`
`Exhibit 3
`
`
`
`(12) United States Patent
`Richman
`
`(10) Patent No.:
`(45) Date of Patent:
`
`US 9,449.484 B2
`*Sep. 20, 2016
`
`USOO9449484B2
`
`(54) SYSTEM FOR REAL TIME SECURITY
`MONITORING
`(71) Applicant: Richman Technology Corporation,
`San Diego, CA (US)
`(72) Inventor: hyene Richman, San Diego, CA
`
`(73) Assignee: Richman Technology Corporation,
`San Diego, CA (US)
`
`(*) Notice:
`
`Subject to any disclaimer, the term of this
`patent is extended or adjusted under 35
`U.S.C. 154(b) by 0 days.
`This patent is Subject to a terminal dis-
`claimer.
`
`(21) Appl. No.: 14/624,392
`
`(22) Filed:
`
`Feb. 17, 2015
`
`(65)
`
`O
`O
`Prior Publication Data
`US 2015/O161864 A1
`Jun. 11, 2015
`s
`Related U.S. Application Data
`(63) Continuation of application No. 13/729,872, filed on
`Dec. 28, 2013, now Pat. No. 8,981,933, which is a
`continuation of application No. 13/174,348, filed on
`Jun. 30, 2011, now Pat. No. 8,350,698, which is a
`continuation of application No. 12/253,826, filed on
`Oct. 17, 2008, now Pat. No. 7,990,268, which is a
`continuation of application No. 10/176,565, filed on
`Jun. 20, 2002, now abandoned, which is a
`continuation-in-part of application No. 10/139,110,
`filed on May 4, 2002, now Pat. No. 6,894,617.
`(51) Int. Cl.
`G08B I3/00
`G08B I3/24
`G08B I3/196
`GSB 2.5/10
`GSB 25/00
`GSB 27/00
`
`(2006.01)
`(2006.01)
`(2006.01)
`(2006.01)
`(2006.01)
`(2006.01)
`
`(52) U.S. Cl.
`CPC ....... G08B 13/2491 (2013.01); G08B 13/1966
`(2013.01); G08B 13/19608 (2013.01); G08B
`13/19621 (2013.01); G08B 13/19656
`(2013.01); G08B 13/19697 (2013.01); G08B
`25/00 (2013.01); G08B 25/10 (2013.01);
`G08B 27/001 (2013.01)
`(58) Field of Classification Search
`CPC ... G06F 21/55; G08B 13/00; G08B 21/0297;
`G08B 27/00; G08B 29/00
`USPC ............. 340/541, 573.1, 506, 539.1, 539.11,
`340/539.14, 539.17, 539.22; 345/7
`See application file for complete search history.
`
`(56)
`
`References Cited
`U.S. PATENT DOCUMENTS
`
`6,097.429 A * 8/2000 Seeley ............. G08B 13, 196O2
`348,154
`6,545,601 B1 * 4/2003 Monroe ............. B64D 45.0015
`340/31
`7,376,969 B1* 5/2008 Njemanze ............... GO6F 21/55
`TO9,224
`8,520,068 B2 * 8/2013 Naidoo ............ G08B 13, 1964.5
`348/143
`
`* cited by examiner
`Primary Examiner — Phung Nguyen
`(74) Attorney, Agent, or Firm — Orrick, Herrington &
`Sutcliffe LLP
`
`ABSTRACT
`(57)
`A security system comprises one or more sensor devices
`configured to detect conditions at one or more sites; one or
`more checkpoints at each of said one or more sites config
`ured to receive signals from the one or more sensor devices;
`and a central headquarters processor configured to receive
`signals indicative of the conditions detected at said one or
`more sites from the one or more checkpoints. The central
`headquarters processor is configured to process the signals
`to determine if an event has occurred.
`
`19 Claims, 8 Drawing Sheets
`
`
`
`Case 6:20-cv-00770-ADA Document 1-3 Filed 08/25/20 Page 2 of 19
`
`
`
`U.S. Patent
`
`Sep. 20, 2016
`
`Sheet 1 of 8
`
`US 9,449.484 B2
`
`OZ
`
`JosuaSJosues
`
`
`
`Case 6:20-cv-00770-ADA Document 1-3 Filed 08/25/20 Page 3 of 19
`
`
`
`U.S. Patent
`
`US 9,449.484 B2
`
`
`
`Ja?nduloo
`
`Case 6:20-cv-00770-ADA Document 1-3 Filed 08/25/20 Page 4 of 19
`
`
`
`U.S. Patent
`
`Sep. 20, 2016
`
`Sheet 3 of 8
`
`US 9,449.484 B2
`
`
`
`
`
`Case 6:20-cv-00770-ADA Document 1-3 Filed 08/25/20 Page 5 of 19
`
`
`
`U.S. Patent
`
`US 9,449.484 B2
`
`
`
`
`
`
`
`
`
`
`
`
`
`Case 6:20-cv-00770-ADA Document 1-3 Filed 08/25/20 Page 6 of 19
`
`SJOSU?S
`
`
`
`Case 6:20-cv-00770-ADA Document 1-3 Filed 08/25/20 Page 7 of 19
`m
`0
`W0d
`
`nheS
`
`M8Ff
`
`2B941M
`
`aSPU£qumwcozmoEsEEoox5502m9<=83
`
`
`
`.mmcozfimm:E63850E69620E69620mg9,wmmm...
`
`
`
`
`
`0.tmmet
`
`U
`
`0nm&85.
`
`
`
`
`AD.“2,5:280Amxomum53805832nwuumpEm
`5:05:00ww.mEEmmm3.mx020#355m9”—
`
`w:8x85
`m632882.;MECESEEES
`mJSH02
`
`
`
`
`Case 6:20-cv-00770-ADA Document 1-3 Filed 08/25/20 Page 8 of 19
`Case 6:20-cv-OO770-ADA Document 1-3 Filed 08/25/20 Page 8 of 19
`
`U.S. Patent
`
`n&
`
`6
`
`00
`
`US 9,449,484 B2
`
`w939.52Em>mLomcmm
`
`m@Bmimvmuoogoolaminaem3:$0042X.mfiblocm
`
`
`
`
`
`E9m>w
`
`Bomcmm
`
`N?
`
`ONF
`
`.32.mm?
`
`
`
`MSemimmmm“m«Gm.o:
`
`wmv
`
`m3E2
`
`
`
`8395.4Em>wLomcmm
`
`938005
`
`
`
`an:9332
`
`m3
`
`IUCNuc-0>m
`
`353623580.88-88
`
`NE.0.m_H_
`
`VNF
`
`NNV
`
`
`
`
`
`
`
`U.S. Patent
`
`Sep. 20, 2016
`
`Sheet 7 of 8
`
`US 9,449.484 B2
`
`190
`
`192
`
`LEVEL
`Event SensOrS/Hardware
`
`
`
`
`
`194
`
`LEVEL
`Conversion/Encryption
`
`196
`
`LEVEL
`SCAVRemote Users
`
`Case 6:20-cv-00770-ADA Document 1-3 Filed 08/25/20 Page 9 of 19
`
`device
`language data
`signals
`
`XML format
`encrypted data
`messages
`
`Fig. 7
`
`
`
`U.S. Patent
`
`Sep. 20, 2016
`
`Sheet 8 of 8
`
`US 9,449.484 B2
`
`2OO
`
`a standardized
`message in
`XML format
`
`204
`
`an encrypted
`message
`
`2O8
`
`a signal at a
`specified serial
`port
`
`240 N-a-
`212
`
`
`
`a standardized
`message in
`XML format
`With CRC
`
`
`
`220
`
`
`
`
`
`
`
`Input Device(s)
`
`2O2
`
`Conversion Module
`
`Control Sum/CRC Adding Module
`
`2O6
`
`Encryption Module
`
`
`
`
`
`Serial Port USB/IR
`Transmitting
`Module
`
`UDP/TCP
`Transmitting
`Module
`
`
`
`System Core
`Application
`
`hardware signal
`
`a standardized
`message in
`XM format
`With CRC
`
`
`
`21 O
`
`UDP packet(s)
`Written to a
`specified UDP
`Socket
`
`UDP/TCP
`Seria Port/USB/IR
`Receiving Module Receiving Module
`
`214
`
`Decryption Module -
`
`Control Sum/CRC Checking
`and Removing Module
`
`Case 6:20-cv-00770-ADA Document 1-3 Filed 08/25/20 Page 10 of 19
`
`standardized
`message in
`XML format
`
`222
`
`226
`
`
`
`
`
`N- Message Filtering Module
`-as Queuing Module
`Message Processing Module
`
`Database
`NC
`
`CSS3CE
`
`216
`
`218
`
`standardized
`message in
`XML format
`
`
`
`
`
`filtered
`standardized
`message in
`XM format
`
`Fig. 8
`
`
`
`US 9,449,484 B2
`
`1.
`SYSTEM FOR REAL TIME SECURITY
`MONITORING
`
`This application is a Continuation of U.S. patent appli
`cation Ser. No. 13/729,872, filed Dec. 28, 2013, now U.S.
`Pat. No. 8,981,933, issued Mar. 17, 2015, which is a
`Continuation of U.S. patent application Ser. No. 13/174,348,
`filed Jun. 30, 2011, now U.S. Pat. No. 8,350,698, issued Oct.
`27, 2011, which is a Continuation of U.S. patent application
`Ser. No. 12/253,826, filed Oct. 17, 2008, now U.S. Pat. No.
`7.990,268, issued Aug. 2, 2011, which is a Continuation of
`U.S. patent application Ser. No. 10/176,565, filed Jun. 20,
`2002, now abandoned, which is a Continuation-in-part of
`U.S. patent application Ser. No. 10/139,110, filed May 4,
`2002, now U.S. Pat. No. 6,894,617, issued May 17, 2005,
`each of which are incorporated herein by reference in their
`entirety for all purposes.
`
`5
`
`10
`
`15
`
`BACKGROUND OF THE INVENTION
`
`2
`An electronic Surveillance system for remote guarding of
`an area using an operator station including a signal receiver
`with television display, radiant energy selection control, and
`energy level controller is known in the prior art. Such a
`device is described in U.S. Pat. No. 6,204,762 B1. The novel
`invention remotely controls and directs an apparatus
`“weapon” for integration with traditionally secured facili
`ties, remote detection devices, closed circuit TV, and a
`remotely-located, manned control station. While such a
`computerized system is helpful in detection of unauthorized
`personnel in a given area and does seek to incorporate
`pre-existing security devices, there is no provision which
`would allow for the irreplaceable and highly effective pres
`ence of human security guards, guards that are further
`enhanced by electronic wireless communications and moni
`toring.
`Additionally, the entire system depends upon the instal
`lation and presence of numerous hard wired security devices
`in a given area and is not readily Scalable to incorporate
`larger areas in the Surveillance area in a short period of time
`without extensive outlay of effort and installation of new
`equipment. The acoustic energy “weapon' used as a deter
`rent to intruders is not confined to any given space and might
`pose a threat to anyone, including authorized individuals,
`within hearing distance.
`Therefore, it would be highly desirable to have a new and
`improved enhanced security guard system which would
`allow for computerized and wireless communications and
`monitoring of human security guards and their activities
`with a centralized location, in addition to conventional
`security devices and which would be scalable with minimal
`time and material expenditure, and which would provide for
`human guards to act as a more rapid and effective deterrent
`to intruders.
`The exit guard system described in U.S. Pat. No. 6,154,
`133 addresses the requirements of providing areas with
`detection of movement of a Subject along an exit path in an
`unauthorized direction. This system further provides for a
`human monitor at a centralized location with added Super
`vision of the deactivation of the security alarm system only
`by authorized personnel.
`However, within this system there is no human security
`guard on site actively patrolling the area. This electronically
`augmented human presence is irreplaceable as a deterrent to
`potential intruders as well as providing for flexibility in
`terms of monitoring and responding to a variety of situations
`that might arise.
`Therefore, it would be highly desirable to have a new and
`improved, technologically augmented human presence auto
`matically reporting to a centralized location, or a remote
`monitoring station through communications over a global
`computer network or via satellite link, which could then
`monitor and record guard activities as well as utilize pre
`existing event detection technology, such as motion, video
`and perimeter control devices to alert those guards of real
`time events taking place on their shift.
`U.S. Pat. No. 6,097,429 describes a relatively sophisti
`cated security system utilizing video images obtained from
`a plurality of cameras relayed to a site control unit equipped
`with an automated image processor. The images are then
`relayed to a security system operator who then analyzes the
`images and informs authorities of an intrusion.
`While this system utilizes advanced technological fea
`tures to distinguish between actual intrusions and false
`alarms (friend or foe), the absence of a human guard which
`would serve to discourage intrusions is notably absent.
`Moreover, the presence of human guards makes those that
`
`25
`
`30
`
`40
`
`1. Field of the Invention
`The present invention relates to a multiple site integrated
`security system method and communications protocol. More
`particularly, the present invention relates to a human ori
`ented system of security service and a computer imple
`mented universal communications protocol which facilitates
`communications between real time security hardware and a
`real time security monitoring software system.
`2. Description of the Related Art
`In addition to traditional threats to security Such as
`burglary, vandalism and arson, today’s complex national and
`international political conflicts are putting increased pres
`Sure on facilities and organizations of all kinds to provide
`effective security systems for the safety and protection of
`35
`personnel, property and Surroundings.
`Devices and systems for the provision of safety and
`security of persons and property are well known. Examples
`of different types and kinds of security systems for protec
`tion and Surveillance methods of building structures and
`surrounding areas are disclosed in U.S. Pat. Nos. 6,204,762
`B1, 6,154,133, 6,097,429, and 5,825,283.
`In general, the structure and function of most security
`systems involves electronic Surveillance equipment moni
`tored at a centralized location. Current development of
`45
`security systems attempts to do away with human-oriented
`services and replace the human security guard with high
`technology solutions to security problems. Only a limited
`number of currently developed security systems utilize a
`combination of guards in close conjunction with the elec
`tronic equipment. Most of the time, these systems involve
`one guard who monitors a video feed or alarm panel for
`intrusion or other related alerts. These security systems are
`commonly built, installed and implemented without any
`regard for the particular facilities of other systems, for
`example, the facilities of built-in environmental and climate
`control, the tracking of people and assets within the building
`or complex, and fire/Smoke detection as well as transport
`systems such as elevators, etc.
`Therefore, it would be highly desirable to have a new and
`improved security system which not only enhances the
`human security guard services, but also integrates facilities
`management, and allows for identification and global posi
`tioning satellite (GPS) tracking of people as well as assets
`Such as computers, and other valuable instrumentation, all in
`a readily scalable configuration utilizing off the shelf elec
`tronic security and communications components.
`
`50
`
`55
`
`60
`
`65
`
`Case 6:20-cv-00770-ADA Document 1-3 Filed 08/25/20 Page 11 of 19
`
`
`
`10
`
`15
`
`Case 6:20-cv-00770-ADA Document 1-3 Filed 08/25/20 Page 12 of 19
`
`US 9,449,484 B2
`
`3
`are present within the facility feel protected and well taken
`care of, and these individuals will often speak to the security
`guards or become familiar with them to avoid any misun
`derstanding as to their access authorization or the like.
`Additionally, the highly automated image processor and 5
`related complex software used to differentiate between
`actual foe intrusions and friendly false alarms is inherently
`limited in its capability to observe, compare and react to the
`myriad of potential one time or entirely novel situations
`which might occur. This type of security monitoring can
`only be accomplished with highly trained, well equipped,
`and competently Supervised human security guards on duty
`in numbers corresponding to the amount of space or activity
`required to be secure from outside threats.
`Therefore, it would be highly desirable to have a new and
`improved system for technological augmentation of human
`guards who are irreplaceable in terms of providing a deter
`rent to intrusion and who are capable of observing, assessing
`and responding to novel and unusual situations and whose 20
`actions would automatically be reported to a centralized
`headquarters with integrated automated daily events and
`incident real time reporting.
`Finally, U.S. Pat. No. 5,825.283 provides for an apparatus
`for monitoring Subjects having a location determining 25
`device which provides the location of the subject to a
`processor. The processor then stores and retrieves data
`generated or received by the processor. The primary means
`by which the subject is tracked is by usage of a GPS.
`Comparison of the parameters of given geographical bound- 30
`aries to the data from the location determining device may
`determine if the subject has deviated from those parameters.
`The claimed invention mandates detection of at least one
`physiological parameter of the Subject in order to compare
`existing Subject data previously stored.
`This imaginative invention does provide for tracking and
`determination of the general area in which a subject is to be
`found and a means by which to compare the location with a
`pre-determined geographic location. Unfortunately, while
`the location and tracking device may show a general area in 40
`which the Subject is located, there is no way of determining
`the exact location of the Subject at any given point in time.
`In addition, this system again depends upon a complex
`processor which must be programmed with any number of
`parameters. The system may fail to operate properly or may 45
`not operate at all if incorporated into a pre-existing security
`system, especially one having less complex processors
`available on site.
`Therefore, it would be highly desirable to have a new and
`improved system for technological augmentation of human 50
`guards automatically reporting exact location and time to a
`centralized headquarters with daily events and incident
`reporting automation which could give exact locations and
`time records of movement of the guards which would
`readily incorporate pre-existing hardware and software. 55
`Moreover, it would be highly desirable to enable said guards
`to wear a garment which would incorporate a wireless
`communications apparatus, or have said guards carry hand
`held computers for this purpose.
`With respect to security system and environmental system 60
`monitoring there have been no significant advances recently,
`especially in the area of software development that can be
`used to integrate far flung and varying system hardware
`configurations. However, the development of global com
`puter networks such as the Internet have sparked new 65
`languages capable of being effectively used in numerous
`alternative applications. One such language is Hypertext
`
`35
`
`4
`Markup Language or HTML and another such language is
`Extensible Markup Language or XML.
`Most documents on the Web are stored and transmitted in
`HTML. HTML is a simple language well suited for hyper
`text, multimedia, and the display of Small and reasonably
`simple documents. HTML is based on SGML (Standard
`Generalized Markup Language, ISO 8879), a standard sys
`tem for defining and using document formats.
`SGML allows documents to describe their own gram
`mar—that is, to specify the tag set used in the document and
`the structural relationships that those tags represent. HTML
`applications are applications that hard-wire a small set of
`tags in conformance with a single SGML specification.
`Freezing a small set of tags allows users to leave the
`language specification out of the document and makes it
`much easier to build applications, but this ease comes at the
`cost of severely limiting HTML in several important
`respects, chief among which are extensibility, structure, and
`validation.
`Extensibility. HTML does not allow users to specify their
`own tags or attributes in order to parameterize or
`otherwise semantically qualify their data.
`Structure. HTML does not support the specification of
`deep structures needed to represent database schemas
`or object-oriented hierarchies.
`Validation. HTML does not support the kind of language
`specification that allows consuming applications to
`check data for structural validity on importation.
`In contrast to HTML stands generic SGML. A generic
`SGML application is one that supports SGML language
`specifications of random complexity and makes possible the
`qualities of extensibility, structure, and validation missing
`from HTML. SGML makes it possible to define your own
`formats for your own documents, to handle large and
`complex documents, and to manage large information
`repositories. However, full SGML contains many optional
`features that are not needed for Web applications and has
`proven to have a cost/benefit ratio unattractive to current
`vendors of Web browsers.
`The World Wide Web Consortium (W3C) has created an
`SGML Working Group to build a set of specifications to
`make it easy and straightforward to use the beneficial
`features of SGML on the Web. Extensible Markup Language
`(XML) is a simple, very flexible text format derived from
`SGML (ISO 8879). Originally designed to meet the chal
`lenges of large-scale electronic publishing, XML is also
`playing an increasingly important role in the exchange of a
`wide variety of data on the Web.
`XML advantages:
`Enables internationalized media-independent electronic
`publishing
`Allows industries to define platform-independent proto
`cols for the exchange of data, especially the data of
`electronic commerce
`Delivers information to client users in a form that allows
`automatic processing after receipt.
`Makes it easier to develop software to handle specialized
`information distributed over the Web
`Makes it easy for people to process data using inexpen
`sive software
`Allows people to display information the way they want
`it, under style sheet control
`Provides a standard packaging/transport mechanism for
`any type of information
`XML Syntax
`The best way to appreciate what XML documents look
`like is with a simple example. Imagine a company that sells
`
`
`
`US 9,449,484 B2
`
`5
`products on-line. Marketing descriptions of the products are
`written in HTML, but names and addresses of customers,
`and also prices and discounts are formatted with XML. Here
`is the information describing a customer:
`
`6
`ware equipment thus providing a high level of integration
`with off the shelf security devices now existing or not yet
`conceived.
`It is a further object of the instant invention to provide a
`system of security which is able to be custom configured and
`scaled up or down, by being individually tailored to site
`conditions such as site component configurations, check
`point locations, building type material, building transporta
`tion systems, facilities environmental control systems, such
`as climate control, fire and Smoke detection, and other varied
`parameters.
`Yet another object of the present invention is to provide a
`system which would automatically monitor and control
`certain movable and fixed site conditions such as people and
`vehicles at checkpoints, safety systems, access control sys
`tems, position sensors, transportation control systems,
`power Supply systems, water and hydraulic control systems,
`warning systems, lighting systems, communications systems
`and miscellaneous site-specific systems such as greenhouse
`temperature controls.
`Still another object of the instant invention is to provide
`a system for security which monitors the identification and
`authorization of personnel inside secured areas through use
`of a two points access Subsystem composed of a fixed device
`installed at a checkpoint and a mobile device (wearable or
`hand held) carried by authorized personnel which could be
`configured to integrate pre-existing security systems without
`modification of the core program.
`Another object of the instant invention is to provide a
`guard activity and real time reporting Support system which
`includes a scheduled building and real time guard tour
`tracking system.
`Yet another object of the instant invention is to provide a
`computer implemented communications protocol whereby
`bi-directional data and command transmissions may occur
`between a base station and any designated personal identi
`fication devices, which enables assistance deployment and
`transmits the location of the person, group of persons,
`security guards and/or guard vehicles.
`A further object of the instant invention is to provide a
`computer implemented communications protocol which
`records real-time object identification data and tracking
`Subsystems data for indoor and outdoor areas.
`Another object of the present invention is to provide a site
`Video monitoring system that generates data which will be
`recorded, transmitted and displayed at a base station (com
`puter or server configuration) with the option of video data
`processing, to recognize and alert of certain predetermined
`events, such as access verification, etc.
`Still another object of the invention is to provide a
`computer implemented communications protocol which will
`allow integration of hardware already existing at the site into
`the system without requiring purchase of redundant hard
`Wae.
`Yet another object of the invention is to provide a com
`puter implemented communications protocol and system
`that allows for data exchange between base station and
`headquarters and between base station and any other speci
`fied hardware system and any other off-site computers (such
`as remote workstations).
`It is also another object of the present invention to provide
`a computer implemented communications protocol and sys
`tem which would automate time sheets, payroll recap and
`other accounting operations.
`It is another object of the present invention to provide a
`computer implemented communications protocol and sys
`tem which provides complete availability of site level infor
`
`<customer-details id+ “AcPharm39156'>
`<name>Acme Pharmaceuticals Co.<name>
`<address country-- “US">
`<streets-7301 Smokey Boulevard</streets
`<city>Smallville-city>
`<state-Indiana</state
`<postalD94571</postal
`<address>
`<customer-details.>
`
`10
`
`15
`
`The XML syntax uses matching start and end tags, such
`as <name> and </name>, to mark up information. A piece of
`information marked by the presence of tags is called an
`element: elements may be further enriched by attaching
`name-value pairs (for example, country--"US in the
`example above) called attributes. Its simple syntax is easy to
`process by machine, and has the attraction of remaining
`understandable to humans. XML is based on SGML, and is
`familiar in look and feel to those accustomed to HTML.
`Building Applications with XML
`XML is a low-level syntax for representing structured
`data. You can use this simple syntax to support a wide
`variety of applications. For this reason, XML now underpins
`a number of Web markup languages and applications.
`Outside and inside W3C, many groups are already defin
`ing new formats for information interchange. The number of
`XML applications is growing rapidly, and the growth
`appears likely to continue. There are many areas, for
`example, the health-care industry, the on-line revenue gen
`eration, database analysis and government and finance,
`where XML applications are used to store and process data.
`XML as a simple method for data representation and orga
`nization will mean that problems of data incompatibility and
`tedious manual re-keying will become more manageable.
`40
`Therefore, it would be highly desirable to have an XML
`based communications method and protocol capable of
`enabling the integration of varying security and environ
`mental hardware monitoring devices, and allowing commu
`nication between said devices and a core system application
`45
`for the purpose of monitoring security systems and/or envi
`ronmental systems within one or more subject sites, both on
`site and remotely using direct and indirect means.
`
`25
`
`30
`
`35
`
`Case 6:20-cv-00770-ADA Document 1-3 Filed 08/25/20 Page 13 of 19
`
`SUMMARY OF THE INVENTION
`
`It is therefore a principal object of the instant invention to
`provide a multiple site, integrated security system which
`incorporates and enhances the performance of human guards
`within said security system and a method and protocol for
`communications between real time hardware and a real time
`security monitoring Software system.
`It is another object of the instant invention to provide the
`human guards with the latest technology, in the form of
`wearable and hand held computers or other data processors
`capable of wireless communications, in order to make the
`guards more knowledgeable and responsible to the guarded
`facilities complex interactive environment.
`Another object of the instant invention is to provide a
`method and communications protocol which would be flex
`ible in incorporating new technology and pre-existing hard
`
`50
`
`55
`
`60
`
`65
`
`
`
`7
`mation from a centralized headquarters, or remotely away
`from a centralized headquarters.
`Still another object of the present invention is to provide
`a computer implemented communications protocol and sys
`tem which would provide access to historical information
`Such as time sheets, event logs, and alert logs to designated
`personnel.
`Yet another object of the present invention is to provide a
`means of communication via the Internet with a central
`console monitoring application.
`Still another object of the present invention is to provide
`a system with failure-resistance and robustness against hard
`ware denials and intentional attacks by providing data
`backup on both facilities site and a security headquarter
`levels.
`It is yet another object of the present invention to provide
`a computer implemented communications protocol capable
`of communicating with preexisting and/or pre-built system
`configurations to be installed at specific kinds of sites.
`It is another object of the present invention to provide a
`computer implemented communications protocol which
`would support several levels of Software security, users,
`data, application and communication, and whereby security
`tasks are performed and verified by the guard during the
`guard tour and that information is recorded by the guard in
`a checkpoint data processing application, then a base station
`processing application. The ability to provide central moni
`toring of guard tours is dependent upon novel wearable and
`hand held devices which are capable of wireless communi
`cations with the data processing checkpoint stations.
`Briefly, the objects and advantages of the present inven
`tion are realized by providing a computer implemented
`process for real time communications between security
`hardware devices and a security system core application
`(SCA). The security devices transmit data in varying device
`language. A security site checkpoint computer collects data
`messages from these security devices and translates the
`device language into standardized converted messages
`before input into and use by the SCA. The SCA then
`generates a message and transmits converted messages via
`various direct and indirect means to other computers running
`the security SCA. Base station computers then receive said
`messages and analyzes, reports and logs the transmitted
`messages for the purpose of monitoring environmental and
`security conditions within a Subject site.
`Therefore, a new and improved computer implemented
`communications protocol is provided, which is an XML
`based communications protocol for security monitoring pur
`50
`poses. This unique XML based communications protocol is
`implemented through numerous modules which receive and
`convert data messages from diverse security devices and
`sensors, standardize and send converted messages, and
`encrypt and decrypt said data messages as necessary. With
`the set modules, the data messages are filtered and trans
`mitted from checkpoint computers to base station comput
`ers, which analyzes, reports and logs environmental as well
`as security events within a subject site. The resulting inte
`grated security system provides better trained security
`guards, who are more alert and responsive, and more closely
`Supervised and easily scheduled, enhanced financial moni
`toring, more accurately paid and costed security services,
`better archived and reported security related events, as well
`as being better coordinated with public agencies, enhanced
`safety, and readily upgraded and integrated with existing and
`future technologies.
`
`US 9,449,484 B2
`
`8
`Other objects and advantages of the present invention will
`become apparent to those of skill in the art upon contem
`plation of the disclosure herein in conjunction with the
`drawings as described below.
`
`BRIEF DESCRIPTION OF THE DRAWINGS
`
`The above mentioned and other objects and features of
`this invention and the manner of attaining them will become
`apparent, and the invention itself will be best understood by
`reference to the following description of the embodiment of
`the invention in conjunction with the accompanying draw
`ings, wherein:
`FIG. 1 is a representational diagram of a multiple site
`integrated security system constructed in accordance with
`the present invention;
`FIG. 2 is an enlarged detailed diagram of a communica
`tions scheme between multiple checkpoint data processors
`and a central base station computer, constructed in accor
`dance with the present invention;
`FIG. 3 is an enlarged detailed diagram of a headquarters
`server with multiple workstations and hard wired as well as
`global computer network communications capabilities, con
`structed in accordance with the present invention;
`FIG. 4 is a block diagram of the checkpoint data process
`ing architecture and communications system between the
`security system event sensors and said checkpoint data
`processor, in greater detail, constructed in accordance with
`the present invention;
`FIG. 5 is a block diagram showing the checkpoint hard
`ware architecture in greater detail, including communica
`tions routes between numerous checkpoint data processing
`units and a base station, constructed in accordance with the
`present invention;
`FIG. 6 is a block diagram of an integrated security system
`encrypted XML communications protocol illustrating com
`munications between system sensors, checkpoint data pro
`cessing units and the s