`
`Exhibit 1
`
`
`
`USOO835.0698B2
`
`(12) United States Patent
`Richman
`
`(10) Patent No.:
`(45) Date of Patent:
`
`US 8,350,698 B2
`*Jan. 8, 2013
`
`(54) METHOD AND PROTOCOL FOR REAL TIME
`SECURITY SYSTEM
`(75) Inventor: Lawrence Richman, La Mesa, CA (US)
`(73) Assignee: Richman Management Corporation,
`San Diego, CA (US)
`
`- r
`c
`(*) Notice:
`
`Subject to any disclaimer, the term of this
`patent is extended or adjusted under 35
`U.S.C. 154(b) by 0 days.
`This patent is subject to a terminal dis-
`claimer.
`
`(21) Appl. No.: 13/174,348
`(22) Filed:
`Jun. 30, 2011
`
`(65)
`
`Prior Publication Data
`US 2011 FO260851A1
`Oct. 27, 2011
`
`Related U.S. Application Data
`(63) Continuation of application No. 12/253,826, filed on
`Oct. 17, 2008, now Pat. No. 7,990,268, which is a
`continuation of application No. 10/ 176,565, filed O
`Jun. 20, 2002, now abandoned, which is a
`continuation-in-part of application No. 10/139,110,
`filed on May 4, 2002, now Pat. No. 6,894,617.
`(51) Int. Cl.
`(2006.01)
`G08B I3/00
`(52) U.S. Cl. ....................................................... 340/541
`(58) Field of Classification Search .................. 340/541,
`340/573.1, 506, 539.1, 539.11,539.14,539.17,
`340/539.22; 345/7
`See application file for complete search history.
`
`(56)
`
`References Cited
`
`U.S. PATENT DOCUMENTS
`3,736,561 A
`5/1973 Rumpel
`4,864,494. A
`9, 1989 Kobus, Jr.
`
`5,132,968 A * 7/1992 Cephus ......................... 370,349
`5,515,288 A
`5/1996 Aberson
`5,623,258 A
`4, 1997 Dorfman
`St. A
`2. SGE.
`5,764,146 A
`6/1998 Baldwin et al.
`5,802,280 A
`9, 1998 Cotichini et al.
`5,861,804 A
`1/1999 Fansa et al.
`6,034,603 A
`3/2000 Steeves
`6,204,762 B1* 3/2001 Dering et al. ................. 340,541
`6,271,752 B1
`8, 2001 Vaios
`6.294.953 B1
`9, 2001 Steeves
`6,300,863 B1
`10/2001 Cotichini et al.
`6,342,915 B1
`1/2002 Ozaki et al.
`6,384,414 B1* 5/2002 Fisher et al. ............. 250/339.14
`6,400,265 B1
`6/2002 Saylor et al.
`6,456,261 B1
`9/2002 Zhang
`(Continued)
`
`OTHER PUBLICATIONS
`
`Notice of Allowance for U.S. Appl. No. 12/253,826 (mailed Mar. 25.
`2011).
`
`(Continued)
`
`Primary Examiner — Phung Nguyen
`(74) Attorney, Agent, or Firm — Sheppard Mullin Richter &
`H ampton LLP. Anthony C. Kuhlmann
`
`(57)
`ABSTRACT
`A security system comprises one or more sensor devices
`configured to detect conditions at one or more sites; one or
`more checkpoints at each of said one or more sites configured
`to receive signals from the one or more sensor devices; and a
`central headquarters processor configured to receive signals
`indicative of the conditions detected at said one or more sites
`from the one or more checkpoints. The central headquarters
`processor is configured to process the signals to determine if
`an event has occurred.
`
`20 Claims, 8 Drawing Sheets
`
`Case 6:20-cv-00770-ADA Document 1-1 Filed 08/25/20 Page 2 of 20
`
`
`
`
`
`
`
`
`
`R. Sensaf
`
`checkpoint
`
`checkpoint
`Computer
`
`as was
`Base Station
`
`bata
`base
`
`sack
`-up
`
`
`
`US 8,350,698 B2
`Page 2
`
`U.S. PATENT DOCUMENTS
`6,505,086 B1* 1/2003 Dodd, Jr. et al. ................ TOOf 65
`6,545,601 B1 * 4/2003 Monroe ........................ 340,521
`6,563,910 B2
`5, 2003 Menard et al.
`6,658.348 B2 12/2003 Rudd et al.
`6,686,838 B1
`2/2004 Rezvani et al.
`6,720,874 B2
`4/2004 Fulfido et al.
`6,894,617 B2
`5, 2005 Richman
`6,973,478 B1
`12/2005 Ketonen et al.
`7,030,757 B2
`4/2006 Matsuhira et al.
`7,242.295 B1*
`7/2007 Milinusic et al. ............. 340,541
`2002fO194267 A1
`12/2002 Flesner et al.
`2003/O15907O A1
`8/2003 Mayer et al.
`2003/0206100 A1 11/2003 Richman et al.
`
`OTHER PUBLICATIONS
`Non-final office action for U.S. Appl. No. 12/253,826 (mailed Nov.
`12, 2010).
`Communication for U.S. Appl. No. 10/176,565 (mailed Dec. 1,
`2008).
`Non-final office action for U.S. Appl. No. 10/176,565 (mailed Apr.
`15, 2008).
`Final office action for U.S. Appl. No. 10/176,565 (mailed Apr. 30.
`2007).
`Non-final office action for U.S. Appl. No. 10/176,565 (mailed Jul. 19.
`2007).
`Non-final office action for U.S. Appl. No. 10/176,565 (mailed Sep. 7.
`2006).
`
`Notice of Allowance for U.S. Appl. No. 10/139,110 (mailed Nov. 17.
`2004).
`Non-final office action for U.S. Appl. No. 10/139,110 (mailed Apr.
`19, 2004).
`Final office action for U.S. Appl. No. 12/067.271 (mailed Aug. 11,
`2011).
`Non-Final office action for U.S. Appl. No. 12/067.271 (mailed Dec.
`10, 2010).
`International Search Report for PCT Patent Application No. PCT/
`US2005/OO9408.
`Notice of References Cited, PTO-892, Part of Paper No. 20101105,
`for U.S. Appl. No. 12/253,826.
`Notice of References Cited, PTO-892, Part of Paper No. 20080206,
`for U.S. Appl. No. 10/176,565.
`Notice of References Cited, PTO-892, Part of Paper No. 20070706,
`for U.S. Appl. No. 10/176,565.
`Notice of References Cited, PTO-892, Part of Paper No. 20070212,
`for U.S. Appl. No. 10/176,565.
`Notice of References Cited, PTO-892, Part of Paper No. 20020620,
`for U.S. Appl. No. 10/176,565.
`Notice of References Cited, PTO-892, Part of Paper No. 2, for U.S.
`Appl. No. 10/139,110.
`Notice of References Cited, PTO-892, Part of Paper No. 2010 1130,
`for U.S. Appl. No. 12/067,271.
`* cited by examiner
`
`Case 6:20-cv-00770-ADA Document 1-1 Filed 08/25/20 Page 3 of 20
`
`
`
`U.S. Patent
`
`
`
`US 8,350,698 B2
`
`Case 6:20-cv-00770-ADA Document 1-1 Filed 08/25/20 Page 4 of 20
`
`
`
`U.S. Patent
`
`Jan. 8, 2013
`
`Sheet 2 of 8
`
`US 8,350,698 B2
`
`
`
`3SeqeqeG
`
`
`
`SJ3) JenbpeaH o L
`
`JOSua S
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`Case 6:20-cv-00770-ADA Document 1-1 Filed 08/25/20 Page 5 of 20
`
`
`
`U.S. Patent
`
`Jan. 8, 2013
`
`Sheet 3 of 8
`
`US 8,350,698 B2
`
`O 1
`
`
`
`
`
`
`
`Case 6:20-cv-00770-ADA Document 1-1 Filed 08/25/20 Page 6 of 20
`
`
`
`uohens eseg ! 0 1
`
`
`
`U.S. Patent
`
`Jan. 8, 2013
`
`Sheet 4 of 8
`
`US 8,350,698 B2
`
`
`
`
`
`
`
`
`
`
`
`98
`
`Case 6:20-cv-00770-ADA Document 1-1 Filed 08/25/20 Page 7 of 20
`
`Z6Z8~~~~…,
`
`96
`
`?un?euadual
`
`Suosu3S
`
`
`
`U.S. Patent
`
`US 8,350,698 B2
`
`
`
`
`
`Case 6:20-cv-00770-ADA Document 1-1 Filed 08/25/20 Page 8 of 20
`
`/
`
`00!
`
`
`
`Case 6:20-cv-00770-ADA Document 1-1 Filed 08/25/20 Page 9 of 20
`Case 6:20-cv-OO770-ADA Document 1-1 Filed 08/25/20 Page 9 of 20
`
`U.S. Patent
`
`aJ
`
`m
`
`US 8,350,698 B2
`
`
`
`
`
`
`
`Em>wLomcmwBAmvmamZAmvmnoo250300mmwzntfid‘
`
`
`
`0MEon€26a/J
`
`
`
`mom?
`
`VN.‘
`
`Nme
`
`E996
`
`meomcmw
`
`«MmbooqEX536.2%
`
`
`
`
`M233%mmmmHm«Ow03
`
`
`
`mm?
`
`
`
`
`
`
`mm?Sta?93:54Em>meomcmwA/
`
`mvamEmZAmvmooolmuoo-mnoo
`
`“up—OHM
`
`058005
`
`'05E-gm
`
`QB9:952
`
`N3,©é?“-
`
`vmwmm?
`
`
`
`E:
`
`
`
`
`
`
`
`
`
`U.S. Patent
`
`Jan. 8, 2013
`
`Sheet 7 of 8
`
`US 8,350,698 B2
`
`190
`
`192
`
`LEVEL
`Event SensOrS/Hardware
`
`
`
`
`
`194
`
`LEVEL
`Conversion/Encryption
`
`196
`
`LEVEL
`SCA/Remote Users
`
`device
`language data
`signals
`
`XML format
`encrypted data
`messages
`
`Case 6:20-cv-00770-ADA Document 1-1 Filed 08/25/20 Page 10 of 20
`
`Fig. 7
`
`
`
`U.S. Patent
`
`Jan. 8, 2013
`
`Sheet 8 of 8
`
`US 8,350,698 B2
`
`200
`N
`
`---
`a standardized
`message in
`XML format
`Orm
`204
`
`
`
`
`
`an encrypted
`
`208
`
`a signal at a
`specified serial
`port
`
`240 N-
`212
`
`a standardized
`message in
`XML format
`with CRC
`
`220
`
`
`
`
`
`
`
`
`
`
`
`
`
`SensOrS
`
`input Device(s)
`
`O2
`2
`
`Conversion Module
`
`Control Sum/CRC Adding Module
`
`
`
`t
`
`UDP/ CP
`Seria Port USB/R
`Transmitting
`Transmitting
`Module
`Module
`System Core
`Application
`Seria Port/USB/R
`Receiving Module
`
`Control Sum/CRC Checking
`and Removing Module
`
`
`
`hardware signal
`
`a Standardized
`message in
`XML format
`
`
`
`210
`
`UDP packet(s)
`written to a
`specified UDP
`SOCket
`
`214
`an encrypted
`
`216
`
`218
`
`Standardized
`message in
`XML format
`
`
`
`filtered
`standardized
`message in
`XML format
`
`Case 6:20-cv-00770-ADA Document 1-1 Filed 08/25/20 Page 11 of 20
`
`Message Filtering Module
`standardized
`message in
`- Message Queuing Module
`XML format
`/
`222 --
`224
`
`D
`
`
`
`
`
`US 8,350,698 B2
`
`1.
`METHOD AND PROTOCOL FOR REAL TIME
`SECURITY SYSTEM
`
`This application is a Continuation of U.S. patent applica
`tion Ser. No. 12/253,826, filed Oct. 17, 2008, which is a
`Continuation of U.S. patent application Ser. No. 10/176,565,
`filed Jun. 20, 2002, now abandoned, which is a Continuation
`in-part of U.S. patent application Ser. No. 10/139,110, filed
`May 4, 2002, now U.S. Pat. No. 6,894,617, issued May 17,
`2005, each of which are incorporated herein by reference in
`their entirety for all purposes.
`
`BACKGROUND OF THE INVENTION
`
`1. Field of the Invention
`The present invention relates to a multiple site integrated
`security system method and communications protocol. More
`particularly, the present invention relates to a human oriented
`system of security service and a computer implemented uni
`Versal communications protocol which facilitates communi
`cations between real time security hardware and a real time
`security monitoring Software system.
`2. Description of the Related Art
`In addition to traditional threats to security such as bur
`glary, Vandalism and arson, today's complex national and
`international political conflicts are putting increased pressure
`on facilities and organizations of all kinds to provide effective
`security systems for the safety and protection of personnel,
`property and Surroundings.
`Devices and systems for the provision of safety and Secu
`rity of persons and property are well known. Examples of
`different types and kinds of security systems for protection
`and Surveillance methods of building structures and Sur
`rounding areas are disclosed in U.S. Pat. Nos. 6,204,762 B1,
`6,154,133, 6,097,429, and 5,825,283.
`In general, the structure and function of most security
`systems involves electronic Surveillance equipment moni
`tored at a centralized location. Current development of secu
`rity systems attempts to do away with human-oriented Ser
`vices and replace the human security guard with high
`technology solutions to security problems. Only a limited
`number of currently developed security systems utilize a
`combination of guards in close conjunction with the elec
`tronic equipment. Most of the time, these systems involve one
`guard who monitors a video feed or alarm panel for intrusion
`or other related alerts. These security systems are commonly
`built, installed and implemented without any regard for the
`particular facilities of other systems, for example, the facili
`ties of built-in environmental and climate control, the track
`ing of people and assets within the building or complex, and
`fire/Smoke detection as well as transport systems such as
`elevators, etc.
`Therefore, it would be highly desirable to have a new and
`improved security system which not only enhances the
`human security guard services, but also integrates facilities
`management, and allows for identification and global posi
`tioning satellite (GPS) tracking of people as well as assets
`Such as computers, and other valuable instrumentation, all in
`a readily scalable configuration utilizing off the shelf elec
`tronic security and communications components.
`An electronic Surveillance system for remote guarding of
`an area using an operator station including a signal receiver
`with television display, radiant energy selection control, and
`energy level controller is known in the prior art. Such a device
`is described in U.S. Pat. No. 6,204,762 B1. The novel inven
`tion remotely controls and directs an apparatus “weapon' for
`integration with traditionally secured facilities, remote detec
`
`Case 6:20-cv-00770-ADA Document 1-1 Filed 08/25/20 Page 12 of 20
`
`2
`tion devices, closed circuit TV, and a remotely-located,
`manned control station. While Such a computerized system is
`helpful in detection of unauthorized personnel in a given area
`and does seek to incorporate pre-existing security devices,
`there is no provision which would allow for the irreplaceable
`and highly effective presence of human security guards,
`guards that are further enhanced by electronic wireless com
`munications and monitoring.
`Additionally, the entire system depends upon the installa
`tion and presence of numerous hard wired security devices in
`a given area and is not readily Scalable to incorporate larger
`areas in the surveillance area in a short period of time without
`extensive outlay of effort and installation of new equipment.
`The acoustic energy “weapon' used as a deterrent to intruders
`is not confined to any given space and might pose a threat to
`anyone, including authorized individuals, within hearing dis
`tance.
`Therefore, it would be highly desirable to have a new and
`improved enhanced security guard system which would allow
`for computerized and wireless communications and monitor
`ing of human security guards and their activities with a cen
`tralized location, in addition to conventional security devices
`and which would be scalable with minimal time and material
`expenditure, and which would provide for human guards to
`act as a more rapid and effective deterrent to intruders.
`The exit guard system described in U.S. Pat. No. 6,154,133
`addresses the requirements of providing areas with detection
`of movement of a Subject along an exit path in an unautho
`rized direction. This system further provides for a human
`monitor at a centralized location with added Supervision of
`the deactivation of the security alarm system only by autho
`rized personnel.
`However, within this system there is no human security
`guard on site actively patrolling the area. This electronically
`augmented human presence is irreplaceable as a deterrent to
`potential intruders as well as providing for flexibility in terms
`of monitoring and responding to a variety of situations that
`might arise.
`Therefore, it would be highly desirable to have a new and
`improved, technologically augmented human presence auto
`matically reporting to a centralized location, or a remote
`monitoring station through communications over a global
`computer network or via satellite link, which could then
`monitor and record guard activities as well as utilize pre
`existing event detection technology, such as motion, video
`and perimeter control devices to alert those guards of real
`time events taking place on their shift.
`U.S. Pat. No. 6,097,429 describes a relatively sophisticated
`security system utilizing video images obtained from a plu
`rality of cameras relayed to a site control unit equipped with
`an automated image processor. The images are then relayed to
`a security system operator who then analyzes the images and
`informs authorities of an intrusion.
`While this system utilizes advanced technological features
`to distinguish between actual intrusions and false alarms
`(friend or foe), the absence of a human guard which would
`serve to discourage intrusions is notably absent. Moreover,
`the presence of human guards makes those that are present
`within the facility feel protected and well taken care of, and
`these individuals will often speak to the security guards or
`become familiar with them to avoid any misunderstanding as
`to their access authorization or the like.
`Additionally, the highly automated image processor and
`related complex software used to differentiate between actual
`foe intrusions and friendly false alarms is inherently limited
`in its capability to observe, compare and react to the myriad of
`potential one time or entirely novel situations which might
`
`10
`
`15
`
`25
`
`30
`
`35
`
`40
`
`45
`
`50
`
`55
`
`60
`
`65
`
`
`
`US 8,350,698 B2
`
`3
`occur. This type of security monitoring can only be accom
`plished with highly trained, well equipped, and competently
`Supervised human security guards on duty in numbers corre
`sponding to the amount of space or activity required to be
`secure from outside threats.
`Therefore, it would be highly desirable to have a new and
`improved system for technological augmentation of human
`guards who are irreplaceable interms of providing a deterrent
`to intrusion and who are capable of observing, assessing and
`responding to novel and unusual situations and whose actions
`would automatically be reported to a centralized headquarters
`with integrated automated daily events and incident real time
`reporting.
`Finally, U.S. Pat. No. 5,825.283 provides for an apparatus
`for monitoring Subjects having a location determining device
`which provides the location of the subject to a processor. The
`processor then Stores and retrieves data generated of received
`by the processor. The primary means by which the subject is
`tracked is by usage of a GPS. Comparison of the parameters
`of given geographical boundaries to the data from the location
`determining device may determine if the subject has deviated
`from those parameters. The claimed invention mandates
`detection of at least one physiological parameter of the Sub
`ject in order to compare existing Subject data previously
`stored.
`This imaginative invention does provide for tracking and
`determination of the general area in which a subject is to be
`found and a means by which to compare the location with a
`pre-determined geographic location. Unfortunately, while
`the location and tracking device may show a general area in
`which the Subject is located, there is no way of determining
`the exact location of the subject at any given point in time.
`In addition, this system again depends upon a complex
`processor which must be programmed with any number of
`parameters. The system may fail to operate properly or may
`not operate at all if incorporated into a pre-existing security
`system, especially one having less complex processors avail
`able on site.
`Therefore, it would be highly desirable to have a new and
`improved system for technological augmentation of human
`40
`guards automatically reporting exact location and time to a
`centralized headquarters with daily events and incident
`reporting automation which could give exact locations and
`time records of movement of the guards which would readily
`incorporate pre-existing hardware and Software. Moreover, it
`would be highly desirable to enable said guards to wear a
`garment which would incorporate a wireless communications
`apparatus, or have said guards carry hand-held computers for
`this purpose.
`With respect to security system and environmental system
`monitoring there have been no significant advances recently,
`especially in the area of software development that can be
`used to integrate far flung and varying system hardware con
`figurations. However, the development of global computer
`networks Such as the Internet have sparked new languages
`capable of being effectively used in numerous alternative
`applications. One such language is Hypertext Markup Lan
`guage or HTML and another such language is Extensible
`Markup Language or XML.
`Most documents on the Web are stored and transmitted in
`HTML.HTML is a simple language well suited for hypertext,
`multimedia, and the display of Small and reasonably simple
`documents. HTML is based on SGML (Standard Generalized
`Markup Language, ISO 8879), a standard system for defining
`and using document formats.
`SGML allows documents to describe their owngrammar
`that is, to specify the tag set used in the document and the
`
`50
`
`4
`structural relationships that those tags represent. HTML
`applications are applications that hard-wire a small set of tags
`in conformance with a single SGML specification. Freezing a
`Small set of tags allows users to leave the language specifica
`tion out of the document and makes it much easier to build
`applications, but this ease comes at the cost of severely lim
`iting HTML in several important respects, chief among which
`are extensibility, structure, and validation.
`Extensibility. HTML does not allow users to specify their
`own tags or attributes in order to parameterize or other
`wise semantically qualify their data.
`Structure. HTML does not support the specification of
`deep structures needed to represent database schemas or
`object-oriented hierarchies.
`Validation. HTML does not support the kind of language
`specification that allows consuming applications to
`check data for structural validity on importation.
`In contrast to HTML stands generic SGML. A generic
`SGML application is one that supports SGML language
`specifications of random complexity and makes possible the
`qualities of extensibility, structure, and validation missing
`from HTML. SGML makes it possible to define your own
`formats for your own documents, to handle large and complex
`documents, and to manage large information repositories.
`However, full SGML contains many optional features that are
`not needed for Web applications and has proven to have a
`cost/benefit ratio unattractive to current vendors of Web
`browsers.
`The World Wide Web Consortium (W3C) has created an
`SGML Working Group to build a set of specifications to make
`it easy and straightforward to use the beneficial features of
`SGML on the Web. Extensible Markup Language (XML) is a
`simple, very flexible text format derived from SGML (ISO
`8879). Originally designed to meet the challenges of large
`scale electronic publishing, XML is also playing an increas
`ingly important role in the exchange of a wide variety of data
`on the Web.
`XML advantages:
`Enables internationalized media-independent electronic
`publishing
`Allows industries to define platform-independent proto
`cols for the exchange of data, especially the data of
`electronic commerce
`Delivers information to client users in a form that allows
`automatic processing after receipt.
`Makes it easier to develop software to handle specialized
`information distributed over the Web
`Makes it easy for people to process data using inexpensive
`software
`Allows people to display information the way they want it,
`under style sheet control
`Provides a standard packaging/transport mechanism for
`any type of information
`XML Syntax
`The best way to appreciate what XML documents look like
`is with a simple example. Imagine a company that sells prod
`ucts on-line. Marketing descriptions of the products are writ
`ten in HTML, but names and addresses of customers, and also
`prices and discounts are formatted with XML. Here is the
`information describing a customer:
`
`<customer-details id+ AcPharm3.9156'>
`<name>Acme Pharmaceuticals Co.<name>
`<address country-- “US">
`<streets-7301 Smokey Boulevard</streets
`
`10
`
`15
`
`25
`
`30
`
`35
`
`45
`
`55
`
`60
`
`65
`
`Case 6:20-cv-00770-ADA Document 1-1 Filed 08/25/20 Page 13 of 20
`
`
`
`US 8,350,698 B2
`
`5
`-continued
`<city>Smallville-city>
`<state-Indiana</state
`<postalD94571</postal
`<address.>
`<customer-details.>
`
`6
`tems, facilities environmental control systems, such as cli
`mate control, fire and Smoke detection, and other varied
`parameters.
`Yet another object of the present invention is to provide a
`system which would automatically monitor and control cer
`tain movable and fixed site conditions such as people and
`vehicles at checkpoints, safety systems, access control sys
`tems, position sensors, transportation control systems, power
`Supply systems, water and hydraulic control systems, warn
`ing systems, lighting systems, communications systems and
`miscellaneous site-specific systems such as greenhouse tem
`perature controls.
`Still another object of the instant invention is to provide a
`system for security which monitors the identification and
`authorization of personnel inside secured areas through use of
`a two points access Subsystem composed of a fixed device
`installed at a checkpoint and a mobile device (wearable or
`hand held) carried by authorized personnel which could be
`configured to integrate pre-existing security systems without
`modification of the core program.
`Another object of the instant invention is to provide a guard
`activity and real time reporting Support system which
`includes a scheduled building and real time guard tour track
`ing System.
`Yet another object of the instant invention is to provide a
`computer implemented communications protocol whereby
`bi-directional data and command transmissions may occur
`between a base station and any designated personal identifi
`cation devices, which enables assistance deployment and
`transmits the location of the person, group of persons, secu
`rity guards and/or guard vehicles.
`A further object of the instant invention is to provide a
`computer implemented communications protocol which
`records real-time object identification data and tracking Sub
`systems data for indoor and outdoor areas.
`Another object of the present invention is to provide a site
`Video monitoring system that generates data which will be
`recorded, transmitted and displayed at a base station (com
`puter or server configuration) with the option of video data
`processing, to recognize and alert of certain predetermined
`events, such as access verification, etc.
`Still another object of the invention is to provide a com
`puter implemented communications protocol which will
`allow integration of hardware already existing at the site into
`the system without requiring purchase of redundant hard
`Wa.
`Yet another object of the invention is to provide a computer
`implemented communications protocol and system that
`allows for data exchange between base station and headquar
`ters and between base station and any other specified hard
`ware system and any other off-site computers (such as remote
`workstations).
`It is also another object of the present invention to provide
`a computer implemented communications protocol and sys
`tem which would automate time sheets, payroll recap and
`other accounting operations.
`It is another object of the present invention to provide a
`computer implemented communications protocol and system
`which provides complete availability of site level information
`from a centralized headquarters, or remotely away from a
`centralized headquarters.
`Still another object of the present invention is to provide a
`computer implemented communications protocol and system
`which would provide access to historical information such as
`time sheets, event logs, and alert logs to designated personnel.
`
`10
`
`15
`
`25
`
`30
`
`The XML Syntax uses matching start and end tags, such as
`<name> and </name>, to mark up information. A piece of
`information marked by the presence of tags is called an ele
`ment: elements may be further enriched by attaching name
`value pairs (for example, country--"US” in the example
`above) called attributes. Its simple syntax is easy to process
`by machine, and has the attraction of remaining understand
`able to humans. XML is based on SGML, and is familiar in
`look and feel to those accustomed to HTML.
`Building Applications with XML
`XML is a low-level syntax for representing structured data.
`You can use this simple syntax to Support a wide variety of
`applications. For this reason, XML now underpins a number
`of Web markup languages and applications.
`Outside and inside W3C, many groups are already defining
`new formats for information interchange. The number of
`XML applications is growing rapidly, and the growth appears
`likely to continue. There are many areas, for example, the
`health-care industry, the on-line revenue generation, database
`analysis and government and finance, where XML applica
`tions are used to store and process data. XML as a simple
`method for data representation and organization will mean
`that problems of data incompatibility and tedious manual
`re-keying will become more manageable.
`Therefore, it would be highly desirable to have an XML
`based communications method and protocol capable of
`35
`enabling the integration of varying security and environmen
`tal hardware monitoring devices, and allowing communica
`tion between said devices and a core system application for
`the purpose of monitoring security systems and/or environ
`mental systems within one or more Subject sites, both on site
`and remotely using direct and indirect means.
`
`40
`
`Case 6:20-cv-00770-ADA Document 1-1 Filed 08/25/20 Page 14 of 20
`
`SUMMARY OF THE INVENTION
`
`It is therefore a principal object of the instant invention to
`provide a multiple site, integrated security system which
`incorporates and enhances the performance of human guards
`within said security system and a method and protocol for
`communications between real time hardware and a real time
`security monitoring Software system.
`It is another object of the instant invention to provide the
`human guards with the latest technology, in the form of wear
`able and hand held computers or other data processors
`capable of wireless communications, in order to make the
`guards more knowledgeable and responsible to the guarded
`facilities complex interactive environment.
`Another object of the instant invention is to provide a
`method and communications protocol which would be flex
`ible in incorporating new technology and pre-existing hard
`ware equipment thus providing a high level of integration
`with off the shelf security devices now existing or not yet
`conceived.
`It is a further object of the instant invention to provide a
`system of security which is able to be custom configured and
`scaled up or down, by being individually tailored to site
`conditions such as site component configurations, checkpoint
`locations, building type material, building transportation sys
`
`45
`
`50
`
`55
`
`60
`
`65
`
`
`
`US 8,350,698 B2
`
`7
`Yet another object of the present invention is to provide a
`means of communication via the Internet with a central con
`sole monitoring application.
`Still another object of the present invention is to provide a
`system with failure-resistance and robustness against hard
`ware denials and intentional attacks by providing databackup
`on both facilities site and a security headquarter levels.
`It is yet another object of the present invention to provide a
`computer implemented communications protocol capable of
`communicating with preexisting and/or pre-built system con
`figurations to be installed at specific kinds of sites.
`It is another object of the present invention to provide a
`computer implemented communications protocol which
`would support several levels of software security, users, data,
`application and communication, and whereby security tasks
`are performed and Verified by the guard during the guard tour
`and that information is recorded by the guard in a checkpoint
`data processing application, then a base station processing
`application. The ability to provide central monitoring of
`guard tours is dependent upon novel wearable and hand held
`devices which are capable of wireless communications with
`the data processing checkpoint stations.
`Briefly, the objects and advantages of the present invention
`are realized by providing a computer implemented process
`for real time communications between security hardware
`devices and a security system core application (SCA). The
`security devices transmit data in varying device language. A
`security site checkpoint computer collects data messages
`from these security devices and translates the device language
`into standardized converted messages before input into and
`use by the SCA. The SCA then generates a message and
`transmits converted messages via various direct and indirect
`means to other computers running the security SCA, Base
`station computers then receive said messages and analyzes,
`reports and logs the transmitted messages for the purpose of
`monitoring environmental and security conditions within a
`Subject site.
`Therefore, a new and improved computer implemented
`communications protocol is provided, which is an XML
`based communications protocol for security monitoring pur
`40
`poses. This unique XML based communications protocol is
`implemented through numerous modules which receive and
`convert data messages from diverse security devices and sen
`sors, standardize and send converted messages, and encrypt
`and decrypt said data messages as necessary. With the set
`modules, the data messages are filtered and transmitted from
`checkpoint computers to base station computers, which ana
`lyzes, reports and logs environmental as well as security
`events within a Subject site. The resulting integrated security
`system provides better trained security guards, who are more
`alert and responsive, and more closely Supervised and easily
`scheduled, enhanced financial monitoring, more accurately
`paid and costed security services, better archived and
`reported security related events, as well as being better coor
`dinated with public agencies, enhanced safety, and readily
`upgraded and integrated with existing and future tech