`
`Exhibit 2
`
`
`
`USOO8981933B2
`
`(12) United States Patent
`Richman
`
`(10) Patent No.:
`(45) Date of Patent:
`
`US 8,981,933 B2
`*Mar. 17, 2015
`
`(54) SYSTEM FOR REAL TIME SECURITY
`MONITORING
`(71) Applicant: Richman Technology Corporation, San
`Diego, CA (US)
`
`(72) Inventor: Lawrence Richman, La Mesa, CA (US)
`(73) Assignee: Richman Technology Corporation, San
`Diego, CA (US)
`Subject to any disclaimer, the term of this
`patent is extended or adjusted under 35
`U.S.C. 154(b) by 0 days.
`This patent is Subject to a terminal dis-
`claimer.
`
`(*) Notice:
`
`(21) Appl. No.: 13/729,872
`
`(22) Filed:
`
`Dec. 28, 2012
`
`(65)
`
`Prior Publication Data
`US 2013/O141232 A1
`Jun. 6, 2013
`
`Related U.S. Application Data
`(63) Continuation of application No. 13/174,348, filed on
`Jun. 30, 2011, now Pat. No. 8,350,698, which is a
`continuation of application No. 12/253,826, filed on
`Oct. 17, 2008, now Pat. No. 7,990,268, which is a
`continuation of application No. 10/176,565, filed on
`Jun. 20, 2002, now abandoned, which is a
`continuation-in-part of application No. 10/139,110,
`filed on May 4, 2002, now Pat. No. 6,894,617.
`
`(51) Int. Cl.
`G08B I3/00
`GSB 25/00
`G08B I3/96
`GSB 2.5/10
`(52) U.S. Cl.
`CPC .......... G08B 25/00 (2013.01); G08B 13/19608
`
`(2006.01)
`(2006.01)
`(2006.01)
`(2006.01)
`
`(2013.01); G08B 13/19621 (2013.01); G08B
`13/19656 (2013.01); G08B 13/1966 (2013.01);
`G08B 13/19697 (2013.01); G08B 25/10
`(2013.01)
`USPC .......................................................... 340/541
`(58) Field of Classification Search
`USPC .............. 340/541,573.1, 506, 539.1, 539.11,
`340/539.14,539.17, 539.22; 345/7
`See application file for complete search history.
`
`(56)
`
`References Cited
`U.S. PATENT DOCUMENTS
`
`5/1973 Rumpel
`3,736,561 A
`9/1989 Kobus, Jr.
`4,864,494. A
`5,132,968 A * 7/1992 Cephus ......................... 370,349
`5,515,288 A
`5/1996 Aberson
`5,623,258 A
`4/1997 Dorfman
`(Continued)
`OTHER PUBLICATIONS
`
`Notice of Allowance for U.S. Appl. No. 12/253,826 (mailed Mar. 25.
`2011).
`
`(Continued)
`
`Primary Examiner — Phung Nguyen
`(74) Attorney, Agent, or Firm — Orrick, Herrington &
`Sutcliffe LLP
`
`ABSTRACT
`(57)
`A security system comprises one or more sensor devices
`configured to detect conditions at one or more sites; one or
`more checkpoints at each of said one or more sites configured
`to receive signals from the one or more sensor devices; and a
`central headquarters processor configured to receive signals
`indicative of the conditions detected at said one or more sites
`from the one or more checkpoints. The central headquarters
`processor is configured to process the signals to determine if
`an event has occurred.
`
`19 Claims, 8 Drawing Sheets
`
`
`
`Case 6:20-cv-00770-ADA Document 1-2 Filed 08/25/20 Page 2 of 20
`
`
`
`US 8,981,933 B2
`Page 2
`
`(56)
`
`References Cited
`
`U.S. PATENT DOCUMENTS
`
`2002/0194267 A1 12/2002 Flesner et al.
`2003/O15907O A1
`8/2003 Mayer et al.
`2003/0206100 A1 11/2003 Richman et al.
`
`OTHER PUBLICATIONS
`
`Non-final office action for U.S. Appl. No. 12/253,826 (mailed Nov.
`12, 2010).
`Communication for U.S. Appl. No. 10/176,565 (mailed Dec. 1,
`2008).
`Non-final office action for U.S. Appl. No. 10/176,565 (mailed Apr.
`15, 2008).
`Final office action for U.S. Appl. No. 10/176,565 (mailed Apr. 30.
`2007).
`Non-final office action for U.S. Appl. No. 10/176,565 (mailed Jul. 19.
`2007).
`Non-final office action for U.S. Appl. No. 10/176,565 (mailed Sep. 7.
`2006).
`Notice of Allowance for U.S. Appl. No. 10/139,110 (mailed Nov. 17.
`2004).
`Non-final office action for U.S. Appl. No. 10/139,110 (mailed Apr.
`19, 2004).
`Final office action for U.S. Appl. No. 12/067.271 (mailed Aug. 11,
`2011).
`Non-Final office action for U.S. Appl. No. 12/067.271 (mailed Dec.
`10, 2010).
`International Search Report for PCT Patent Application No. PCT/
`US2005/OO9408.
`
`* cited by examiner
`
`5,699,430
`5,745,037
`5,764,146
`5,802,280
`5,861,804
`6,034,603
`6,097.429
`6,118,382
`6,204,762
`6,271,752
`6,294,953
`6,300,863
`6,342,915
`6,384,414
`6,400,265
`6,456.261
`6,505,086
`6,545,601
`6,563,910
`6,658.348
`6,686,838
`6,720,874
`6,894,617
`6,973.478
`7,030,757
`7,242.295
`8,520,068
`2002fOO24443
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`. 340,541
`
`12/1997 Krizay et al.
`4, 1998 Guthrie et al.
`6, 1998 Baldwin et al.
`9, 1998 Cotichini et al.
`1/1999 Fansa et al.
`3, 2000 Steeves
`8/2000 Seeley et al. .................. 348,154
`ck
`9, 2000 Hibbs et al. .
`*
`340,586
`* 3/2001 Dering et al.
`B1
`8, 2001 Vaios
`B1
`9, 2001 Steeves
`B1
`10, 2001 Cotichini et al.
`B1
`1/2002 Ozaki et al.
`B1
`5, 2002 Fisher et al. ............. 250/339.14
`B1
`6/2002 Saylor et al.
`B1
`9/2002 Zhang
`TOOf65
`B1
`1/2003 Dodd et al. .
`B1
`4/2003 Monroe ........................ 340,521
`B2
`5, 2003 Menard et al.
`B2 12/2003 Rudd et al.
`B1
`2/2004 Rezvani et al.
`B2
`4/2004 Fulfido et al.
`B2
`5, 2005 Richman
`B1
`12/2005 Ketonen et al.
`B2
`4/2006 Matsuhira et al.
`B1
`7, 2007 Milinusic et al. ............. 340,541
`B2
`8, 2013 Naidoo et al.
`... 348/143
`A1
`2/2002 Hawkins et al. ........... 340,573.1
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`
`
`Case 6:20-cv-00770-ADA Document 1-2 Filed 08/25/20 Page 3 of 20
`
`
`
`U.S. Patent
`
`Mar. 17, 2015
`
`Sheet 1 of 8
`
`US 8,981,933 B2
`
`
`
`Josuas
`
`JosueS
`
`OZ
`
`º? donesDaeZZ
`
`
`
`suayenbpee H
`
`Josuas
`
`Case 6:20-cv-00770-ADA Document 1-2 Filed 08/25/20 Page 4 of 20
`
`
`
`U.S. Patent
`
`US 8,981,933 B2
`
`
`
`aseqeqec1
`
`09
`
`Case 6:20-cv-00770-ADA Document 1-2 Filed 08/25/20 Page 5 of 20
`
`
`
`U.S. Patent
`
`Mar. 17, 2015
`
`Sheet 3 of 8
`
`US 8,981,933 B2
`
`
`
`
`
`
`
`Case 6:20-cv-00770-ADA Document 1-2 Filed 08/25/20 Page 6 of 20
`
`
`
`U.S. Patent
`
`Mar. 17, 2015
`
`Sheet 4 of 8
`
`US 8,981,933 B2
`
`
`
`
`
`
`
`
`
`Case 6:20-cv-00770-ADA Document 1-2 Filed 08/25/20 Page 7 of 20
`
`
`
`U.S. Patent
`
`US 8,981,933 B2
`
`
`
`Case 6:20-cv-00770-ADA Document 1-2 Filed 08/25/20 Page 8 of 20
`
`7
`
`G -61-I
`
`
`
`02,m9e
`aPO2:/u2a0
`Case 6:20-cv-00770-ADA Document 1-2 Filed 08/25/20 Page 9 of 20
`C
`U
`mC
`m
`g
`
`A1.
`
`
`ADn7,mSQIbZEm>m52%
`
`mo:3:£8042X.mflblocm
`m5N?mvamEmZvamvoo
`mmJ.mMof
`mvoo'mllnoo
`
`
`U.S. Patent
`
`SamMEBm>m“m
`mEm>mwhomcmm
`
`..
`
`0wof¢2ow;
`
`VNV
`
`mm?
`
`1..atenheS
`
`US 8,981,933 B2
`
`vaNmF
`
`mhznmoohm
`
`93059:2
`
`va
`
`dmm?
`
`m3E2
`
`A m
`
`vmamafiocool88I88
`
`NvFmw.mw_nm
`
`[caucm>m
`
`835,4Em>mhomcmw
`
`Hm1J26SEEMmmmmum(om9:
`
`
`
`
`
`
`
`U.S. Patent
`
`Mar. 17, 2015
`
`Sheet 7 of 8
`
`US 8,981,933 B2
`
`190
`
`
`
`192
`
`LEVEL
`Event SensOrS/Hardware
`
`
`
`device
`language data
`signals
`
`XML format
`encrypted data
`messages
`
`Fig. 7
`
`
`
`
`
`
`
`
`
`
`
`
`
`194
`
`
`
`
`
`LEVEL
`Conversion/Encryption
`
`
`
`196
`
`
`
`LEVEL
`SCAVRemote Users
`
`Case 6:20-cv-00770-ADA Document 1-2 Filed 08/25/20 Page 10 of 20
`
`
`
`U.S. Patent
`
`Mar. 17, 2015
`
`Sheet 8 of 8
`
`US 8,981,933 B2
`
`2OO
`N
`
`input Device(s)
`
`2O2
`
`Conversion Module
`
`Control Sum/CRC Adding Module
`
`a standardized
`message in
`XM format
`Orra
`204
`
`an encrypted
`
`
`
`hardware signal
`
`a standardized
`message in
`XML format
`
`
`
`210
`
`UDP/TCP
`Serial Port USB/IR
`Transmitting
`Transmitting
`UDP packet(s)
`Module
`Module
`written to a
`System Core - specified UDP
`Application
`SOcket
`
`UDP/TCP
`Seria Port/USB/R
`214.
`Receiving Module Receiving Module
`an encrypted
`in- eSSae
`Decryption Module
`216
`
`208
`
`a signal at a
`specified serial
`port
`
`240 N->
`212
`
`
`
`a standardized
`message in
`XML format
`with CRC
`
`
`
`
`
`Control Sum/CRC Checking
`and Removing Module
`
`22O
`standardized Y- Message Filtering Module
`message in
`XML format -vous Queuing Module
`222
`Message Processing Module
`(gatabase
`
`Case 6:20-cv-00770-ADA Document 1-2 Filed 08/25/20 Page 11 of 20
`
`224
`
`226
`
`
`
`
`
`
`
`218
`standardized
`message in
`XML format
`
`filtered
`standardized
`message in
`XML format
`
`Fig. 8
`
`
`
`2
`is described in U.S. Pat. No. 6,204,762 B1. The novel inven
`tion remotely controls and directs an apparatus “weapon' for
`integration with traditionally secured facilities, remote detec
`tion devices, closed circuit TV, and a remotely-located,
`manned control station. While Such a computerized system is
`helpful in detection of unauthorized personnel in a given area
`and does seek to incorporate pre-existing security devices,
`there is no provision which would allow for the irreplaceable
`and highly effective presence of human security guards,
`guards that are further enhanced by electronic wireless com
`munications and monitoring.
`Additionally, the entire system depends upon the installa
`tion and presence of numerous hard wired security devices in
`a given area and is not readily Scalable to incorporate larger
`areas in the surveillance area in a short period of time without
`extensive outlay of effort and installation of new equipment.
`The acoustic energy “weapon' used as a deterrent to intruders
`is not confined to any given space and might pose a threat to
`anyone, including authorized individuals, within hearing dis
`tance.
`Therefore, it would be highly desirable to have a new and
`improved enhanced security guard system which would allow
`for computerized and wireless communications and monitor
`ing of human security guards and their activities with a cen
`tralized location, in addition to conventional security devices
`and which would be scalable with minimal time and material
`expenditure, and which would provide for human guards to
`act as a more rapid and effective deterrent to intruders.
`The exit guard system described in U.S. Pat. No. 6,154,133
`addresses the requirements of providing areas with detection
`of movement of a Subject along an exit path in an unautho
`rized direction. This system further provides for a human
`monitor at a centralized location with added Supervision of
`the deactivation of the security alarm system only by autho
`rized personnel.
`However, within this system there is no human security
`guard on site actively patrolling the area. This electronically
`augmented human presence is irreplaceable as a deterrent to
`potential intruders as well as providing for flexibility in terms
`of monitoring and responding to a variety of situations that
`might arise.
`Therefore, it would be highly desirable to have a new and
`improved, technologically augmented human presence auto
`matically reporting to a centralized location, or a remote
`monitoring station through communications over a global
`computer network or via satellite link, which could then
`monitor and record guard activities as well as utilize pre
`existing event detection technology, such as motion, video
`and perimeter control devices to alert those guards of real
`time events taking place on their shift.
`U.S. Pat. No. 6,097,429 describes a relatively sophisticated
`security system utilizing video images obtained from a plu
`rality of cameras relayed to a site control unit equipped with
`an automated image processor. The images are then relayed to
`a security system operator who then analyzes the images and
`informs authorities of an intrusion.
`While this system utilizes advanced technological features
`to distinguish between actual intrusions and false alarms
`(friend or foe), the absence of a human guard which would
`serve to discourage intrusions is notably absent. Moreover,
`the presence of human guards makes those that are present
`within the facility feel protected and well taken care of and
`these individuals will often speak to the security guards or
`become familiar with them to avoid any misunderstanding as
`to their access authorization or the like.
`Additionally, the highly automated image processor and
`related complex software used to differentiate between actual
`
`Case 6:20-cv-00770-ADA Document 1-2 Filed 08/25/20 Page 12 of 20
`
`40
`
`45
`
`50
`
`55
`
`60
`
`65
`
`US 8,981,933 B2
`
`5
`
`10
`
`15
`
`25
`
`30
`
`35
`
`1.
`SYSTEM FOR REAL TIME SECURITY
`MONITORING
`
`This application is a Continuation of U.S. patent applica
`tion Ser. No. 13/174,348, filed Jun. 30, 2011, now U.S. Pat.
`No. 8,350,698, issued Jan. 8, 2013, which is a Continuation of
`U.S. patent application Ser. No. 12/253,826, filed Oct. 17,
`2008, now U.S. Pat. No. 7,990,268, issued Aug. 2, 2011,
`which is a Continuation of U.S. patent application Ser. No.
`10/176,565, filed Jun. 20, 2002, now abandoned, which is a
`Continuation-in-part of U.S. patent application Ser. No.
`10/139,110, filed May 4, 2002, now U.S. Pat. No. 6,894,617,
`issued May 17, 2005, each of which are incorporated herein
`by reference in their entirety for all purposes.
`
`BACKGROUND OF THE INVENTION
`
`1. Field of the Invention
`The present invention relates to a multiple site integrated
`security system method and communications protocol. More
`particularly, the present invention relates to a human oriented
`system of security service and a computer implemented uni
`Versal communications protocol which facilitates communi
`cations between real time security hardware and a real time
`security monitoring Software system.
`2. Description of the Related Art
`In addition to traditional threats to security such as bur
`glary, Vandalism and arson, today's complex national and
`international political conflicts are putting increased pressure
`on facilities and organizations of all kinds to provide effective
`security systems for the safety and protection of personnel,
`property and surroundings.
`Devices and systems for the provision of safety and Secu
`rity of persons and property are well known. Examples of
`different types and kinds of security systems for protection
`and Surveillance methods of building structures and Sur
`rounding areas are disclosed in U.S. Pat. Nos. 6,204,762 B1,
`6,154,133, 6,097,429, and 5,825,283.
`In general, the structure and function of most security
`systems involves electronic Surveillance equipment moni
`tored at a centralized location. Current development of secu
`rity systems attempts to do away with human-oriented Ser
`vices and replace the human security guard with high
`technology solutions to security problems. Only a limited
`number of currently developed security systems utilize a
`combination of guards in close conjunction with the elec
`tronic equipment. Most of the time, these systems involve one
`guard who monitors a video feed or alarm panel for intrusion
`or other related alerts. These security systems are commonly
`built, installed and implemented without any regard for the
`particular facilities of other systems, for example, the facili
`ties of built-in environmental and climate control, the track
`ing of people and assets within the building or complex, and
`fire/Smoke detection as well as transport systems such as
`elevators, etc.
`Therefore, it would be highly desirable to have a new and
`improved security system which not only enhances the
`human security guard services, but also integrates facilities
`management, and allows for identification and global posi
`tioning satellite (GPS) tracking of people as well as assets
`Such as computers, and other valuable instrumentation, all in
`a readily scalable configuration utilizing off the shelf elec
`tronic security and communications components.
`An electronic Surveillance system for remote guarding of
`an area using an operator station including a signal receiver
`with television display, radiant energy selection control, and
`energy level controller is known in the prior art. Such a device
`
`
`
`US 8,981,933 B2
`
`10
`
`15
`
`25
`
`30
`
`35
`
`3
`foe intrusions and friendly false alarms is inherently limited
`in its capability to observe, compare and react to the myriad of
`potential one time or entirely novel situations which might
`occur. This type of security monitoring can only be accom
`plished with highly trained, well equipped, and competently
`Supervised human security guards on duty in numbers corre
`sponding to the amount of space or activity required to be
`secure from outside threats.
`Therefore, it would be highly desirable to have a new and
`improved system for technological augmentation of human
`guards who are irreplaceable in teens of providing a deterrent
`to intrusion and who are capable of observing, assessing and
`responding to novel and unusual situations and whose actions
`would automatically be reported to a centralized headquarters
`with integrated automated daily events and incident real time
`reporting.
`Finally, U.S. Pat. No. 5,825.283 provides for an apparatus
`for monitoring Subjects having a location determining device
`which provides the location of the subject to a processor. The
`processor then Stores and retrieves data generated or received
`by the processor. The primary means by which the subject is
`tracked is by usage of a GPS. Comparison of the parameters
`of given geographical boundaries to the data from the location
`determining device may determine if the subject has deviated
`from those parameters. The claimed invention mandates
`detection of at least one physiological parameter of the Sub
`ject in order to compare existing Subject data previously
`stored.
`This imaginative invention does provide for tracking and
`determination of the general area in which a subject is to be
`found and a means by which to compare the location with a
`pre-determined geographic location. Unfortunately, while
`the location and tracking device may show a general area in
`which the Subject is located, there is no way of determining
`the exact location of the Subject at any given point in time.
`In addition, this system again depends upon a complex
`processor which must be programmed with any number of
`parameters. The system may fail to operate properly or may
`40
`not operate at all if incorporated into a pre-existing security
`system, especially one having less complex processors avail
`able on site.
`Therefore, it would be highly desirable to have a new and
`improved system for technological augmentation of human
`45
`guards automatically reporting exact location and time to a
`centralized headquarters with daily events and incident
`reporting automation which could give exact locations and
`time records of movement of the guards which would readily
`incorporate pre-existing hardware and Software. Moreover, it
`would be highly desirable to enable said guards to wear a
`garment which would incorporate a wireless communications
`apparatus, or have said guards carry hand-held computers for
`this purpose.
`With respect to security system and environmental system
`monitoring there have been no significant advances recently,
`especially in the area of software development that can be
`used to integrate far flung and varying system hardware con
`figurations. However, the development of global computer
`networks Such as the Internet have sparked new languages
`capable of being effectively used in numerous alternative
`applications. One such language is Hypertext Markup Lan
`guage or HTML and another such language is Extensible
`Markup Language or XML.
`Most documents on the Web are stored and transmitted in
`HTML.HTML is a simple language well suited for hypertext,
`multimedia, and the display of Small and reasonably simple
`
`50
`
`Case 6:20-cv-00770-ADA Document 1-2 Filed 08/25/20 Page 13 of 20
`
`55
`
`60
`
`65
`
`4
`documents. HTML is based on SGML (Standard Generalized
`Markup Language, ISO 8879), a standard system for defining
`and using document formats.
`SGML allows documents to describe their own grammar
`that is, to specify the tag set used in the document and the
`structural relationships that those tags represent. HTML
`applications are applications that hard-wire a small set of tags
`in conformance with a single SGML specification. Freezing a
`Small set of tags allows users to leave the language specifica
`tion out of the document and makes it much easier to build
`applications, but this ease comes at the cost of severely lim
`iting HTML in several important respects, chief among which
`are extensibility, structure, and validation.
`Extensibility. HTML does not allow users to specify their
`own tags or attributes in order to parameterize or other
`wise semantically qualify their data.
`Structure. HTML does not support the specification of
`deep structures needed to represent database schemas or
`object-oriented hierarchies.
`Validation. HTML does not support the kind of language
`specification that allows consuming applications to
`check data for structural validity on importation.
`In contrast to HTML stands generic SGML. A generic
`SGML application is one that supports SGML language
`specifications of random complexity and makes possible the
`qualities of extensibility, structure, and validation missing
`from HTML. SGML makes it possible to define your own
`formats for your own documents, to handle large and complex
`documents, and to manage large information repositories.
`However, full SGML contains many optional features that are
`not needed for Web applications and has proven to have a
`cost/benefit ratio unattractive to current vendors of Web
`browsers.
`The World Wide Web Consortium (W3C) has created an
`SGML Working Group to build a set of specifications to make
`it easy and straightforward to use the beneficial features of
`SGML on the Web. Extensible Markup Language (XML) is a
`simple, very flexible text format derived from SGML (ISO
`8879). Originally designed to meet the challenges of large
`scale electronic publishing, XML is also playing an increas
`ingly important role in the exchange of a wide variety of data
`on the Web.
`XML advantages:
`Enables internationalized media-independent electronic
`publishing
`Allows industries to define platform-independent proto
`cols for the exchange of data, especially the data of
`electronic commerce
`Delivers information to client users in a form that allows
`automatic processing after receipt.
`Makes it easier to develop software to handle specialized
`information distributed over the Web
`Makes it easy for people to process data using inexpensive
`software
`Allows people to display information the way they want it,
`under style sheet control
`Provides a standard packaging/transport mechanism for
`any type of information
`XML Syntax
`The best way to appreciate what XML documents look like
`is with a simple example. Imagine a company that sells prod
`ucts on-line. Marketing descriptions of the products are writ
`ten in HTML, but names and addresses of customers, and also
`prices and discounts are formatted with XML. Here is the
`information describing a customer:
`
`
`
`US 8,981,933 B2
`
`5
`
`<customer-details id+ AcPharm39156'>
`<name>Acme Pharmaceuticals Co.</name>
`<address country+ “US's
`<streets-7301 Smokey Boulevard</streets
`<city>Smallville-city>
`<state-Indiana<state
`<postalD94571</postals
`<address.>
`<customer-details.>
`
`6
`locations, building type material, building transportation sys
`tems, facilities environmental control systems, such as cli
`mate control, fire and Smoke detection, and other varied
`parameters.
`Yet another object of the present invention is to provide a
`system which would automatically monitor and control cer
`tain movable and fixed site conditions such as people and
`vehicles at checkpoints, safety systems, access control sys
`tems, position sensors, transportation control systems, power
`Supply systems, water and hydraulic control systems, warn
`ing systems, lighting systems, communications systems and
`miscellaneous site-specific systems such as greenhouse tem
`perature controls.
`Still another object of the instant invention is to provide a
`system for security which monitors the identification and
`authorization of personnel inside secured areas through use of
`a two points access Subsystem composed of a fixed device
`installed at a checkpoint and a mobile device (wearable or
`hand held) carried by authorized personnel which could be
`configured to integrate pre-existing security systems without
`modification of the core program.
`Another object of the instant invention is to provide a guard
`activity and real time reporting Support system which
`includes a scheduled building and real time guard tour track
`ing System.
`Yet another object of the instant invention is to provide a
`computer implemented communications protocol whereby
`bi-directional data and command transmissions may occur
`between a base station and any designated personal identifi
`cation devices, which enables assistance deployment and
`transmits the location of the person, group of persons, secu
`rity guards and/or guard vehicles.
`A further object of the instant invention is to provide a
`computer implemented communications protocol which
`records real-time object identification data and tracking Sub
`systems data for indoor and outdoor areas.
`Another object of the present invention is to provide a site
`Video monitoring system that generates data which will be
`recorded, transmitted and displayed at a base station (com
`puter or server configuration) with the option of video data
`processing, to recognize and alert of certain predetermined
`events, such as access verification, etc.
`Still another object of the invention is to provide a com
`puter implemented communications protocol which will
`allow integration of hardware already existing at the site into
`the system without requiring purchase of redundant hard
`Wa.
`Yet another object of the invention is to provide a computer
`implemented communications protocol and system that
`allows for data exchange between base station and headquar
`ters and between base station and any other specified hard
`ware system and any other off-site computers (such as remote
`workstations).
`It is also another object of the present invention to provide
`a computer implemented communications protocol and sys
`tem which would automate time sheets, payroll recap and
`other accounting operations.
`It is another object of the present invention to provide a
`computer implemented communications protocol and system
`which provides complete availability of site level information
`from a centralized headquarters, or remotely away from a
`centralized headquarters.
`Still another object of the present invention is to provide a
`computer implemented communications protocol and system
`which would provide access to historical information such as
`time sheets, event logs, and alert logs to designated personnel.
`
`10
`
`15
`
`25
`
`30
`
`The XML Syntax uses matching start and end tags, such as
`<name> and </name>, to mark up information. A piece of
`information marked by the presence of tags is called an ele
`ment: elements may be further enriched by attaching name
`value pairs (for example, country--"US” in the example
`above) called attributes. Its simple syntax is easy to process
`by machine, and has the attraction of remaining understand
`able to humans. XML is based on SGML, and is familiar in
`look and feel to those accustomed to HTML.
`Building Applications with XML
`XML is a low-level syntax for representing structured data.
`You can use this simple syntax to Support a wide variety of
`applications. For this reason, XML now underpins a number
`of Web markup languages and applications.
`Outside and inside W3C, many groups are already defining
`new formats for information interchange. The number of
`XML applications is growing rapidly, and the growth appears
`likely to continue. There are many areas, for example, the
`health-care industry, the on-line revenue generation, database
`analysis and government and finance, where XML applica
`tions are used to store and process data. XML as a simple
`method for data representation and organization will mean
`that problems of data incompatibility and tedious manual
`re-keying will become more manageable.
`Therefore, it would be highly desirable to have an XML
`35
`based communications method and protocol capable of
`enabling the integration of varying security and environmen
`tal hardware monitoring devices, and allowing communica
`tion between said devices and a core system application for
`the purpose of monitoring security systems and/or environ
`mental systems within one or more Subject sites, both on site
`and remotely using direct and indirect means.
`
`40
`
`Case 6:20-cv-00770-ADA Document 1-2 Filed 08/25/20 Page 14 of 20
`
`SUMMARY OF THE INVENTION
`
`It is therefore a principal object of the instant invention to
`provide a multiple site, integrated security system which
`incorporates and enhances the performance of human guards
`within said security system and a method and protocol for
`communications between real time hardware and a real time
`security monitoring Software system.
`It is another object of the instant invention to provide the
`human guards with the latest technology, in the form of wear
`able and hand held computers or other data processors
`capable of wireless communications, in order to make the
`guards more knowledgeable and responsible to the guarded
`facilities complex interactive environment.
`Another object of the instant invention is to provide a
`method and communications protocol which would be flex
`ible in incorporating new technology and pre-existing hard
`ware equipment thus providing a high level of integration
`with off the shelf security devices now existing or not yet
`conceived.
`It is a further object of the instant invention to provide a
`system of security which is able to be custom configured and
`scaled up or down, by being individually tailored to site
`conditions such as site component configurations, checkpoint
`
`45
`
`50
`
`55
`
`60
`
`65
`
`
`
`US 8,981,933 B2
`
`7
`Yet another object of the present invention is to provide a
`means of communication via the Internet with a central con
`sole monitoring application.
`Still another object of the present invention is to provide a
`system with failure-resistance and robustness against hard
`ware denials and intentional attacks by providing databackup
`on both facilities site and a security headquarter levels.
`It is yet another object of the present invention to provide a
`computer implemented communications protocol capable of
`communicating with preexisting and/or pre-built system con
`figurations to be installed at specific kinds of sites.
`It is another object of the present invention to provide a
`computer implemented communications protocol which
`would support several levels of software security, users, data,
`application and communication, and whereby security tasks
`are performed and Verified by the guard during the guard tour
`and that information is recorded by the guard in a checkpoint
`data processing application, then a base station processing
`application. The ability to provide central monitoring of
`guard tours is dependent upon novel wearable and hand held
`devices which are capable of wireless communications with
`the data processing checkpoint stations.
`Briefly, the objects and advantages of the present invention
`are realized by providing a computer implemented process
`for real time communications between security hardware
`devices and a security system core application (SCA). The
`security devices transmit data in varying device language. A
`security site checkpoint computer collects data messages
`from these security devices and translates the device language
`into standardized converted messages before input into and
`use by the SCA. The SCA then generates a message and
`transmits converted messages via various direct and indirect
`means to other computers running the security SCA. Base
`station computers then receive said messages and analyzes,
`reports and logs the transmitted messages for the purpose of
`monitoring environmental and security conditions within a
`Subject site.
`Therefore, a new and improved computer implemented
`communications protocol is provided, which is an XML
`based communications protocol for security monitoring pur
`40
`poses. This unique XML based communications protocol is
`implemented through numerous modules which receive and
`convert data messages from diverse security devices and sen
`sors, standardize and send converted messages, and encrypt
`and decrypt said data messages as necessary. With the set
`modules, the data messages are filtered and transmitted from
`checkpoint computers to base station computers, which ana
`lyzes, reports and logs environmental as well as security
`events within a Subject site. The resulting integrated security
`system provides better trained security guards, who are more
`alert and responsive, and more closely Supervised and easily
`scheduled, enhanced financial monitoring, more accurately
`paid and costed security services, better archived and
`reported security related events, as well as b