`
`Exhibit 4
`
`
`
`(12) United States Patent
`Richman et al.
`
`(10) Patent No.:
`(45) Date of Patent:
`
`US 8,174,378 B2
`May 8, 2012
`
`US008174378B2
`
`(54)
`
`HUMAN GUARD ENHANCING MULTIPLE
`STE SECURITY SYSTEM
`
`(75)
`
`Inventors:
`
`(73)
`
`Assignee:
`
`(*)
`
`Notice:
`
`Lawrence Richman, La Mesa, CA
`(US); Anca Vacaru, San Diego, CA
`(US): Olga A. Zatusevschi, San Diego,
`CA (US)
`Richman Technology Corporation, San
`Diego, CA (US)
`
`Subject to any disclaimer, the term of this
`patent is extended or adjusted under 35
`U.S.C. 154(b) by 969 days.
`
`(21)
`(22)
`(86)
`
`(87)
`
`(65)
`
`(51)
`
`(52)
`
`(58)
`
`Appl. No.:
`
`12/067,271
`
`PCT Fled:
`
`Mar. 18, 2005
`
`PCT/US2OOS/OO9408
`
`PCT NO.:
`S371 (c)(1),
`(2), (4) Date:
`PCT Pub. No.:
`WO2OO6/101490
`PCT Pub. Date: Sep. 28, 2006
`
`Mar. 18, 2008
`
`Prior Publication Data
`US 2010/O238O19 A1
`Sep. 23, 2010
`
`Int. C.
`(2006.01)
`GSB 9/00
`(2006.01)
`G08B I/00
`(2006.01)
`GSB 29/00
`U.S. C. ... 34.0/521; 340/506; 340/531; 340/539.16;
`340/522; 348/143: 700/83
`Field of Classification Search ................... 34O7521
`See application file for complete search history.
`
`1.
`
`14
`
`12
`
`A
`
`-
`
`I
`
`(56)
`
`References Cited
`
`U.S. PATENT DOCUMENTS
`6,400,265 B1* 6/2002 Saylor et al. .................. 340,531
`6,505,086 B1* 1/2003 Dodd et al. ..................... TOOf 65
`6,686,838 B1* 2/2004 Rezvani et al. ...
`... 340/506
`2003/0206100 A1* 11/2003 Richman et al. .............. 340/506
`* cited by examiner
`Primary Examiner — Donnie Crosland
`(74) Attorney, Agent, or Firm — Foley & Lardner LLP
`(57)
`ABSTRACT
`Provided is a human guard enhancing multiple site security
`system comprising one or more human guards, peripheral
`equipment positioned at one or more sites, said peripheral
`equipment comprising one or more of a plurality of sensors,
`Video cameras, positioning systems, and mobile communica
`tion and data processing equipment, said peripheral equip
`ment being further capable of collecting and transmitting
`event-related and environmental data, one or more check
`point systems capable of receiving, processing into a stan
`dardized protocol, and further relaying the data received from
`said peripheral equipment, and of providing said one or more
`guards with information based on the data, and one or more
`stations capable of logging, processing, and reporting the data
`relayed from said one or more checkpoint systems to provide
`a security system status and to facilitate human Supervision,
`situation analysis, decision making, and intervention. The
`system includes a computer implemented communications
`protocol, which is an XML based communications protocol
`for real time security alert monitoring purposes. The XML
`based communications protocol consists of numerous mod
`ules which receive and convert data messages from varying
`security devices and sensors, standardize, translate and send
`converted messages, and encrypt and decrypt said data mes
`Sages.
`
`26 Claims, 14 Drawing Sheets
`
`Cellower
`
`f * Satelite
`A
`
`
`
`ppa internet
`
`Sensor
`
`se
`
`Case 6:20-cv-00769-ADA Document 1-4 Filed 08/25/20 Page 2 of 28
`
`W
`
`t-
`
`Site. A
`&
`
`És
`Sets
`8
`\ f
`i-
`f
`vices
`checkpoi?t
`corputer
`Ho-
`------
`Base Station
`
`Sensor
`r
`a Sensor
`A.
`is
`?ix
`A
`T-2Checkpoint
`5.
`poi
`Seiso,
`{Ca! wireless Y
`r
`Network (eg. WiFi, etc.)
`^^----------
`
`Back-tip
`st
`r
`t
`mm
`headquarters
`
`-
`
`
`
`;
`
`6
`
`N
`
`20
`
`:
`
`Alert
`Engine
`26-
`
`|
`2."
`Workstation
`
`8
`
`•y
`Global Orbitting
`atellite System 3
`ge * Sensor \ -Gips
`A-
`is Seisor E
`(EGC Wiess Wides
`Ce: of&
`RNet.
`aia
`aiaaS8
`fri
`- Back-up
`u)
`-1 Workstation
`
`- 22
`
`-
`2
`a
`
`2:
`
`atabase
`
`8:3e
`--
`Elanguage
`guag
`far:sation
`voie
`24
`
`Workstatic
`arrrrrorcora
`
`se
`
`5 Back-up
`
`
`
`Case 6:20-cv-00769-ADA Document 1-4 Filed 08/25/20 Page 3 of 28
`Case 6:20-cv-OO769—ADA Document 1-4 Filed 08/25/20 Page 3 of 28
`
`U.S. Patent
`
`M
`
`21
`
`41f01teehS
`
`US 8,174,378 B2
`
`‘L
`
`@Eea”320
`
`”ExamRama
`
`
`
`
`Wu‘.gx
`m£02.,me
`
`8,SmcmmomE>mmmwmsg“muggy
`
`
`howcmm\
`
`{flu
`
`E0335
`
`
`
`3%.ES».3mVt
`mamEgan.
`ogwmzV31K
`
`-N“$03030
`
`$3335
`FemwsaEcu
`
`em‘
`
`émmmsmcmg
`
`commgmcmfi
`
`333$
`
`angumm
`
`-wmmmfima
`
`53mm
`
`mfiwmwmxag
`cowmmfiog
`
`mEmcm,.
`
`we?H
`
`mm
`
`r.9“.
`
`
`
`
`
`
`
`
`
`
`U.S. Patent
`
`
`
`
`
`
`
`
`
`
`
`?
`
`Case 6:20-cv-00769-ADA Document 1-4 Filed 08/25/20 Page 4 of 28
`
`Z '61)
`
`
`
`U.S. Patent
`
`US 8,174,378 B2
`
`
`
`
`
`dnºpeg (~<, ?-----------------------~--~~~~--~~~~~~~~~~~~~~~~---------- |
`
`o
`
`<C
`CY)
`g
`-
`
`
`
`
`
`
`
`
`
`
`
`Case 6:20-cv-00769-ADA Document 1-4 Filed 08/25/20 Page 5 of 28
`
`
`
`U.S. Patent
`
`May 8, 2012
`
`Sheet 4 of 14
`
`US 8,174,378 B2
`
`
`
`
`
`|
`
`
`
`
`
`
`
`Case 6:20-cv-00769-ADA Document 1-4 Filed 08/25/20 Page 6 of 28
`
`| –
`
`»
`
`
`
`U.S. Patent
`
`May 8, 2012
`
`Sheet 5 of 14
`
`US 8,174,378 B2
`
`
`
`
`
`
`
`
`
`Case 6:20-cv-00769-ADA Document 1-4 Filed 08/25/20 Page 7 of 28
`
`g) uoppºleg
`
`7 (61-)
`
`ºs-Tsaesnes
`
`? ºdn?ejad?3 4.
`
`
`
`U.S. Patent
`
`May 8, 2012
`
`Sheet 6 of 14
`
`US 8,174,378 B2
`
`
`
`uuejfiold
`
`~~~~&#
`
`~901
`
`~ 0 || ||
`
`
`
`
`
`
`
`
`
`
`
`Case 6:20-cv-00769-ADA Document 1-4 Filed 08/25/20 Page 8 of 28
`
`G -61
`
`
`
`Case 6:20-cv-00769-ADA Document 1-4 Filed 08/25/20 Page 9 of 28
`
`23,
`
`m807o\Evflm3
`
`U.S. Patent
`
`r
`
`smmw
`
`Emv8},593wr2336
`
`0#2nEEE
`
`Ann8,E3353HEm>mSmcmmE
`
`Q3WuElaiis‘E...,E.E1&1//mMw—Egg.
`
`
`
`
`
`€39Ejm.cm:wma?m?V?cm:
`
`
`ncmefiE»PUtEbommmooiwcgmE
`
`mm3;.mm.m“$30;.2,:m3,wanrme,.E,,,EE,E,
`
`1..aE.mmxmSWwww;\fivka
`
`
`
`
`mung.§s«n&q332mm2Es555%;EEEJkE\EE”m:
`AM£8Emegfimuog$8$59
`am.E5“N:war.wx:mo.6353523380.250_$8w_w4EAtamfifié
`
`Emwwbmmmm,JHHM.,EE\EEE_HnE\‘Emma3%HmSum9:
`OW3,NE\‘uitillf
`
`
`
`
`
`
`
`
`U.S. Patent
`
`May 8, 2012
`
`Sheet 8 of 14
`
`US 8,174,378 B2
`
`90
`
`N
`
`92
`
`EVE
`Event Sensors/Hardware
`
`- - - -
`
`- -ka-a-a-a-a-a-a-a-a-a-a-a-a-a-a-a-a-aee-ee-actual
`
`—-
`EVE
`Conversion/Encryption
`
`
`
`94.
`
`96
`
`Case 6:20-cv-00769-ADA Document 1-4 Filed 08/25/20 Page 10 of 28
`
`EVE
`SCA
`
`device
`
`language data
`
`signais
`
`
`
`XM format
`r encrypted data
`messages
`
`Fig. 7
`
`
`
`U.S. Patent
`
`May 8, 2012
`
`Sheet 9 of 14
`
`US 8,174,378 B2
`
`Stand-Alone Checkpoint
`
`ra
`
`28
`
`(S5
`
`Other
`Sensor
`
`200
`
`
`
`Checkpoint Software
`
`
`
`Conversion
`Mode
`
`86-"
`
`Control Surf
`CRC
`
`
`
`Encryption
`
`88 u? Transmitting
`Module
`
`Case 6:20-cv-00769-ADA Document 1-4 Filed 08/25/20 Page 11 of 28
`
`Fig. 8A
`
`
`
`U.S. Patent
`
`May 8, 2012
`
`Sheet 10 of 14
`
`US 8,174,378 B2
`
`Mobile Checkpoint
`
`226
`
`A
`
`(S7). 228
`Cl
`Other
`
`
`
`in
`?ci
`t
`O
`
`22O
`
`i
`
`204
`
`Checkpoint Software
`
`84 -
`
`------
`
`Conversion
`Module
`
`ar
`Contro Sun
`86 - - CRC
`
`Encryption
`
`s
`
`88 -
`
`Transmitting
`Module
`
`i
`
`?tri
`92 -l-
`- L| u
`R r
`TxM.
`
`Case 6:20-cv-00769-ADA Document 1-4 Filed 08/25/20 Page 12 of 28
`
`F-no-eco-c-
`Base
`Station
`
`arra
`
`96
`
`Fig. 8B
`
`
`
`U.S. Patent
`
`May 8, 2012
`
`Sheet 11 of 14
`
`US 8,174,378 B2
`
`Distributed Checkpoint
`
`r"m
`(s /Y248 O O "I
`so
`Sensor
`efSO
`(D Tag)
`
`248
`
`240
`
`.N
`
`14- asaaaa-rarua-na-na---
`
`Checkpoint Software
`or Board Cel Phone
`
`------
`
`1
`
`a
`Ssss
`Cell
`Phone
`
`|
`
`
`
`---
`
`Eo
`9
`s
`-
`
`5---------------------rr
`
`5 a
`e S
`as S.
`(
`w --
`
`g
`9 s
`3
`
`N
`i.
`
`Checkpoint Software
`on Board
`Base Station Server
`
`---arearra ala---
`
`www.kuwarrrrrr
`
`244
`
`
`
`
`
`Case 6:20-cv-00769-ADA Document 1-4 Filed 08/25/20 Page 13 of 28
`
`--- ---
`
`Base
`Station Server
`
`ru-
`
`w
`
`vuukula-arrarae-wr-warm-hand-rwww.v.
`
`
`
`U.S. Patent
`
`May 8, 2012
`
`Sheet 12 of 14
`
`US 8,174,378 B2
`
`
`
`
`
`
`
`Case 6:20-cv-00769-ADA Document 1-4 Filed 08/25/20 Page 14 of 28
`
`aw-e-...-----a-ra-i-AM-e-Ala-----...
`
`
`
`U.S. Patent
`
`May 8, 2012
`
`Sheet 13 of 14
`
`US 8,174,378 B2
`
`?
`O)
`
`
`
`Case 6:20-cv-00769-ADA Document 1-4 Filed 08/25/20 Page 15 of 28
`
`
`
`Case 6:20-cv-00769-ADA Document 1-4 Filed 08/25/20 Page 16 of 28
`Case 6:20-cv-00769-ADA Document 1-4 Filed 08/25/20 Page 16 of 28
`
`U.S. Patent
`
`US 8,174,378 B2
`
`
`fifia8a8mg:mrucoummbééLacy“?WEESVAxmfioumvHaxmfiaeuqmKim03”maamaxmr3§$§m§E233fimeSvmaxszERm
`
`
`
`
`8.,$838W“x3503:36«29:30.
`
`
`M_
`
`..,
`
`
`
`mEmc
`
`
`
`EowmaoM..Mw$5323szQumEOLBMEdEijQmfl
`
`cowmu“,“oMW.m..“tzemem9mamEm$me
`
`hmmmzwmbnmmaaEgan,ESSQEEEmm3\fimEaumS.8..Em>w8mcmm0:»:
`
`
`
`“$an\mmm.a3m,3figmmmmnfimuE930\E30Em£055EmmegaémmE59530
`
`,awmmEawmkmnmwmmmmmmémxumnwHv3cum.“0
`
`mtmfiLegacy“
`
`wwmgfimm
`
`mgmcm$3.
`
`\xeomm
`
`
`
`mammEmz“x85055.,
`
`
`
`{If}!.—HWUwesewage
`
`
`wig“x350MEmma»33059mommmuumi
`
`
`
`
`
`
`
`”mm..mEmmwwUEwEumwchmmEOE
`
`
`
`
`
`US 8,174,378 B2
`
`1.
`HUMAN GUARD ENHANCING MULTIPLE
`SITE SECURITY SYSTEM
`
`TECHNICAL FIELD
`
`The present invention relates to a guard enhancing multiple
`site integrated security system and method of making same.
`More particularly, the present invention relates to a human
`security guard oriented system of security service, training
`and multiple site monitoring, which facilitates communica
`tions between real time security hardware and a real time
`security alert monitoring thereby providing human security
`guards with the latest technology to make them more intelli
`gent and responsive within a complex interactive environ
`ment.
`
`10
`
`15
`
`BACKGROUND ART
`
`2
`highly effective presence of human security guards, guards
`that are further enhanced by electronic wireless communica
`tions and monitoring.
`Additionally, the entire system depends upon the installa
`tion and presence of numerous hard wired security devices in
`a given area and is not readily Scalable to incorporate larger
`areas in the surveillance area in a short period of time without
`extensive outlay of effort and installation of new equipment.
`The acoustic energy “weapon' used as a deterrent to intruders
`is not confined to any given space and might pose a threat to
`anyone, including authorized individuals, within hearing dis
`tance.
`Therefore, it would be highly desirable to have a new and
`improved enhanced security guard system which would allow
`for computerized and wireless communications and monitor
`ing of human security guards and their activities with a cen
`tralized location, in addition to conventional security devices
`and which would be scalable with minimal time and material
`expenditure, and which would provide for human guards to
`act as a more rapid and effective deterrent to intruders.
`The conventional exit guard system addresses the require
`ments of providing areas with detection of movement of a
`Subject along an exit path in an unauthorized direction. This
`system further provides for a human monitor at a centralized
`location with added supervision of the deactivation of the
`security alarm system only by authorized personnel.
`However, within this system there is no human security
`guard on site actively patrolling the area. This electronically
`augmented human presence is irreplaceable as a deterrent to
`potential intruders as well as providing for flexibility in terms
`of monitoring and responding to a variety of situations that
`might arise.
`Therefore, it would be highly desirable to have a new and
`improved, technologically augmented human presence auto
`matically reporting to a centralized location, or a remote
`monitoring station through communications over a global
`computer network, cellular telephone network, or via satellite
`link, which could then monitor and record guard activities as
`well as utilize pre-existing event detection technology, Such
`as motion, Video and perimeter control devices to alert those
`guards of real time events taking place on their shift.
`Many patents describe relatively sophisticated security
`systems utilizing video images obtained from a plurality of
`cameras relayed to a site control unit equipped with an auto
`mated image processor. The images are then relayed to a
`security system operator who then analyzes the images and
`informs authorities of an intrusion.
`While these systems utilize advanced technological fea
`tures to distinguish between actual intrusions and false alarms
`(friend or foe), the absence of a human guard which would
`serve to discourage intrusions is notably absent. Moreover,
`the presence of human guards makes those that are present
`within the facility feel protected and well taken care of, and
`these individuals will often speak to the security guards or
`become familiar with them to avoid any misunderstanding as
`to their access authorization or the like.
`Additionally, the highly automated image processor and
`related complex software used to differentiate between actual
`foe intrusions and friendly false alarms is inherently limited
`in its capability to observe, compare and react to the myriad of
`potential one time or entirely novel situations which might
`occur. This type of security monitoring can only be accom
`plished with highly trained, well equipped, and competently
`Supervised human security guards on duty in numbers corre
`sponding to the amount of space or activity required for
`optimal security from outside threats.
`
`In addition to traditional threats to security such as bur
`glary, Vandalism and arson, today's complex national and
`international political conflicts are putting increased pressure
`on facilities and organizations of all kinds to provide effective
`security systems for the safety and protection of personnel,
`property and Surroundings.
`Devices and systems for the provision of safety and Secu
`rity of persons and property are well known. Examples of
`different types and kinds of security systems for protection
`and Surveillance methods of building structures and Sur
`rounding areas are disclosed in numerous worldwide patents.
`In general, the structure and function of most security
`systems involves electronic Surveillance equipment moni
`tored at a centralized location. Current development of secu
`rity systems attempts to do away with human-oriented Ser
`vices and replace the human security guard with high
`technology solutions to security problems. Only a limited
`number of currently developed security systems utilize a
`combination of guards in close conjunction with the elec
`tronic equipment. Most of the time, these systems involve one
`guard who monitors a video feed or alarm panel for intrusion
`or other related alerts. These security systems are commonly
`built, installed and implemented without any regard for the
`particular facilities of other systems, for example, the facili
`ties of built-in environmental and climate control, the track
`ing of people and assets within the building or complex, and
`fire/Smoke detection as well as transport systems such as
`elevators, etc.
`Therefore, it would be highly desirable to have a new and
`improved security system which not only enhances the
`human security guard services, but also integrates facilities
`management, and allows for real time identification, global
`positioning satellite (GPS) tracking, radio frequency identi
`fication (RFID) tracking, Wi-Fi and other tracking methods
`for people as well as assets such as computers, and other
`valuable instrumentation, all in a readily Scalable configura
`tion utilizing off the shelf electronic security and communi
`cations components.
`An electronic Surveillance system for remote guarding of
`an area using an operator station including a signal receiver
`with television display, radiant energy selection control, and
`energy level controller is known in the prior art. Such a device
`remotely controls and directs an apparatus “weapon' for inte
`gration with traditionally secured facilities, remote detection
`devices, closed circuit TV, and a remotely-located, manned
`control station. While such a computerized system is helpful
`in detection of unauthorized personnel in a given area and
`does seek to incorporate pre-existing security devices, there is
`no provision which would allow for the irreplaceable and
`
`25
`
`30
`
`35
`
`40
`
`45
`
`50
`
`55
`
`60
`
`65
`
`Case 6:20-cv-00769-ADA Document 1-4 Filed 08/25/20 Page 17 of 28
`
`
`
`US 8,174,378 B2
`
`5
`
`10
`
`15
`
`25
`
`30
`
`35
`
`3
`Therefore, it would be highly desirable to have a new and
`improved system for the technological augmentation of
`human guards who are irreplaceable in terms of providing a
`deterrent to intrusion and who are capable of observing,
`assessing and responding to novel and unusual situations and
`whose actions would automatically be reported to a central
`ized headquarters with integrated automated daily events and
`incident real time reporting.
`Finally, there are patented inventions which provide for an
`apparatus for monitoring Subjects having a location determin
`ing device which provides the location of the subject to a
`processor. The processor then stores and retrieves data gen
`erated or received by the processor. The primary means by
`which the subject is tracked is by usage of a GPS. Comparison
`of the parameters of given geographical boundaries to the
`data from the location determining device may determine if
`the subject has deviated from those parameters. The claimed
`invention mandates detection of at least one physiological
`parameter of the Subject in order to compare existing Subject
`data previously stored.
`These imaginative inventions do provide for tracking and
`determination of the general area in which a subject is to be
`found and a means by which to compare the location with a
`pre-determined geographic location. Unfortunately, while
`the location and tracking device may show a general area in
`which the Subject is located, there is no way of determining
`the exact location of the Subject at any given point in time.
`In addition, this system again depends upon a complex
`processor which must be programmed with any number of
`parameters. The system may fail to operate properly or may
`not operate at all if incorporated into a pre-existing security
`system, especially one having less complex processors avail
`able on site.
`Therefore, it would be highly desirable to have a new and
`improved system for technological augmentation of human
`guards automatically reporting exact location and time to a
`centralized headquarters with daily events and incident
`reporting automation which could give exact locations and
`time records of movement of the guards which would readily
`incorporate pre-existing hardware and Software. Moreover, it
`would be highly desirable to enable said guards to be alerted
`in real time when security threatening events or environmen
`tal events occur including the automated translations of these
`real time alerts into local dialects and local languages.
`
`4
`scaled up or down, by being individually tailored to site
`conditions such as site component configurations, checkpoint
`locations, building type material, building transportation sys
`tems, facilities environmental control systems, such as cli
`mate control, fire and Smoke detection, and other varied
`parameters.
`Yet another advantage of the present invention is to provide
`a system which would automatically monitor and control
`certain movable and fixed site conditions such as people and
`vehicles at checkpoints, safety systems, access control sys
`tems, position sensors, transportation control systems, power
`Supply systems, water and hydraulic control systems, warn
`ing systems, lighting systems, communications systems and
`miscellaneous site-specific systems such as greenhouse tem
`perature controls.
`Yet a further advantage of the invention is to enable training
`of human guards including drills, system operating instruc
`tions, and interactive testing of guard utilization of all system
`components, including software, hardware and communica
`tions.
`Still another advantage of the instant invention is to provide
`a system for security which monitors the identification and
`authorization of personnel inside secured areas through use of
`a two points access Subsystem composed of a fixed device
`installed at a checkpoint and a mobile device (wearable or
`hand held) carried by authorized personnel which could be
`configured to integrate pre-existing security systems without
`modification of the core program.
`Another advantage of the instant invention is to provide a
`guard activity and real time reporting Support system which
`includes a scheduled building and real time guard tour track
`ing system.
`Yet another advantage of the instant invention is to provide
`a system whereby bi-directional data and command transmis
`sion may occur between a base station (computer or server
`configuration) and any designated person or group of persons,
`which enables assistance deployment and transmits the loca
`tion of the person, group of persons, security guards and/or
`guard vehicles.
`A further advantage of the instant invention is to provide a
`system which records real-time object identification and
`tracking Subsystems for indoor and outdoor areas.
`Another advantage of the present invention is to provide a
`site video monitoring system which will be recorded, trans
`mitted and displayed at a base station (computer or server
`configuration) with the option of video data processing, to
`recognize and alert of certain predetermined events, such as
`access verification, etc.
`Still another advantage of the invention is to provide a
`system which may integrate pre-existing hardware into the
`system without requiring purchase of redundant hardware.
`Yet another advantage of the invention is to provide a
`system whereby there is automation of communication
`between base station and headquarters and between base
`station and any other specified person or distribution point
`whether mobile or fixed.
`It is also another advantage of the present invention to
`provide a system which would automate time sheets, payroll
`recap and other accounting operations.
`It is another advantage of the present invention to provide
`a system which provides availability of site level information
`from a centralized headquarters, or remotely away from a
`centralized headquarters.
`Still another advantage of the present invention is to pro
`vide a system which would provide access to historical infor
`mation Such as time sheets, event logs, and alert logs to
`designated personnel.
`
`40
`
`45
`
`Case 6:20-cv-00769-ADA Document 1-4 Filed 08/25/20 Page 18 of 28
`
`DISCLOSURE OF INVENTION
`
`It is therefore the principal advantage of the instant inven
`tion to provide a multiple site, integrated security system
`which incorporates and enhances the performance of human
`guards within said security system. The invaluable human
`presence acts as a deterrent and provides the irreplaceable
`human capability to observe, assess, coordinate, and react
`instantaneously to unusual and immediate circumstances.
`It is another advantage of the instant invention to provide
`the human guards with the latest technology, in the form of
`wearable and hand held computers or other data processors
`capable of wireless communications, in order to make the
`guards more intelligent and responsible to the guarded facili
`ties complex interactive environment.
`Another advantage of the instant invention is to provide a
`system which would be flexible in incorporating new tech
`nology and pre-existing hardware equipment thus providing a
`high level of integration with off the shelf security devices
`now existing or not yet conceived.
`It is a further advantage of the instant invention to provide
`a system of security which is able to be custom configured and
`
`50
`
`55
`
`60
`
`65
`
`
`
`5
`Yet another advantage of the present invention is to provide
`a means of communication via the Internet with a central
`console monitoring application.
`Still another advantage of the present invention is to pro
`vide a system with failure-resistance and robustness against
`hardware denials and intentional attacks by providing data
`backup on both facilities site and at Security headquarter
`levels.
`It is yet another advantage of the present invention to
`provide a system capable of communicating with preexisting
`and/or pre-built system configurations to be installed at spe
`cific kinds of sites.
`It is also another advantage of the present invention to
`provide a computer-implemented coordinated communica
`tions protocol and system, which would automate a real time
`alert System, direct security alerts, and translate those alerts
`into the local dialect or language.
`It is another advantage of the present invention to provide
`a security system which would support several levels of soft
`ware, users, data, applications and communications, and
`whereby security tasks are performed and verified by the
`guard during the guard tour and that information is recorded
`by the guardina checkpoint data processing application, then
`that recorded information is passed to a base station (com
`puter or server) processing application. The ability to provide
`central monitoring of guard tours is dependent upon novel
`wearable and handheld devices which are capable of wireless
`communications with the data processing checkpoint sta
`tions.
`Briefly, the advantages of the present invention are realized
`by providing a human-oriented security guard system as the
`pivotal aspect of the security system, whereby said guards are
`greatly enhanced by implementation of varying security
`device and microprocessor technology. The technological
`aspect of the system is not specific to any devices or equip
`ment currently on the market but would be site specific and
`would have the option of incorporating pre-existing technol
`ogy in centralized monitoring of the site. A high level inte
`gration enables introduction of novel technology appearing
`on the market or pre-existing site specific technology into the
`security system. Supported features of the system include a
`guard tour control system, centralized coordinated commu
`nications and reporting with headquarters, schedule builder
`and time recap automation, daily events and incident automa
`tion, Support of security protocol, optional web access to the
`base station application, synchronization with headquarters
`accounting database and centralized connection to existing
`client's equipment. The primary goal of the system configu
`ration is to make guard tour tasks planned, controlled, moni
`tored, recorded, expensed and paid in a highly efficient and
`effective manner.
`Moreover, the advantages of the present invention are real
`ized by providing a human guard enhancing multiple site
`security system comprising one or more human guards,
`peripheral equipment positioned at one or more sites, said
`peripheral equipment comprising one or more of a plurality of
`sensors, video cameras, positioning systems, and mobile
`communication and data processing equipment, said periph
`eral equipment being further capable of collecting and trans
`mitting event-related and environmental data, one or more
`checkpoint systems capable of receiving, processing into a
`standardized protocol, and further relaying the data received
`from said peripheral equipment, and of providing said one or
`more guards with information based on the data, and one or
`more stations capable of logging, processing, and reporting
`the data relayed from said one or more checkpoint systems to
`
`25
`
`30
`
`35
`
`40
`
`45
`
`50
`
`55
`
`60
`
`65
`
`Case 6:20-cv-00769-ADA Document 1-4 Filed 08/25/20 Page 19 of 28
`
`US 8,174,378 B2
`
`10
`
`15
`
`6
`provide a security system status and to facilitate human Super
`vision, situation analysis, decision making, and intervention.
`Additionally, a new and improved computer implemented
`communications protocol is provided, which is an XML
`based communications protocol for security monitoring pur
`poses. This unique XML based communications protocol is
`implemented through numerous modules which receive and
`convert data messages from diverse security devices and sen
`sors, standardize and send converted messages, and encrypt
`and decrypt said data messages to security personnel as nec
`essary. With the set modules, the data messages are filtered
`and transmitted from checkpoint computers to base station
`computers, which analyze, report, and log environmental as
`well as security events within a subject site. Moreover, real
`time alerts may be translated into local dialects and languages
`as necessary. The resulting integrated security system pro
`vides better monitoring and response tools to the security
`guards, better trained security guards, who are more alert and
`responsive, and more closely Supervised and easily Scheduled
`guards, with enhanced financial monitoring, more accurately
`paid and cost analyzed security services, better archived and
`reported security related events, as well as better coordination
`with public agencies, enhanced safety, and readily upgraded
`and integrated with existing and future technologies. Real
`time alerts may be selectively directed to a number of other
`systems, including public Safety agencies, government
`offices, School campuses, communities and globally.
`Therefore, this new and improved multiple site, readily
`Scalable security system is provided which combines human
`based security personnel integrated with a diverse integrated
`array of fixed and movable electronic security enhancing
`components, and numerous modes of communications
`between said components, including hard wired and wireless
`applications. The security related components include event
`sensors, identification tracking for people and things, access
`control devices, security guard wearable computers and hand
`held computers as well as embedded data processing control
`and communications systems, with all sensors and sites
`capable of being monitored by a designated headquarters
`through checkpoint data processing components and base
`station components. The security system provides better
`trained security guards, who are more alert and responsive,
`and more closely Supervised and easily scheduled, enhanced
`financial monitoring, more accurately paid and expensed
`security services, better archived and reported security
`related events, as well as being better coordinated with public
`agencies, enhanced safety, and readily upgraded with existing
`and future technologies.
`The above-mentioned and other advantages and features of
`the present invention and the manner of attaining them will
`become apparent, and the invention itself will be best under
`stood to those of skill in the art by reference to the disclosure
`herein in conjunction with the accompanying drawings.
`
`BRIEF DESCRIPTION OF DRAWINGS
`
`The accompanying drawings, which are incorporated in
`and form a part of this specification, illustrate embodiments
`of the invention, and together with the description, serve to
`explain the principles of this invention, wherein:
`FIG. 1 is a representational diagram of a multiple site
`integrated security system constructed in accordance with the
`present invention;
`FIG. 2 is an enlarged detailed diagram of a communica
`tions scheme between multiple checkpoint data processors
`and a central base station computer, constructed in accor
`dance with the present invention;
`
`
`
`US 8,174,378 B2
`
`10
`
`15
`
`25
`
`30
`
`35
`
`40
`
`45
`
`50
`
`7
`FIG. 3A is an enlarged detailed diagram of a base station
`located outside of the headquarters office with multiple work
`stations and hard wired as well as global computer network
`communications capabilities, constructed in accordance with
`the present invention;
`FIG. 3B is an enlarged detailed diagram of a base station
`within headquarters with multiple workstations and hard
`wired as well as global computer network communications
`capabilities, constructed in accordance with the present
`invention
`FIG. 4 is a block diagram of the checkpoint data processing
`architecture and communications system between the Secu
`rity system event sensors and said checkpoint data processor,
`in greater detail, constructed in accordance with the present
`invention;
`FIG.5 is a block diagram showing the checkpoint hardware
`architecture in greater detail, including communications
`routes between numerous checkpoint data processing units
`and a base station, constructed in accordance with the present
`invention;
`FIG. 6 is a block diagram of an integrated security system
`encrypted XML communications protocol illustrating com
`munications between system sensors, checkpoint data pro
`cessing units and the system core applicationatabase station,
`constructed in accordance with the present invention;
`FIG. 7 is a block diagram illustrating the three basic levels
`of architecture in the strategy and functioning of the overall
`method and protocol for real time security system commun