[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

GB2515500A - A Security System - Google Patents

A Security System Download PDF

Info

Publication number
GB2515500A
GB2515500A GB1311237.0A GB201311237A GB2515500A GB 2515500 A GB2515500 A GB 2515500A GB 201311237 A GB201311237 A GB 201311237A GB 2515500 A GB2515500 A GB 2515500A
Authority
GB
United Kingdom
Prior art keywords
security device
satellite
transceiver
monitoring device
housing
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
GB1311237.0A
Other versions
GB2515500B (en
GB201311237D0 (en
Inventor
Colin Rogers
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to GB1311237.0A priority Critical patent/GB2515500B/en
Publication of GB201311237D0 publication Critical patent/GB201311237D0/en
Publication of GB2515500A publication Critical patent/GB2515500A/en
Application granted granted Critical
Publication of GB2515500B publication Critical patent/GB2515500B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B25/00Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems
    • G08B25/01Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems characterised by the transmission medium
    • G08B25/10Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems characterised by the transmission medium using wireless transmission systems
    • BPERFORMING OPERATIONS; TRANSPORTING
    • B60VEHICLES IN GENERAL
    • B60RVEHICLES, VEHICLE FITTINGS, OR VEHICLE PARTS, NOT OTHERWISE PROVIDED FOR
    • B60R25/00Fittings or systems for preventing or indicating unauthorised use or theft of vehicles
    • B60R25/10Fittings or systems for preventing or indicating unauthorised use or theft of vehicles actuating a signalling device
    • B60R25/102Fittings or systems for preventing or indicating unauthorised use or theft of vehicles actuating a signalling device a signal being sent to a remote location, e.g. a radio signal being transmitted to a police station, a security company or the owner
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B25/00Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems
    • G08B25/01Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems characterised by the transmission medium
    • G08B25/08Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems characterised by the transmission medium using communication transmission lines
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04KSECRET COMMUNICATION; JAMMING OF COMMUNICATION
    • H04K3/00Jamming of communication; Counter-measures
    • H04K3/20Countermeasures against jamming
    • H04K3/22Countermeasures against jamming including jamming detection and monitoring
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04KSECRET COMMUNICATION; JAMMING OF COMMUNICATION
    • H04K3/00Jamming of communication; Counter-measures
    • H04K3/20Countermeasures against jamming
    • H04K3/22Countermeasures against jamming including jamming detection and monitoring
    • H04K3/222Countermeasures against jamming including jamming detection and monitoring wherein jamming detection includes detecting the absence or impossibility of intelligible communication on at least one channel
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04KSECRET COMMUNICATION; JAMMING OF COMMUNICATION
    • H04K3/00Jamming of communication; Counter-measures
    • H04K3/20Countermeasures against jamming
    • H04K3/22Countermeasures against jamming including jamming detection and monitoring
    • H04K3/224Countermeasures against jamming including jamming detection and monitoring with countermeasures at transmission and/or reception of the jammed signal, e.g. stopping operation of transmitter or receiver, nulling or enhancing transmitted power in direction of or at frequency of jammer
    • H04K3/226Selection of non-jammed channel for communication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04KSECRET COMMUNICATION; JAMMING OF COMMUNICATION
    • H04K3/00Jamming of communication; Counter-measures
    • H04K3/80Jamming or countermeasure characterized by its function
    • H04K3/88Jamming or countermeasure characterized by its function related to allowing or preventing alarm transmission
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M11/00Telephonic communication systems specially adapted for combination with other electrical systems
    • H04M11/04Telephonic communication systems specially adapted for combination with other electrical systems with alarm systems, e.g. fire, police or burglar alarm systems
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04KSECRET COMMUNICATION; JAMMING OF COMMUNICATION
    • H04K2203/00Jamming of communication; Countermeasures
    • H04K2203/10Jamming or countermeasure used for a particular application
    • H04K2203/16Jamming or countermeasure used for a particular application for telephony
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04KSECRET COMMUNICATION; JAMMING OF COMMUNICATION
    • H04K2203/00Jamming of communication; Countermeasures
    • H04K2203/10Jamming or countermeasure used for a particular application
    • H04K2203/18Jamming or countermeasure used for a particular application for wireless local area networks or WLAN
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04KSECRET COMMUNICATION; JAMMING OF COMMUNICATION
    • H04K2203/00Jamming of communication; Countermeasures
    • H04K2203/10Jamming or countermeasure used for a particular application
    • H04K2203/22Jamming or countermeasure used for a particular application for communication related to vehicles

Landscapes

  • Engineering & Computer Science (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Radar, Positioning & Navigation (AREA)
  • Remote Sensing (AREA)
  • Mechanical Engineering (AREA)
  • Business, Economics & Management (AREA)
  • Emergency Management (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Alarm Systems (AREA)

Abstract

A silent intruder alarm system is provided for alerting a user to an article 100 being breached or compromised. If an intruder interferes with the secured article 100, a sensor 70 of a security device detects an event associated with an article 100. This detection will trigger (via a processor 80) an alarm condition, and a transceiver 90 will send an alarm signal 20 to a monitoring device 10 over a communication network 50. No indication of the alarm condition is detectable outside the housing 40 by means other than via the alarm signal 20. In this way, an intruder compromising an article 100 is not alerted to detection of the event by the sensor 70. Therefore, authorities may be summoned to apprehend the intruder without the intruder being provided with an opportunity to escape. The monitoring device 10 can remotely control the security device over the network 50. The monitoring device 10 may comprise a mobile phone, smartphone, tablet or computer. The monitoring device 10 may be arranged to run an application for monitoring and/or controlling the security device.

Description

A SECURITY SYSTEM
The present invention relates generally to a security system and a security device, and a method and apparatus for monitoring and controlling the security device over a communication network. The present invention tinds particular, although not exclusive, utility in an alarm system for notifying an operator of the alarm system of an alarmed article being compromised.
Systems are known in which security of an article is provided by a device that detects one or more events associated with an article being compromised. In particular, i0 articles to which security may be provided include cars, lorries, constmcfion plants, bicycles, luggage, bags, boxes, caravans, trains, tents, portable buildings, intermodal containers, houses, shops, offices, other buildings, and any other similar construction.
An article may he compromised if it is removed and/or accessed without authorisation.
In particular, a level of protection may he applied to an article/appliance (such as, for 1 5 example, a lock and/or tether, and breach of that protection (such as, for example, breaking a lock and/or tether) and/or circumvention of that protection (such as, by accessing the appliance via an un-locked route) would constitute the article being compromised. In certain circumnstamices, a level of protection may riot be applied to an article, whereupon the article mnay he compromised merely by being accessed and/or moved. Known systems may detect breach and/or circumvention of protection applied to an article, or access or movement of an article.
Known security systems issue an audible and/or visible alarm to alert all those local to the article that the article has been compromised. However, for various reasons, passers-by do not respond to such an alarm/alert. For instance, a high frequency of false and/or nuisance alarms encourage passers-by to ignore audible and/or visible alarms. Furthermnore, passers-by may not wish to endanger themselves by investigating an alann/alert. This is particularly important in remote areas where a driver of an alarmed container lorry may not wish to investigate an alarm without support from other people and/or the authorities (such as the police). In addition, known alamis provide no indication to an observer how long they have been triggered. For instance, a home-owner may return home to find their alarm activated, but has not indication of how long the alarm has been trigaered, and is therefore unaware of whether intruders
I
are likely to still be present within the house, or whether local authorities are hkdy to have already responded to the alann.
The present invention seeks to overcome these problems.
According to a first aspect of the present invention, there is provided a security system for indicating when an article has been compromised, the system comprising: a security device configured to secure the article; and a monitoring device configured to monitor the security device over a communication network, wherein the monitoring device comprises a controller for controlling operation of the security device over the communication network; wherein the security device comprises: a substantially tamper-lO proof housing; a power source located within the housing; at least one sensor ocated within the housing, the at least one sensor configured to detect an event associated with the article being compromised; a processor located within the housing, the processor configured to trigger an alarm condition in response to the at least one sensor detecting an event associated with the article being compromised; and a transceiver located within the housing, the transceiver configured to send an alartn signal to the monitoring device over the cotnmunication network in response to triggering of the alarm condition by the processor; and wherein the security device is configured such that the alarm condition is only detectable outside the housing via the alarm signal.
An observer at the security device may only able to detect an alarm condition via the alarm signal, an observer at the security device may not able to detect an alarm condition without access to the communication network, there may be no alarm indication at the security device that passes through the housing, and/or no sound or light may be emitted from the security device in response to the alarm condition.
If an intruder interferes xvith a secured article, the at least one sensor may detect an event associated with an article being interfered with and/or compromised. This detection will trigger (via the processor) an alarm condition, and the transceiver will send an alarm signal to the monitoring device over the cotntnunication network; however, no indication of the alarm condinon is detectable outside the housing by any means other than via the alarm signal.
In this way, an intruder compromising an article is not alerted to detection of the event by the sensor. In this way, authorities may be summoned to apprehend the intruder without the intruder being provided with the opportunity to escape. This is particularly important in remote locations, such as quarries or campsites, where if an alarm sounds an intruder will have ample opportunity to escape before authorities, such as the police or a private security service, arrive.
The present invention may operate over any suitable communication network, inclu(Iing: a telecommunication network, a mobile telecommunication network, a GSM network, a public switched telephone network, the internet, an intranet, a local area network, a radio frequency network, a pubhc network, a private network, or any network or combination thereof.
The tamper-proof housing may he robust. In particular, the tamper-proof housing may be configured to resist forced entry by a user and/or by a user operating un-powered hand toots. The tamper-proof housing may comprise a p'astic box and/or case.
The at least one sensor may he selected from the oup comprising: a motion detector, an acoustic detector, an optical detector, a heat detector, a vibration detector, a trip switch, a GPS system, a gyroscopic detector, an infrared detector, an ultrasonic detector, a microwave detector, a tomographic detector, a laser detector, a jamnier detector and any other suitable form of sensor.
An event associated with an article being compromised may be motion withrn the sensing range of the motion, ultrasound, iiiicrowave or toitiographic detector, a sound or vibration occurring within the sensing range of an acoustic or vibration detector, a change in light, heat or infrared levuis within the sensing range of an optical, heat or infrared detector, a tripping of a trip switch (for instance by an electrical contact being made/released, or a laser beam being crossed), and/or translational and/or rotational movement of the article outside of a pre-determined range, induding acceleration.
The security device may comprise at least two sensors. For instance, two sensors, three sensors, four sensors, five sensors or six sensors. One or more of the sensors may he of the same or a different kind to the other sensors.
The security device may comprise a sensitivity adjustment control configured to adjust die sensitivity of the at least one sensor. In this way, the occurrence of nuisance alarms and/or false alarms may be reduced, while preventing circumvention of the security system in a given environment.
The jammor detector may he configured to detect a mobile phone jammer. The processor may he configured to activate a GPS unit in the security device in response to detecting a mobile phone jammer. The monitoring device may be further configured to identify when (PS has been activated on the security device, and may he configured to indicate an alarm c()ndltu)n to a user of the monitoring device in response to such an identification, even if there has been no alarm signal received by the monitoring device over the network. In some embodiments, the security device may he contigured to send a modulated GPS signal, wherein modulation to the GPS signal may include data that may include an alarm signal.
The transceiver may comprise a SIM card for communication over a telecommunication network. In this way, existing technology and infrastructure may be relied upon for the operation of the invention.
The transceiver may comprise more than one SPA card, each for communication over a respective telecommunication network, and may additionally comprise a network strength detection switch configured to direct the transceiver to operate over a selected one of the telecommunication networks in response to a detected strength of each telecommunication network. In this way, the transceiver may automatically select a strongest one of the available networks to transmit over, such that contact with the monitoring device is maintained at an optimal level.
The power source riiay comprise a battery selected from the group cornpnsirig a lithium ion battery, a Boston Power long-cycle battery and a Lithonia battery.
The power source may comprise a first power unit and a second power unit, the second power unit being independent from the first power unit. For instance, the first and second power units may both supply pover to the transceiver, the sensor and the processor, wherein failure of one of the first and second power units does not affect operation of the other of the first and second power units.. The power source may comprise more than two independent power units.
The security device may comprise a power source status detector configured to detect the status of the power source. In particular, the power source status detector may detect the status of each power unit. The power source status detector may he configured to selectively determine which power unit to use to power each component of the security device.
The transceiver may he further configured to send operational data representing a functional status of the security device, and/or sensor data representing an environment of the security device, over the communication network to the monitoring device. (Dperational data may include power source status data, sensor status data (for example data indicating what they are sensing and/or whether they are functioning correctly, network suength detection switch data, network strength data, alann status data, unique identifier code data, alert control data, anti/or configuration data, amongst other forms of data. Configuration data may include data indicating adjustment of the sensitivity of the at least one sensor, data indicating whether the alarm signal is sent to one or more monitoring devices, the authorities (e.g. police or private security service), a sequence of monitoring devices/telephone numbers, and a hierarchy of backup numbers to use if one in such a sequence is not functioning, data indicating a setting of lO whether to perform sensing with the sensors and/or determine power status continuously, only on request, intermittently (e.g. every lniin, 2mm, 5mm or 10mm), and/or only when another sensor is tripped, data indicating a frequency at which to send operational/functional data, for instance on request, intermittently (including the length of the intermission), only after an alarm is tripped, 1 5 and/or when batten' low, etc. The sensor may detect in a sensing region. The sensing region may he the environment around the sensor.
The transceiver may he further configured to receive control data from the monitoring device, to control operation of the security device. Control data may include configuration data and/or operational data. The control data may comprise instructions to the security device to produce an alarm condition (for example to test the system or security device), and/or to send operational data.
The control data may comprise instructions to the security device to send operational data representing a functional status of the security device, and/or sensor data representing an environment of the security device, over the communication network to the monitoring device.
The control data may comprise configuration data, for configuring operation of the security device.
The transceiver may be configured to communicate with the monitoring device over the communication network using a message selected from the group comprising a telephone call, a radio frequency signal, an email, an SMS and any other message form.
The security device may comprise an attachment mechanism. For example, the security device may comprise mounting brackets, through-holes, clamps and/or other fixing means. In one embodiment, the attachment mechanism may comprise a mounting plate, in which the mounttng plate may he configured to mount upon a plurality of bars and/or rods embedded into a wall. For instance, there may he two, three, four or more bars. The bars may he inserted into pre-drilled holes in a wall, such as a concrete wall. The bars may be glued into place.
The housing may prevent user interface by any means other than via the transceiver. In this way, the opportunity for tampering with the security device is reduced. For instance, there may he no user interface device at the security device.
The housing and/or other component parts of the security device may be made lO from a plastics material, a polycarbonate material, carbon fibre, Kevlar (RTM), metal, another similar matenal, and/or a combrnation thereof.
The security device may have a tamper evident construction. Two or more component parts of the security device may he bonded together such that separation of the component parts may release a chemical that may destroy one or more component parts of the security device. In this way, the security device may he invulnerable to tampering, in particular, without tampering being identilled.
The system may comprise more than one security device. In this \vay multiple security devices may secure a single article arid/or multiple articles mTlay he secured, each with an associated respective security device. Furthermore, each security device may he monitored and/or controlled by a single monitoring device. A monitoring device may be paired with more than one security device.
Each security device may he provided with a respective unique identifier code detectable by the monitoring device. In this way, it is possible for a monitoring device to distinguish between security devices that it is monitoring.
The system of any one of claims IS or 19, comprising a primary security device alit] at least one satellite security device, wherein the at least one satellite security device comprises: a substantially tamper-proof satellite housing; a satellite power source located within the satellite housing; at least one satellite sensor located within the satellite housing, the at least one satellite sensor configured to detect an event associated with the article being compromised; a satellite processor located within the satellite housing, the satellite processor configured to trigger a satellite alarm condition in response to the at least one satellite sensor detecting an event associated with the article being compromised; and a satellite transceiver located within the satellite housing, the satellite transceiver configured to send a satellite alarm signal to the security device in response to triggering of the satellite alarm condition by the satellite processor; and wherein the satellite security device is configured such that the satellite alarm condithm is only detectable outside the satellite housing via the satellite alarm signal. In this way, the satellite device may communicate with the security device, and the security device may relay such communications to/from the monitoring device.
Each component part of the satellite security device may be the same as a corresponding part of the security device. Alternatively, the component part(s) may differ. In particular, the satellite power source may be substantially smaller than the i0 power source, for instance the satellite power source may be a hearing aid battery. The satellite transceiver may be substantially smaller than the transceiver, for instance the satellite transceiver tiny be a tn1cro-nanscefler; in particular, the micro-transceiver may he a radio nansmitter having a range of up to lOOm, 200m, 500m, 1km, 2km or 2.2km.
The micro-transceiver may operate over a Digital Enhanced Cordless Telecommunications (DECT[') system. The micro-transceiver may he configured to encrypt/decrypt communications. The micro-transceiver may he configured to embed an identification signal within communications. The alarm signal may be a GPS signal.
In this way, when an article is coniprornised, the satellite security device iriay relay its location to the primary security device such that, even if the primary security device is removed from the article being compromised, the location of the article may be determined by the monitoring device such that assistance may be summoned.
The satellite security device may he a substantially fiat and/or self-adhesive strip, and may he black in colour, or may have a colour to match the article to he secured. In this way, the satellite security device may he hidden on the article to he secured.
The system may comprise more than one monitoring device. In this way, multiple users may monitor a single security device such that the chance of break-down of security at the human interface level is minimised.
The monitoring device may be selected from the group comprising a computer, a tablet computer, a smartphone, a telephone and a mobile phone, or may be a generic computing device.
The monitoring device may he configured to have a predetermined alarm sound for alerting a user to an alarm condition at the security device.
The monitoring device may be configured to run an application for monitoring and/or conuoffing the security device, and may have a user interface comprising drop-down menu navigation.
The monitoring device may he configured to log monitored activity of the security device. Tn this way, the monitoring device may keep a record of some or all activity of the security device, for instance in the form of an electronic activity log. The log may include details of the location of the security device, power kvels, dates and/or times when batteries were last changed, and/or dates and/or times when the security device was activated and/or deactivated. In this way, traceability of the security device lO may be improved by providing a history of the security devices activity. Further, insurance companies may be able to use the log in calculating pay outs.
According to a second aspect of the present invention, there is provided a method of indicating when an article has been compromised comprising the steps of: providing a system according to the foregoing aspect; detect, with the at least one sensor, an event associated with an article being compromised; triggering, with the processor, an alarm condition in response to the at least one sensor detecting an event associated with the article being compromised; and sending, with the transceiver, an alarrii signal to the rnontoi1ng device over the conirtiunication network in response to triggering of the alarm condition by the processor, such that the alarm condition is only detectable outside the housing via the alarm signal; monitoring the security device over the communication network; and controlling operation of the security device over the communication network.
According to a third aspect of the present invention there is provided a security device for use in the system of the first aspect.
According to a fourth aspect of the presetu invention, there is provided a monitoring device for use in the system of the first aspect.
According to a fifth aspect of the presetit invention, there is provided a method of operating the monitoring device of the fourth aspect comprising the steps of: providing a monitoring device according to the fourth aspect, monitoring and controlhng a security device according to the third aspect, over a communication network.
According to a sixth aspect of the present invention, there is provided a computer program product comprising computer program code means adapted to perform all the steps of the method according to the fifth aspect when said program is run on a computer.
The above and other characteristics, features and advantages of the present invention will become apparent from the following detailed description, taken in conjunction with the accompanying drawings, which illustrate, by way of example, the principles of the invention. This description is given for the sake of example only, without limiting the scope of the invention. The reference figures quoted below refer to the attached drawings.
Figure 1 is a schematic representation of a system according to the present invention.
The present invention will be described with respect to particular embodiments and xvith reference to certain draxvings hut the invention is not limited thereto hut only by the claims. The drawings described are only schematic and are non-limiting. In the drawings, the sh<e of some of the elements may he exaggerated and not drawn to scale for ill ustrative pwposes. The dimensions and the relative dimensions do not correspond to actual reductions to practice of the invention.
Furthermore, the terms first, second, third and the like in the description and in the claims, are used for tlistiriguishing between sirriilar elements arid riot necessarily for describing a sequence, either temporally, spatially, in ranking or in any other manner. It is to be understood that the terms so used are interchangeable under appropriate circumstances and that the embodiments of tlie invention described herein are capable of operation in other sequences than described or illustrated herein.
Moreover, the terms top, bottom, over, under and the like in the description and the claims are used for descriptive purposes and not necessarily for describing relative positiots. It is to he understood that the tenns so used are interchangeable under appropriate circumstances and that the embodiments of the invention described herein are capable of operation in other orientations than described or illustrated herein.
It is to he noticed that the term "comprising", used in the claims, should not he interpreted as being restricted to the means listed thereafter; it does not exclude other elements or steps. It is thus to he interpreted as specifying the presence of the stated features, integers, steps or components as referred to, hut does not preclude the presence or addittin of one or more other features, integers, steps or components, or groups thereof. Thus, the scope of the expression "a device comprising means A and B" should not be limited to devices consisting only of components A and B. It means that with respect to the present invention, the only relevant components of the device are A and B. Similarly, it is to he noticed that the term "connected", used in the description, should not he interpreted as being restricted to direct connections only. Thus, the scope of the expression "a device A connected to a device B" should not be hmited to devices or systems wherein an output of device A is directly connected to an input of device B. It means that there exists a path between an output of A and an input of B which may be a path including other devices or means. "Connected" may mean that two or more elements are either in direct physical or electrical contact, or that two or more elements are not in direct contact with each other but yet still co-operate or interact with each other.
Reference throughout this specification to "one embodiment" or "an embodiment" means that a particular feature, structure or characteristic described in connection with the embodiment is included in at least one embodiment of the present invention. Thus, appearances of the phrases "in one embodiment" or "in an embodiment" in various places throughout this specification are not necessarily all referring to the same embodiment, but may refer to different emnhoclimiients.
Furthermore, the particular features, structures or characteristics of any embodiment or aspect of the invention may be combined in any suitable manner, as would be apparent to one of ordinary skill in the art from this disclosure, in one or more embodiments.
Similarly, it should he appreciated that in the description of exemplary embodiments of the invention, various features of the invention are sometimes grouped together in a single embodiment, figure, or description thereof for the purpose of streamlining the disclosure and aiding in the understanding of one or more of the various inventive aspects. This method of disclosure, however, is not to he interpreted as reflecting an intention that the claimed invention requires more features than are expressly recited in each claim. Rather, as the following claims reflect, inventive aspects lie in fewer than all features of a single foregoing disclosed embodiment. Thus, the claims following the detailed description are hereby expressly incorporated into this detailed description, with each claim standing on its own as a separate embodiment of this invention.
Furtherniore, while some embodiments described herein include some features included in other embodiments, combi ations of features of different embodiments are meant to be within the scope of the invention, and form vet further embodiments, as will he understood by those skilled in the art. For example, in the following claims, any of the claimed embodiments can he used in any combination.
In the description provided herein, numerous specific details are set forth.
However, it is understood that embodiments of the invention may be practised without these specific details. In other instances, well-known methods, structures and techniques have not been shown in detail in order not to obscure an understanding of
lO this description.
In the discussion of the invention, unless stated to the contrary, the disclosure of alternative values for the upper or lower limit of the permitted range of a parameter, coupled with an indication that one of said values is more highly preferred than the other, is to he construed as an implied statement that each intermediate value of said parameter, lying between the more preferred and the less ptefenel of said alternatives, is itself preferred to said less preferred value and also to each value lying between said less preferred value and said intermediate value.
The use of the term at least one'' may, iii some embodiments, mean only one.
The invention will now he described by a detailed description of several embodiments of the invention. It is clear that other embodiments of the invention can be configured according to the knowledge of persons skilled in the art without departing from the underlying concept or technical teaching of the invention, the invention being limited only by the terms of the appended claims.
Figure 1 is a schematic representation of a system according to the present invention. A monitoring device 10 monitors (via monitoring signals 20) and controls (via control signals 30) a security device 40 over a communication network 50.
In one embodiment, the monitoring device 10 is a smartphone 10 running an application that enables m rntorng 20 and controlling 30 of the security device 40 over a GS1'vl network 50.
The security device 40 contains a power source 60 in the form of two independent batteries. The power source 60 is configured such that, should one battery fail, the other battery can adequately supply the power needs of the security device 40, and specifically, the sensor unit 70, the processor 80 and the transceiver 90.
The security device 4-0 is located adjacent an article 100. In the present embodiment, the security device 40 is coupled to the article 1(R) to prevent disassociation of the security device 40 from the article 100; however, other arrangements are also envisaged. The coupling between the security device 40 and the article 100 is not shown, for clarity.
The sensor unit 70 comprises a motion scnsor, a vibranon sensor and a GPS device. In the figure, the motion sensor has a sensing region 110 that encompasses the article 100; however, in reality, the sensing region 110 may only encompass a portion of the article, for instance a driving seat of a construction plant.
While the security device is active, the motion and vibration sensors are continuously sensing for movement and vibmton, respectively. If motion is detected by the motion sensor in the sensing region 110, the motion sensor sends a signal to the processor 80 indicative of a person present in the driving seat of the construction plant.
Tf vibration is detected by the vibration sensor, the vibration sensor sends a signal to the processor 80 indicative of movement of the construction plant, for instance by being hoisted onto a tmiler. The conthination of signals from the motion and vibration sensors causes the processor 80 to transition to an alarm state.
Once the alarm state is triggered by the processor 80, the processor 80 activates the G-PS device. The GPS device had hitherto been inactive to save power. A location of the security device, and therefore the apphance, can be forwarded 20 to the monitoring device 10, via the communication network 50, by the transceiver 90, together with an alarm signal.
In response to receiving the alarm signal at the monitoring device 10, the monitoring device 10 \vill issue an audible alarm to an operator, in this embodiment in the form of a unique ringtone alarm. The monitoring device 10 will also provide an indication of the location, determined by the GPS device, of the article 100.
Optionally, the transceiver may send an alarm signal directly to the local poflce service, or additional monitoring devices; however, for simplicity this has been omitted from figure 1.
The GPS device may continue to transmit 20 location data to the monitoring device 10 at, for instance, five minute intervals until the GPS device receives 30 an instruction from the monitoring device 10 to stop. The processor will continue in the alarm state until it is reset by the monitoring device 10. Alternatively, the processor may discontinue the alarm state as soon as detection of movement and/or vibration by the movement sensor and the vibration sensor has ceased.

Claims (34)

  1. CLAIMS1. A security system for indicating when an article has been compromised, the system conmri sing: a security device configured to secure the article; and a monitoring device configured to monitor the security device over a communication network, wherein the monitoring device comprises a controller for controlling operation of the security device over the commumcation network; wherein the security device comprises: a substantially tamper-proof housing; a power source located within the housing; at least one sensor located within the housing, the at least one sensor configured to detect an event associated with the article being compromised; 1 5 a processor located within the housing, the processor configured to trigger an alann condition in response to the at least one sensor detecting an event associated with thc article being compromised; and a transceiver located within the housing, the transceiver configured to send an alann signal to the monitoring device over the communication network in response to triggering of the alarm condition by the processor; and wherein the security device is configured such that the alarm condition is only detectable outside the housing via the alarm signal.
  2. 2. The system of claim 1, wherein the at least one sensor is selected from the group comprising: a motion detector, an acoustic detector an optical detector, a heat detector, a vibration detector, a trip switch, a G-PS system, a gyroscopic detector, an infrared detector, an ultrasonic detector, a microwave detector, a tornographic detector, a laser detector, a jammer detector and any other suitable form of sensor.
  3. 3. The system of claim I or claim 2, wherein the security device comprises at least two sensors.
  4. 4. The system of any preceding claim, wherein the security device comprises a sensitivity adjustment control conhgured to adjust the sensitivity of the at least one sens ( )t.
  5. 5. The system of any preceding claim, wherein the transceiver comprises a STM card for communication over a telecommunication network.
  6. 6. The system of claim 5, wherein the transceiver comprises more than one STM card, each for communication over a respective telecommunication network, and a lO network strength detection switch configured to direct the transceiver to operate over a selected one of the telecommunication networks in response to a detected strength of each telecommunication network.
  7. 7. The system of any preceding claim, wherein the power source comprises a battery selected from the group comprising a lithium ion battery, a Boston Power long-cycle battery and a Lithonia battery.
  8. 8. The system of any preceding claim, wherein the power source comprises a first lio\v unit and a second l)o' unit, the second pov unit being independent from the first power unit.
  9. 9. The system of any preceding claim, wherein the security device comprises a power source status detector configured to detect the status of the power source.
  10. 10. The system of any preceding claim, wherein the transceiver is further configured to send operational data representing a functional status of the security device, and/or sensor data representing an environment of the security device, over the communication network to the monitoring device.
  11. Il. The system of any preceding claim, wherein the transceiver is further configured to receive control data from die monitoring device, to control operation of the security device.
  12. 12. The system of claim 11, wherein the control data comprises instrucions to the security device to produce an alarm condition, to send operational data.
  13. 13. The system of claim II or claim 12, wherein the control data comprises instructions to the security device to send operational data representing a functional status of the security device, and/or sensor data representing an environment of the security device, over the communication network to the monitoring device.
  14. 14. The system of any one of claims 11 to 13, wherein the control data comprises configuration data, for configuring operation of the security device.
  15. 15. The system of any preceding claim, wherein the transceiver is configured to communicate with the monitoring device over the communication network using a message selected from the group comprising a telephone call, a radio frequency signal, an email, an SM S and any other message form.
  16. 16. The system of any preceding claim, wherein the sccurity device comprises an attachr net tr ii ec hat ii sin.
  17. 17. The system of any preceding claim, \vherein the housing prevents user interface by any means other than via the transceiver.
  18. IS. The system of any preceding claim, wherein the security device may have a consUucuon that is tamper evident.
  19. 19. The system of any preceding claim, comprising more than one security device.
  20. 20. The system of claim 19, wherein each security device is provided with a respective unique identifier code detectable by the monitoring device.
  21. 21. The system of any one of claims 19 or 20, comprising a primal-v security device and at least one satellite security device, wherein the at least one satclhtc security device comprises: a substantially tamper-proof sateffite housing; a satellite power source located within the satellite housing; at least one satellite sensor located within the satellite housing, the at least one satellite sensor configured to detect an event associated with the article being compromised; a satellite processor ocated within the sateffite honsing, the satellite proccssor configured to trigger a sateffite alarm condition in response to the at least one satellite sensor detecting an event associated with the article being compromised; and lO a sateffite transceiver located within the satellite housing, the sateffite transceiver configured to send a sateffite alarm signal to the security device in response to triggering of the satellite alarm condition by the satellite processor; and wherein the satellite security device is configured such that the satellite alarm condition is only detectable outside the satellite housing via the satellite alarm signal.
  22. 22. The system of any preceding claim, comprising more than one monitoring device.
  23. 23. The system of any preceding claim, wherein the monitoring device is selected from the group comprising a computer, a tablet computer, a smartphone, a telephone and a mobile phone.
  24. 24. The system of any preceding daim, wherein the monitoring device is configured to have a predetermined alarm sound for alerting a user to an alarm condition at the security device.
  25. 25. The system of any preceding claim, wherein the monitoring device is configured to run an application for morutoring and/or controlling the security device, the application having a user interface comprising drop-down menu navigation.
  26. 26. The system of any preceding daim, wherein the monitoring device is configured to log mointored activity of the security device.
  27. 27. A security system substantially as hereinbefore described with reference to the accompanying drawings.
  28. 28. A method of indicating when an article has been compromised comprising the steps of: providing a system according to any one of daims I to 27; detecting, with the at least one sensor, an event associated with an article being compromised; triering, with the processor, an alarm condition in response to the at least one sensor detecting an event associated with the article being compromised; and sending, with the transceiver, an alarm signal to the monitoring device over the communication network in response to ftiggering of the alarm condition hy the processor, such that the alarm condition is only detectahle outside the housing via the alann signal; monitoring the security device over the communication network; and controlling operation of the security device over the communication network.
  29. 29. A security device for use in the systeiTi of arty one of claims I io 27.
  30. 30. A security device substantially as hereinbefore described with reference to the accompanying drawings.
  31. 31. A monitoring device for use in the system of any one of claims I to 27.
  32. 32. A monitoring device substantially as hereinhefore described with reference to the accompanying drawings.
  33. 33. A method of operafing the monitoring device of claim 31 or claim 32, comprising the steps of: providing a monitoring device according to claim 31 or claim 32, monitoring and controlling a security device according to claim 29 or claim 30, over a communication network.
  34. 34. A computcr program product comprising computer program code means adapted to perform all the steps of the method according to claim 33when said program is run on a computer.Amendments to claims have been filed as follows (:LAIMS 1. A security system for indicating when an article has been compromised, the system comprising: a primary security device contigured to secure the article; at least one satellite security device.; and a monitoring device configured to monitor the primary security device over a communication network, wherein the monitoring device comprises a controller for controlling operation of the primary security device over the communication nertvork; wherein the primary security device comprises: a tamper-proof housing; a power source located within the housing; at least one sensor located within the housing, the at least one sensor configured to detect an event associated with the article being compromised; a processor located within the housing, the processor conhgured to trigger an alarm condition in response to the at least one sensor detecting an event associatcd witl the article being compromised; a transceiver located within the housing, the transceiver comprising more than (.0 20 one SIM card, each SIM card for communication over a respective O H. telecommunication netivork; and a network strength detection switch configured to direct the transceiver to operate over a selected one of the telecommunication networks in response to a detected strength of each telecommunication network; wherein the transceiver is configured to send an alarm signal to the monitoring device over the selected communication network in response to triggering of the alarm condition by the processor; and wherein the housing prevents user interface by any means other than via the transceiver; wherein the primary security device is configured such that the alarm condition is only detectable outside the housing via the alann signal; wherein the at least one satellite security device comprises: a substantially tamper-proof satellite housing; a satellite power source located within the satellite housing; at least one satellite sensor located within the satellite housing. the at least one satellite sensor configured to detect an event associated with the article being ce) mpro mis ed; a satellite processor located within the satellite housing. the satellite processor configured to trigger a satellite alarm condition in response to the at least one.satellite sensor detecting an event associated with the article being compromised; and a satellite transceiver located within the satellite housing, the satellite transceiver configured to send a satellite alarm signal to the primary security device in response to triggering of the satellite alarm condition by the satellite processor; and xvherein the satellite security device is configured such that the satellite alarm condition is only detectable outside the satellite housing via the satellite alarm signal.2. The system of claim 1, wherein the at least one sensor is selected from the group comprising: a motion detector, an acoustic detector an optical detector, a heat detector, a vibration detcctor, a trip switch, a GPS systcri, a gyroscopic dctcctor, an infrared detector, an ultrasonic detector, a microwave detector, a tomographic detector, a laser (0 20 detector, and a jammer detector.3. The system of claim 1 or claim 2, wherein the primary security device comprises at least ttvo sensors.4. The system of claim 1 or claim 2, wherein the primary security device comprises a sensitivity adjustment control configured to adjust the sensitivity of the at least one sensor.5. The system of any preceding claim, wherein the power source of the primary security device comprises a battery selected from the group comprising a lithium ion battery, a Boston Power long-cycle battery and a Lithonia batt cry.6. The system of any preceding claim, wherein the power source of the primary security device comprises a first power unit and a second pover unit, the second power unit being independent from the hrst power unit.7. The system of any preceding claim, wherein the primary security device coniprise.s a power source status detector configured to detect the status of the power source.8. The system of any preceding claim, wherein the transceiver of the primary security device is further configured to send operational data representing a functional status of the primary security device, and/or sensor data representing an environment of the primary security device, over the communication network to the monitoring device.9. The system of any preceding claim, wherein the transceiver of the primary security device is further configured to receive control data from the monitoring device, to control operation of the primary security device.10. Ilic systcrri of claim 9, wherein the control data comprises instructions to the primary security device to produce an alann condition. (0 20Ii. The systena of claim 9 or claim 10. \vherein the control data comprises instructions to the primary security device to send operational data representing a functional status of the primary security device, and/or sensor data representing an environment of the primary security device, over the communication network to the monitoring device.12. The system of any one of claims 9 to ii, wherein the control data comprises conhguration data, for conhguring operation of the primary security device.13. The system of any preceding claitn, wherein the transceiver of the primary security device is configured to communicate with the mnonitoring device over the conlinunication nertvork using a niessage selected from the group comprising a telephone call, a radio frequency signal. an email, and an SMS.14. The system of any preceding claim, wherein the primary security device comprises an attachment mechanism.iS. The system of any preceding claim, wherein the primary security device has a construction that is tamper evident.16. The system of any preceding claim, comprising more than one pnmary security device.17. The system of claim 16, wherein each primary security device is provided with a respective nniqne identifier code detectable by the monitoring device.18. The system of any preceding claim, comprising more than one monitoring device.19. The system of any preceding claim. \vherein the monitoring device is selected frorri tlic group comprising a computer, a tablet corriputcr, a sriiartplioiic, a tcleplioric and a mobile phone. (0 2020. The system of any preceding claim, wherein the monitoring device is configured to have a predetermined alarm sound for alerting a user to an alarm condition at the primary security device.21. The system of any preceding claim, wherein the monitoring device is configured to run an application for monitoring and/or controlling the primary security device, the application having a user interface comprising drop-down menu navigation.22. The system of any preceding claim, wherein the monitoring device is configured to log monitored activity of the primary security device.23. A secnrity system snbstantially as hereinhefore described with reference to the accompanying drawings.24. A method of indicating when an article has been compromised comprising the steps of: providg a system according to any one of claims I tc 23; detecting. with the at least one satellite sensor, an event associated with an article being compromised; triggering, with the satellite, processor, a satellite alarni condition in response to the at least one satellite sensor detecting an event associated with the article being compromised; sending, with the satellite transceiver, a satellite alarm signal to the primaq security device in response to triggering of the satellite alarm condition by the satellite processor, such that the satellite alarm condition is only detectable outside the housing via the alarm signal: triggering, with the processor, an alarm condition in response to receiving the 1 5 satellite alarm signal; sending, with the transceiver, an alarm signal to the monitoring device over the communication nevork in response to triggering of the alarm condition by the proccssr, sod] tliat thc alarrji condition is only dctcctablc outsidc the 0 housing via the alarm signal; (0 20 monitoring the prima securi device over the communication nevorlç and controlling operation of the primary security device over the communication network.
GB1311237.0A 2013-06-25 2013-06-25 A Security System Expired - Fee Related GB2515500B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
GB1311237.0A GB2515500B (en) 2013-06-25 2013-06-25 A Security System

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
GB1311237.0A GB2515500B (en) 2013-06-25 2013-06-25 A Security System

Publications (3)

Publication Number Publication Date
GB201311237D0 GB201311237D0 (en) 2013-08-14
GB2515500A true GB2515500A (en) 2014-12-31
GB2515500B GB2515500B (en) 2015-07-22

Family

ID=48998880

Family Applications (1)

Application Number Title Priority Date Filing Date
GB1311237.0A Expired - Fee Related GB2515500B (en) 2013-06-25 2013-06-25 A Security System

Country Status (1)

Country Link
GB (1) GB2515500B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110772177A (en) * 2018-07-27 2020-02-11 松下电器(美国)知识产权公司 Information processing method, information processing apparatus, and recording medium

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10327526B2 (en) * 2017-02-16 2019-06-25 Marta KNITTEL Carrying devices with built-in security system
US11259611B2 (en) 2017-02-16 2022-03-01 Bagcam, Llc Carrying devices with built-in security system

Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5446445A (en) * 1991-07-10 1995-08-29 Samsung Electronics Co., Ltd. Mobile detection system
IT1258669B (en) * 1992-07-13 1996-02-27 Angelo Boni Anti-theft device with silent alarm, particularly for motor vehicles
NL1014393C2 (en) * 2000-02-16 2001-08-20 Monsanto Randy Marciano Bi-directional security and silent alarm system communicates with central station via GSM cell-net phone system
GB2363287A (en) * 2000-06-07 2001-12-12 E Lead Electronic Co Ltd Vehicle installed phone device capable of performing control measures
US20030227337A1 (en) * 2002-06-06 2003-12-11 Siniscalchi Patrick Peter Voltage controlled oscillator having control current compensation
WO2004019593A2 (en) * 2002-08-21 2004-03-04 HURTADO CAMPOS, Andrés Wireless telephony-operated alarm
US20090325572A1 (en) * 2008-06-26 2009-12-31 Samsung Electronics Co. Ltd. Apparatus and method for providing network service in a portable communication system
US20110269503A1 (en) * 2010-04-30 2011-11-03 Samsung Electronics Co. Ltd. Apparatus and method for automatic sim card selection according to network environment in dual mode
US20120223825A1 (en) * 2011-03-03 2012-09-06 Dossantos David Silent car alarm
US20120286951A1 (en) * 2011-05-13 2012-11-15 Hess Brian K Consumer alarm with quiet button

Patent Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5446445A (en) * 1991-07-10 1995-08-29 Samsung Electronics Co., Ltd. Mobile detection system
IT1258669B (en) * 1992-07-13 1996-02-27 Angelo Boni Anti-theft device with silent alarm, particularly for motor vehicles
NL1014393C2 (en) * 2000-02-16 2001-08-20 Monsanto Randy Marciano Bi-directional security and silent alarm system communicates with central station via GSM cell-net phone system
GB2363287A (en) * 2000-06-07 2001-12-12 E Lead Electronic Co Ltd Vehicle installed phone device capable of performing control measures
US20030227337A1 (en) * 2002-06-06 2003-12-11 Siniscalchi Patrick Peter Voltage controlled oscillator having control current compensation
WO2004019593A2 (en) * 2002-08-21 2004-03-04 HURTADO CAMPOS, Andrés Wireless telephony-operated alarm
US20090325572A1 (en) * 2008-06-26 2009-12-31 Samsung Electronics Co. Ltd. Apparatus and method for providing network service in a portable communication system
US20110269503A1 (en) * 2010-04-30 2011-11-03 Samsung Electronics Co. Ltd. Apparatus and method for automatic sim card selection according to network environment in dual mode
US20120223825A1 (en) * 2011-03-03 2012-09-06 Dossantos David Silent car alarm
US20120286951A1 (en) * 2011-05-13 2012-11-15 Hess Brian K Consumer alarm with quiet button

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110772177A (en) * 2018-07-27 2020-02-11 松下电器(美国)知识产权公司 Information processing method, information processing apparatus, and recording medium
CN110772177B (en) * 2018-07-27 2022-04-12 松下电器(美国)知识产权公司 Information processing method, information processing apparatus, and recording medium
US11357376B2 (en) 2018-07-27 2022-06-14 Panasonic Intellectual Property Corporation Of America Information processing method, information processing apparatus and computer-readable recording medium storing information processing program
US11925304B2 (en) 2018-07-27 2024-03-12 Panasonic Intellectual Property Corporation Of America Information processing method, information processing apparatus and computer-readable recording medium storing information processing program

Also Published As

Publication number Publication date
GB2515500B (en) 2015-07-22
GB201311237D0 (en) 2013-08-14

Similar Documents

Publication Publication Date Title
CA2701335C (en) Portable alarm device
US10134265B2 (en) Portable alarm system with self-monitoring sensor
US8638218B2 (en) Wireless takeover of an alarm system
EP2218060B1 (en) Alarm device for the protection of property
US9449479B2 (en) Security system
US9558644B2 (en) Security system with earthquake detection
KR19990080778A (en) Fire alarm wireless transceiver and control method thereof
GB2462590A (en) Proximity safety system for vehicle and personnel using ID tags, with vehicle immobilization and event logging.
US20100283608A1 (en) Intrusion Warning and Reporting Network
GB2515500A (en) A Security System
US20170053520A1 (en) Alarm unit
EP3035304A1 (en) A security system for indicating when an article has been compromised
GB2481400A (en) Security system providing protection against the theft of valuables
CN201191433Y (en) Security synthetic alarm system
US20070085671A1 (en) Apparatus and method for providing a programmable chime for security system proximity alerts
CN105279890A (en) Wireless safety protection wrist strap set
US8717161B1 (en) Lockout for hydrogen sulfide monitoring system
GB2443848A (en) A surveillance system with identification detection
JP2017146930A (en) Monitoring device
CN202331742U (en) Security system based on CAN bus
GB2484462A (en) Intruder alarm system power supply having a remote communication means associated therewith
RU2390851C1 (en) Security system of real estate unit
CN203849827U (en) Automatic anti-fire anti-theft anti-gas-leakage alarm system based on networked video
GB2530120A (en) Alarm system
KR20060030138A (en) Remote monitoring system of the robbery prevention

Legal Events

Date Code Title Description
PCNP Patent ceased through non-payment of renewal fee

Effective date: 20200625