13. Thecomputer program product of claim 12, wherein the target device is asafety device and the operation includes activation of the targetdevice; de-activation of the target device; resetting of the targetdevice; and overriding operation settings programmed into the targetdevice.
 14. The computer program product of claim 12, wherein therequest to execute the operation via selection of the function key isreceived by the computer processor via the remote control device;wherein the approving the request to execute the operation whenauthorization has been secured is performed by permissions rulesconfigured into the remote control device.
 15. The computer programproduct of claim 12, wherein the request to execute the operation viaselection of the function key is transmitted over a network, wherein theapproving the request to execute the operation when authorization hasbeen secured is performed by a response signal received at the remotecontrol device from the computer processor.
 16. The computer programproduct of claim 12, wherein the target device is a safety devicecomprising a motion sensor.
 17. The method of claim 1, wherein thetarget device is a safety device, and the request to execute theoperation via selection of the function key is received by the computerprocessor over the network.
 18. The method of claim 1, wherein therequest to execute the operation via selection of the function key isreceived by another computer processor over a network, the methodfurther comprising: overriding the operation subject to the request fromthe remote control device responsive to identifying, via the othercomputer processor, conditions undetectable by a user of the remotecontrol device; and enabling another function key on the remote controldevice via the other computer processor, the other function keyconfigured to cause the target device to mitigate aspects of theconditions undetectable by the user of the remote control device.