throbber
Case 6:20-cv-00769-ADA Document 1-4 Filed 08/25/20 Page 1 of 28
`
`Exhibit 4
`
`

`

`(12) United States Patent
`Richman et al.
`
`(10) Patent No.:
`(45) Date of Patent:
`
`US 8,174,378 B2
`May 8, 2012
`
`US008174378B2
`
`(54)
`
`HUMAN GUARD ENHANCING MULTIPLE
`STE SECURITY SYSTEM
`
`(75)
`
`Inventors:
`
`(73)
`
`Assignee:
`
`(*)
`
`Notice:
`
`Lawrence Richman, La Mesa, CA
`(US); Anca Vacaru, San Diego, CA
`(US): Olga A. Zatusevschi, San Diego,
`CA (US)
`Richman Technology Corporation, San
`Diego, CA (US)
`
`Subject to any disclaimer, the term of this
`patent is extended or adjusted under 35
`U.S.C. 154(b) by 969 days.
`
`(21)
`(22)
`(86)
`
`(87)
`
`(65)
`
`(51)
`
`(52)
`
`(58)
`
`Appl. No.:
`
`12/067,271
`
`PCT Fled:
`
`Mar. 18, 2005
`
`PCT/US2OOS/OO9408
`
`PCT NO.:
`S371 (c)(1),
`(2), (4) Date:
`PCT Pub. No.:
`WO2OO6/101490
`PCT Pub. Date: Sep. 28, 2006
`
`Mar. 18, 2008
`
`Prior Publication Data
`US 2010/O238O19 A1
`Sep. 23, 2010
`
`Int. C.
`(2006.01)
`GSB 9/00
`(2006.01)
`G08B I/00
`(2006.01)
`GSB 29/00
`U.S. C. ... 34.0/521; 340/506; 340/531; 340/539.16;
`340/522; 348/143: 700/83
`Field of Classification Search ................... 34O7521
`See application file for complete search history.
`
`1.
`
`14
`
`12
`
`A
`
`-
`
`I
`
`(56)
`
`References Cited
`
`U.S. PATENT DOCUMENTS
`6,400,265 B1* 6/2002 Saylor et al. .................. 340,531
`6,505,086 B1* 1/2003 Dodd et al. ..................... TOOf 65
`6,686,838 B1* 2/2004 Rezvani et al. ...
`... 340/506
`2003/0206100 A1* 11/2003 Richman et al. .............. 340/506
`* cited by examiner
`Primary Examiner — Donnie Crosland
`(74) Attorney, Agent, or Firm — Foley & Lardner LLP
`(57)
`ABSTRACT
`Provided is a human guard enhancing multiple site security
`system comprising one or more human guards, peripheral
`equipment positioned at one or more sites, said peripheral
`equipment comprising one or more of a plurality of sensors,
`Video cameras, positioning systems, and mobile communica
`tion and data processing equipment, said peripheral equip
`ment being further capable of collecting and transmitting
`event-related and environmental data, one or more check
`point systems capable of receiving, processing into a stan
`dardized protocol, and further relaying the data received from
`said peripheral equipment, and of providing said one or more
`guards with information based on the data, and one or more
`stations capable of logging, processing, and reporting the data
`relayed from said one or more checkpoint systems to provide
`a security system status and to facilitate human Supervision,
`situation analysis, decision making, and intervention. The
`system includes a computer implemented communications
`protocol, which is an XML based communications protocol
`for real time security alert monitoring purposes. The XML
`based communications protocol consists of numerous mod
`ules which receive and convert data messages from varying
`security devices and sensors, standardize, translate and send
`converted messages, and encrypt and decrypt said data mes
`Sages.
`
`26 Claims, 14 Drawing Sheets
`
`Cellower
`
`f * Satelite
`A
`
`
`
`ppa internet
`
`Sensor
`
`se
`
`Case 6:20-cv-00769-ADA Document 1-4 Filed 08/25/20 Page 2 of 28
`
`W
`
`t-
`
`Site. A
`&
`
`És
`Sets
`8
`\ f
`i-
`f
`vices
`checkpoi?t
`corputer
`Ho-
`------
`Base Station
`
`Sensor
`r
`a Sensor
`A.
`is
`?ix
`A
`T-2Checkpoint
`5.
`poi
`Seiso,
`{Ca! wireless Y
`r
`Network (eg. WiFi, etc.)
`^^----------
`
`Back-tip
`st
`r
`t
`mm
`headquarters
`
`-
`
`
`
`;
`
`6
`
`N
`
`20
`
`:
`
`Alert
`Engine
`26-
`
`|
`2."
`Workstation
`
`8
`
`•y
`Global Orbitting
`atellite System 3
`ge * Sensor \ -Gips
`A-
`is Seisor E
`(EGC Wiess Wides
`Ce: of&
`RNet.
`aia
`aiaaS8
`fri
`- Back-up
`u)
`-1 Workstation
`
`- 22
`
`-
`2
`a
`
`2:
`
`atabase
`
`8:3e
`--
`Elanguage
`guag
`far:sation
`voie
`24
`
`Workstatic
`arrrrrorcora
`
`se
`
`5 Back-up
`
`

`

`Case 6:20-cv-00769-ADA Document 1-4 Filed 08/25/20 Page 3 of 28
`Case 6:20-cv-OO769—ADA Document 1-4 Filed 08/25/20 Page 3 of 28
`
`U.S. Patent
`
`M
`
`21
`
`41f01teehS
`
`US 8,174,378 B2
`
`‘L
`
`@Eea”320
`
`”ExamRama
`
`
`
`
`Wu‘.gx
`m£02.,me
`
`8,SmcmmomE>mmmwmsg“muggy
`
`
`howcmm\
`
`{flu
`
`E0335
`
`
`
`3%.ES».3mVt
`mamEgan.
`ogwmzV31K
`
`-N“$03030
`
`$3335
`FemwsaEcu
`
`em‘
`
`émmmsmcmg
`
`commgmcmfi
`
`333$
`
`angumm
`
`-wmmmfima
`
`53mm
`
`mfiwmwmxag
`cowmmfiog
`
`mEmcm,.
`
`we?H
`
`mm
`
`r.9“.
`
`
`
`
`
`
`
`
`

`

`U.S. Patent
`
`
`
`
`
`
`
`
`
`
`
`?
`
`Case 6:20-cv-00769-ADA Document 1-4 Filed 08/25/20 Page 4 of 28
`
`Z '61)
`
`

`

`U.S. Patent
`
`US 8,174,378 B2
`
`
`
`
`
`dnºpeg (~<, ?-----------------------~--~~~~--~~~~~~~~~~~~~~~~---------- |
`
`o
`
`<C
`CY)
`g
`-
`
`
`
`
`
`
`
`
`
`
`
`Case 6:20-cv-00769-ADA Document 1-4 Filed 08/25/20 Page 5 of 28
`
`

`

`U.S. Patent
`
`May 8, 2012
`
`Sheet 4 of 14
`
`US 8,174,378 B2
`
`
`
`
`
`|
`
`
`
`
`
`
`
`Case 6:20-cv-00769-ADA Document 1-4 Filed 08/25/20 Page 6 of 28
`
`| –
`

`
`

`

`U.S. Patent
`
`May 8, 2012
`
`Sheet 5 of 14
`
`US 8,174,378 B2
`
`
`
`
`
`
`
`
`
`Case 6:20-cv-00769-ADA Document 1-4 Filed 08/25/20 Page 7 of 28
`
`g) uoppºleg
`
`7 (61-)
`
`ºs-Tsaesnes
`
`? ºdn?ejad?3 4.
`
`

`

`U.S. Patent
`
`May 8, 2012
`
`Sheet 6 of 14
`
`US 8,174,378 B2
`
`
`
`uuejfiold
`
`~~~~&#
`
`~901
`
`~ 0 || ||
`
`
`
`
`
`
`
`
`
`
`
`Case 6:20-cv-00769-ADA Document 1-4 Filed 08/25/20 Page 8 of 28
`
`G -61
`
`

`

`Case 6:20-cv-00769-ADA Document 1-4 Filed 08/25/20 Page 9 of 28
`
`23,
`
`m807o\Evflm3
`
`U.S. Patent
`
`r
`
`smmw
`
`Emv8},593wr2336
`
`0#2nEEE
`
`Ann8,E3353HEm>mSmcmmE
`
`Q3WuElaiis‘E...,E.E1&1//mMw—Egg.
`
`
`
`
`
`€39Ejm.cm:wma?m?V?cm:
`
`
`ncmefiE»PUtEbommmooiwcgmE
`
`mm3;.mm.m“$30;.2,:m3,wanrme,.E,,,EE,E,
`
`1..aE.mmxmSWwww;\fivka
`
`
`
`
`mung.§s«n&q332mm2Es555%;EEEJkE\EE”m:
`AM£8Emegfimuog$8$59
`am.E5“N:war.wx:mo.6353523380.250_$8w_w4EAtamfifié
`
`Emwwbmmmm,JHHM.,EE\EEE_HnE\‘Emma3%HmSum9:
`OW3,NE\‘uitillf
`
`
`
`
`
`
`

`

`U.S. Patent
`
`May 8, 2012
`
`Sheet 8 of 14
`
`US 8,174,378 B2
`
`90
`
`N
`
`92
`
`EVE
`Event Sensors/Hardware
`
`- - - -
`
`- -ka-a-a-a-a-a-a-a-a-a-a-a-a-a-a-a-a-aee-ee-actual
`
`—-
`EVE
`Conversion/Encryption
`
`
`
`94.
`
`96
`
`Case 6:20-cv-00769-ADA Document 1-4 Filed 08/25/20 Page 10 of 28
`
`EVE
`SCA
`
`device
`
`language data
`
`signais
`
`
`
`XM format
`r encrypted data
`messages
`
`Fig. 7
`
`

`

`U.S. Patent
`
`May 8, 2012
`
`Sheet 9 of 14
`
`US 8,174,378 B2
`
`Stand-Alone Checkpoint
`
`ra
`
`28
`
`(S5
`
`Other
`Sensor
`
`200
`
`
`
`Checkpoint Software
`
`
`
`Conversion
`Mode
`
`86-"
`
`Control Surf
`CRC
`
`
`
`Encryption
`
`88 u? Transmitting
`Module
`
`Case 6:20-cv-00769-ADA Document 1-4 Filed 08/25/20 Page 11 of 28
`
`Fig. 8A
`
`

`

`U.S. Patent
`
`May 8, 2012
`
`Sheet 10 of 14
`
`US 8,174,378 B2
`
`Mobile Checkpoint
`
`226
`
`A
`
`(S7). 228
`Cl
`Other
`
`
`
`in
`?ci
`t
`O
`
`22O
`
`i
`
`204
`
`Checkpoint Software
`
`84 -
`
`------
`
`Conversion
`Module
`
`ar
`Contro Sun
`86 - - CRC
`
`Encryption
`
`s
`
`88 -
`
`Transmitting
`Module
`
`i
`
`?tri
`92 -l-
`- L| u
`R r
`TxM.
`
`Case 6:20-cv-00769-ADA Document 1-4 Filed 08/25/20 Page 12 of 28
`
`F-no-eco-c-
`Base
`Station
`
`arra
`
`96
`
`Fig. 8B
`
`

`

`U.S. Patent
`
`May 8, 2012
`
`Sheet 11 of 14
`
`US 8,174,378 B2
`
`Distributed Checkpoint
`
`r"m
`(s /Y248 O O "I
`so
`Sensor
`efSO
`(D Tag)
`
`248
`
`240
`
`.N
`
`14- asaaaa-rarua-na-na---
`
`Checkpoint Software
`or Board Cel Phone
`
`------
`
`1
`
`a
`Ssss
`Cell
`Phone
`
`|
`
`
`
`---
`
`Eo
`9
`s
`-
`
`5---------------------rr
`
`5 a
`e S
`as S.
`(
`w --
`
`g
`9 s
`3
`
`N
`i.
`
`Checkpoint Software
`on Board
`Base Station Server
`
`---arearra ala---
`
`www.kuwarrrrrr
`
`244
`
`
`
`
`
`Case 6:20-cv-00769-ADA Document 1-4 Filed 08/25/20 Page 13 of 28
`
`--- ---
`
`Base
`Station Server
`
`ru-
`
`w
`
`vuukula-arrarae-wr-warm-hand-rwww.v.
`
`

`

`U.S. Patent
`
`May 8, 2012
`
`Sheet 12 of 14
`
`US 8,174,378 B2
`
`
`
`
`
`
`
`Case 6:20-cv-00769-ADA Document 1-4 Filed 08/25/20 Page 14 of 28
`
`aw-e-...-----a-ra-i-AM-e-Ala-----...
`
`

`

`U.S. Patent
`
`May 8, 2012
`
`Sheet 13 of 14
`
`US 8,174,378 B2
`
`?
`O)
`
`
`
`Case 6:20-cv-00769-ADA Document 1-4 Filed 08/25/20 Page 15 of 28
`
`

`

`Case 6:20-cv-00769-ADA Document 1-4 Filed 08/25/20 Page 16 of 28
`Case 6:20-cv-00769-ADA Document 1-4 Filed 08/25/20 Page 16 of 28
`
`U.S. Patent
`
`US 8,174,378 B2
`
`
`fifia8a8mg:mrucoummbééLacy“?WEESVAxmfioumvHaxmfiaeuqmKim03”maamaxmr3§$§m§E233fimeSvmaxszERm
`
`
`
`
`8.,$838W“x3503:36«29:30.
`
`
`M_
`
`..,
`
`
`
`mEmc
`
`
`
`EowmaoM..Mw$5323szQumEOLBMEdEijQmfl
`
`cowmu“,“oMW.m..“tzemem9mamEm$me
`
`hmmmzwmbnmmaaEgan,ESSQEEEmm3\fimEaumS.8..Em>w8mcmm0:»:
`
`
`
`“$an\mmm.a3m,3figmmmmnfimuE930\E30Em£055EmmegaémmE59530
`
`,awmmEawmkmnmwmmmmmmémxumnwHv3cum.“0
`
`mtmfiLegacy“
`
`wwmgfimm
`
`mgmcm$3.
`
`\xeomm
`
`
`
`mammEmz“x85055.,
`
`
`
`{If}!.—HWUwesewage
`
`
`wig“x350MEmma»33059mommmuumi
`
`
`
`
`
`
`
`”mm..mEmmwwUEwEumwchmmEOE
`
`
`
`

`

`US 8,174,378 B2
`
`1.
`HUMAN GUARD ENHANCING MULTIPLE
`SITE SECURITY SYSTEM
`
`TECHNICAL FIELD
`
`The present invention relates to a guard enhancing multiple
`site integrated security system and method of making same.
`More particularly, the present invention relates to a human
`security guard oriented system of security service, training
`and multiple site monitoring, which facilitates communica
`tions between real time security hardware and a real time
`security alert monitoring thereby providing human security
`guards with the latest technology to make them more intelli
`gent and responsive within a complex interactive environ
`ment.
`
`10
`
`15
`
`BACKGROUND ART
`
`2
`highly effective presence of human security guards, guards
`that are further enhanced by electronic wireless communica
`tions and monitoring.
`Additionally, the entire system depends upon the installa
`tion and presence of numerous hard wired security devices in
`a given area and is not readily Scalable to incorporate larger
`areas in the surveillance area in a short period of time without
`extensive outlay of effort and installation of new equipment.
`The acoustic energy “weapon' used as a deterrent to intruders
`is not confined to any given space and might pose a threat to
`anyone, including authorized individuals, within hearing dis
`tance.
`Therefore, it would be highly desirable to have a new and
`improved enhanced security guard system which would allow
`for computerized and wireless communications and monitor
`ing of human security guards and their activities with a cen
`tralized location, in addition to conventional security devices
`and which would be scalable with minimal time and material
`expenditure, and which would provide for human guards to
`act as a more rapid and effective deterrent to intruders.
`The conventional exit guard system addresses the require
`ments of providing areas with detection of movement of a
`Subject along an exit path in an unauthorized direction. This
`system further provides for a human monitor at a centralized
`location with added supervision of the deactivation of the
`security alarm system only by authorized personnel.
`However, within this system there is no human security
`guard on site actively patrolling the area. This electronically
`augmented human presence is irreplaceable as a deterrent to
`potential intruders as well as providing for flexibility in terms
`of monitoring and responding to a variety of situations that
`might arise.
`Therefore, it would be highly desirable to have a new and
`improved, technologically augmented human presence auto
`matically reporting to a centralized location, or a remote
`monitoring station through communications over a global
`computer network, cellular telephone network, or via satellite
`link, which could then monitor and record guard activities as
`well as utilize pre-existing event detection technology, Such
`as motion, Video and perimeter control devices to alert those
`guards of real time events taking place on their shift.
`Many patents describe relatively sophisticated security
`systems utilizing video images obtained from a plurality of
`cameras relayed to a site control unit equipped with an auto
`mated image processor. The images are then relayed to a
`security system operator who then analyzes the images and
`informs authorities of an intrusion.
`While these systems utilize advanced technological fea
`tures to distinguish between actual intrusions and false alarms
`(friend or foe), the absence of a human guard which would
`serve to discourage intrusions is notably absent. Moreover,
`the presence of human guards makes those that are present
`within the facility feel protected and well taken care of, and
`these individuals will often speak to the security guards or
`become familiar with them to avoid any misunderstanding as
`to their access authorization or the like.
`Additionally, the highly automated image processor and
`related complex software used to differentiate between actual
`foe intrusions and friendly false alarms is inherently limited
`in its capability to observe, compare and react to the myriad of
`potential one time or entirely novel situations which might
`occur. This type of security monitoring can only be accom
`plished with highly trained, well equipped, and competently
`Supervised human security guards on duty in numbers corre
`sponding to the amount of space or activity required for
`optimal security from outside threats.
`
`In addition to traditional threats to security such as bur
`glary, Vandalism and arson, today's complex national and
`international political conflicts are putting increased pressure
`on facilities and organizations of all kinds to provide effective
`security systems for the safety and protection of personnel,
`property and Surroundings.
`Devices and systems for the provision of safety and Secu
`rity of persons and property are well known. Examples of
`different types and kinds of security systems for protection
`and Surveillance methods of building structures and Sur
`rounding areas are disclosed in numerous worldwide patents.
`In general, the structure and function of most security
`systems involves electronic Surveillance equipment moni
`tored at a centralized location. Current development of secu
`rity systems attempts to do away with human-oriented Ser
`vices and replace the human security guard with high
`technology solutions to security problems. Only a limited
`number of currently developed security systems utilize a
`combination of guards in close conjunction with the elec
`tronic equipment. Most of the time, these systems involve one
`guard who monitors a video feed or alarm panel for intrusion
`or other related alerts. These security systems are commonly
`built, installed and implemented without any regard for the
`particular facilities of other systems, for example, the facili
`ties of built-in environmental and climate control, the track
`ing of people and assets within the building or complex, and
`fire/Smoke detection as well as transport systems such as
`elevators, etc.
`Therefore, it would be highly desirable to have a new and
`improved security system which not only enhances the
`human security guard services, but also integrates facilities
`management, and allows for real time identification, global
`positioning satellite (GPS) tracking, radio frequency identi
`fication (RFID) tracking, Wi-Fi and other tracking methods
`for people as well as assets such as computers, and other
`valuable instrumentation, all in a readily Scalable configura
`tion utilizing off the shelf electronic security and communi
`cations components.
`An electronic Surveillance system for remote guarding of
`an area using an operator station including a signal receiver
`with television display, radiant energy selection control, and
`energy level controller is known in the prior art. Such a device
`remotely controls and directs an apparatus “weapon' for inte
`gration with traditionally secured facilities, remote detection
`devices, closed circuit TV, and a remotely-located, manned
`control station. While such a computerized system is helpful
`in detection of unauthorized personnel in a given area and
`does seek to incorporate pre-existing security devices, there is
`no provision which would allow for the irreplaceable and
`
`25
`
`30
`
`35
`
`40
`
`45
`
`50
`
`55
`
`60
`
`65
`
`Case 6:20-cv-00769-ADA Document 1-4 Filed 08/25/20 Page 17 of 28
`
`

`

`US 8,174,378 B2
`
`5
`
`10
`
`15
`
`25
`
`30
`
`35
`
`3
`Therefore, it would be highly desirable to have a new and
`improved system for the technological augmentation of
`human guards who are irreplaceable in terms of providing a
`deterrent to intrusion and who are capable of observing,
`assessing and responding to novel and unusual situations and
`whose actions would automatically be reported to a central
`ized headquarters with integrated automated daily events and
`incident real time reporting.
`Finally, there are patented inventions which provide for an
`apparatus for monitoring Subjects having a location determin
`ing device which provides the location of the subject to a
`processor. The processor then stores and retrieves data gen
`erated or received by the processor. The primary means by
`which the subject is tracked is by usage of a GPS. Comparison
`of the parameters of given geographical boundaries to the
`data from the location determining device may determine if
`the subject has deviated from those parameters. The claimed
`invention mandates detection of at least one physiological
`parameter of the Subject in order to compare existing Subject
`data previously stored.
`These imaginative inventions do provide for tracking and
`determination of the general area in which a subject is to be
`found and a means by which to compare the location with a
`pre-determined geographic location. Unfortunately, while
`the location and tracking device may show a general area in
`which the Subject is located, there is no way of determining
`the exact location of the Subject at any given point in time.
`In addition, this system again depends upon a complex
`processor which must be programmed with any number of
`parameters. The system may fail to operate properly or may
`not operate at all if incorporated into a pre-existing security
`system, especially one having less complex processors avail
`able on site.
`Therefore, it would be highly desirable to have a new and
`improved system for technological augmentation of human
`guards automatically reporting exact location and time to a
`centralized headquarters with daily events and incident
`reporting automation which could give exact locations and
`time records of movement of the guards which would readily
`incorporate pre-existing hardware and Software. Moreover, it
`would be highly desirable to enable said guards to be alerted
`in real time when security threatening events or environmen
`tal events occur including the automated translations of these
`real time alerts into local dialects and local languages.
`
`4
`scaled up or down, by being individually tailored to site
`conditions such as site component configurations, checkpoint
`locations, building type material, building transportation sys
`tems, facilities environmental control systems, such as cli
`mate control, fire and Smoke detection, and other varied
`parameters.
`Yet another advantage of the present invention is to provide
`a system which would automatically monitor and control
`certain movable and fixed site conditions such as people and
`vehicles at checkpoints, safety systems, access control sys
`tems, position sensors, transportation control systems, power
`Supply systems, water and hydraulic control systems, warn
`ing systems, lighting systems, communications systems and
`miscellaneous site-specific systems such as greenhouse tem
`perature controls.
`Yet a further advantage of the invention is to enable training
`of human guards including drills, system operating instruc
`tions, and interactive testing of guard utilization of all system
`components, including software, hardware and communica
`tions.
`Still another advantage of the instant invention is to provide
`a system for security which monitors the identification and
`authorization of personnel inside secured areas through use of
`a two points access Subsystem composed of a fixed device
`installed at a checkpoint and a mobile device (wearable or
`hand held) carried by authorized personnel which could be
`configured to integrate pre-existing security systems without
`modification of the core program.
`Another advantage of the instant invention is to provide a
`guard activity and real time reporting Support system which
`includes a scheduled building and real time guard tour track
`ing system.
`Yet another advantage of the instant invention is to provide
`a system whereby bi-directional data and command transmis
`sion may occur between a base station (computer or server
`configuration) and any designated person or group of persons,
`which enables assistance deployment and transmits the loca
`tion of the person, group of persons, security guards and/or
`guard vehicles.
`A further advantage of the instant invention is to provide a
`system which records real-time object identification and
`tracking Subsystems for indoor and outdoor areas.
`Another advantage of the present invention is to provide a
`site video monitoring system which will be recorded, trans
`mitted and displayed at a base station (computer or server
`configuration) with the option of video data processing, to
`recognize and alert of certain predetermined events, such as
`access verification, etc.
`Still another advantage of the invention is to provide a
`system which may integrate pre-existing hardware into the
`system without requiring purchase of redundant hardware.
`Yet another advantage of the invention is to provide a
`system whereby there is automation of communication
`between base station and headquarters and between base
`station and any other specified person or distribution point
`whether mobile or fixed.
`It is also another advantage of the present invention to
`provide a system which would automate time sheets, payroll
`recap and other accounting operations.
`It is another advantage of the present invention to provide
`a system which provides availability of site level information
`from a centralized headquarters, or remotely away from a
`centralized headquarters.
`Still another advantage of the present invention is to pro
`vide a system which would provide access to historical infor
`mation Such as time sheets, event logs, and alert logs to
`designated personnel.
`
`40
`
`45
`
`Case 6:20-cv-00769-ADA Document 1-4 Filed 08/25/20 Page 18 of 28
`
`DISCLOSURE OF INVENTION
`
`It is therefore the principal advantage of the instant inven
`tion to provide a multiple site, integrated security system
`which incorporates and enhances the performance of human
`guards within said security system. The invaluable human
`presence acts as a deterrent and provides the irreplaceable
`human capability to observe, assess, coordinate, and react
`instantaneously to unusual and immediate circumstances.
`It is another advantage of the instant invention to provide
`the human guards with the latest technology, in the form of
`wearable and hand held computers or other data processors
`capable of wireless communications, in order to make the
`guards more intelligent and responsible to the guarded facili
`ties complex interactive environment.
`Another advantage of the instant invention is to provide a
`system which would be flexible in incorporating new tech
`nology and pre-existing hardware equipment thus providing a
`high level of integration with off the shelf security devices
`now existing or not yet conceived.
`It is a further advantage of the instant invention to provide
`a system of security which is able to be custom configured and
`
`50
`
`55
`
`60
`
`65
`
`

`

`5
`Yet another advantage of the present invention is to provide
`a means of communication via the Internet with a central
`console monitoring application.
`Still another advantage of the present invention is to pro
`vide a system with failure-resistance and robustness against
`hardware denials and intentional attacks by providing data
`backup on both facilities site and at Security headquarter
`levels.
`It is yet another advantage of the present invention to
`provide a system capable of communicating with preexisting
`and/or pre-built system configurations to be installed at spe
`cific kinds of sites.
`It is also another advantage of the present invention to
`provide a computer-implemented coordinated communica
`tions protocol and system, which would automate a real time
`alert System, direct security alerts, and translate those alerts
`into the local dialect or language.
`It is another advantage of the present invention to provide
`a security system which would support several levels of soft
`ware, users, data, applications and communications, and
`whereby security tasks are performed and verified by the
`guard during the guard tour and that information is recorded
`by the guardina checkpoint data processing application, then
`that recorded information is passed to a base station (com
`puter or server) processing application. The ability to provide
`central monitoring of guard tours is dependent upon novel
`wearable and handheld devices which are capable of wireless
`communications with the data processing checkpoint sta
`tions.
`Briefly, the advantages of the present invention are realized
`by providing a human-oriented security guard system as the
`pivotal aspect of the security system, whereby said guards are
`greatly enhanced by implementation of varying security
`device and microprocessor technology. The technological
`aspect of the system is not specific to any devices or equip
`ment currently on the market but would be site specific and
`would have the option of incorporating pre-existing technol
`ogy in centralized monitoring of the site. A high level inte
`gration enables introduction of novel technology appearing
`on the market or pre-existing site specific technology into the
`security system. Supported features of the system include a
`guard tour control system, centralized coordinated commu
`nications and reporting with headquarters, schedule builder
`and time recap automation, daily events and incident automa
`tion, Support of security protocol, optional web access to the
`base station application, synchronization with headquarters
`accounting database and centralized connection to existing
`client's equipment. The primary goal of the system configu
`ration is to make guard tour tasks planned, controlled, moni
`tored, recorded, expensed and paid in a highly efficient and
`effective manner.
`Moreover, the advantages of the present invention are real
`ized by providing a human guard enhancing multiple site
`security system comprising one or more human guards,
`peripheral equipment positioned at one or more sites, said
`peripheral equipment comprising one or more of a plurality of
`sensors, video cameras, positioning systems, and mobile
`communication and data processing equipment, said periph
`eral equipment being further capable of collecting and trans
`mitting event-related and environmental data, one or more
`checkpoint systems capable of receiving, processing into a
`standardized protocol, and further relaying the data received
`from said peripheral equipment, and of providing said one or
`more guards with information based on the data, and one or
`more stations capable of logging, processing, and reporting
`the data relayed from said one or more checkpoint systems to
`
`25
`
`30
`
`35
`
`40
`
`45
`
`50
`
`55
`
`60
`
`65
`
`Case 6:20-cv-00769-ADA Document 1-4 Filed 08/25/20 Page 19 of 28
`
`US 8,174,378 B2
`
`10
`
`15
`
`6
`provide a security system status and to facilitate human Super
`vision, situation analysis, decision making, and intervention.
`Additionally, a new and improved computer implemented
`communications protocol is provided, which is an XML
`based communications protocol for security monitoring pur
`poses. This unique XML based communications protocol is
`implemented through numerous modules which receive and
`convert data messages from diverse security devices and sen
`sors, standardize and send converted messages, and encrypt
`and decrypt said data messages to security personnel as nec
`essary. With the set modules, the data messages are filtered
`and transmitted from checkpoint computers to base station
`computers, which analyze, report, and log environmental as
`well as security events within a subject site. Moreover, real
`time alerts may be translated into local dialects and languages
`as necessary. The resulting integrated security system pro
`vides better monitoring and response tools to the security
`guards, better trained security guards, who are more alert and
`responsive, and more closely Supervised and easily Scheduled
`guards, with enhanced financial monitoring, more accurately
`paid and cost analyzed security services, better archived and
`reported security related events, as well as better coordination
`with public agencies, enhanced safety, and readily upgraded
`and integrated with existing and future technologies. Real
`time alerts may be selectively directed to a number of other
`systems, including public Safety agencies, government
`offices, School campuses, communities and globally.
`Therefore, this new and improved multiple site, readily
`Scalable security system is provided which combines human
`based security personnel integrated with a diverse integrated
`array of fixed and movable electronic security enhancing
`components, and numerous modes of communications
`between said components, including hard wired and wireless
`applications. The security related components include event
`sensors, identification tracking for people and things, access
`control devices, security guard wearable computers and hand
`held computers as well as embedded data processing control
`and communications systems, with all sensors and sites
`capable of being monitored by a designated headquarters
`through checkpoint data processing components and base
`station components. The security system provides better
`trained security guards, who are more alert and responsive,
`and more closely Supervised and easily scheduled, enhanced
`financial monitoring, more accurately paid and expensed
`security services, better archived and reported security
`related events, as well as being better coordinated with public
`agencies, enhanced safety, and readily upgraded with existing
`and future technologies.
`The above-mentioned and other advantages and features of
`the present invention and the manner of attaining them will
`become apparent, and the invention itself will be best under
`stood to those of skill in the art by reference to the disclosure
`herein in conjunction with the accompanying drawings.
`
`BRIEF DESCRIPTION OF DRAWINGS
`
`The accompanying drawings, which are incorporated in
`and form a part of this specification, illustrate embodiments
`of the invention, and together with the description, serve to
`explain the principles of this invention, wherein:
`FIG. 1 is a representational diagram of a multiple site
`integrated security system constructed in accordance with the
`present invention;
`FIG. 2 is an enlarged detailed diagram of a communica
`tions scheme between multiple checkpoint data processors
`and a central base station computer, constructed in accor
`dance with the present invention;
`
`

`

`US 8,174,378 B2
`
`10
`
`15
`
`25
`
`30
`
`35
`
`40
`
`45
`
`50
`
`7
`FIG. 3A is an enlarged detailed diagram of a base station
`located outside of the headquarters office with multiple work
`stations and hard wired as well as global computer network
`communications capabilities, constructed in accordance with
`the present invention;
`FIG. 3B is an enlarged detailed diagram of a base station
`within headquarters with multiple workstations and hard
`wired as well as global computer network communications
`capabilities, constructed in accordance with the present
`invention
`FIG. 4 is a block diagram of the checkpoint data processing
`architecture and communications system between the Secu
`rity system event sensors and said checkpoint data processor,
`in greater detail, constructed in accordance with the present
`invention;
`FIG.5 is a block diagram showing the checkpoint hardware
`architecture in greater detail, including communications
`routes between numerous checkpoint data processing units
`and a base station, constructed in accordance with the present
`invention;
`FIG. 6 is a block diagram of an integrated security system
`encrypted XML communications protocol illustrating com
`munications between system sensors, checkpoint data pro
`cessing units and the system core applicationatabase station,
`constructed in accordance with the present invention;
`FIG. 7 is a block diagram illustrating the three basic levels
`of architecture in the strategy and functioning of the overall
`method and protocol for real time security system commun

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket