US20110095883A1 - Asset monitoring system and portable security system therefor - Google Patents
Asset monitoring system and portable security system therefor Download PDFInfo
- Publication number
- US20110095883A1 US20110095883A1 US12/984,118 US98411811A US2011095883A1 US 20110095883 A1 US20110095883 A1 US 20110095883A1 US 98411811 A US98411811 A US 98411811A US 2011095883 A1 US2011095883 A1 US 2011095883A1
- Authority
- US
- United States
- Prior art keywords
- portable security
- security system
- host system
- alarm
- message
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
Images
Classifications
-
- B—PERFORMING OPERATIONS; TRANSPORTING
- B60—VEHICLES IN GENERAL
- B60R—VEHICLES, VEHICLE FITTINGS, OR VEHICLE PARTS, NOT OTHERWISE PROVIDED FOR
- B60R25/00—Fittings or systems for preventing or indicating unauthorised use or theft of vehicles
- B60R25/10—Fittings or systems for preventing or indicating unauthorised use or theft of vehicles actuating a signalling device
- B60R25/1004—Alarm systems characterised by the type of sensor, e.g. current sensing means
-
- B—PERFORMING OPERATIONS; TRANSPORTING
- B60—VEHICLES IN GENERAL
- B60R—VEHICLES, VEHICLE FITTINGS, OR VEHICLE PARTS, NOT OTHERWISE PROVIDED FOR
- B60R25/00—Fittings or systems for preventing or indicating unauthorised use or theft of vehicles
- B60R25/10—Fittings or systems for preventing or indicating unauthorised use or theft of vehicles actuating a signalling device
- B60R25/1003—Alarm systems characterised by arm or disarm features
-
- B—PERFORMING OPERATIONS; TRANSPORTING
- B60—VEHICLES IN GENERAL
- B60R—VEHICLES, VEHICLE FITTINGS, OR VEHICLE PARTS, NOT OTHERWISE PROVIDED FOR
- B60R25/00—Fittings or systems for preventing or indicating unauthorised use or theft of vehicles
- B60R25/10—Fittings or systems for preventing or indicating unauthorised use or theft of vehicles actuating a signalling device
- B60R25/102—Fittings or systems for preventing or indicating unauthorised use or theft of vehicles actuating a signalling device a signal being sent to a remote location, e.g. a radio signal being transmitted to a police station, a security company or the owner
-
- B—PERFORMING OPERATIONS; TRANSPORTING
- B60—VEHICLES IN GENERAL
- B60R—VEHICLES, VEHICLE FITTINGS, OR VEHICLE PARTS, NOT OTHERWISE PROVIDED FOR
- B60R25/00—Fittings or systems for preventing or indicating unauthorised use or theft of vehicles
- B60R25/30—Detection related to theft or to other events relevant to anti-theft systems
- B60R25/33—Detection related to theft or to other events relevant to anti-theft systems of global position, e.g. by providing GPS coordinates
-
- B—PERFORMING OPERATIONS; TRANSPORTING
- B60—VEHICLES IN GENERAL
- B60R—VEHICLES, VEHICLE FITTINGS, OR VEHICLE PARTS, NOT OTHERWISE PROVIDED FOR
- B60R2325/00—Indexing scheme relating to vehicle anti-theft devices
- B60R2325/20—Communication devices for vehicle anti-theft devices
- B60R2325/205—Mobile phones
Definitions
- the present disclosure relates to asset monitoring systems and portable security systems therefor.
- a portable security system has one or more alarm sensors and a wireless transceiver that communicates via wireless communication with a host system.
- the portable security system is switchable between a disabled (partially powered) state and an enabled (fully powered state) in response to commands received from the host system.
- the portable security system is shipped from a manufacturer in the disabled state and is enabled by the host system, such as in response to the user registering the portable security system with the host system and activating it via the host system.
- the wireless communication is cellular communication.
- the system is provisioned with parameters necessary for its operation prior to being shipped from the manufacturer in the disabled state.
- the portable security system has a plurality of alarm sensors which a user can separately activate and deactivate via the host system.
- the user activates and deactivates each alarm sensor via a web interface with the host system.
- the portable security system includes a base unit and an auxiliary unit.
- the base unit includes one or more of the alarm sensors including a window/door sensor that serves a dual purpose depending on whether the base unit is mated with the auxiliary unit.
- the window/door sensor senses whether a window or door is opened.
- the window/door sensor senses whether the auxiliary unit is being tampered with, such as being removed from the base unit.
- the window/door sensor is a magnetic sensor and the auxiliary unit includes a housing having a receptacle in which the base unit is received.
- the housing includes a hinged cover having a magnet that is in proximity with the window/door sensor of the base unit when the hinged cover is closed. If the hinged cover is opened, the window/door sensor responds to the change in magnetic field caused by the magnet moving away from the window/door sensor and generates an alarm signal. The base unit then sends an alarm signal to the host system that the cover of the auxiliary unit has been opened and the host system notifies the user associated with that portable security system.
- the auxiliary unit is a battery pack.
- the base unit includes a tamper sensor that provides a signal in response to the base unit being removed from a surface on which it is mounted. The base unit responds to this signal and sends a tamper alarm to the host system and then the host system notifies the user associated with that portable security system of the tamper condition.
- this surface is a surface of an asset being monitored by the portable security system.
- the base unit includes a window/door sensor, a vibration sensor and a temperature sensor.
- the auxiliary unit includes an actuator for the tamper sensor so that the tamper sensor is operative when the base unit is mated in the auxiliary unit and the auxiliary unit is mounted on the surface.
- the tamper sensor actuator in the auxiliary unit actuates the tamper sensor so that the tamper sensor generates the signal indicating that the auxiliary unit has been removed from the surface.
- the auxiliary unit may be a battery pack or a motion detector.
- the host system can be utilized by multiple users to manage portable security systems associated with the respective users.
- each user can assign any of the portable security systems associated with that user to a group and also have multiple groups. The user can then configure as a group the portable security systems assigned to a group. The user configures the settings for the desired group which results in the settings for all the portable security systems assigned to that group being configured according to the group settings.
- the host system notifies a user(s) of an alarm condition(s) by calling one or more contact number(s) designated by the user(s) during configuration of the portable security system(s), sending an e-mail to one or more e-mail address(es) designated by the user(s) during configuration of the portable security system(s), or both.
- the system does so sequentially by attempting to call each contact one at a time and calling the next contact if the first contact does not answer.
- FIG. 1 is a block diagram of a base unit of a portable security system
- FIG. 2A is a top perspective view of the base unit of FIG. 1 with the top being transparent;
- FIG. 2B is a top view of the base unit of FIG. 1 ;
- FIG. 3 is a bottom view of the base unit of FIG. 1 ;
- FIG. 4A is a top perspective view of an auxiliary battery unit in an open condition
- FIG. 4B is a bottom view of the auxiliary battery unit of FIG. 4A in a closed condition
- FIG. 5A is a top perspective view of an auxiliary motion detector unit
- FIG. 5B is a bottom view of the auxiliary motion detector unit of FIG. 5A ;
- FIG. 6 is a system diagram of an asset monitoring system with a portable security system
- FIG. 7 is a simplified flow chart showing an enable sequence for the portable security system of FIG. 1 ;
- FIG. 8 is a simplified schematic of an enable/disable circuit of the portable security system of FIG. 1 ;
- FIG. 9 is a simplified flow chart showing a disable sequence for the portable security system of FIG. 1 ;
- FIGS. 10A-10O are exemplar web pages of a web aspect of a management site for managing portable security systems of FIG. 1 ;
- FIGS. 11A and 11B are maps showing the location (present and historical) of a portable security system of FIG. 1 ;
- FIG. 12 is a flow chart of an illustrative routine for operation of the asset monitoring system of FIG. 6 .
- FIG. 1 is a block diagram of a portable security system 100 in accordance with an illustrative aspect.
- Portable security system 100 communicates via wireless communication with server(s) and communicates conditions, such as alarm conditions, to the server(s) and can be programmed by the server.
- the wireless communication used may illustratively be cellular communication. It should be understood that while the following description references cellular communication, other wireless communication may also be used, such as VHF, UHF, satellite, 802.11(b) (and similar communications).
- a user can interface with the server via the Internet or phone to manage portable security system 100 (e.g., configure it and to receive information from portable security system 100 , such as alarms.)
- Portable security system 100 includes a base unit 101 .
- Base unit 101 includes a controller 102 coupled to a cellular module 104 , a global positioning system (GPS) module 106 , one or more sensors 108 , battery 110 , speaker 112 and an accessory port 114 .
- GPS module 106 is an assisted GPS module 106 .
- battery 110 is a lithium ion battery and a battery heater 116 is coupled to battery 110 and controller 102 .
- GPS module 106 is coupled to a GPS antenna 118 and cellular module 104 is coupled to cellular antenna 120 .
- the foregoing components are disposed in a housing, such as housing 200 shown in FIGS. 2A and 2B .
- Sensor(s) 108 may include a temperature sensor (or sensors) 124 , a window/door sensor (or sensors) 126 , a tamper sensor (or sensors) 128 , and a vibration sensor (or sensors) 130 . It should be understood that sensor(s) 108 can include other types of sensors as well. For example, sensor(s) 108 can include water, light, RF, CO 2 , magnetism, earth magnetic field (e.g., compass), gyroscopic, accelerometer, sensor mat, loss of charger power, vehicle buss communications (e.g., OBD-II), and the like.
- sensor(s) 108 can include water, light, RF, CO 2 , magnetism, earth magnetic field (e.g., compass), gyroscopic, accelerometer, sensor mat, loss of charger power, vehicle buss communications (e.g., OBD-II), and the like.
- Temperature sensor(s) 124 may illustratively be a thermistor
- window/door sensor(s) 126 may illustratively be a magnetic sensor (such as a hall effect transducer or reed switch)
- tamper sensor(s) 128 may illustratively include a magnetic sensor and plunger assembly, as described below
- vibration sensor(s) 130 may illustratively be a cantilever-type vibration sensor, such as a Minisense 100 Vibration Sensor available from Measurement Specialties, Inc., 1000 Lucas Way, Hampton, Va. 23666.
- sensors 124 , 126 , 128 and 130 may be types of sensors other than the foregoing types, and each of sensors 124 , 126 , 128 and 130 may be any sensor suitable for sensing the condition that the sensor is to sense.
- window/door sensor 126 may illustratively be a magnetically actuated reed switch; and tamper sensor 128 may illustratively be a push button switch.
- FIGS. 2A and 2B show an illustrative embodiment of base unit 101 of portable security system 100 .
- housing 200 has a small footprint, approximately the size of two decks of cards.
- Housing 200 may, for example, illustratively have a length of 111 mm, a width of 88 mm and a height of 32 mm.
- Base unit 101 can connect, such as via accessory port 114 , with auxiliary devices, examples of which are discussed below, to provide additional capability for portable security system 100 .
- accessory port 114 provides connections for a conventional charger 232 ( FIG. 2 ), which may be an A/C charger, DC charger, vehicle charger, solar charger, or other known type of charger that provides a requisite source of DC power to base unit 101 .
- a printed circuit board 202 is mounted within housing 200 .
- Controller 102 , cellular module 104 , cellular antenna 120 , GPS module 106 , GPS antenna 118 , accessory port 114 , and associated electronic components are mounted on printed circuit board 202 .
- An electromagnetic shield 204 such as a metal can, is mounted on printed circuit board 202 over RF circuits.
- Accessory port 114 may illustratively be a 7 pin mini-DIN connector.
- Battery 110 may illustratively be a lithium ion battery and in the embodiment shown in FIGS. 2A and 2B , illustratively includes two lithium ion battery cells 206 . In the embodiment shown in FIGS.
- GPS antenna 118 and cellular antenna 120 are shown mounted vertically on printed circuit board 202 . It should be understood that one or both of GPS antenna 118 and cellular antenna 120 can be mounted horizontally on or with respect to printed circuit board 202 .
- Speaker 112 is disposed in housing 200 and has lead wires (not shown) that connect to a connector 207 on printed circuit board 202 .
- Housing 200 includes one or more features used to mount housing 200 on an asset to be protected or in an area to be protected or monitored. These mounting features may illustratively include one or more mounting magnets 208 disposed in housing 200 . In the illustrative embodiment shown in FIGS. 2A and 2B , mounting magnets 208 are disposed in recesses 210 on opposite sides of housing 200 that illustratively open out of a bottom 300 ( FIG. 3 ) of housing 200 with magnet(s) 208 flush, or virtually flush, with the bottom 300 of housing 200 . These features may also, or alternatively, include one or more screw holes 212 in housing 200 . In the illustrative embodiment shown in FIGS. 2A and 2B , housing 200 includes a screw hole 212 on each of the right and left sides (as oriented in FIGS. 2A and 2B ) of housing 200 .
- base unit 101 of portable security device 100 is mounted, such to an asset to be protected, using magnets 208 and/or screws (not shown) placed through screw hole(s) 212 .
- magnets 208 can be used to hold base unit 101 to the asset.
- base unit 101 is to be mounted on a wood tool cabinet, screws can be inserted into screw holes 212 and tightened to affix base unit 101 to the asset.
- base unit 101 can simply be placed on top of the asset, such as on the top surface of a tool box.
- tamper sensor 128 includes a magnetic sensor, such as a hall effect transducer, mounted within housing 200 , such as on printed circuit board 202 , and a plunger or pin assembly 302 ( FIG. 3 ) disposed in an outwardly opening recess 304 in bottom 300 of housing 200 .
- Plunger or pin assembly 302 includes a pin or plunger 306 , a compression spring and a magnet (not shown). The pin assembly 302 is disposed in housing 200 so that the pin 306 extends out of the bottom 300 of housing 200 when housing 200 is not mounted and is pushed up into housing 200 when housing 200 is mounted to an asset.
- the pin of the pin assembly springs out changing the location of the magnet with respect to the magnetic sensor and changing the magnetic field at the magnet sensor (i.e., bringing it closer to or further away).
- the change in magnetic field causes the magnetic sensor to provide a signal to controller 102 indicative of the plunger extending from the bottom 300 of housing 200 .
- controller 102 determines that a tamper condition occurred, and it generates a tamper alarm as discussed in more detail below.
- Recess 304 is illustratively molded in an outer wall of housing 200 so that material of housing 200 is between pin assembly 302 and the inside of housing 200 . This facilitates making housing 200 watertight without the need to provide a seal around pin assembly 302 .
- base unit 101 is adapted to interface with accessory units, such as auxiliary battery unit 400 ( FIGS. 4A and 4B ) and motion detector 500 ( FIGS. 5A and 5B ).
- accessory units such as auxiliary battery unit 400 ( FIGS. 4A and 4B ) and motion detector 500 ( FIGS. 5A and 5B ).
- auxiliary battery unit 400 includes housing 402 having a base 404 and a hinged cover 406 .
- Base 404 includes a battery compartment 408 in which battery cells 410 , illustratively 4 D size alkaline battery cells, are received.
- Base 404 also includes a receptacle 412 for receiving base unit 101 and a connector (not shown) that mates with accessory port 114 of base unit 101 to electrically connect battery cells 410 to base unit 101 .
- Base 404 and hinged cover 406 of housing 402 of auxiliary battery unit 400 including corresponding latch elements 414 that, when hinged cover 406 is closed over base 404 engage to latch hinged cover 406 to base 404 in a closed position.
- Base 404 of housing 402 also includes a movable pad 416 ( FIG. 4B ) disposed in a bottom 418 of housing base 404 that contacts pin 306 of pin assembly 302 of tamper sensor 128 when base unit 101 is disposed in receptacle 412 of base 404 .
- Movable pad 416 provides an extension for pin 306 enabling tamper sensor 128 to work when base unit 101 is received in auxiliary battery unit 400 .
- Movable pad 416 may illustratively be spring loaded.
- auxiliary motion detector unit 500 includes a housing 502 having a receptacle 504 for receiving base unit 101 .
- Motion detector 500 may illustratively be a passive infrared radiation motion detector.
- Housing 502 may illustratively include screw holes 506 for mounting motion detector unit such as to a wall of a room to be monitored by tightening screws (not shown) inserted into screw holes 506 into the wall.
- Housing 502 includes a connector (not shown) that mates with accessory port 114 of base unit 101 to electrically connect motion detector unit 500 to base unit 101 .
- motion detector unit 500 is physically electrically connected to base unit 101 through accessory port 114 , as opposed to wirelessly connected.
- Housing 502 also includes a movable pad 508 in a bottom 510 of housing 502 similar to movable pad 416 of auxiliary battery unit 400 that provides an extension for pin 306 enabling tamper sensor 128 to work when base unit 101 is received in receptacle 504 .
- Portable security system 100 has one or more of the following features. It does not have any physical on/off switch or button accessible on the outside of base unit 101 . It can be activated, deactivated, and configured or programmed only through wireless communications through cellular module 104 . Management (e.g., activation, deactivation, configuration and/or messaging) is via a server that a user can communicate with via the Internet or by phone (e.g., by an interactive voice response system).
- portable security system 100 With reference to FIG. 6 , the operation of portable security system 100 is generally described with reference to an asset 600 to be protected.
- Portable security system 100 is appropriately located, such as by placing base unit 101 on asset 600 .
- Asset 600 may illustratively be a metal tool box and mounting magnets 208 hold base unit 101 in place on the tool box.
- portable security system 100 monitors assets 600 via sensors 108 .
- portable security system 100 Upon detecting an alarm condition via one of sensors 108 , portable security system 100 sends an alarm message via cellular communication to server 602 , which is illustratively a remotely located host system, and, if configured to do so, also sounds an audible alarm with speaker 112 .
- Server 602 may use any or all of three types of cellular communication protocols including Cellemetry®, 1X RTT, and short message service (SMS). Cellemetry may also be used by portable security system 100 to send alarm information using the control channel. Server 602 sends the alarm message (either as a pass through or as may be formatted by server 602 ) to appropriate contacts that are illustratively input into server 602 for each portable security system 100 when that portable security system 100 is configured (or reconfigured) by a user. In an aspect, server 602 can call one or more phone numbers (shown illustratively by cell phone 604 ) input into server 602 by the user of the portable security system 100 to provide a phone notification of the alarm.
- phone numbers shown illustratively by cell phone 604
- Server 602 can also send an e-mail notification of the alarm to one or more e-mail address(es) input into server 602 by the user of the portable security system 100 during configuration (shown illustratively by computer system 606 ). Server 602 can also send the alarm message, such as via phone, e-mail or text message to the appropriate authorities (shown illustratively by police unit 608 ). Illustratively, server 602 also logs the alarm which can be accessed on a web page, by phone via a voice menu, and/or text via a text message menu. In an aspect, the alarm message may illustratively include a location of portable security system 100 as determined using GPS module 106 . In an aspect, server 602 uses the last location of the portable security system 100 , such as may have been obtained by a “locate” function and the alarm message sent by the portable security system 100 does not include location information.
- sensors 108 may include temperature sensor 124 , window/door sensor 126 , tamper sensor 128 and vibration sensor 130 . Sensors 108 may also include other types of sensors as discussed above.
- controller 102 based on an input from temperature sensor 124 determines that a temperature where portable security system 100 is located is over or under temperature, controller 102 sends a temperature alarm message via cellular communication using cellular module 104 to server 602 that the temperature is out of range.
- controller 102 determines that a window or door has opened based on an input from window/door sensor 126
- controller 102 sends an window/door open alarm message to server 602 that the window or door has been opened.
- controller 102 determines that base unit 101 has been removed from asset 600 based on an input from tamper sensor 128 , it sends a tamper alarm message to server 602 that portable security 100 has been tampered with. If controller 102 determines that asset 600 is being moved such as based on an input from vibration sensor 130 , controller 102 sends a vibration alarm message to server 602 . If portable security system 100 includes auxiliary motion detector 500 , and controller 102 determines that movement has occurred based on an input from auxiliary motion detector 500 , it sends an intrusion alarm message to server 602 . Controller 102 may also sound an audible alarm in each case where it sends an alarm message to server 602 .
- portable security unit 100 is user configurable, via wireless programming as discussed below, to set which sensors 108 are active. Controller 602 will send alarm messages to server 602 only in response to an appropriate input from a sensor that is configured as active.
- portable security unit 100 is user configurable, via wireless programming as discussed below, to set which alarm conditions will also result in controller 102 sounding an audible alarm with speaker 112 . In some cases, it may be desirable that an audible alarm not be sounded upon controller detecting an alarm condition where it sends an alarm message to server 602 .
- portable security system 100 when portable security system 100 is utilizing auxiliary motion detector 500 to monitor an area, to avoid alerting intruders that their presence has been detected, portable security system 100 may be configured so that upon detecting motion, controller 102 sends an intrusion alarm message to server 602 but does not sound an audible alarm.
- window/door sensor 126 is a magnetic sensor, such as a hall effect transducer, disposed in housing 200 , such as on printed circuit board 202 ( FIGS. 2A & 2B ).
- a magnet shown representatively by box 214 in FIG. 2B , is then disposed on the window or door of the asset to be protected so that it is adjacent window/door sensor 126 when the window or door is closed.
- the hall effect transducer senses the change in magnetic field and provides a corresponding signal to controller 102 , which determines that the window or door has been opened. Controller 102 then sends an alarm message to server 602 indicating that the window or door has been opened and server 602 sends an alarm message to a user associated with the portable security system 100 , such as in the manner described below.
- window/door sensor 126 can also be used to indicate a tamper condition of an auxiliary device, described using auxiliary battery unit 400 as an example.
- window/door sensor 126 is a magnetic sensor, such as a hall effect transducer.
- Hinged cover 406 of auxiliary battery unit 400 has a magnet 409 mounted thereon. When hinged cover 406 is closed, magnet 409 is adjacent window/door sensor 126 of base unit 101 , such as by being received in a recess 417 of housing base 404 of housing 402 of auxiliary battery unit 400 .
- window/door sensor 126 When hinged cover 406 is opened, window/door sensor 126 responds to the change in magnetic field and provides controller 102 of base unit 101 a signal indicative of the magnet moving away from window/door sensor 126 . This causes controller 102 to determine that a tamper condition occurred, and it generates a tamper alarm.
- controller 102 determines that the tamper condition is housing cover 406 being opened and sends server 602 an tamper condition alarm message indicating that hinged cover 406 had been opened.
- Server 602 sends an alarm message to the contact(s) designated for that portable security system 100 indicating that the hinged cover 406 of the auxiliary battery unit had been opened.
- portable security system 100 after it is assembled at the factory, is provisioned with that data necessary for testing it and then tested. In an aspect, it is also provisioned prior to shipment with the parameters needed for operation. In an aspect, portable security system 100 is then shipped from the manufacturer in a disabled state with battery 110 partially charged. In an aspect, in the disabled state, battery 110 can't be charged and portable security system 100 can't send cellular messages (e.g., sending of 1XRTT messages is disabled). Portable security system 100 must then be enabled by the user. An illustrative process of enabling portable security system 100 is described with reference to FIG. 7 . To do so, a user connects portable security system 100 at 700 to a source of power, such as AC charger 232 ( FIG.
- the user accesses a management site 610 operated by a service provider, illustratively hosted by server 602 .
- the management site 610 includes a web site, a home page 1000 for which is shown in FIG. 10A , that the user can access via the Internet where the user can manage and configure the portable security system 100 .
- the management site 610 may also illustratively be accessible by calling a customer service number, which may illustratively connect the user to an interactive voice response system through which the user can register and configure the portable security system 100 .
- the user then registers portable security system 100 at 704 , which may illustratively require the user to enter an electronic serial number (which may be referenced as MSIN in the drawings) and the unit number (cell phone number) of the base unit 101 of the portable security system 100 , which are assigned by the manufacturer or seller of portable security system 100 in much the same way that a cell phone's electronic serial number and phone number are assigned.
- the user also identifies the account with which portable security system 100 is associated and selects a monitoring plan for the portable security system 100 .
- the user will also need to set an account up. In an aspect, this requires the user to provide a credit card number against which the fees, such as monthly fees, for that portable security system 100 are charged.
- the service provider may offer a variety of monitoring plans and the user can select which monitoring plan the user wants for each portable security system 100 that the user has (e.g., self monitored, fully monitored). This process ensures that billing information for the portable security system 100 is provided by the user before portable security system 100 is enabled.
- Server 602 then enables the base unit 101 of the portable security system 100 at 706 .
- Base unit 101 of portable security system 100 is shipped from the manufacturer in a disabled state.
- disabled it is meant that battery 110 is partially charged and provides power only to those components of components of base unit 101 that are involved in switching from enabled to disabled states.
- battery 110 is connected to controller 102 and battery heater 116 .
- controller 102 Upon receipt of an enable command from server 602 , provided accessory port 114 of base unit 101 is connected to a source of DC power, such as AC charger 232 , controller 102 puts base unit 101 in an enable condition by closing switch 800 connecting battery 110 to accessory port 114 and to the remainder of the components of base unit 101 .
- switch 800 is representative of the circuit that enables and disables base unit 101 , which may include various circuit topologies as known in the art.
- Battery 110 is charged by the source of DC power connected to accessory port 114 , such as AC charger 232 .
- a user can disable base unit 101 of portable security system 100 , putting it back into the same condition as when it left the manufacturer.
- the user accesses the management site (such as may be hosted by server 602 ) and at 900 , selects the portable security system 100 to be disabled.
- Server 602 then sends a disable command to the base unit 101 of the portable security system 100 to be disabled.
- controller 102 opens switch 800 ( FIG. 8 ) putting base unit 101 in the disabled state.
- Portable security system 100 can also be managed by calling the customer service number for management site 610 and accessing it via the interactive voice response system, although some features, such as map location display, may not be suitable for phone communication and may thus be available only on the website.
- the user accesses a logon page (not shown) of the website management site 610 and logins which takes the user to a home page of management site 610 that is provisioned for that user, referred to herein as Units—Accounts Summary page 1000 .
- All the portable security systems 100 associated with that user are shown on User—Accounts Summary home page 1000 , along with various buttons (e.g., arm, locate, request status, settings) for selecting functions to manage the portable security systems 100 and links (shown along the left hand side of the page) that the user can select to manage portable security systems 100 . Also, if these portable security systems 100 are also associated with groups, they will by shown by group. Also, the links are typically displayed along the left hand side of each of the sub pages as can be seen from FIGS. 10B-10O . In this regard, the links displayed along the left hand side of each page may vary depending on the page.
- the user profile information that the user can enter or update on page 1002 includes the user's e-mail address, the user's phone menu login, and the user's web password. It also includes fields where the user can globally set certain display settings for the portable security systems 100 associated with the user, such as temperature scale, whether the units are identified by name or serial number, time zone, and whether the time zone follows daylight savings time.
- the user is taken to the Unit Settings/Unit History page 1008 ( FIG. 10D ).
- the user selects a portable security system 100 such as by the name assigned to the portable security system, illustratively shown as “Office Trailer” in FIG. 10D in the Unit Settings segment of page 1008 .
- the user can then select which sensors of the selected portable security system 100 are to be active and which are not by checking or unchecking the box next to each sensor.
- Certain sensors may include parameters that the user can also set, such as the sensitivity level and pulse count for vibration sensor 130 ( FIG. 1 ).
- the user can set whether the portable security system alarms on a high reading, a low reading, or both, and the setting for the alarm.
- temperature sensor 124 can trigger a high temperature alarm in the event of sensing temperature at or above a high temperature setting, a low temperature alarm in the event of sensing temperature at or below a low temperature reading, or both.
- the user can set by checking the appropriate box whether the selected portable security system 100 triggers an alarm based on a high temperature, based on a low temperature, or both.
- the user can also set the high temperature limit and the low temperature limit.
- the portable security system 100 will then respond only to those sensors that have been made active in generating alarm messages.
- controller 102 of the base unit 101 of the selected portable security system 100 updates accordingly.
- the user can select by checking the appropriate box whether the selected portable security system will sound an audible alarm or message using speaker 112 ( FIG. 1 ) upon the occurrence of a particular event, such as an alarm. After doing so, the user clicks the “Update” button under Speaker to send the updated speaker configuration to the selected portable security system 100 .
- the controller 102 of the base unit 101 of the selected portable security system 100 updates accordingly.
- Page 1008 also displays the Unit History for the selected portable security system 100 in the “Unit History” box. This is a log of the events for the selected portable security system 100 , such as alarm messages, page events, etc.
- Page 1008 also displays the arm/disarm status of the selected portable security system 100 , which the user can obtain by clicking “Status”button 1010 . It also allows the user to arm and disarm the selected portable security system 100 by clicking the arm and disarm buttons 1012 and 1014 , respectively.
- the selected portable security system 100 When the selected portable security system 100 is armed, it will, upon receiving an appropriate input from an active sensor, generate a corresponding alarm message that it sends out as discussed above. When the selected portable security system 100 is disarmed, it won't generate an alarm message or sound an audible alarm.
- the “Page” button 1016 is used to turn the “Page” function on (indicated by “+” on the button) and off (indicated by ( ⁇ ) on the button.
- the page function of the selected portable security system 100 When the page function of the selected portable security system 100 is on, the selected portable security system 100 emits a sound from speaker 112 so that those in the vicinity of the selected portable security system 100 can locate it by the sound emanating from its speaker 112 .
- the “Page” function can be advantageously used to locate assets, such as a particular tool, on a jobsite.
- the base unit 101 of a portable security system 100 is attached to the asset and when personnel on the jobsite need to locate that asset, they can turn the “Page” function for that portable security system 100 on and use the sound emanating from the speaker of that portable security system 100 to locate the asset.
- a portable security system 100 having its Page function on emits a sound from its speaker for a period of time, such as sixty seconds.
- a portable security system 100 having its Page function on emits a sound from its speaker 112 until its Page function is deactivated.
- a “Locate” button ( FIG. 11A ) actuates the “locate” function for the for the selected portable security system 100 .
- Clicking the “Locate” button causes server 602 to send a locate command to the selected portable security system 100 .
- Controller 102 of the selected portable security system 100 responds to the locate command by obtaining information about its location, such as from GPS module 106 . This information may illustratively be the latitude and longitude of the portable security system.
- the controller 102 of the selected portable security system 100 can also obtain location information from cell towers 612 , which allows the controller 102 to obtain location information should its view of GPS satellites 614 be blocked, such as may be the case if base unit 101 of the portable security system 100 is in an indoor location.
- Controller 102 then sends the location information back to server 602 via cellular communication.
- Server 602 then provides the location information to the user.
- server 602 may determine or obtain an address corresponding to the longitude and latitude of the portable security system 100 , such as by accessing a map database.
- Server 602 may illustratively send the location information to the user's phone or e-mail address.
- Server 602 may also make the location information available to the user via phone access, such as using the IVR. It may also make the location available on the management site 610 hosted by server 602 .
- server 602 maps the location information on a map, such as shown in FIGS. 11A & 11B . Test button 1019 can be clicked to test the portable security system 100 .
- Page 1022 is used to designate the contact information for the selected portable security system 100 where messages, such as alarm messages, are to be sent.
- messages such as alarm messages
- FIG. 10F up to three e-mail addresses for contacts for e-mail messages can be designated and up to three phone numbers for contacts for phone message, such as alarm messages, can be designated.
- Each e-mail and phone number contact field has associated with it boxes that are checked or unchecked to indicate when an e-mail message is sent to the e-mail address or a phone call made to the phone number.
- FIG. 10F is used to designate the contact information for the selected portable security system 100 where messages, such as alarm messages, are to be sent.
- up to three e-mail addresses for contacts for e-mail messages can be designated and up to three phone numbers for contacts for phone message, such as alarm messages, can be designated.
- Each e-mail and phone number contact field has associated with it boxes that are checked or unchecked to indicate when an e-mail message is sent to the e
- server 602 sends an alarm e-mail message or phone call is made in the event when the portable security system 100 generates an alarm message. If the “low battery” box is checked, then server 602 sends a low battery message or phone call is made in the event portable security system 100 generates a low battery message. If the “full battery” box is checked, then server 602 sends a full battery e-mail message or phone call is made in the event portable security system 100 generates a full battery message. In an illustrative aspect, server 602 tries to call the first designated phone number and if unsuccessful, then tries the next designated phone number. In a variation, server 602 tries to call all the designated phone numbers. In a variation, server 602 sends an e-mail message to all the designated e-mails.
- the contact information includes prioritization information and server 602 sends a notification message to one or more of the contacts based on the prioritization information.
- server 602 sends the notification messages to the contacts based on priority order with server 602 sending the notification message to the next lower priority contact only if server 602 receives no response from the contact to which it sent the notification message.
- the alarm message is one of a plurality of different types of alarm messages and the contact information set in server 602 includes contact information for a plurality of contacts for server 602 to contact upon receipt of the alarm message wherein different contacts are associated with different ones of the different types of alarm messages.
- Server 602 sends a notification message upon receipt of the alarm message to the contact associated with the type of alarm message that corresponds to the received alarm message.
- the name unit page 1024 take provides for changing the name of a selected portable security system 100 .
- Name unit page 1024 is accessed via selecting a unit on page the Units Settings/Unit History page 1008 ( FIG. 10D ).
- Clicking the “Arm Schedule” link takes the user to Arm/Disarm schedule page 1026 ( FIG. 10H ).
- a user can select a portable security system 100 and set a schedule (by days of the week or daily) of the time(s) of day when the selected portable security system 100 is armed and when it is disarmed.
- clicking the “Update” button causes server 602 to send the schedule to the selected portable security system 100 .
- the controller 102 of the selected portable security system 100 sets the arm/disarm schedule accordingly and arms and disarms the portable security system 100 according to the schedule.
- Clicking the “Maintain Users” link takes the user to Add/Update Users page 1027 ( FIG. 10I ).
- the user can then add a new user or update information for a user.
- the user can add a new user or update information for a user.
- a user having administrative privileges for an account can add a user for that account or change information about the users for that account.
- a user not having administrative privileges for an account would be able to change only the information for that particular user.
- management site 610 provides for multiple levels of authority. That is, personnel who have access to management site 610 are provided various levels of authority with regard to which functions of management site 610 that they can access or use.
- levels of authority include customer service support which provides customer support personnel of the provider that manages management site 610 access to all accounts for troubleshooting, and a “super user” that provides rights in addition to those provided customer service support personnel.
- customer service support which provides customer support personnel of the provider that manages management site 610 access to all accounts for troubleshooting
- a “super user” that provides rights in addition to those provided customer service support personnel.
- three levels of authority are provided in an aspect. These are “Account Owner,” “Master User,” and “User.”
- the Account Owner sets up the account, manages the payments for the account, and has authority to set up Master Users and Users.
- a Master User has access to all functions for the portable security systems 100 associated with the account.
- a Master User can purchase locates for the account using his/her credit card, such as by clicking the “Purchase Locates” link.
- a Master User can set up other Master Users and Users.
- a User has access only to the arm and disarm functions for the portable security systems 100 associated with the account.
- the lower case term “user” is used herein to refer to an person having access to management site 610 regardless of the level of authority assigned to that person while the capitalized term “User” is used herein to refer to a user of management site 610 assigned the “User” level of authority.
- the “Accounts” link and sublinks thereunder take a user to pages used to set up and manage accounts. Again, the access to these pages and functions available thereon depends on the level of authority assigned to the user.
- portable security systems 100 assigned to an account can be managed by groups. That is, individual portable security systems 100 can be assigned to a group and that portable security systems 100 assigned to that group managed collectively. For example, a group may be set up for all portable security systems 100 that are at single location, with a different group being set up for different locations. The different locations may, for example, be different jobsites with one group being for one jobsite and a second group being for a different jobsite. A group can also be created so that all of the features for the portable security systems 100 in the group can be set at the same time. In an aspect, the features available for groping are arm, disarm, create schedule, change sensor settings and change speaker settings.
- Group page 1032 may, in an aspect, list all the portable security systems 100 associated with a user either as being assigned to the selected group (listing them in the “Assigned” column) or not assigned to it (listing them in the “Unassigned” column). The user can then by using arrows 1034 , 1036 move the portable security systems 100 between the Assigned and Unassigned columns to assign them to the selected group or remove them from the selected group.
- Clicking the “Customize Group” link takes the user to the “Customize Group” page 1038 ( FIG. 10M ).
- This page is similar to the Unit Settings/Unit History page 1008 ( FIG. 10D ) except that it pertains to all the portable security systems 100 assigned to the selected group as opposed to an individual portable security system 100 .
- the user selects which sensors are to be active and sets the sensor parameters as appropriate. After doing so, the user clicks update and server 602 then sends these configuration settings to each portable security system 100 assigned to the selected group.
- the user can also select the speaker settings.
- the controllers 102 for each of these portable security systems 100 then update the configurations of the portable security systems 100 accordingly.
- the user can also arm and disarm the portable security systems 100 assigned to the selected group by clicking the Arm and Disarm buttons.
- Group arm/disarm schedule page 1040 is similar to arm/disarm schedule page 1026 ( FIG. 10H ) except that it applies to all the portable security systems 100 assigned to the selected group as opposed to an individual portable security system 100 .
- the user sets a schedule (by days of the week or daily) of time(s) of day when the group is to be armed and disarmed.
- clicking the “Update” button causes server 602 to send the schedule to the portable security systems 100 assigned to the selected group.
- the controllers 102 for the portable security systems 100 assigned to the selected group set the arm/disarm schedule for their respective portable security system 100 accordingly and arm and disarms their respective portable security system 100 according to the schedule.
- the base unit 101 of a portable security system 100 can advantageously be used to monitor the temperature in the area around the base unit and when the temperature is out of range, cause a user to be alerted, such as by server 602 calling a number assigned by the user or sending an e-mail to an e-mail address assigned by the user, such as has been described above with reference to the contacts for unit page 1022 ( FIG. 10F ).
- the user sets the temperature thresholds (High, Low, or both) such as described above with reference to Unit Status—Customize page 1008 ( FIG. 10D ).
- controller 102 of the base unit 101 sends out an alarm message to server 602 that the temperature is above or below, as applicable, the High or Low temperature limit and server 602 notifies the user associated with the portable security system 100 as described above.
- the base unit 101 of a portable security system 100 can thus be used in monitoring temperature such as where concrete is curing so that if the temperature goes out of a range, the associated user is timely notified so that the user can timely take appropriate action to resolve the problem.
- clicking the Location History link takes the user the user to a page displaying a map, such a satellite image map as shown in FIG. 11A or a street map as shown in FIG. 11B , of the geographic area in which the portable security system 100 is located with an indication on the map where the portable security system 100 is located.
- the latitude, longitude and address of the location of the selected portable security system 100 are also displayed along with the date. History location may also be displayed, as shown in the illustrative embodiment shown in FIG. 11 .
- asset monitoring system 616 having portable security system 100 and server 602 is described. It should be understood that while the operation of asset monitoring system 616 is described with reference to one portable security system 100 and associated user, it should be understood that asset monitoring system 616 provides for multiple users and multiple portable security systems 100 for each user, as discussed above with reference to FIGS. 10A-10O .
- portable security system 100 is powered up and goes through an initialization self-check.
- the settings of portable security system 100 such as sent by server 602 are made active and in an illustrative aspect, speaker 112 chirps to signify that portable security system 100 is armed.
- a check is made whether tamper sensor 128 has been tripped. If so, and if the configuration setting for a tamper condition was set to sound an audible alarm, an audible tamper alarm is sounded at 1208 using speaker 112 and a call initiated to server 602 at 1210 and status information sent to server 602 at 1212 . It should be understood that the audible alarm can be a unique sound for each type of alarm.
- the status information can include one or more of the following:
- server 602 After status information is sent to server 602 at 1212 and server 602 receives it, server 602 sends alarm messages to the contacts set up for that portable security system 100 as discussed above.
- server 602 calls at 1230 the first phone number for the user associated with the portable security system 100 as set up during configuration of the contacts for that portable security system 100 . If a connection is found to be successful at 1232 , the routine branches to 1234 where the user answering the call is connected to the interactive voice response system. If no connection is made, the server tries each programmed number in turn, as representatively shown at 1236 and if a connection is found to be successful at 1238 , the routine branches to 1234 as discussed above. If no connection is successful, the routine branches to 1230 and starts again with the first programmed number.
- a user can request a status report from the portable security system 100 by accessing server 602 by phone at 1242 and being connected to the interactive voice response system, or by accessing management site 610 via the Internet at 1244 .
- Server 602 establishes cellular communication with the portable security system 100 at 1246 and commands a status report from a selected portable security system 100 , which the selected portable security system 100 sends to server 602 at 1248 .
- the routine then branches to 1234 as discussed above.
Landscapes
- Engineering & Computer Science (AREA)
- Mechanical Engineering (AREA)
- Radar, Positioning & Navigation (AREA)
- Remote Sensing (AREA)
- Alarm Systems (AREA)
Abstract
A portable security system for monitoring an asset has one or more alarm sensors and a wireless transmitter/receiver that communicates via wireless communication with a host system. The portable security system is switchable between a disabled (partially powered) state and an enabled (fully powered state) in response to commands received from the host system. In an aspect, the portable security system has a plurality of alarm sensors which a user can separately activate and deactivate via the host system. In an aspect, the portable security system includes a base unit and an auxiliary unit. The base unit includes one or more of the alarm sensors that serves a dual purpose depending on whether the base unit is mated with the auxiliary unit. In an aspect, the host system can be utilized by multiple users to manage portable security systems associated with the respective users, including management by group. In an aspect, the host system notifies a user(s) of an alarm condition(s).
Description
- This application is a divisional of U.S. patent application Ser. No. 11/840,436 filed Aug. 17, 2007 and claims the benefit of U.S. Provisional Application No. 60/838,910 filed on Aug. 18, 2006. The disclosure of the above applications are incorporated herein by reference.
- The present disclosure relates to asset monitoring systems and portable security systems therefor.
- In an aspect, a portable security system has one or more alarm sensors and a wireless transceiver that communicates via wireless communication with a host system. The portable security system is switchable between a disabled (partially powered) state and an enabled (fully powered state) in response to commands received from the host system. In an aspect, the portable security system is shipped from a manufacturer in the disabled state and is enabled by the host system, such as in response to the user registering the portable security system with the host system and activating it via the host system. In an aspect, the wireless communication is cellular communication. In an aspect, the system is provisioned with parameters necessary for its operation prior to being shipped from the manufacturer in the disabled state.
- In an aspect, the portable security system has a plurality of alarm sensors which a user can separately activate and deactivate via the host system. In an aspect, the user activates and deactivates each alarm sensor via a web interface with the host system.
- In an aspect, the portable security system includes a base unit and an auxiliary unit. The base unit includes one or more of the alarm sensors including a window/door sensor that serves a dual purpose depending on whether the base unit is mated with the auxiliary unit. When the base unit is not mated with the auxiliary unit, the window/door sensor senses whether a window or door is opened. When the base unit is mated with the auxiliary unit, the window/door sensor senses whether the auxiliary unit is being tampered with, such as being removed from the base unit. In an aspect, the window/door sensor is a magnetic sensor and the auxiliary unit includes a housing having a receptacle in which the base unit is received. The housing includes a hinged cover having a magnet that is in proximity with the window/door sensor of the base unit when the hinged cover is closed. If the hinged cover is opened, the window/door sensor responds to the change in magnetic field caused by the magnet moving away from the window/door sensor and generates an alarm signal. The base unit then sends an alarm signal to the host system that the cover of the auxiliary unit has been opened and the host system notifies the user associated with that portable security system. In an aspect, the auxiliary unit is a battery pack.
- In an aspect, the base unit includes a tamper sensor that provides a signal in response to the base unit being removed from a surface on which it is mounted. The base unit responds to this signal and sends a tamper alarm to the host system and then the host system notifies the user associated with that portable security system of the tamper condition. In an aspect, this surface is a surface of an asset being monitored by the portable security system. In an aspect, the base unit includes a window/door sensor, a vibration sensor and a temperature sensor.
- In an aspect, the auxiliary unit includes an actuator for the tamper sensor so that the tamper sensor is operative when the base unit is mated in the auxiliary unit and the auxiliary unit is mounted on the surface. When the auxiliary unit is removed from the surface, the tamper sensor actuator in the auxiliary unit actuates the tamper sensor so that the tamper sensor generates the signal indicating that the auxiliary unit has been removed from the surface. In an aspect, the auxiliary unit may be a battery pack or a motion detector.
- In an aspect, the host system can be utilized by multiple users to manage portable security systems associated with the respective users. In an aspect, each user can assign any of the portable security systems associated with that user to a group and also have multiple groups. The user can then configure as a group the portable security systems assigned to a group. The user configures the settings for the desired group which results in the settings for all the portable security systems assigned to that group being configured according to the group settings.
- In an aspect, the host system notifies a user(s) of an alarm condition(s) by calling one or more contact number(s) designated by the user(s) during configuration of the portable security system(s), sending an e-mail to one or more e-mail address(es) designated by the user(s) during configuration of the portable security system(s), or both. In an aspect, the system does so sequentially by attempting to call each contact one at a time and calling the next contact if the first contact does not answer.
- The drawings described herein are for illustration purposes only and are not intended to limit the scope of the present disclosure in any way.
-
FIG. 1 is a block diagram of a base unit of a portable security system; -
FIG. 2A is a top perspective view of the base unit ofFIG. 1 with the top being transparent; -
FIG. 2B is a top view of the base unit ofFIG. 1 ; -
FIG. 3 is a bottom view of the base unit ofFIG. 1 ; -
FIG. 4A is a top perspective view of an auxiliary battery unit in an open condition; -
FIG. 4B is a bottom view of the auxiliary battery unit ofFIG. 4A in a closed condition; -
FIG. 5A is a top perspective view of an auxiliary motion detector unit; -
FIG. 5B is a bottom view of the auxiliary motion detector unit ofFIG. 5A ; -
FIG. 6 is a system diagram of an asset monitoring system with a portable security system; -
FIG. 7 is a simplified flow chart showing an enable sequence for the portable security system ofFIG. 1 ; -
FIG. 8 is a simplified schematic of an enable/disable circuit of the portable security system ofFIG. 1 ; -
FIG. 9 is a simplified flow chart showing a disable sequence for the portable security system ofFIG. 1 ; -
FIGS. 10A-10O are exemplar web pages of a web aspect of a management site for managing portable security systems ofFIG. 1 ; -
FIGS. 11A and 11B are maps showing the location (present and historical) of a portable security system ofFIG. 1 ; and -
FIG. 12 is a flow chart of an illustrative routine for operation of the asset monitoring system ofFIG. 6 . - The following description is merely exemplary in nature and is not intended to limit the present disclosure, application, or uses. It should be understood that throughout the drawings, corresponding reference numerals indicate like or corresponding parts and features.
-
FIG. 1 is a block diagram of aportable security system 100 in accordance with an illustrative aspect.Portable security system 100 communicates via wireless communication with server(s) and communicates conditions, such as alarm conditions, to the server(s) and can be programmed by the server. The wireless communication used may illustratively be cellular communication. It should be understood that while the following description references cellular communication, other wireless communication may also be used, such as VHF, UHF, satellite, 802.11(b) (and similar communications). A user can interface with the server via the Internet or phone to manage portable security system 100 (e.g., configure it and to receive information fromportable security system 100, such as alarms.) -
Portable security system 100 includes abase unit 101.Base unit 101 includes acontroller 102 coupled to acellular module 104, a global positioning system (GPS) module 106, one ormore sensors 108,battery 110,speaker 112 and anaccessory port 114. In an illustrative embodiment, GPS module 106 is an assisted GPS module 106. In an illustrative aspect,battery 110 is a lithium ion battery and abattery heater 116 is coupled tobattery 110 andcontroller 102. GPS module 106 is coupled to aGPS antenna 118 andcellular module 104 is coupled tocellular antenna 120. The foregoing components are disposed in a housing, such ashousing 200 shown inFIGS. 2A and 2B . Sensor(s) 108 may include a temperature sensor (or sensors) 124, a window/door sensor (or sensors) 126, a tamper sensor (or sensors) 128, and a vibration sensor (or sensors) 130. It should be understood that sensor(s) 108 can include other types of sensors as well. For example, sensor(s) 108 can include water, light, RF, CO2, magnetism, earth magnetic field (e.g., compass), gyroscopic, accelerometer, sensor mat, loss of charger power, vehicle buss communications (e.g., OBD-II), and the like. - Temperature sensor(s) 124 may illustratively be a thermistor, window/door sensor(s) 126 may illustratively be a magnetic sensor (such as a hall effect transducer or reed switch), tamper sensor(s) 128 may illustratively include a magnetic sensor and plunger assembly, as described below, and vibration sensor(s) 130 may illustratively be a cantilever-type vibration sensor, such as a
Minisense 100 Vibration Sensor available from Measurement Specialties, Inc., 1000 Lucas Way, Hampton, Va. 23666. It should be understood that thesensors sensors door sensor 126 may illustratively be a magnetically actuated reed switch; andtamper sensor 128 may illustratively be a push button switch. -
FIGS. 2A and 2B show an illustrative embodiment ofbase unit 101 ofportable security system 100. In the embodiment shown inFIGS. 2A and 2 b,housing 200 has a small footprint, approximately the size of two decks of cards.Housing 200 may, for example, illustratively have a length of 111 mm, a width of 88 mm and a height of 32 mm.Base unit 101 can connect, such as viaaccessory port 114, with auxiliary devices, examples of which are discussed below, to provide additional capability forportable security system 100. Also,accessory port 114 provides connections for a conventional charger 232 (FIG. 2 ), which may be an A/C charger, DC charger, vehicle charger, solar charger, or other known type of charger that provides a requisite source of DC power tobase unit 101. - A printed
circuit board 202 is mounted withinhousing 200.Controller 102,cellular module 104,cellular antenna 120, GPS module 106,GPS antenna 118,accessory port 114, and associated electronic components are mounted on printedcircuit board 202. Anelectromagnetic shield 204, such as a metal can, is mounted on printedcircuit board 202 over RF circuits.Accessory port 114 may illustratively be a 7 pin mini-DIN connector.Battery 110 may illustratively be a lithium ion battery and in the embodiment shown inFIGS. 2A and 2B , illustratively includes two lithiumion battery cells 206. In the embodiment shown inFIGS. 2A and 2B ,GPS antenna 118 andcellular antenna 120 are shown mounted vertically on printedcircuit board 202. It should be understood that one or both ofGPS antenna 118 andcellular antenna 120 can be mounted horizontally on or with respect to printedcircuit board 202. -
Speaker 112 is disposed inhousing 200 and has lead wires (not shown) that connect to a connector 207 on printedcircuit board 202. -
Housing 200 includes one or more features used to mounthousing 200 on an asset to be protected or in an area to be protected or monitored. These mounting features may illustratively include one or more mountingmagnets 208 disposed inhousing 200. In the illustrative embodiment shown inFIGS. 2A and 2B , mountingmagnets 208 are disposed inrecesses 210 on opposite sides ofhousing 200 that illustratively open out of a bottom 300 (FIG. 3 ) ofhousing 200 with magnet(s) 208 flush, or virtually flush, with thebottom 300 ofhousing 200. These features may also, or alternatively, include one or more screw holes 212 inhousing 200. In the illustrative embodiment shown inFIGS. 2A and 2B ,housing 200 includes ascrew hole 212 on each of the right and left sides (as oriented inFIGS. 2A and 2B ) ofhousing 200. - In use,
base unit 101 ofportable security device 100 is mounted, such to an asset to be protected, usingmagnets 208 and/or screws (not shown) placed through screw hole(s) 212. For example, ifbase unit 101 is to be mounted on a metal tool box or metal tool cabinet,magnets 208 can be used to holdbase unit 101 to the asset. Ifbase unit 101 is to be mounted on a wood tool cabinet, screws can be inserted intoscrew holes 212 and tightened to affixbase unit 101 to the asset. In some cases,base unit 101 can simply be placed on top of the asset, such as on the top surface of a tool box. - In the illustrative embodiment shown in
FIGS. 2A , 2B & 3,tamper sensor 128 includes a magnetic sensor, such as a hall effect transducer, mounted withinhousing 200, such as on printedcircuit board 202, and a plunger or pin assembly 302 (FIG. 3 ) disposed in an outwardly openingrecess 304 inbottom 300 ofhousing 200. Plunger orpin assembly 302 includes a pin orplunger 306, a compression spring and a magnet (not shown). Thepin assembly 302 is disposed inhousing 200 so that thepin 306 extends out of the bottom 300 ofhousing 200 whenhousing 200 is not mounted and is pushed up intohousing 200 whenhousing 200 is mounted to an asset. Ifhousing 200 is removed from the asset, the pin of the pin assembly springs out changing the location of the magnet with respect to the magnetic sensor and changing the magnetic field at the magnet sensor (i.e., bringing it closer to or further away). The change in magnetic field causes the magnetic sensor to provide a signal tocontroller 102 indicative of the plunger extending from thebottom 300 ofhousing 200. This causescontroller 102 to determine that a tamper condition occurred, and it generates a tamper alarm as discussed in more detail below.Recess 304 is illustratively molded in an outer wall ofhousing 200 so that material ofhousing 200 is betweenpin assembly 302 and the inside ofhousing 200. This facilitates makinghousing 200 watertight without the need to provide a seal aroundpin assembly 302. - To provide
portable security system 100 with additional functionality yet enablebase unit 101 to remain small,base unit 101 is adapted to interface with accessory units, such as auxiliary battery unit 400 (FIGS. 4A and 4B ) and motion detector 500 (FIGS. 5A and 5B ). For example, with reference toFIGS. 4A and 4B ,auxiliary battery unit 400 includes housing 402 having a base 404 and a hingedcover 406.Base 404 includes abattery compartment 408 in whichbattery cells 410, illustratively 4 D size alkaline battery cells, are received.Base 404 also includes areceptacle 412 for receivingbase unit 101 and a connector (not shown) that mates withaccessory port 114 ofbase unit 101 to electrically connectbattery cells 410 tobase unit 101.Base 404 and hingedcover 406 of housing 402 ofauxiliary battery unit 400 including correspondinglatch elements 414 that, when hingedcover 406 is closed overbase 404 engage to latch hingedcover 406 tobase 404 in a closed position.Base 404 of housing 402 also includes a movable pad 416 (FIG. 4B ) disposed in abottom 418 ofhousing base 404 that contacts pin 306 ofpin assembly 302 oftamper sensor 128 whenbase unit 101 is disposed inreceptacle 412 ofbase 404. Movable pad 416 provides an extension forpin 306 enablingtamper sensor 128 to work whenbase unit 101 is received inauxiliary battery unit 400. Movable pad 416 may illustratively be spring loaded. - With reference to
FIG. 5 , auxiliarymotion detector unit 500 includes ahousing 502 having areceptacle 504 for receivingbase unit 101.Motion detector 500 may illustratively be a passive infrared radiation motion detector.Housing 502 may illustratively include screw holes 506 for mounting motion detector unit such as to a wall of a room to be monitored by tightening screws (not shown) inserted intoscrew holes 506 into the wall.Housing 502 includes a connector (not shown) that mates withaccessory port 114 ofbase unit 101 to electrically connectmotion detector unit 500 tobase unit 101. In this aspect,motion detector unit 500 is physically electrically connected tobase unit 101 throughaccessory port 114, as opposed to wirelessly connected.Housing 502 also includes amovable pad 508 in abottom 510 ofhousing 502 similar to movable pad 416 ofauxiliary battery unit 400 that provides an extension forpin 306 enablingtamper sensor 128 to work whenbase unit 101 is received inreceptacle 504. -
Portable security system 100 has one or more of the following features. It does not have any physical on/off switch or button accessible on the outside ofbase unit 101. It can be activated, deactivated, and configured or programmed only through wireless communications throughcellular module 104. Management (e.g., activation, deactivation, configuration and/or messaging) is via a server that a user can communicate with via the Internet or by phone (e.g., by an interactive voice response system). - With reference to
FIG. 6 , the operation ofportable security system 100 is generally described with reference to anasset 600 to be protected.Portable security system 100 is appropriately located, such as by placingbase unit 101 onasset 600.Asset 600 may illustratively be a metal tool box and mountingmagnets 208hold base unit 101 in place on the tool box. Onceportable security system 100 is activated and configured, as described below, it monitorsassets 600 viasensors 108. Upon detecting an alarm condition via one ofsensors 108,portable security system 100 sends an alarm message via cellular communication toserver 602, which is illustratively a remotely located host system, and, if configured to do so, also sounds an audible alarm withspeaker 112.Server 602 may use any or all of three types of cellular communication protocols including Cellemetry®, 1X RTT, and short message service (SMS). Cellemetry may also be used byportable security system 100 to send alarm information using the control channel.Server 602 sends the alarm message (either as a pass through or as may be formatted by server 602) to appropriate contacts that are illustratively input intoserver 602 for eachportable security system 100 when thatportable security system 100 is configured (or reconfigured) by a user. In an aspect,server 602 can call one or more phone numbers (shown illustratively by cell phone 604) input intoserver 602 by the user of theportable security system 100 to provide a phone notification of the alarm.Server 602 can also send an e-mail notification of the alarm to one or more e-mail address(es) input intoserver 602 by the user of theportable security system 100 during configuration (shown illustratively by computer system 606).Server 602 can also send the alarm message, such as via phone, e-mail or text message to the appropriate authorities (shown illustratively by police unit 608). Illustratively,server 602 also logs the alarm which can be accessed on a web page, by phone via a voice menu, and/or text via a text message menu. In an aspect, the alarm message may illustratively include a location ofportable security system 100 as determined using GPS module 106. In an aspect,server 602 uses the last location of theportable security system 100, such as may have been obtained by a “locate” function and the alarm message sent by theportable security system 100 does not include location information. - As discussed,
sensors 108 may includetemperature sensor 124, window/door sensor 126,tamper sensor 128 andvibration sensor 130.Sensors 108 may also include other types of sensors as discussed above. In the event thatcontroller 102 based on an input fromtemperature sensor 124 determines that a temperature whereportable security system 100 is located is over or under temperature,controller 102 sends a temperature alarm message via cellular communication usingcellular module 104 toserver 602 that the temperature is out of range. In the event thatcontroller 102 determines that a window or door has opened based on an input from window/door sensor 126,controller 102 sends an window/door open alarm message toserver 602 that the window or door has been opened. Similarly, ifcontroller 102 determines thatbase unit 101 has been removed fromasset 600 based on an input fromtamper sensor 128, it sends a tamper alarm message toserver 602 thatportable security 100 has been tampered with. Ifcontroller 102 determines thatasset 600 is being moved such as based on an input fromvibration sensor 130,controller 102 sends a vibration alarm message toserver 602. Ifportable security system 100 includesauxiliary motion detector 500, andcontroller 102 determines that movement has occurred based on an input fromauxiliary motion detector 500, it sends an intrusion alarm message toserver 602.Controller 102 may also sound an audible alarm in each case where it sends an alarm message toserver 602. It should be understood thatportable security unit 100 is user configurable, via wireless programming as discussed below, to set whichsensors 108 are active.Controller 602 will send alarm messages toserver 602 only in response to an appropriate input from a sensor that is configured as active. Similarly,portable security unit 100 is user configurable, via wireless programming as discussed below, to set which alarm conditions will also result incontroller 102 sounding an audible alarm withspeaker 112. In some cases, it may be desirable that an audible alarm not be sounded upon controller detecting an alarm condition where it sends an alarm message toserver 602. For example, whenportable security system 100 is utilizingauxiliary motion detector 500 to monitor an area, to avoid alerting intruders that their presence has been detected,portable security system 100 may be configured so that upon detecting motion,controller 102 sends an intrusion alarm message toserver 602 but does not sound an audible alarm. - In an aspect, window/
door sensor 126 is a magnetic sensor, such as a hall effect transducer, disposed inhousing 200, such as on printed circuit board 202 (FIGS. 2A & 2B ). A magnet, shown representatively bybox 214 inFIG. 2B , is then disposed on the window or door of the asset to be protected so that it is adjacent window/door sensor 126 when the window or door is closed. When the window or door is opened, the hall effect transducer senses the change in magnetic field and provides a corresponding signal tocontroller 102, which determines that the window or door has been opened.Controller 102 then sends an alarm message toserver 602 indicating that the window or door has been opened andserver 602 sends an alarm message to a user associated with theportable security system 100, such as in the manner described below. - In an aspect, window/
door sensor 126 can also be used to indicate a tamper condition of an auxiliary device, described usingauxiliary battery unit 400 as an example. In this example, window/door sensor 126 is a magnetic sensor, such as a hall effect transducer. Hingedcover 406 ofauxiliary battery unit 400 has amagnet 409 mounted thereon. When hingedcover 406 is closed,magnet 409 is adjacent window/door sensor 126 ofbase unit 101, such as by being received in arecess 417 ofhousing base 404 of housing 402 ofauxiliary battery unit 400. When hingedcover 406 is opened, window/door sensor 126 responds to the change in magnetic field and providescontroller 102 of base unit 101 a signal indicative of the magnet moving away from window/door sensor 126. This causescontroller 102 to determine that a tamper condition occurred, and it generates a tamper alarm. In this illustrative aspect,controller 102 determines that the tamper condition ishousing cover 406 being opened and sendsserver 602 an tamper condition alarm message indicating that hingedcover 406 had been opened.Server 602 sends an alarm message to the contact(s) designated for thatportable security system 100 indicating that the hingedcover 406 of the auxiliary battery unit had been opened. - In an aspect,
portable security system 100, after it is assembled at the factory, is provisioned with that data necessary for testing it and then tested. In an aspect, it is also provisioned prior to shipment with the parameters needed for operation. In an aspect,portable security system 100 is then shipped from the manufacturer in a disabled state withbattery 110 partially charged. In an aspect, in the disabled state,battery 110 can't be charged andportable security system 100 can't send cellular messages (e.g., sending of 1XRTT messages is disabled).Portable security system 100 must then be enabled by the user. An illustrative process of enablingportable security system 100 is described with reference toFIG. 7 . To do so, a user connectsportable security system 100 at 700 to a source of power, such as AC charger 232 (FIG. 2A ) or to auxiliary battery unit 400 (FIG. 4 ). This “wakes up”portable security system 100 where it can “listen” for cellular messages (e.g., receive cellular messages them) but not transmit them. At 702, the user accesses amanagement site 610 operated by a service provider, illustratively hosted byserver 602. Illustratively, themanagement site 610 includes a web site, ahome page 1000 for which is shown inFIG. 10A , that the user can access via the Internet where the user can manage and configure theportable security system 100. Themanagement site 610 may also illustratively be accessible by calling a customer service number, which may illustratively connect the user to an interactive voice response system through which the user can register and configure theportable security system 100. The user then registersportable security system 100 at 704, which may illustratively require the user to enter an electronic serial number (which may be referenced as MSIN in the drawings) and the unit number (cell phone number) of thebase unit 101 of theportable security system 100, which are assigned by the manufacturer or seller ofportable security system 100 in much the same way that a cell phone's electronic serial number and phone number are assigned. The user also identifies the account with whichportable security system 100 is associated and selects a monitoring plan for theportable security system 100. In this regard, if there is no account set-up for thatportable security system 100, the user will also need to set an account up. In an aspect, this requires the user to provide a credit card number against which the fees, such as monthly fees, for thatportable security system 100 are charged. In this regard, the service provider may offer a variety of monitoring plans and the user can select which monitoring plan the user wants for eachportable security system 100 that the user has (e.g., self monitored, fully monitored). This process ensures that billing information for theportable security system 100 is provided by the user beforeportable security system 100 is enabled. -
Server 602 then enables thebase unit 101 of theportable security system 100 at 706.Base unit 101 ofportable security system 100 is shipped from the manufacturer in a disabled state. By disabled, it is meant thatbattery 110 is partially charged and provides power only to those components of components ofbase unit 101 that are involved in switching from enabled to disabled states. As shown representatively by the simplified schematic ofFIG. 8 ,battery 110 is connected tocontroller 102 andbattery heater 116. Upon receipt of an enable command fromserver 602, providedaccessory port 114 ofbase unit 101 is connected to a source of DC power, such asAC charger 232,controller 102 putsbase unit 101 in an enable condition by closingswitch 800 connectingbattery 110 toaccessory port 114 and to the remainder of the components ofbase unit 101. It should be understood thatswitch 800 is representative of the circuit that enables and disablesbase unit 101, which may include various circuit topologies as known in the art.Battery 110 is charged by the source of DC power connected toaccessory port 114, such asAC charger 232. - With reference to
FIG. 9 , a user can disablebase unit 101 ofportable security system 100, putting it back into the same condition as when it left the manufacturer. To do so, the user accesses the management site (such as may be hosted by server 602) and at 900, selects theportable security system 100 to be disabled.Server 602 then sends a disable command to thebase unit 101 of theportable security system 100 to be disabled. Upon receipt of the disable command,controller 102 opens switch 800 (FIG. 8 ) puttingbase unit 101 in the disabled state. - Management of a
portable security system 100 viamanagement site 610 is discussed with reference to the pages of the web site ofmanagement site 610.Portable security system 100 can also be managed by calling the customer service number formanagement site 610 and accessing it via the interactive voice response system, although some features, such as map location display, may not be suitable for phone communication and may thus be available only on the website. The user accesses a logon page (not shown) of thewebsite management site 610 and logins which takes the user to a home page ofmanagement site 610 that is provisioned for that user, referred to herein as Units—AccountsSummary page 1000. All theportable security systems 100 associated with that user are shown on User—AccountsSummary home page 1000, along with various buttons (e.g., arm, locate, request status, settings) for selecting functions to manage theportable security systems 100 and links (shown along the left hand side of the page) that the user can select to manageportable security systems 100. Also, if theseportable security systems 100 are also associated with groups, they will by shown by group. Also, the links are typically displayed along the left hand side of each of the sub pages as can be seen fromFIGS. 10B-10O . In this regard, the links displayed along the left hand side of each page may vary depending on the page. - If the user wishes to enter or update the user's profile, the user selects “user profile” link under the Users heading. This takes the user to the Users—User Profile page 1002 (
FIG. 10B ). The user profile information that the user can enter or update onpage 1002 includes the user's e-mail address, the user's phone menu login, and the user's web password. It also includes fields where the user can globally set certain display settings for theportable security systems 100 associated with the user, such as temperature scale, whether the units are identified by name or serial number, time zone, and whether the time zone follows daylight savings time. - If the user selects the “suggestion box” link under the Admin heading, the user is taken to “Comment/Suggestion” page 1004 (
FIG. 10C ) where the user can input suggestions or comments intext box 1006 and submit them by clicking the “submit”button 1007. - If the user selects the “customize units” link, the user is taken to the Unit Settings/Unit History page 1008 (
FIG. 10D ). The user selects aportable security system 100 such as by the name assigned to the portable security system, illustratively shown as “Office Trailer” inFIG. 10D in the Unit Settings segment ofpage 1008. Under “Sensors,” the user can then select which sensors of the selectedportable security system 100 are to be active and which are not by checking or unchecking the box next to each sensor. Certain sensors may include parameters that the user can also set, such as the sensitivity level and pulse count for vibration sensor 130 (FIG. 1 ). Also, if the sensor is of the type that can trigger an alarm on either or both a high and low reading, the user can set whether the portable security system alarms on a high reading, a low reading, or both, and the setting for the alarm. For example,temperature sensor 124 can trigger a high temperature alarm in the event of sensing temperature at or above a high temperature setting, a low temperature alarm in the event of sensing temperature at or below a low temperature reading, or both. The user can set by checking the appropriate box whether the selectedportable security system 100 triggers an alarm based on a high temperature, based on a low temperature, or both. The user can also set the high temperature limit and the low temperature limit. Theportable security system 100 will then respond only to those sensors that have been made active in generating alarm messages. After checking or unchecking the boxes for the various sensors and setting sensor parameters as appropriate, the user clicks the “update” button to send the updated sensor configuration to the selectedportable security system 100. Upon receipt of the updated sensor configuration fromserver 602,controller 102 of thebase unit 101 of the selectedportable security system 100 updates accordingly. - Under Speaker, the user can select by checking the appropriate box whether the selected portable security system will sound an audible alarm or message using speaker 112 (
FIG. 1 ) upon the occurrence of a particular event, such as an alarm. After doing so, the user clicks the “Update” button under Speaker to send the updated speaker configuration to the selectedportable security system 100. Upon receipt of the updated configuration fromserver 602, thecontroller 102 of thebase unit 101 of the selectedportable security system 100 updates accordingly. -
Page 1008 also displays the Unit History for the selectedportable security system 100 in the “Unit History” box. This is a log of the events for the selectedportable security system 100, such as alarm messages, page events, etc. -
Page 1008 also displays the arm/disarm status of the selectedportable security system 100, which the user can obtain by clicking “Status”button 1010. It also allows the user to arm and disarm the selectedportable security system 100 by clicking the arm and disarmbuttons portable security system 100 is armed, it will, upon receiving an appropriate input from an active sensor, generate a corresponding alarm message that it sends out as discussed above. When the selectedportable security system 100 is disarmed, it won't generate an alarm message or sound an audible alarm. - The “Page”
button 1016 is used to turn the “Page” function on (indicated by “+” on the button) and off (indicated by (−) on the button. When the page function of the selectedportable security system 100 is on, the selectedportable security system 100 emits a sound fromspeaker 112 so that those in the vicinity of the selectedportable security system 100 can locate it by the sound emanating from itsspeaker 112. The “Page” function can be advantageously used to locate assets, such as a particular tool, on a jobsite. Thebase unit 101 of aportable security system 100 is attached to the asset and when personnel on the jobsite need to locate that asset, they can turn the “Page” function for thatportable security system 100 on and use the sound emanating from the speaker of thatportable security system 100 to locate the asset. In an aspect, aportable security system 100 having its Page function on emits a sound from its speaker for a period of time, such as sixty seconds. In an aspect, aportable security system 100 having its Page function on emits a sound from itsspeaker 112 until its Page function is deactivated. - A “Locate” button (
FIG. 11A ) actuates the “locate” function for the for the selectedportable security system 100. Clicking the “Locate” button causesserver 602 to send a locate command to the selectedportable security system 100.Controller 102 of the selectedportable security system 100 responds to the locate command by obtaining information about its location, such as from GPS module 106. This information may illustratively be the latitude and longitude of the portable security system. Thecontroller 102 of the selectedportable security system 100 can also obtain location information fromcell towers 612, which allows thecontroller 102 to obtain location information should its view ofGPS satellites 614 be blocked, such as may be the case ifbase unit 101 of theportable security system 100 is in an indoor location.Controller 102 then sends the location information back toserver 602 via cellular communication.Server 602 then provides the location information to the user. In this regard,server 602 may determine or obtain an address corresponding to the longitude and latitude of theportable security system 100, such as by accessing a map database.Server 602 may illustratively send the location information to the user's phone or e-mail address.Server 602 may also make the location information available to the user via phone access, such as using the IVR. It may also make the location available on themanagement site 610 hosted byserver 602. In an aspect,server 602 maps the location information on a map, such as shown inFIGS. 11A & 11B .Test button 1019 can be clicked to test theportable security system 100. - If the user clicks the “Add a New Unit” link under the Units heading, the user is taken to Units—Add a New Unit page 1020 (
FIG. 10E ). The user can then add newportable security systems 100 by inputting their ESNs in the boxes. - Clicking the “Update Alarm Contacts” link takes the user to “Units—Update Alarm Contacts” page 1022 (
FIG. 10F ).Page 1022 is used to designate the contact information for the selectedportable security system 100 where messages, such as alarm messages, are to be sent. In the illustrative embodiment shown inFIG. 10F , up to three e-mail addresses for contacts for e-mail messages can be designated and up to three phone numbers for contacts for phone message, such as alarm messages, can be designated. Each e-mail and phone number contact field has associated with it boxes that are checked or unchecked to indicate when an e-mail message is sent to the e-mail address or a phone call made to the phone number. In the embodiment shown inFIG. 10F , if the “alarm” box is checked, thenserver 602 sends an alarm e-mail message or phone call is made in the event when theportable security system 100 generates an alarm message. If the “low battery” box is checked, thenserver 602 sends a low battery message or phone call is made in the eventportable security system 100 generates a low battery message. If the “full battery” box is checked, thenserver 602 sends a full battery e-mail message or phone call is made in the eventportable security system 100 generates a full battery message. In an illustrative aspect,server 602 tries to call the first designated phone number and if unsuccessful, then tries the next designated phone number. In a variation,server 602 tries to call all the designated phone numbers. In a variation,server 602 sends an e-mail message to all the designated e-mails. - In this regard, in an aspect, the contact information includes prioritization information and
server 602 sends a notification message to one or more of the contacts based on the prioritization information. In an aspect,server 602 sends the notification messages to the contacts based on priority order withserver 602 sending the notification message to the next lower priority contact only ifserver 602 receives no response from the contact to which it sent the notification message. - In an aspect, the alarm message is one of a plurality of different types of alarm messages and the contact information set in
server 602 includes contact information for a plurality of contacts forserver 602 to contact upon receipt of the alarm message wherein different contacts are associated with different ones of the different types of alarm messages.Server 602 sends a notification message upon receipt of the alarm message to the contact associated with the type of alarm message that corresponds to the received alarm message. - With reference to
FIG. 10G , thename unit page 1024 take provides for changing the name of a selectedportable security system 100. Nameunit page 1024 is accessed via selecting a unit on page the Units Settings/Unit History page 1008 (FIG. 10D ). - Clicking the “Arm Schedule” link takes the user to Arm/Disarm schedule page 1026 (
FIG. 10H ). In the illustrative embodiment shown inFIG. 10H , a user can select aportable security system 100 and set a schedule (by days of the week or daily) of the time(s) of day when the selectedportable security system 100 is armed and when it is disarmed. After setting the schedule, clicking the “Update” button causesserver 602 to send the schedule to the selectedportable security system 100. Upon receipt of the schedule, thecontroller 102 of the selectedportable security system 100 sets the arm/disarm schedule accordingly and arms and disarms theportable security system 100 according to the schedule. - Clicking the “Maintain Users” link takes the user to Add/Update Users page 1027 (
FIG. 10I ). The user can then add a new user or update information for a user. Depending on the privileges that the user has, the user can add a new user or update information for a user. For example, a user having administrative privileges for an account can add a user for that account or change information about the users for that account. A user not having administrative privileges for an account would be able to change only the information for that particular user. - In aspect,
management site 610 provides for multiple levels of authority. That is, personnel who have access tomanagement site 610 are provided various levels of authority with regard to which functions ofmanagement site 610 that they can access or use. In an aspect, levels of authority include customer service support which provides customer support personnel of the provider that managesmanagement site 610 access to all accounts for troubleshooting, and a “super user” that provides rights in addition to those provided customer service support personnel. For end users, e.g., users associated withportable security systems 100, three levels of authority are provided in an aspect. These are “Account Owner,” “Master User,” and “User.” - In an aspect, there is one Account Owner per account and the Account Owner has access to all functions for the
portable security systems 100 associated with that account as well as functions associated with the account. The Account Owner sets up the account, manages the payments for the account, and has authority to set up Master Users and Users. - In an aspect, there can be an unlimited number of Master Users for each account. A Master User has access to all functions for the
portable security systems 100 associated with the account. A Master User can purchase locates for the account using his/her credit card, such as by clicking the “Purchase Locates” link. A Master User can set up other Master Users and Users. - In an aspect, there can be an unlimited number of Users for each account. In an aspect, a User has access only to the arm and disarm functions for the
portable security systems 100 associated with the account. It should be understood that the lower case term “user” is used herein to refer to an person having access tomanagement site 610 regardless of the level of authority assigned to that person while the capitalized term “User” is used herein to refer to a user ofmanagement site 610 assigned the “User” level of authority. - The “Accounts” link and sublinks thereunder take a user to pages used to set up and manage accounts. Again, the access to these pages and functions available thereon depends on the level of authority assigned to the user.
- Clicking the Account Maintenance link takes the user to Account page 1028 (
FIG. 10J ), where the user can assign a name to an account. This again requires that the user have the appropriate privileges. - Clicking the “Account Selection” link on
home page 1000 takes the user to Account Selection page 1030 (FIG. 10K ). In an aspect, access to this page is restricted to users who have customer service support authority or “super user” authority. This page allows the user to select an account for which information pertain to the account is then displayer to allow the user to troubleshoot any problems associated with the account or the like. - In addition to managing
portable security systems 100 individually by selecting eachportable security system 100,portable security systems 100 assigned to an account can be managed by groups. That is, individualportable security systems 100 can be assigned to a group and thatportable security systems 100 assigned to that group managed collectively. For example, a group may be set up for allportable security systems 100 that are at single location, with a different group being set up for different locations. The different locations may, for example, be different jobsites with one group being for one jobsite and a second group being for a different jobsite. A group can also be created so that all of the features for theportable security systems 100 in the group can be set at the same time. In an aspect, the features available for groping are arm, disarm, create schedule, change sensor settings and change speaker settings. - Clicking the “Group Management” link takes the user to “Group” page 1032 (
FIG. 10L ). The user can select or add a group, specify the group name and, if applicable, IVR tag name, and assign theportable security systems 100 associated with the account to the group. In this regard,Group page 1032 may, in an aspect, list all theportable security systems 100 associated with a user either as being assigned to the selected group (listing them in the “Assigned” column) or not assigned to it (listing them in the “Unassigned” column). The user can then by using arrows 1034, 1036 move theportable security systems 100 between the Assigned and Unassigned columns to assign them to the selected group or remove them from the selected group. - Clicking the “Customize Group” link takes the user to the “Customize Group” page 1038 (
FIG. 10M ). This page is similar to the Unit Settings/Unit History page 1008 (FIG. 10D ) except that it pertains to all theportable security systems 100 assigned to the selected group as opposed to an individualportable security system 100. The user selects which sensors are to be active and sets the sensor parameters as appropriate. After doing so, the user clicks update andserver 602 then sends these configuration settings to eachportable security system 100 assigned to the selected group. The user can also select the speaker settings. Thecontrollers 102 for each of theseportable security systems 100 then update the configurations of theportable security systems 100 accordingly. The user can also arm and disarm theportable security systems 100 assigned to the selected group by clicking the Arm and Disarm buttons. - Clicking the “Group Schedule” link (
FIG. 10A ) takes the user to a group arm/disarm schedule page 1040 (FIG. 10N ). Group arm/disarmschedule page 1040 is similar to arm/disarm schedule page 1026 (FIG. 10H ) except that it applies to all theportable security systems 100 assigned to the selected group as opposed to an individualportable security system 100. The user sets a schedule (by days of the week or daily) of time(s) of day when the group is to be armed and disarmed. After setting the schedule, clicking the “Update” button causesserver 602 to send the schedule to theportable security systems 100 assigned to the selected group. Upon receipt of the schedule, thecontrollers 102 for theportable security systems 100 assigned to the selected group set the arm/disarm schedule for their respectiveportable security system 100 accordingly and arm and disarms their respectiveportable security system 100 according to the schedule. - Clicking the “Event History” button under Reports takes the user to a report page 1042 (
FIG. 10O ). After selecting a portable security system 100 (or group) from the pick list, the user enters the parameters for the report in the appropriate fields and clicks the “search” button. A report of the events for the selected portable security system 100 (or group) within the selected parameters is then displayed, similar to Unit History report shown onFIG. 10D . - The
base unit 101 of aportable security system 100 can advantageously be used to monitor the temperature in the area around the base unit and when the temperature is out of range, cause a user to be alerted, such as byserver 602 calling a number assigned by the user or sending an e-mail to an e-mail address assigned by the user, such as has been described above with reference to the contacts for unit page 1022 (FIG. 10F ). The user sets the temperature thresholds (High, Low, or both) such as described above with reference to Unit Status—Customize page 1008 (FIG. 10D ). When the temperature exceeds the High temperature limit or drops below the Low temperature limit (as applicable),controller 102 of thebase unit 101 sends out an alarm message toserver 602 that the temperature is above or below, as applicable, the High or Low temperature limit andserver 602 notifies the user associated with theportable security system 100 as described above. Thebase unit 101 of aportable security system 100 can thus be used in monitoring temperature such as where concrete is curing so that if the temperature goes out of a range, the associated user is timely notified so that the user can timely take appropriate action to resolve the problem. - Assuming a successful location function has been performed for a, clicking the Location History link takes the user the user to a page displaying a map, such a satellite image map as shown in
FIG. 11A or a street map as shown inFIG. 11B , of the geographic area in which theportable security system 100 is located with an indication on the map where theportable security system 100 is located. The latitude, longitude and address of the location of the selectedportable security system 100 are also displayed along with the date. History location may also be displayed, as shown in the illustrative embodiment shown inFIG. 11 . - With reference to
FIGS. 6 and 12 , an illustrative routine for the operation of an asset monitoring system 616 havingportable security system 100 andserver 602 is described. It should be understood that while the operation of asset monitoring system 616 is described with reference to oneportable security system 100 and associated user, it should be understood that asset monitoring system 616 provides for multiple users and multipleportable security systems 100 for each user, as discussed above with reference toFIGS. 10A-10O . - At 1200,
portable security system 100 is powered up and goes through an initialization self-check. At 1202, the settings ofportable security system 100 such as sent byserver 602 are made active and in an illustrative aspect,speaker 112 chirps to signify thatportable security system 100 is armed. At 1204, a check is made whethertamper sensor 128 has been tripped. If so, and if the configuration setting for a tamper condition was set to sound an audible alarm, an audible tamper alarm is sounded at 1208 usingspeaker 112 and a call initiated toserver 602 at 1210 and status information sent toserver 602 at 1212. It should be understood that the audible alarm can be a unique sound for each type of alarm. The status information can include one or more of the following: - Identification Number of the
Portable Security System 100 - Armed/Disarmed status
- Tamper
- Time of Day (clock)
- Time to Arm
- Time to Disarm
- Temperature
- Cell Signal Strength
- Battery Charge Level
- Charging or Not
- Last GPS Coordinates
- Passive Infrared (motion) Activity
- Vibration Activity
- Siren Active/Silent
- Door/Window Activity
- If
tamper sensor 128 is not tripped, a check is made at 1214 whethervibration sensor 130 has detected any vibration activity. If so, the routine proceeds to 1208 as discussed above. - If no vibration activity was detected, a check is made at 1216 whether auxiliary motion sensor 500 (if being used) has detected motion. If so, the routine proceeds to 1208.
- If no motion was detected, a check is made at 1218 whether the temperature as sensed by
temperature sensor 124 is too high or too low (as applicable based on the configuration settings sent by server 602). If so, the routine proceeds to 1208. - If the temperature was not too high or too low, a check is made at 1220 whether
battery 110 is low. If so, a check is made at 1222 whetherbattery 110 is being charged and if not, the routine branches to 1210. - If
battery 110 was not low, a check is made at 1224 whether the battery is being charged. If so, a check is made at 1226 whether the battery is fully charged and if so, the routine branches to 1210. If thebattery 110 is not being charged, or is not fully charged, a check is then made at to see ifcellular module 104 is active. If not, the routine branches to 1204. Ifcellular module 104 is active, the routine branches to 1212. - After status information is sent to
server 602 at 1212 andserver 602 receives it,server 602 sends alarm messages to the contacts set up for thatportable security system 100 as discussed above. In the illustrative operation shown inFIG. 12 ,server 602 calls at 1230 the first phone number for the user associated with theportable security system 100 as set up during configuration of the contacts for thatportable security system 100. If a connection is found to be successful at 1232, the routine branches to 1234 where the user answering the call is connected to the interactive voice response system. If no connection is made, the server tries each programmed number in turn, as representatively shown at 1236 and if a connection is found to be successful at 1238, the routine branches to 1234 as discussed above. If no connection is successful, the routine branches to 1230 and starts again with the first programmed number. - Once a user completes interacting with server, the connection between the
portable security system 100 andserver 602 is terminated and the routine branches back to 1202. - A user can request a status report from the
portable security system 100 by accessingserver 602 by phone at 1242 and being connected to the interactive voice response system, or by accessingmanagement site 610 via the Internet at 1244.Server 602 establishes cellular communication with theportable security system 100 at 1246 and commands a status report from a selectedportable security system 100, which the selectedportable security system 100 sends toserver 602 at 1248. The routine then branches to 1234 as discussed above.
Claims (19)
1. A method of managing a portable security system having a base unit having a housing in which a controller, a wireless transmitter/receiver receiver are disposed, the wireless transmitter/receiver coupled to the controller, the portable security system having a plurality of alarm sensors coupled to the controller, the method comprising:
accessing a host system and setting settings in the host system for which alarm sensors of the portable security system are to be active and which are to be inactive;
sending a configuration message from the host system to the portable security system via wireless communication that includes the set settings to configure the portable security system to set as active the alarm sensors that were set to be active and to set as inactive the alarm sensors that were set to be inactive;
setting with the controller in response to the configuration message the alarm sensors as active that were set to be active and setting the alarm sensors as inactive that were set to be inactive;
responding with the controller only to an alarm sensor that was set as active to generate with the controller an alarm message upon that alarm sensor sensing an alarm condition and providing an alarm signal to the controller and generating an alarm message with the controller in response thereto; and
sending with the wireless transmitter/receiver the alarm message via wireless communication to the host system.
2. The method of claim 1 including accessing the host system and setting parameters for those alarm sensors that require parameters and including the set parameters in the configuration message sent to the portable security system.
3. The method of claim 1 including accessing the host system and setting an arm/disarm status for the portable security system and sending an arm message from the host system to the portable security system via wireless communication to arm the portable security system when the arm/disarm status is set to arm and sending a disarm message from the host system to the portable security system via wireless communication to disarm the portable security system when the arm/disarm status is set to disarm.
4. The method of claim 3 including setting in the host system an arm time and a disarm time for the security system and at the arm time sending the arm message from the host system to the portable security system and at the disarm time sending the disarm message from the host system to the portable security system.
5. The method of claim 1 including accessing the host system and initiating a locate by setting a request locate for the portable security system and sending a locate request message from the host system to the portable security system via wireless communication when the request locate is set, obtaining location information via a global position sensor module and sending the location information via wireless communication with the wireless transmitter/receiver to the host system.
6. The method of claim 1 including managing a plurality of security systems by accessing the host system and setting settings for each of the portable security systems to be configured to set which alarm sensors of each such security system are to be active and which are to be inactive and sending configuration messages to each such security system.
7. The method of claim 6 including accessing the host system and setting parameters for those alarm sensors of each of the portable security systems that require parameters and including the settings for the parameters in the configuration message sent to the portable security system.
8. The method of claim 6 including accessing the host system and setting an arm/disarm status for each of the portable security systems to be armed/disarmed and sending an arm message to each portable security system to be armed via wireless communication to arm that portable security system when the arm/disarm status for that portable security system is set to arm and sending a disarm message to the portable security system via wireless communication to disarm the portable security system when the arm/disarm status is set to disarm.
9. The method of claim 6 including assigning in the host system two or more of the portable security systems to one or more groups and accessing the host system and setting settings for one or more of the groups group to set the settings for each portable security system assigned to each such group and sending configuration messages from the host system to each portable security system assigned to each such group.
10. The method of claim 9 including accessing the host system and setting parameters for those alarm sensors that require parameters for one or more of the groups and including the settings for the parameters in the configuration messages sent to the portable security systems assigned to each such group.
11. The method of claim 6 including assigning in the host system two or more of the portable security systems to one or more groups and accessing the host system and setting arm/disarm statuses for one or more of the groups group to set the arm/disarm status and sending an arm message to each portable security system assigned to each such group when the arm/disarm status for that group is set to arm and sending a disarm message to each portable security system assigned to each such group when the arm/disarm status for that group is set to disarm.
12. The method of claim 1 including setting in the host system contact information for a plurality of contacts for the host system to contact upon receipt of the alarm message, the contact information including prioritization information, the host system sending a notification message to one or more of the contacts based on the prioritization information.
13. The method of claim 12 wherein the host system sends the notification messages to the contacts based on priority order with the host system sending the notification message to the next lower priority contact only if the host system receives no response from the contact to which it sent the notification message.
14. The method of claim 12 wherein the alarm message is one of a plurality of different types of alarm messages, the method including setting in the host system contact information for a plurality of contacts for the host system to contact upon receipt of the alarm message wherein different contacts are associated with different ones of the different types of alarm messages, and the host system sending a notification message upon receipt of the alarm message to the contact associated with the type of alarm message that corresponds to the received alarm message.
15. A method of managing a plurality of portable security systems, each portable security system having a base unit having a housing in which a controller, a wireless transmitter and a wireless receiver are disposed, the wireless transmitter and the wireless receiver coupled to the controller, the portable security system having a plurality of alarm sensors coupled to the controller, the method comprising:
assigning in a host system two or more portable security systems to one or more groups,
setting settings in the host system for one or more of the groups group to set settings for each portable security system assigned to each such group and sending configuration messages from the host system to each portable security system assigned to each such group;
sending a configuration message from the host system to each portable security system assigned to each such group via wireless communication that includes the set settings to configure each portable security system assigned to each such group;
the controller of each portable security system receiving the configuration message configuring its portable security system according to the set settings in the configuration message.
16. The method of claim 15 wherein the alarm sensors include a plurality of types of alarm sensors and setting the settings includes setting an active/inactive status for at least one of the types of alarm sensors.
17. The method of claim 15 wherein the setting the settings include setting an arm/disarm status.
18. The method of claim 15 wherein setting the settings include setting an arm time and a disarm time.
19. The method of claim 15 wherein assigning the portable security systems to one or more groups includes assigning portable security systems associated with a first user to one or more groups associated with that first user and assigning portable security systems associated with a second user to one or more groups associated with that second user.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US12/984,118 US20110095883A1 (en) | 2006-08-18 | 2011-01-04 | Asset monitoring system and portable security system therefor |
Applications Claiming Priority (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US83891006P | 2006-08-18 | 2006-08-18 | |
US11/840,436 US7961088B2 (en) | 2006-08-18 | 2007-08-17 | Asset monitoring system and portable security system therefor |
US12/984,118 US20110095883A1 (en) | 2006-08-18 | 2011-01-04 | Asset monitoring system and portable security system therefor |
Related Parent Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US11/840,436 Division US7961088B2 (en) | 2006-08-18 | 2007-08-17 | Asset monitoring system and portable security system therefor |
Publications (1)
Publication Number | Publication Date |
---|---|
US20110095883A1 true US20110095883A1 (en) | 2011-04-28 |
Family
ID=39100873
Family Applications (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US11/840,436 Expired - Fee Related US7961088B2 (en) | 2006-08-18 | 2007-08-17 | Asset monitoring system and portable security system therefor |
US12/984,118 Abandoned US20110095883A1 (en) | 2006-08-18 | 2011-01-04 | Asset monitoring system and portable security system therefor |
Family Applications Before (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US11/840,436 Expired - Fee Related US7961088B2 (en) | 2006-08-18 | 2007-08-17 | Asset monitoring system and portable security system therefor |
Country Status (1)
Country | Link |
---|---|
US (2) | US7961088B2 (en) |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20120178476A1 (en) * | 2011-01-12 | 2012-07-12 | Sofia Alexandra Ortiz | Determining the last location of lost and stolen portable electronic devices when wireless communications access to the lost or stolen devices is lost or intermittent |
US20120185560A1 (en) * | 2011-01-13 | 2012-07-19 | Keisuke Mera | Data collecting device, computer readable medium, and data collecting system |
US8265605B2 (en) * | 2007-02-06 | 2012-09-11 | Numerex Corp. | Service escrowed transportable wireless event reporting system |
US20140191868A1 (en) * | 2011-01-12 | 2014-07-10 | Sofia Alexandra Ortiz | Systems and methods for tracking assets using associated portable electronic device in the form of beacons |
US9019112B2 (en) | 2012-07-13 | 2015-04-28 | Walter Kidde Portable Equipment, Inc. | Systems and methods for optimizing low battery indication in alarms |
Families Citing this family (75)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9131040B2 (en) | 2002-06-20 | 2015-09-08 | Numerex Corp. | Alarm system for use over satellite broadband |
US9054893B2 (en) | 2002-06-20 | 2015-06-09 | Numerex Corp. | Alarm system IP network with PSTN output |
US8509391B2 (en) | 2002-06-20 | 2013-08-13 | Numerex Corp. | Wireless VoIP network for security system monitoring |
US8031061B2 (en) * | 2006-04-17 | 2011-10-04 | Master Lock Company Llc | Trailer alarm |
US7535346B2 (en) * | 2006-04-17 | 2009-05-19 | Master Lock Company Llc | Trailer alarm |
US8279075B2 (en) * | 2006-11-30 | 2012-10-02 | Honeywell International Inc. | Card slot anti-tamper protection system |
US8279081B2 (en) * | 2007-01-11 | 2012-10-02 | Innovative Technology Concepts, Inc. | Remotely readable gas meter and method of using the same |
US9538014B2 (en) * | 2007-02-13 | 2017-01-03 | Honeywell International Inc. | Using an IVR to remotely operate security systems |
JP5116841B2 (en) * | 2008-03-27 | 2013-01-09 | ホーチキ株式会社 | Alarm and alarm system |
US20090284578A1 (en) * | 2008-05-11 | 2009-11-19 | Revolutionary Concepts, Inc. | Real estate communications and monitoring systems and methods for use by real estate agents |
US8290125B2 (en) * | 2008-09-02 | 2012-10-16 | International Business Machines Corporation | Voice response unit shortcutting |
US9106745B2 (en) * | 2008-09-16 | 2015-08-11 | International Business Machines Corporation | Voice response unit harvesting |
US20100141445A1 (en) * | 2008-12-08 | 2010-06-10 | Savi Networks Inc. | Multi-Mode Commissioning/Decommissioning of Tags for Managing Assets |
US20110032360A1 (en) * | 2009-07-12 | 2011-02-10 | Ronald Carter | Systems, methods, and apparatus for monitoring an area |
EP2454729A1 (en) * | 2009-07-14 | 2012-05-23 | Deal Magic, Inc. | Security seal |
US8456302B2 (en) * | 2009-07-14 | 2013-06-04 | Savi Technology, Inc. | Wireless tracking and monitoring electronic seal |
US8432274B2 (en) | 2009-07-31 | 2013-04-30 | Deal Magic, Inc. | Contextual based determination of accuracy of position fixes |
SG178484A1 (en) * | 2009-08-17 | 2012-04-27 | Deal Magic Inc | Contextually aware monitoring of assets |
US8334773B2 (en) * | 2009-08-28 | 2012-12-18 | Deal Magic, Inc. | Asset monitoring and tracking system |
US20110050397A1 (en) * | 2009-08-28 | 2011-03-03 | Cova Nicholas D | System for generating supply chain management statistics from asset tracking data |
US8314704B2 (en) * | 2009-08-28 | 2012-11-20 | Deal Magic, Inc. | Asset tracking using alternative sources of position fix data |
US20110054979A1 (en) * | 2009-08-31 | 2011-03-03 | Savi Networks Llc | Physical Event Management During Asset Tracking |
US9633327B2 (en) | 2009-09-25 | 2017-04-25 | Fedex Corporate Services, Inc. | Sensor zone management |
CN102053574B (en) * | 2009-10-30 | 2013-11-06 | 鸿富锦精密工业(深圳)有限公司 | Output and input device environment monitoring system with same |
US8344881B1 (en) * | 2009-11-25 | 2013-01-01 | Exelis, Inc. | System and method for cascaded tamper detection |
GB2480675A (en) * | 2010-05-28 | 2011-11-30 | Darryl Dawson | An alarm for alerting a person to the theft of a trailer |
US20120185166A1 (en) * | 2011-01-17 | 2012-07-19 | Kuo-Ching Chiang | Portable Communication Device with Inert Navigator |
US8618952B2 (en) * | 2011-01-21 | 2013-12-31 | Honda Motor Co., Ltd. | Method of intersection identification for collision warning system |
WO2012119253A1 (en) * | 2011-03-08 | 2012-09-13 | Home Monitor Inc. | Area monitoring method and system |
WO2012138443A1 (en) | 2011-04-04 | 2012-10-11 | Numerek Corp. | Delivery of alarm system event data and audio over hybrid networks |
EP2695370A4 (en) | 2011-04-04 | 2015-03-11 | Numerex Corp | TRANSMITTING ALARM SYSTEM EVENT DATA AND AUDIO SIGNALS |
US8705716B2 (en) | 2011-04-27 | 2014-04-22 | Numerex Corp. | Interactive control of alarm systems by telephone interface using an intermediate gateway |
US8505359B2 (en) * | 2011-07-01 | 2013-08-13 | Maximum Controls, L.L.C. | System and method for determining a gate position |
US9836945B2 (en) * | 2011-12-01 | 2017-12-05 | Mark Kramer | Wireless appliance vibration sensor monitor and method |
JP5811105B2 (en) * | 2012-01-13 | 2015-11-11 | 株式会社デンソー | Theft tracking device |
US20140159883A1 (en) * | 2012-07-25 | 2014-06-12 | Richard Damiani | Intrusion and theft alert device remotely armed and disarmed by mobile platform application |
SE537366C2 (en) * | 2012-09-25 | 2015-04-14 | Jonas Patrik Graphenius | Safety device and method for detecting movement of a door and monitoring movement in an area |
WO2014052785A2 (en) | 2012-09-28 | 2014-04-03 | Numerex Corp. | Method and system for untethered two-way voice communication for an alarm system |
US9235855B2 (en) * | 2012-11-12 | 2016-01-12 | Numerex Corp. | Delivery of security solutions based on-demand |
US8964406B2 (en) * | 2012-12-11 | 2015-02-24 | ESPi LLC | Battery backup cover system |
US20140351735A1 (en) * | 2013-05-21 | 2014-11-27 | Cartasite, Inc. | Viewing driver event data |
US9412243B2 (en) * | 2013-08-27 | 2016-08-09 | Christopher C Hamilton | Portable security system |
US10065601B2 (en) * | 2014-05-01 | 2018-09-04 | Babaco Alarm Systems Inc. | Portable, self-contained anti-theft vehicle alarm system with automatic proximity control |
US20150314753A1 (en) * | 2014-05-01 | 2015-11-05 | Babaco Alarm Systems, Inc. | Portable, self-contained anti-theft alarm system for the cargo compartment of a vehicle |
US20170129455A1 (en) * | 2014-05-01 | 2017-05-11 | Babaco Alarm Systems Inc. | Portable, self-contained anti-theft vehicle alarm system with automatic proximity control |
US9183730B1 (en) | 2014-07-16 | 2015-11-10 | Numerex Corp. | Method and system for mitigating invasion risk associated with stranger interactions in a security system environment |
US9449497B2 (en) | 2014-10-24 | 2016-09-20 | Numerex Corp. | Method and system for detecting alarm system tampering |
US20170011605A1 (en) * | 2015-05-20 | 2017-01-12 | Package Guard, Inc | Package delivery notification and protection device, system and method |
US20170011616A1 (en) * | 2015-07-09 | 2017-01-12 | Digital Monitoring Products, Inc. | Security system with user controlled monitoring |
CN105128816A (en) * | 2015-09-14 | 2015-12-09 | 广东顺德车联管家科技有限公司 | Vehicle control method and vehicle-mounted terminal |
WO2017143093A1 (en) | 2016-02-16 | 2017-08-24 | Golock Technology, Inc. | Portable lock with integrity sensors |
US10019880B1 (en) * | 2016-11-22 | 2018-07-10 | Brad Winters | Portable security system |
USD821177S1 (en) | 2017-01-04 | 2018-06-26 | Golock Technology, Inc. | Portable lock housing |
WO2018129178A1 (en) | 2017-01-04 | 2018-07-12 | Golock Technology, Inc. | Cable with integral sensing elements for fault detection |
GB2562289A (en) * | 2017-05-11 | 2018-11-14 | Brodie Christoper | An alarm |
US10544605B2 (en) | 2017-05-19 | 2020-01-28 | Douglas A. Yates | Sliding lockable housing with supplemental openings |
US10749791B2 (en) | 2017-11-15 | 2020-08-18 | Bank Of America Corporation | System for rerouting electronic data transmissions based on generated solution data models |
US10713224B2 (en) | 2017-11-15 | 2020-07-14 | Bank Of America Corporation | Implementing a continuity plan generated using solution data modeling based on predicted future event simulation testing |
US10496460B2 (en) | 2017-11-15 | 2019-12-03 | Bank Of America Corporation | System for technology anomaly detection, triage and response using solution data modeling |
US10592861B2 (en) | 2017-12-09 | 2020-03-17 | Elizabeth Kemp | Active shooter response system for initiating silent alert and deploying tactical tools |
US10875503B2 (en) * | 2018-01-06 | 2020-12-29 | Toyota Motor Engineering & Manufacturing North America, Inc. | System and method for anti-theft control for autonomous vehicle |
US11395254B2 (en) * | 2018-01-16 | 2022-07-19 | Maarten Van Laere | Cellular alerting add-on |
US10732051B2 (en) * | 2018-01-22 | 2020-08-04 | Google Llc | Passive infrared sensor device |
US10951414B2 (en) * | 2018-01-29 | 2021-03-16 | Hub data security Ltd. | Method for securing digital currency |
US10936984B2 (en) | 2018-05-08 | 2021-03-02 | Bank Of America Corporation | System for mitigating exposure associated with identified impacts of technological system changes based on solution data modelling |
US10970406B2 (en) | 2018-05-08 | 2021-04-06 | Bank Of America Corporation | System for mitigating exposure associated with identified unmanaged devices in a network using solution data modelling |
US11023835B2 (en) | 2018-05-08 | 2021-06-01 | Bank Of America Corporation | System for decommissioning information technology assets using solution data modelling |
US10977283B2 (en) * | 2018-05-08 | 2021-04-13 | Bank Of America Corporation | System for mitigating intentional and unintentional exposure using solution data modelling |
US10778274B1 (en) * | 2019-05-01 | 2020-09-15 | Honeywell International Inc. | Wall mountable security case |
US11560742B2 (en) | 2019-07-23 | 2023-01-24 | Joseph Curtis Taylor | Door security apparatus with sensor |
US11182993B2 (en) | 2019-07-26 | 2021-11-23 | Oversight Investments | Access detection device |
US11527147B2 (en) * | 2019-08-09 | 2022-12-13 | TeamOfDefenders LLC | Devices, systems, and methods for monitoring controlled spaces for transitory uses |
US11624220B2 (en) | 2020-03-19 | 2023-04-11 | Joseph Curtis Taylor | Security device for sliding door or sliding window assembly |
US20230177948A1 (en) * | 2020-07-08 | 2023-06-08 | TeamOfDefenders LLC | Devices, systems, and methods for monitoring controlled spaces for transitory uses |
FR3125909B1 (en) * | 2021-07-29 | 2023-08-04 | Globalexpert | METHOD AND DEVICE FOR DETECTING AN EVENT RELATING TO THE MOVEMENT OR SABOTAGE OF AN OBJECT |
Citations (23)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4742336A (en) * | 1986-12-04 | 1988-05-03 | Hall Security Services, Inc. | Portable intrusion detection warning system |
US5200735A (en) * | 1989-07-11 | 1993-04-06 | Hines Thomas N | Weather protected portable security system for in-field use |
US5587701A (en) * | 1994-09-09 | 1996-12-24 | Hess; Brian K. | Portable alarm system |
US5731757A (en) * | 1996-08-19 | 1998-03-24 | Pro Tech Monitoring, Inc. | Portable tracking apparatus for continuous position determination of criminal offenders and victims |
US5748083A (en) * | 1996-03-11 | 1998-05-05 | Security Solutions Plus | Computer asset protection apparatus and method |
US5777551A (en) * | 1994-09-09 | 1998-07-07 | Hess; Brian K. | Portable alarm system |
US5801618A (en) * | 1996-02-08 | 1998-09-01 | Jenkins; Mark | Vehicle alarm and lot monitoring system |
US5836002A (en) * | 1995-06-01 | 1998-11-10 | Morstein; Jason | Anti-theft device |
US5850180A (en) * | 1994-09-09 | 1998-12-15 | Tattletale Portable Alarm Systems, Inc. | Portable alarm system |
US6049273A (en) * | 1994-09-09 | 2000-04-11 | Tattletale Portable Alarm, Inc. | Cordless remote alarm transmission apparatus |
US6072250A (en) * | 1998-06-01 | 2000-06-06 | Motorola, Inc. | Battery pack having a hibernate circuit |
US20020113704A1 (en) * | 2000-09-20 | 2002-08-22 | Hess Brian K. | Wireless transmitting security cable |
US20030061344A1 (en) * | 2001-09-21 | 2003-03-27 | Monroe David A | Multimedia network appliances for security and surveillance applications |
US6646676B1 (en) * | 2000-05-17 | 2003-11-11 | Mitsubishi Electric Research Laboratories, Inc. | Networked surveillance and control system |
US20040036598A1 (en) * | 2001-01-19 | 2004-02-26 | Siemens Building Technologies Ag | Security system and danger sensor for monitoring danger parameters |
US20050030174A1 (en) * | 2003-06-11 | 2005-02-10 | Tattletale Portable Alarm Systems, Inc. | Portable alarm and methods of transmitting alarm data |
US20050046567A1 (en) * | 2002-09-17 | 2005-03-03 | All Set Marine Security Ab | Method and system for utilizing multiple sensors for monitoring container security, contents and condition |
US6864789B2 (en) * | 2000-09-06 | 2005-03-08 | Red Wolf Technologies, Inc. | Personal property security device |
US20050080566A1 (en) * | 2000-12-15 | 2005-04-14 | Vock Curtis A. | Product integrity systems and associated methods |
US20050174235A1 (en) * | 2002-05-07 | 2005-08-11 | Davis Brian J. | Tracking system and assosciated method |
US20050179541A1 (en) * | 2001-08-31 | 2005-08-18 | Red Wolf Technologies, Inc. | Personal property security device |
US7415544B2 (en) * | 2002-08-02 | 2008-08-19 | C-Labs S.R.L. | Architecture and method for the centralised control of remote peripheral electronic devices |
US7522043B2 (en) * | 2006-01-20 | 2009-04-21 | The Boeing Company | Mobile wireless mesh technology for shipping container security |
Family Cites Families (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
USD379157S (en) | 1996-04-10 | 1997-05-13 | Tattletale Portable Alarm, Inc. | Portable alarm |
US6075451A (en) | 1996-07-15 | 2000-06-13 | Lebowitz; Mayer M. | RF cellular technology network transmission system for remote monitoring equipment |
US6759956B2 (en) | 1998-10-23 | 2004-07-06 | Royal Thoughts, L.L.C. | Bi-directional wireless detection system |
US6356192B1 (en) | 1998-10-23 | 2002-03-12 | Royal Thoughts L.L.C. | Bi-directional wireless detection system |
US6611686B1 (en) | 1999-02-09 | 2003-08-26 | Elite Logistics Services, Inc. | Tracking control and logistics system and method |
US6831557B1 (en) | 2000-03-23 | 2004-12-14 | Tattletale Portable Alarm Systems, Inc. | Method of providing alarm based wireless security monitoring |
US20050030175A1 (en) | 2003-08-07 | 2005-02-10 | Wolfe Daniel G. | Security apparatus, system, and method |
WO2004027727A1 (en) | 2002-09-17 | 2004-04-01 | All Set Marine Security Ab. | Method and system for monitoring containers to maintain the security thereof |
US7193508B2 (en) | 2004-02-12 | 2007-03-20 | Hill Philip A | Portable security system |
-
2007
- 2007-08-17 US US11/840,436 patent/US7961088B2/en not_active Expired - Fee Related
-
2011
- 2011-01-04 US US12/984,118 patent/US20110095883A1/en not_active Abandoned
Patent Citations (23)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4742336A (en) * | 1986-12-04 | 1988-05-03 | Hall Security Services, Inc. | Portable intrusion detection warning system |
US5200735A (en) * | 1989-07-11 | 1993-04-06 | Hines Thomas N | Weather protected portable security system for in-field use |
US5587701A (en) * | 1994-09-09 | 1996-12-24 | Hess; Brian K. | Portable alarm system |
US5777551A (en) * | 1994-09-09 | 1998-07-07 | Hess; Brian K. | Portable alarm system |
US5850180A (en) * | 1994-09-09 | 1998-12-15 | Tattletale Portable Alarm Systems, Inc. | Portable alarm system |
US6049273A (en) * | 1994-09-09 | 2000-04-11 | Tattletale Portable Alarm, Inc. | Cordless remote alarm transmission apparatus |
US5836002A (en) * | 1995-06-01 | 1998-11-10 | Morstein; Jason | Anti-theft device |
US5801618A (en) * | 1996-02-08 | 1998-09-01 | Jenkins; Mark | Vehicle alarm and lot monitoring system |
US5748083A (en) * | 1996-03-11 | 1998-05-05 | Security Solutions Plus | Computer asset protection apparatus and method |
US5731757A (en) * | 1996-08-19 | 1998-03-24 | Pro Tech Monitoring, Inc. | Portable tracking apparatus for continuous position determination of criminal offenders and victims |
US6072250A (en) * | 1998-06-01 | 2000-06-06 | Motorola, Inc. | Battery pack having a hibernate circuit |
US6646676B1 (en) * | 2000-05-17 | 2003-11-11 | Mitsubishi Electric Research Laboratories, Inc. | Networked surveillance and control system |
US6864789B2 (en) * | 2000-09-06 | 2005-03-08 | Red Wolf Technologies, Inc. | Personal property security device |
US20020113704A1 (en) * | 2000-09-20 | 2002-08-22 | Hess Brian K. | Wireless transmitting security cable |
US20050080566A1 (en) * | 2000-12-15 | 2005-04-14 | Vock Curtis A. | Product integrity systems and associated methods |
US20040036598A1 (en) * | 2001-01-19 | 2004-02-26 | Siemens Building Technologies Ag | Security system and danger sensor for monitoring danger parameters |
US20050179541A1 (en) * | 2001-08-31 | 2005-08-18 | Red Wolf Technologies, Inc. | Personal property security device |
US20030061344A1 (en) * | 2001-09-21 | 2003-03-27 | Monroe David A | Multimedia network appliances for security and surveillance applications |
US20050174235A1 (en) * | 2002-05-07 | 2005-08-11 | Davis Brian J. | Tracking system and assosciated method |
US7415544B2 (en) * | 2002-08-02 | 2008-08-19 | C-Labs S.R.L. | Architecture and method for the centralised control of remote peripheral electronic devices |
US20050046567A1 (en) * | 2002-09-17 | 2005-03-03 | All Set Marine Security Ab | Method and system for utilizing multiple sensors for monitoring container security, contents and condition |
US20050030174A1 (en) * | 2003-06-11 | 2005-02-10 | Tattletale Portable Alarm Systems, Inc. | Portable alarm and methods of transmitting alarm data |
US7522043B2 (en) * | 2006-01-20 | 2009-04-21 | The Boeing Company | Mobile wireless mesh technology for shipping container security |
Cited By (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8543097B2 (en) | 2007-02-06 | 2013-09-24 | Numerex Corp. | Service escrowed transportable wireless event reporting system |
US8855716B2 (en) | 2007-02-06 | 2014-10-07 | Numerex Corp. | Service escrowed transportable wireless event reporting system |
US8265605B2 (en) * | 2007-02-06 | 2012-09-11 | Numerex Corp. | Service escrowed transportable wireless event reporting system |
US20140191868A1 (en) * | 2011-01-12 | 2014-07-10 | Sofia Alexandra Ortiz | Systems and methods for tracking assets using associated portable electronic device in the form of beacons |
US8548499B2 (en) * | 2011-01-12 | 2013-10-01 | Ortiz And Associates Consulting, Llc | Determining the last location of lost and stolen portable electronic devices when wireless communications access to the lost or stolen devices is lost or intermittent |
US20140031066A1 (en) * | 2011-01-12 | 2014-01-30 | Ortiz And Associates Consulting, Llc | Determining the last location of lost and stolen portable electronic devices when wireless communications access to the lost or stolen devices is lost or intermittent |
US20120178476A1 (en) * | 2011-01-12 | 2012-07-12 | Sofia Alexandra Ortiz | Determining the last location of lost and stolen portable electronic devices when wireless communications access to the lost or stolen devices is lost or intermittent |
US9860703B2 (en) * | 2011-01-12 | 2018-01-02 | Open Invention Network, Llc | Determining the last location of lost and stolen portable electronic devices when wireless communications access to the lost or stolen devices is lost or intermittent |
US10068440B2 (en) * | 2011-01-12 | 2018-09-04 | Open Invention Network, Llc | Systems and methods for tracking assets using associated portable electronic device in the form of beacons |
US10694333B1 (en) * | 2011-01-12 | 2020-06-23 | Open Invention Network Llc | Determining the last location of lost and stolen portable electronic devices when wireless communications access to the lost or stolen devices is lost or intermittent |
US20120185560A1 (en) * | 2011-01-13 | 2012-07-19 | Keisuke Mera | Data collecting device, computer readable medium, and data collecting system |
US8984169B2 (en) * | 2011-01-13 | 2015-03-17 | Kabushiki Kaisha Toshiba | Data collecting device, computer readable medium, and data collecting system |
US9019112B2 (en) | 2012-07-13 | 2015-04-28 | Walter Kidde Portable Equipment, Inc. | Systems and methods for optimizing low battery indication in alarms |
Also Published As
Publication number | Publication date |
---|---|
US7961088B2 (en) | 2011-06-14 |
US20080042809A1 (en) | 2008-02-21 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US7961088B2 (en) | Asset monitoring system and portable security system therefor | |
US10866570B2 (en) | Monitoring apparatus and system | |
US7949541B2 (en) | Vehicle activity module | |
US7171187B2 (en) | Method and system for asset tracking | |
US6611686B1 (en) | Tracking control and logistics system and method | |
CN102167008B (en) | Method and system for detecting an unauthorized use of a vehicle by an authorized driver | |
US7340400B2 (en) | Vehicle activity module | |
US7834757B2 (en) | Method of mobile storage container protection | |
CN111882844B (en) | Wall-mounted safety shell | |
CN108364424A (en) | Anti-theft prewarning system | |
US12147205B2 (en) | System and method for property security | |
EP3115979B1 (en) | Data collection and processing apparatus and system with burglarproof function, and method | |
US7557700B2 (en) | Protection system of a work station by network-centralised management | |
CN101523776A (en) | Monitoring apparatus and system | |
US20190221104A1 (en) | Methods and apparatus for security monitoring | |
EP4495904A1 (en) | System and method for property security | |
CA2567600C (en) | Method for remotely changing the sensitivity of a wireless sensor | |
CA2085865A1 (en) | Alarm system | |
WO2020178570A1 (en) | Valve monitoring apparatus | |
CA2398582A1 (en) | A system and method for asset tracking | |
Chopade et al. | Smart Intrusion Detection |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
STCB | Information on status: application discontinuation |
Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION |