throbber
Case 6:20-cv-00770-ADA Document 1-1 Filed 08/25/20 Page 1 of 20
`
`Exhibit 1
`
`

`

`USOO835.0698B2
`
`(12) United States Patent
`Richman
`
`(10) Patent No.:
`(45) Date of Patent:
`
`US 8,350,698 B2
`*Jan. 8, 2013
`
`(54) METHOD AND PROTOCOL FOR REAL TIME
`SECURITY SYSTEM
`(75) Inventor: Lawrence Richman, La Mesa, CA (US)
`(73) Assignee: Richman Management Corporation,
`San Diego, CA (US)
`
`- r
`c
`(*) Notice:
`
`Subject to any disclaimer, the term of this
`patent is extended or adjusted under 35
`U.S.C. 154(b) by 0 days.
`This patent is subject to a terminal dis-
`claimer.
`
`(21) Appl. No.: 13/174,348
`(22) Filed:
`Jun. 30, 2011
`
`(65)
`
`Prior Publication Data
`US 2011 FO260851A1
`Oct. 27, 2011
`
`Related U.S. Application Data
`(63) Continuation of application No. 12/253,826, filed on
`Oct. 17, 2008, now Pat. No. 7,990,268, which is a
`continuation of application No. 10/ 176,565, filed O
`Jun. 20, 2002, now abandoned, which is a
`continuation-in-part of application No. 10/139,110,
`filed on May 4, 2002, now Pat. No. 6,894,617.
`(51) Int. Cl.
`(2006.01)
`G08B I3/00
`(52) U.S. Cl. ....................................................... 340/541
`(58) Field of Classification Search .................. 340/541,
`340/573.1, 506, 539.1, 539.11,539.14,539.17,
`340/539.22; 345/7
`See application file for complete search history.
`
`(56)
`
`References Cited
`
`U.S. PATENT DOCUMENTS
`3,736,561 A
`5/1973 Rumpel
`4,864,494. A
`9, 1989 Kobus, Jr.
`
`5,132,968 A * 7/1992 Cephus ......................... 370,349
`5,515,288 A
`5/1996 Aberson
`5,623,258 A
`4, 1997 Dorfman
`St. A
`2. SGE.
`5,764,146 A
`6/1998 Baldwin et al.
`5,802,280 A
`9, 1998 Cotichini et al.
`5,861,804 A
`1/1999 Fansa et al.
`6,034,603 A
`3/2000 Steeves
`6,204,762 B1* 3/2001 Dering et al. ................. 340,541
`6,271,752 B1
`8, 2001 Vaios
`6.294.953 B1
`9, 2001 Steeves
`6,300,863 B1
`10/2001 Cotichini et al.
`6,342,915 B1
`1/2002 Ozaki et al.
`6,384,414 B1* 5/2002 Fisher et al. ............. 250/339.14
`6,400,265 B1
`6/2002 Saylor et al.
`6,456,261 B1
`9/2002 Zhang
`(Continued)
`
`OTHER PUBLICATIONS
`
`Notice of Allowance for U.S. Appl. No. 12/253,826 (mailed Mar. 25.
`2011).
`
`(Continued)
`
`Primary Examiner — Phung Nguyen
`(74) Attorney, Agent, or Firm — Sheppard Mullin Richter &
`H ampton LLP. Anthony C. Kuhlmann
`
`(57)
`ABSTRACT
`A security system comprises one or more sensor devices
`configured to detect conditions at one or more sites; one or
`more checkpoints at each of said one or more sites configured
`to receive signals from the one or more sensor devices; and a
`central headquarters processor configured to receive signals
`indicative of the conditions detected at said one or more sites
`from the one or more checkpoints. The central headquarters
`processor is configured to process the signals to determine if
`an event has occurred.
`
`20 Claims, 8 Drawing Sheets
`
`Case 6:20-cv-00770-ADA Document 1-1 Filed 08/25/20 Page 2 of 20
`
`
`
`
`
`
`
`
`
`R. Sensaf
`
`checkpoint
`
`checkpoint
`Computer
`
`as was
`Base Station
`
`bata
`base
`
`sack
`-up
`
`

`

`US 8,350,698 B2
`Page 2
`
`U.S. PATENT DOCUMENTS
`6,505,086 B1* 1/2003 Dodd, Jr. et al. ................ TOOf 65
`6,545,601 B1 * 4/2003 Monroe ........................ 340,521
`6,563,910 B2
`5, 2003 Menard et al.
`6,658.348 B2 12/2003 Rudd et al.
`6,686,838 B1
`2/2004 Rezvani et al.
`6,720,874 B2
`4/2004 Fulfido et al.
`6,894,617 B2
`5, 2005 Richman
`6,973,478 B1
`12/2005 Ketonen et al.
`7,030,757 B2
`4/2006 Matsuhira et al.
`7,242.295 B1*
`7/2007 Milinusic et al. ............. 340,541
`2002fO194267 A1
`12/2002 Flesner et al.
`2003/O15907O A1
`8/2003 Mayer et al.
`2003/0206100 A1 11/2003 Richman et al.
`
`OTHER PUBLICATIONS
`Non-final office action for U.S. Appl. No. 12/253,826 (mailed Nov.
`12, 2010).
`Communication for U.S. Appl. No. 10/176,565 (mailed Dec. 1,
`2008).
`Non-final office action for U.S. Appl. No. 10/176,565 (mailed Apr.
`15, 2008).
`Final office action for U.S. Appl. No. 10/176,565 (mailed Apr. 30.
`2007).
`Non-final office action for U.S. Appl. No. 10/176,565 (mailed Jul. 19.
`2007).
`Non-final office action for U.S. Appl. No. 10/176,565 (mailed Sep. 7.
`2006).
`
`Notice of Allowance for U.S. Appl. No. 10/139,110 (mailed Nov. 17.
`2004).
`Non-final office action for U.S. Appl. No. 10/139,110 (mailed Apr.
`19, 2004).
`Final office action for U.S. Appl. No. 12/067.271 (mailed Aug. 11,
`2011).
`Non-Final office action for U.S. Appl. No. 12/067.271 (mailed Dec.
`10, 2010).
`International Search Report for PCT Patent Application No. PCT/
`US2005/OO9408.
`Notice of References Cited, PTO-892, Part of Paper No. 20101105,
`for U.S. Appl. No. 12/253,826.
`Notice of References Cited, PTO-892, Part of Paper No. 20080206,
`for U.S. Appl. No. 10/176,565.
`Notice of References Cited, PTO-892, Part of Paper No. 20070706,
`for U.S. Appl. No. 10/176,565.
`Notice of References Cited, PTO-892, Part of Paper No. 20070212,
`for U.S. Appl. No. 10/176,565.
`Notice of References Cited, PTO-892, Part of Paper No. 20020620,
`for U.S. Appl. No. 10/176,565.
`Notice of References Cited, PTO-892, Part of Paper No. 2, for U.S.
`Appl. No. 10/139,110.
`Notice of References Cited, PTO-892, Part of Paper No. 2010 1130,
`for U.S. Appl. No. 12/067,271.
`* cited by examiner
`
`Case 6:20-cv-00770-ADA Document 1-1 Filed 08/25/20 Page 3 of 20
`
`

`

`U.S. Patent
`
`
`
`US 8,350,698 B2
`
`Case 6:20-cv-00770-ADA Document 1-1 Filed 08/25/20 Page 4 of 20
`
`

`

`U.S. Patent
`
`Jan. 8, 2013
`
`Sheet 2 of 8
`
`US 8,350,698 B2
`
`
`
`3SeqeqeG
`
`
`
`SJ3) JenbpeaH o L
`
`JOSua S
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`Case 6:20-cv-00770-ADA Document 1-1 Filed 08/25/20 Page 5 of 20
`
`

`

`U.S. Patent
`
`Jan. 8, 2013
`
`Sheet 3 of 8
`
`US 8,350,698 B2
`
`O 1
`
`
`
`
`
`
`
`Case 6:20-cv-00770-ADA Document 1-1 Filed 08/25/20 Page 6 of 20
`
`
`
`uohens eseg ! 0 1
`
`

`

`U.S. Patent
`
`Jan. 8, 2013
`
`Sheet 4 of 8
`
`US 8,350,698 B2
`
`
`
`
`
`
`
`
`
`
`
`98
`
`Case 6:20-cv-00770-ADA Document 1-1 Filed 08/25/20 Page 7 of 20
`
`Z6Z8~~~~…,
`
`96
`
`?un?euadual
`
`Suosu3S
`
`

`

`U.S. Patent
`
`US 8,350,698 B2
`
`
`
`
`
`Case 6:20-cv-00770-ADA Document 1-1 Filed 08/25/20 Page 8 of 20
`
`/
`
`00!
`
`

`

`Case 6:20-cv-00770-ADA Document 1-1 Filed 08/25/20 Page 9 of 20
`Case 6:20-cv-OO770-ADA Document 1-1 Filed 08/25/20 Page 9 of 20
`
`U.S. Patent
`
`aJ
`
`m
`
`US 8,350,698 B2
`
`
`
`
`
`
`
`Em>wLomcmwBAmvmamZAmvmnoo250300mmwzntfid‘
`
`
`
`0MEon€26a/J
`
`
`
`mom?
`
`VN.‘
`
`Nme
`
`E996
`
`meomcmw
`
`«MmbooqEX536.2%
`
`
`
`
`M233%mmmmHm«Ow03
`
`
`
`mm?
`
`
`
`
`
`
`mm?Sta?93:54Em>meomcmwA/
`
`mvamEmZAmvmooolmuoo-mnoo
`
`“up—OHM
`
`058005
`
`'05E-gm
`
`QB9:952
`
`N3,©é?“-
`
`vmwmm?
`
`
`
`E:
`
`
`
`
`
`
`
`

`

`U.S. Patent
`
`Jan. 8, 2013
`
`Sheet 7 of 8
`
`US 8,350,698 B2
`
`190
`
`192
`
`LEVEL
`Event SensOrS/Hardware
`
`
`
`
`
`194
`
`LEVEL
`Conversion/Encryption
`
`196
`
`LEVEL
`SCA/Remote Users
`
`device
`language data
`signals
`
`XML format
`encrypted data
`messages
`
`Case 6:20-cv-00770-ADA Document 1-1 Filed 08/25/20 Page 10 of 20
`
`Fig. 7
`
`

`

`U.S. Patent
`
`Jan. 8, 2013
`
`Sheet 8 of 8
`
`US 8,350,698 B2
`
`200
`N
`
`---
`a standardized
`message in
`XML format
`Orm
`204
`
`
`
`
`
`an encrypted
`
`208
`
`a signal at a
`specified serial
`port
`
`240 N-
`212
`
`a standardized
`message in
`XML format
`with CRC
`
`220
`
`
`
`
`
`
`
`
`
`
`
`
`
`SensOrS
`
`input Device(s)
`
`O2
`2
`
`Conversion Module
`
`Control Sum/CRC Adding Module
`
`
`
`t
`
`UDP/ CP
`Seria Port USB/R
`Transmitting
`Transmitting
`Module
`Module
`System Core
`Application
`Seria Port/USB/R
`Receiving Module
`
`Control Sum/CRC Checking
`and Removing Module
`
`
`
`hardware signal
`
`a Standardized
`message in
`XML format
`
`
`
`210
`
`UDP packet(s)
`written to a
`specified UDP
`SOCket
`
`214
`an encrypted
`
`216
`
`218
`
`Standardized
`message in
`XML format
`
`
`
`filtered
`standardized
`message in
`XML format
`
`Case 6:20-cv-00770-ADA Document 1-1 Filed 08/25/20 Page 11 of 20
`
`Message Filtering Module
`standardized
`message in
`- Message Queuing Module
`XML format
`/
`222 --
`224
`
`D
`
`
`
`

`

`US 8,350,698 B2
`
`1.
`METHOD AND PROTOCOL FOR REAL TIME
`SECURITY SYSTEM
`
`This application is a Continuation of U.S. patent applica
`tion Ser. No. 12/253,826, filed Oct. 17, 2008, which is a
`Continuation of U.S. patent application Ser. No. 10/176,565,
`filed Jun. 20, 2002, now abandoned, which is a Continuation
`in-part of U.S. patent application Ser. No. 10/139,110, filed
`May 4, 2002, now U.S. Pat. No. 6,894,617, issued May 17,
`2005, each of which are incorporated herein by reference in
`their entirety for all purposes.
`
`BACKGROUND OF THE INVENTION
`
`1. Field of the Invention
`The present invention relates to a multiple site integrated
`security system method and communications protocol. More
`particularly, the present invention relates to a human oriented
`system of security service and a computer implemented uni
`Versal communications protocol which facilitates communi
`cations between real time security hardware and a real time
`security monitoring Software system.
`2. Description of the Related Art
`In addition to traditional threats to security such as bur
`glary, Vandalism and arson, today's complex national and
`international political conflicts are putting increased pressure
`on facilities and organizations of all kinds to provide effective
`security systems for the safety and protection of personnel,
`property and Surroundings.
`Devices and systems for the provision of safety and Secu
`rity of persons and property are well known. Examples of
`different types and kinds of security systems for protection
`and Surveillance methods of building structures and Sur
`rounding areas are disclosed in U.S. Pat. Nos. 6,204,762 B1,
`6,154,133, 6,097,429, and 5,825,283.
`In general, the structure and function of most security
`systems involves electronic Surveillance equipment moni
`tored at a centralized location. Current development of secu
`rity systems attempts to do away with human-oriented Ser
`vices and replace the human security guard with high
`technology solutions to security problems. Only a limited
`number of currently developed security systems utilize a
`combination of guards in close conjunction with the elec
`tronic equipment. Most of the time, these systems involve one
`guard who monitors a video feed or alarm panel for intrusion
`or other related alerts. These security systems are commonly
`built, installed and implemented without any regard for the
`particular facilities of other systems, for example, the facili
`ties of built-in environmental and climate control, the track
`ing of people and assets within the building or complex, and
`fire/Smoke detection as well as transport systems such as
`elevators, etc.
`Therefore, it would be highly desirable to have a new and
`improved security system which not only enhances the
`human security guard services, but also integrates facilities
`management, and allows for identification and global posi
`tioning satellite (GPS) tracking of people as well as assets
`Such as computers, and other valuable instrumentation, all in
`a readily scalable configuration utilizing off the shelf elec
`tronic security and communications components.
`An electronic Surveillance system for remote guarding of
`an area using an operator station including a signal receiver
`with television display, radiant energy selection control, and
`energy level controller is known in the prior art. Such a device
`is described in U.S. Pat. No. 6,204,762 B1. The novel inven
`tion remotely controls and directs an apparatus “weapon' for
`integration with traditionally secured facilities, remote detec
`
`Case 6:20-cv-00770-ADA Document 1-1 Filed 08/25/20 Page 12 of 20
`
`2
`tion devices, closed circuit TV, and a remotely-located,
`manned control station. While Such a computerized system is
`helpful in detection of unauthorized personnel in a given area
`and does seek to incorporate pre-existing security devices,
`there is no provision which would allow for the irreplaceable
`and highly effective presence of human security guards,
`guards that are further enhanced by electronic wireless com
`munications and monitoring.
`Additionally, the entire system depends upon the installa
`tion and presence of numerous hard wired security devices in
`a given area and is not readily Scalable to incorporate larger
`areas in the surveillance area in a short period of time without
`extensive outlay of effort and installation of new equipment.
`The acoustic energy “weapon' used as a deterrent to intruders
`is not confined to any given space and might pose a threat to
`anyone, including authorized individuals, within hearing dis
`tance.
`Therefore, it would be highly desirable to have a new and
`improved enhanced security guard system which would allow
`for computerized and wireless communications and monitor
`ing of human security guards and their activities with a cen
`tralized location, in addition to conventional security devices
`and which would be scalable with minimal time and material
`expenditure, and which would provide for human guards to
`act as a more rapid and effective deterrent to intruders.
`The exit guard system described in U.S. Pat. No. 6,154,133
`addresses the requirements of providing areas with detection
`of movement of a Subject along an exit path in an unautho
`rized direction. This system further provides for a human
`monitor at a centralized location with added Supervision of
`the deactivation of the security alarm system only by autho
`rized personnel.
`However, within this system there is no human security
`guard on site actively patrolling the area. This electronically
`augmented human presence is irreplaceable as a deterrent to
`potential intruders as well as providing for flexibility in terms
`of monitoring and responding to a variety of situations that
`might arise.
`Therefore, it would be highly desirable to have a new and
`improved, technologically augmented human presence auto
`matically reporting to a centralized location, or a remote
`monitoring station through communications over a global
`computer network or via satellite link, which could then
`monitor and record guard activities as well as utilize pre
`existing event detection technology, such as motion, video
`and perimeter control devices to alert those guards of real
`time events taking place on their shift.
`U.S. Pat. No. 6,097,429 describes a relatively sophisticated
`security system utilizing video images obtained from a plu
`rality of cameras relayed to a site control unit equipped with
`an automated image processor. The images are then relayed to
`a security system operator who then analyzes the images and
`informs authorities of an intrusion.
`While this system utilizes advanced technological features
`to distinguish between actual intrusions and false alarms
`(friend or foe), the absence of a human guard which would
`serve to discourage intrusions is notably absent. Moreover,
`the presence of human guards makes those that are present
`within the facility feel protected and well taken care of, and
`these individuals will often speak to the security guards or
`become familiar with them to avoid any misunderstanding as
`to their access authorization or the like.
`Additionally, the highly automated image processor and
`related complex software used to differentiate between actual
`foe intrusions and friendly false alarms is inherently limited
`in its capability to observe, compare and react to the myriad of
`potential one time or entirely novel situations which might
`
`10
`
`15
`
`25
`
`30
`
`35
`
`40
`
`45
`
`50
`
`55
`
`60
`
`65
`
`

`

`US 8,350,698 B2
`
`3
`occur. This type of security monitoring can only be accom
`plished with highly trained, well equipped, and competently
`Supervised human security guards on duty in numbers corre
`sponding to the amount of space or activity required to be
`secure from outside threats.
`Therefore, it would be highly desirable to have a new and
`improved system for technological augmentation of human
`guards who are irreplaceable interms of providing a deterrent
`to intrusion and who are capable of observing, assessing and
`responding to novel and unusual situations and whose actions
`would automatically be reported to a centralized headquarters
`with integrated automated daily events and incident real time
`reporting.
`Finally, U.S. Pat. No. 5,825.283 provides for an apparatus
`for monitoring Subjects having a location determining device
`which provides the location of the subject to a processor. The
`processor then Stores and retrieves data generated of received
`by the processor. The primary means by which the subject is
`tracked is by usage of a GPS. Comparison of the parameters
`of given geographical boundaries to the data from the location
`determining device may determine if the subject has deviated
`from those parameters. The claimed invention mandates
`detection of at least one physiological parameter of the Sub
`ject in order to compare existing Subject data previously
`stored.
`This imaginative invention does provide for tracking and
`determination of the general area in which a subject is to be
`found and a means by which to compare the location with a
`pre-determined geographic location. Unfortunately, while
`the location and tracking device may show a general area in
`which the Subject is located, there is no way of determining
`the exact location of the subject at any given point in time.
`In addition, this system again depends upon a complex
`processor which must be programmed with any number of
`parameters. The system may fail to operate properly or may
`not operate at all if incorporated into a pre-existing security
`system, especially one having less complex processors avail
`able on site.
`Therefore, it would be highly desirable to have a new and
`improved system for technological augmentation of human
`40
`guards automatically reporting exact location and time to a
`centralized headquarters with daily events and incident
`reporting automation which could give exact locations and
`time records of movement of the guards which would readily
`incorporate pre-existing hardware and Software. Moreover, it
`would be highly desirable to enable said guards to wear a
`garment which would incorporate a wireless communications
`apparatus, or have said guards carry hand-held computers for
`this purpose.
`With respect to security system and environmental system
`monitoring there have been no significant advances recently,
`especially in the area of software development that can be
`used to integrate far flung and varying system hardware con
`figurations. However, the development of global computer
`networks Such as the Internet have sparked new languages
`capable of being effectively used in numerous alternative
`applications. One such language is Hypertext Markup Lan
`guage or HTML and another such language is Extensible
`Markup Language or XML.
`Most documents on the Web are stored and transmitted in
`HTML.HTML is a simple language well suited for hypertext,
`multimedia, and the display of Small and reasonably simple
`documents. HTML is based on SGML (Standard Generalized
`Markup Language, ISO 8879), a standard system for defining
`and using document formats.
`SGML allows documents to describe their owngrammar
`that is, to specify the tag set used in the document and the
`
`50
`
`4
`structural relationships that those tags represent. HTML
`applications are applications that hard-wire a small set of tags
`in conformance with a single SGML specification. Freezing a
`Small set of tags allows users to leave the language specifica
`tion out of the document and makes it much easier to build
`applications, but this ease comes at the cost of severely lim
`iting HTML in several important respects, chief among which
`are extensibility, structure, and validation.
`Extensibility. HTML does not allow users to specify their
`own tags or attributes in order to parameterize or other
`wise semantically qualify their data.
`Structure. HTML does not support the specification of
`deep structures needed to represent database schemas or
`object-oriented hierarchies.
`Validation. HTML does not support the kind of language
`specification that allows consuming applications to
`check data for structural validity on importation.
`In contrast to HTML stands generic SGML. A generic
`SGML application is one that supports SGML language
`specifications of random complexity and makes possible the
`qualities of extensibility, structure, and validation missing
`from HTML. SGML makes it possible to define your own
`formats for your own documents, to handle large and complex
`documents, and to manage large information repositories.
`However, full SGML contains many optional features that are
`not needed for Web applications and has proven to have a
`cost/benefit ratio unattractive to current vendors of Web
`browsers.
`The World Wide Web Consortium (W3C) has created an
`SGML Working Group to build a set of specifications to make
`it easy and straightforward to use the beneficial features of
`SGML on the Web. Extensible Markup Language (XML) is a
`simple, very flexible text format derived from SGML (ISO
`8879). Originally designed to meet the challenges of large
`scale electronic publishing, XML is also playing an increas
`ingly important role in the exchange of a wide variety of data
`on the Web.
`XML advantages:
`Enables internationalized media-independent electronic
`publishing
`Allows industries to define platform-independent proto
`cols for the exchange of data, especially the data of
`electronic commerce
`Delivers information to client users in a form that allows
`automatic processing after receipt.
`Makes it easier to develop software to handle specialized
`information distributed over the Web
`Makes it easy for people to process data using inexpensive
`software
`Allows people to display information the way they want it,
`under style sheet control
`Provides a standard packaging/transport mechanism for
`any type of information
`XML Syntax
`The best way to appreciate what XML documents look like
`is with a simple example. Imagine a company that sells prod
`ucts on-line. Marketing descriptions of the products are writ
`ten in HTML, but names and addresses of customers, and also
`prices and discounts are formatted with XML. Here is the
`information describing a customer:
`
`<customer-details id+ AcPharm3.9156'>
`<name>Acme Pharmaceuticals Co.<name>
`<address country-- “US">
`<streets-7301 Smokey Boulevard</streets
`
`10
`
`15
`
`25
`
`30
`
`35
`
`45
`
`55
`
`60
`
`65
`
`Case 6:20-cv-00770-ADA Document 1-1 Filed 08/25/20 Page 13 of 20
`
`

`

`US 8,350,698 B2
`
`5
`-continued
`<city>Smallville-city>
`<state-Indiana</state
`<postalD94571</postal
`<address.>
`<customer-details.>
`
`6
`tems, facilities environmental control systems, such as cli
`mate control, fire and Smoke detection, and other varied
`parameters.
`Yet another object of the present invention is to provide a
`system which would automatically monitor and control cer
`tain movable and fixed site conditions such as people and
`vehicles at checkpoints, safety systems, access control sys
`tems, position sensors, transportation control systems, power
`Supply systems, water and hydraulic control systems, warn
`ing systems, lighting systems, communications systems and
`miscellaneous site-specific systems such as greenhouse tem
`perature controls.
`Still another object of the instant invention is to provide a
`system for security which monitors the identification and
`authorization of personnel inside secured areas through use of
`a two points access Subsystem composed of a fixed device
`installed at a checkpoint and a mobile device (wearable or
`hand held) carried by authorized personnel which could be
`configured to integrate pre-existing security systems without
`modification of the core program.
`Another object of the instant invention is to provide a guard
`activity and real time reporting Support system which
`includes a scheduled building and real time guard tour track
`ing System.
`Yet another object of the instant invention is to provide a
`computer implemented communications protocol whereby
`bi-directional data and command transmissions may occur
`between a base station and any designated personal identifi
`cation devices, which enables assistance deployment and
`transmits the location of the person, group of persons, secu
`rity guards and/or guard vehicles.
`A further object of the instant invention is to provide a
`computer implemented communications protocol which
`records real-time object identification data and tracking Sub
`systems data for indoor and outdoor areas.
`Another object of the present invention is to provide a site
`Video monitoring system that generates data which will be
`recorded, transmitted and displayed at a base station (com
`puter or server configuration) with the option of video data
`processing, to recognize and alert of certain predetermined
`events, such as access verification, etc.
`Still another object of the invention is to provide a com
`puter implemented communications protocol which will
`allow integration of hardware already existing at the site into
`the system without requiring purchase of redundant hard
`Wa.
`Yet another object of the invention is to provide a computer
`implemented communications protocol and system that
`allows for data exchange between base station and headquar
`ters and between base station and any other specified hard
`ware system and any other off-site computers (such as remote
`workstations).
`It is also another object of the present invention to provide
`a computer implemented communications protocol and sys
`tem which would automate time sheets, payroll recap and
`other accounting operations.
`It is another object of the present invention to provide a
`computer implemented communications protocol and system
`which provides complete availability of site level information
`from a centralized headquarters, or remotely away from a
`centralized headquarters.
`Still another object of the present invention is to provide a
`computer implemented communications protocol and system
`which would provide access to historical information such as
`time sheets, event logs, and alert logs to designated personnel.
`
`10
`
`15
`
`25
`
`30
`
`The XML Syntax uses matching start and end tags, such as
`<name> and </name>, to mark up information. A piece of
`information marked by the presence of tags is called an ele
`ment: elements may be further enriched by attaching name
`value pairs (for example, country--"US” in the example
`above) called attributes. Its simple syntax is easy to process
`by machine, and has the attraction of remaining understand
`able to humans. XML is based on SGML, and is familiar in
`look and feel to those accustomed to HTML.
`Building Applications with XML
`XML is a low-level syntax for representing structured data.
`You can use this simple syntax to Support a wide variety of
`applications. For this reason, XML now underpins a number
`of Web markup languages and applications.
`Outside and inside W3C, many groups are already defining
`new formats for information interchange. The number of
`XML applications is growing rapidly, and the growth appears
`likely to continue. There are many areas, for example, the
`health-care industry, the on-line revenue generation, database
`analysis and government and finance, where XML applica
`tions are used to store and process data. XML as a simple
`method for data representation and organization will mean
`that problems of data incompatibility and tedious manual
`re-keying will become more manageable.
`Therefore, it would be highly desirable to have an XML
`based communications method and protocol capable of
`35
`enabling the integration of varying security and environmen
`tal hardware monitoring devices, and allowing communica
`tion between said devices and a core system application for
`the purpose of monitoring security systems and/or environ
`mental systems within one or more Subject sites, both on site
`and remotely using direct and indirect means.
`
`40
`
`Case 6:20-cv-00770-ADA Document 1-1 Filed 08/25/20 Page 14 of 20
`
`SUMMARY OF THE INVENTION
`
`It is therefore a principal object of the instant invention to
`provide a multiple site, integrated security system which
`incorporates and enhances the performance of human guards
`within said security system and a method and protocol for
`communications between real time hardware and a real time
`security monitoring Software system.
`It is another object of the instant invention to provide the
`human guards with the latest technology, in the form of wear
`able and hand held computers or other data processors
`capable of wireless communications, in order to make the
`guards more knowledgeable and responsible to the guarded
`facilities complex interactive environment.
`Another object of the instant invention is to provide a
`method and communications protocol which would be flex
`ible in incorporating new technology and pre-existing hard
`ware equipment thus providing a high level of integration
`with off the shelf security devices now existing or not yet
`conceived.
`It is a further object of the instant invention to provide a
`system of security which is able to be custom configured and
`scaled up or down, by being individually tailored to site
`conditions such as site component configurations, checkpoint
`locations, building type material, building transportation sys
`
`45
`
`50
`
`55
`
`60
`
`65
`
`

`

`US 8,350,698 B2
`
`7
`Yet another object of the present invention is to provide a
`means of communication via the Internet with a central con
`sole monitoring application.
`Still another object of the present invention is to provide a
`system with failure-resistance and robustness against hard
`ware denials and intentional attacks by providing databackup
`on both facilities site and a security headquarter levels.
`It is yet another object of the present invention to provide a
`computer implemented communications protocol capable of
`communicating with preexisting and/or pre-built system con
`figurations to be installed at specific kinds of sites.
`It is another object of the present invention to provide a
`computer implemented communications protocol which
`would support several levels of software security, users, data,
`application and communication, and whereby security tasks
`are performed and Verified by the guard during the guard tour
`and that information is recorded by the guard in a checkpoint
`data processing application, then a base station processing
`application. The ability to provide central monitoring of
`guard tours is dependent upon novel wearable and hand held
`devices which are capable of wireless communications with
`the data processing checkpoint stations.
`Briefly, the objects and advantages of the present invention
`are realized by providing a computer implemented process
`for real time communications between security hardware
`devices and a security system core application (SCA). The
`security devices transmit data in varying device language. A
`security site checkpoint computer collects data messages
`from these security devices and translates the device language
`into standardized converted messages before input into and
`use by the SCA. The SCA then generates a message and
`transmits converted messages via various direct and indirect
`means to other computers running the security SCA, Base
`station computers then receive said messages and analyzes,
`reports and logs the transmitted messages for the purpose of
`monitoring environmental and security conditions within a
`Subject site.
`Therefore, a new and improved computer implemented
`communications protocol is provided, which is an XML
`based communications protocol for security monitoring pur
`40
`poses. This unique XML based communications protocol is
`implemented through numerous modules which receive and
`convert data messages from diverse security devices and sen
`sors, standardize and send converted messages, and encrypt
`and decrypt said data messages as necessary. With the set
`modules, the data messages are filtered and transmitted from
`checkpoint computers to base station computers, which ana
`lyzes, reports and logs environmental as well as security
`events within a Subject site. The resulting integrated security
`system provides better trained security guards, who are more
`alert and responsive, and more closely Supervised and easily
`scheduled, enhanced financial monitoring, more accurately
`paid and costed security services, better archived and
`reported security related events, as well as being better coor
`dinated with public agencies, enhanced safety, and readily
`upgraded and integrated with existing and future tech

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket