throbber
Case 6:20-cv-00770-ADA Document 1-3 Filed 08/25/20 Page 1 of 19
`
`Exhibit 3
`
`

`

`(12) United States Patent
`Richman
`
`(10) Patent No.:
`(45) Date of Patent:
`
`US 9,449.484 B2
`*Sep. 20, 2016
`
`USOO9449484B2
`
`(54) SYSTEM FOR REAL TIME SECURITY
`MONITORING
`(71) Applicant: Richman Technology Corporation,
`San Diego, CA (US)
`(72) Inventor: hyene Richman, San Diego, CA
`
`(73) Assignee: Richman Technology Corporation,
`San Diego, CA (US)
`
`(*) Notice:
`
`Subject to any disclaimer, the term of this
`patent is extended or adjusted under 35
`U.S.C. 154(b) by 0 days.
`This patent is Subject to a terminal dis-
`claimer.
`
`(21) Appl. No.: 14/624,392
`
`(22) Filed:
`
`Feb. 17, 2015
`
`(65)
`
`O
`O
`Prior Publication Data
`US 2015/O161864 A1
`Jun. 11, 2015
`s
`Related U.S. Application Data
`(63) Continuation of application No. 13/729,872, filed on
`Dec. 28, 2013, now Pat. No. 8,981,933, which is a
`continuation of application No. 13/174,348, filed on
`Jun. 30, 2011, now Pat. No. 8,350,698, which is a
`continuation of application No. 12/253,826, filed on
`Oct. 17, 2008, now Pat. No. 7,990,268, which is a
`continuation of application No. 10/176,565, filed on
`Jun. 20, 2002, now abandoned, which is a
`continuation-in-part of application No. 10/139,110,
`filed on May 4, 2002, now Pat. No. 6,894,617.
`(51) Int. Cl.
`G08B I3/00
`G08B I3/24
`G08B I3/196
`GSB 2.5/10
`GSB 25/00
`GSB 27/00
`
`(2006.01)
`(2006.01)
`(2006.01)
`(2006.01)
`(2006.01)
`(2006.01)
`
`(52) U.S. Cl.
`CPC ....... G08B 13/2491 (2013.01); G08B 13/1966
`(2013.01); G08B 13/19608 (2013.01); G08B
`13/19621 (2013.01); G08B 13/19656
`(2013.01); G08B 13/19697 (2013.01); G08B
`25/00 (2013.01); G08B 25/10 (2013.01);
`G08B 27/001 (2013.01)
`(58) Field of Classification Search
`CPC ... G06F 21/55; G08B 13/00; G08B 21/0297;
`G08B 27/00; G08B 29/00
`USPC ............. 340/541, 573.1, 506, 539.1, 539.11,
`340/539.14, 539.17, 539.22; 345/7
`See application file for complete search history.
`
`(56)
`
`References Cited
`U.S. PATENT DOCUMENTS
`
`6,097.429 A * 8/2000 Seeley ............. G08B 13, 196O2
`348,154
`6,545,601 B1 * 4/2003 Monroe ............. B64D 45.0015
`340/31
`7,376,969 B1* 5/2008 Njemanze ............... GO6F 21/55
`TO9,224
`8,520,068 B2 * 8/2013 Naidoo ............ G08B 13, 1964.5
`348/143
`
`* cited by examiner
`Primary Examiner — Phung Nguyen
`(74) Attorney, Agent, or Firm — Orrick, Herrington &
`Sutcliffe LLP
`
`ABSTRACT
`(57)
`A security system comprises one or more sensor devices
`configured to detect conditions at one or more sites; one or
`more checkpoints at each of said one or more sites config
`ured to receive signals from the one or more sensor devices;
`and a central headquarters processor configured to receive
`signals indicative of the conditions detected at said one or
`more sites from the one or more checkpoints. The central
`headquarters processor is configured to process the signals
`to determine if an event has occurred.
`
`19 Claims, 8 Drawing Sheets
`
`
`
`Case 6:20-cv-00770-ADA Document 1-3 Filed 08/25/20 Page 2 of 19
`
`

`

`U.S. Patent
`
`Sep. 20, 2016
`
`Sheet 1 of 8
`
`US 9,449.484 B2
`
`OZ
`
`JosuaSJosues
`
`
`
`Case 6:20-cv-00770-ADA Document 1-3 Filed 08/25/20 Page 3 of 19
`
`

`

`U.S. Patent
`
`US 9,449.484 B2
`
`
`
`Ja?nduloo
`
`Case 6:20-cv-00770-ADA Document 1-3 Filed 08/25/20 Page 4 of 19
`
`

`

`U.S. Patent
`
`Sep. 20, 2016
`
`Sheet 3 of 8
`
`US 9,449.484 B2
`
`
`
`
`
`Case 6:20-cv-00770-ADA Document 1-3 Filed 08/25/20 Page 5 of 19
`
`

`

`U.S. Patent
`
`US 9,449.484 B2
`
`
`
`
`
`
`
`
`
`
`
`
`
`Case 6:20-cv-00770-ADA Document 1-3 Filed 08/25/20 Page 6 of 19
`
`SJOSU?S
`
`

`

`Case 6:20-cv-00770-ADA Document 1-3 Filed 08/25/20 Page 7 of 19
`m
`0
`W0d
`
`nheS
`
`M8Ff
`
`2B941M
`
`aSPU£qumwcozmoEsEEoox5502m9<=83
`
`
`
`.mmcozfimm:E63850E69620E69620mg9,wmmm...
`
`
`
`
`
`0.tmmet
`
`U
`
`0nm&85.
`
`
`
`
`AD.“2,5:280Amxomum53805832nwuumpEm
`5:05:00ww.mEEmmm3.mx020#355m9”—
`
`w:8x85
`m632882.;MECESEEES
`mJSH02
`
`
`

`

`Case 6:20-cv-00770-ADA Document 1-3 Filed 08/25/20 Page 8 of 19
`Case 6:20-cv-OO770-ADA Document 1-3 Filed 08/25/20 Page 8 of 19
`
`U.S. Patent
`
`n&
`
`6
`
`00
`
`US 9,449,484 B2
`
`w939.52Em>mLomcmm
`
`m@Bmimvmuoogoolaminaem3:$0042X.mfiblocm
`
`
`
`
`
`E9m>w
`
`Bomcmm
`
`N?
`
`ONF
`
`.32.mm?
`
`
`
`MSemimmmm“m«Gm.o:
`
`wmv
`
`m3E2
`
`
`
`8395.4Em>wLomcmm
`
`938005
`
`
`
`an:9332
`
`m3
`
`IUCNuc-0>m
`
`353623580.88-88
`
`NE.0.m_H_
`
`VNF
`
`NNV
`
`
`
`
`
`

`

`U.S. Patent
`
`Sep. 20, 2016
`
`Sheet 7 of 8
`
`US 9,449.484 B2
`
`190
`
`192
`
`LEVEL
`Event SensOrS/Hardware
`
`
`
`
`
`194
`
`LEVEL
`Conversion/Encryption
`
`196
`
`LEVEL
`SCAVRemote Users
`
`Case 6:20-cv-00770-ADA Document 1-3 Filed 08/25/20 Page 9 of 19
`
`device
`language data
`signals
`
`XML format
`encrypted data
`messages
`
`Fig. 7
`
`

`

`U.S. Patent
`
`Sep. 20, 2016
`
`Sheet 8 of 8
`
`US 9,449.484 B2
`
`2OO
`
`a standardized
`message in
`XML format
`
`204
`
`an encrypted
`message
`
`2O8
`
`a signal at a
`specified serial
`port
`
`240 N-a-
`212
`
`
`
`a standardized
`message in
`XML format
`With CRC
`
`
`
`220
`
`
`
`
`
`
`
`Input Device(s)
`
`2O2
`
`Conversion Module
`
`Control Sum/CRC Adding Module
`
`2O6
`
`Encryption Module
`
`
`
`
`
`Serial Port USB/IR
`Transmitting
`Module
`
`UDP/TCP
`Transmitting
`Module
`
`
`
`System Core
`Application
`
`hardware signal
`
`a standardized
`message in
`XM format
`With CRC
`
`
`
`21 O
`
`UDP packet(s)
`Written to a
`specified UDP
`Socket
`
`UDP/TCP
`Seria Port/USB/IR
`Receiving Module Receiving Module
`
`214
`
`Decryption Module -
`
`Control Sum/CRC Checking
`and Removing Module
`
`Case 6:20-cv-00770-ADA Document 1-3 Filed 08/25/20 Page 10 of 19
`
`standardized
`message in
`XML format
`
`222
`
`226
`
`
`
`
`
`N- Message Filtering Module
`-as Queuing Module
`Message Processing Module
`
`Database
`NC
`
`CSS3CE
`
`216
`
`218
`
`standardized
`message in
`XML format
`
`
`
`
`
`filtered
`standardized
`message in
`XM format
`
`Fig. 8
`
`

`

`US 9,449,484 B2
`
`1.
`SYSTEM FOR REAL TIME SECURITY
`MONITORING
`
`This application is a Continuation of U.S. patent appli
`cation Ser. No. 13/729,872, filed Dec. 28, 2013, now U.S.
`Pat. No. 8,981,933, issued Mar. 17, 2015, which is a
`Continuation of U.S. patent application Ser. No. 13/174,348,
`filed Jun. 30, 2011, now U.S. Pat. No. 8,350,698, issued Oct.
`27, 2011, which is a Continuation of U.S. patent application
`Ser. No. 12/253,826, filed Oct. 17, 2008, now U.S. Pat. No.
`7.990,268, issued Aug. 2, 2011, which is a Continuation of
`U.S. patent application Ser. No. 10/176,565, filed Jun. 20,
`2002, now abandoned, which is a Continuation-in-part of
`U.S. patent application Ser. No. 10/139,110, filed May 4,
`2002, now U.S. Pat. No. 6,894,617, issued May 17, 2005,
`each of which are incorporated herein by reference in their
`entirety for all purposes.
`
`5
`
`10
`
`15
`
`BACKGROUND OF THE INVENTION
`
`2
`An electronic Surveillance system for remote guarding of
`an area using an operator station including a signal receiver
`with television display, radiant energy selection control, and
`energy level controller is known in the prior art. Such a
`device is described in U.S. Pat. No. 6,204,762 B1. The novel
`invention remotely controls and directs an apparatus
`“weapon” for integration with traditionally secured facili
`ties, remote detection devices, closed circuit TV, and a
`remotely-located, manned control station. While such a
`computerized system is helpful in detection of unauthorized
`personnel in a given area and does seek to incorporate
`pre-existing security devices, there is no provision which
`would allow for the irreplaceable and highly effective pres
`ence of human security guards, guards that are further
`enhanced by electronic wireless communications and moni
`toring.
`Additionally, the entire system depends upon the instal
`lation and presence of numerous hard wired security devices
`in a given area and is not readily Scalable to incorporate
`larger areas in the Surveillance area in a short period of time
`without extensive outlay of effort and installation of new
`equipment. The acoustic energy “weapon' used as a deter
`rent to intruders is not confined to any given space and might
`pose a threat to anyone, including authorized individuals,
`within hearing distance.
`Therefore, it would be highly desirable to have a new and
`improved enhanced security guard system which would
`allow for computerized and wireless communications and
`monitoring of human security guards and their activities
`with a centralized location, in addition to conventional
`security devices and which would be scalable with minimal
`time and material expenditure, and which would provide for
`human guards to act as a more rapid and effective deterrent
`to intruders.
`The exit guard system described in U.S. Pat. No. 6,154,
`133 addresses the requirements of providing areas with
`detection of movement of a Subject along an exit path in an
`unauthorized direction. This system further provides for a
`human monitor at a centralized location with added Super
`vision of the deactivation of the security alarm system only
`by authorized personnel.
`However, within this system there is no human security
`guard on site actively patrolling the area. This electronically
`augmented human presence is irreplaceable as a deterrent to
`potential intruders as well as providing for flexibility in
`terms of monitoring and responding to a variety of situations
`that might arise.
`Therefore, it would be highly desirable to have a new and
`improved, technologically augmented human presence auto
`matically reporting to a centralized location, or a remote
`monitoring station through communications over a global
`computer network or via satellite link, which could then
`monitor and record guard activities as well as utilize pre
`existing event detection technology, such as motion, video
`and perimeter control devices to alert those guards of real
`time events taking place on their shift.
`U.S. Pat. No. 6,097,429 describes a relatively sophisti
`cated security system utilizing video images obtained from
`a plurality of cameras relayed to a site control unit equipped
`with an automated image processor. The images are then
`relayed to a security system operator who then analyzes the
`images and informs authorities of an intrusion.
`While this system utilizes advanced technological fea
`tures to distinguish between actual intrusions and false
`alarms (friend or foe), the absence of a human guard which
`would serve to discourage intrusions is notably absent.
`Moreover, the presence of human guards makes those that
`
`25
`
`30
`
`40
`
`1. Field of the Invention
`The present invention relates to a multiple site integrated
`security system method and communications protocol. More
`particularly, the present invention relates to a human ori
`ented system of security service and a computer imple
`mented universal communications protocol which facilitates
`communications between real time security hardware and a
`real time security monitoring software system.
`2. Description of the Related Art
`In addition to traditional threats to security Such as
`burglary, vandalism and arson, today’s complex national and
`international political conflicts are putting increased pres
`Sure on facilities and organizations of all kinds to provide
`effective security systems for the safety and protection of
`35
`personnel, property and Surroundings.
`Devices and systems for the provision of safety and
`security of persons and property are well known. Examples
`of different types and kinds of security systems for protec
`tion and Surveillance methods of building structures and
`surrounding areas are disclosed in U.S. Pat. Nos. 6,204,762
`B1, 6,154,133, 6,097,429, and 5,825,283.
`In general, the structure and function of most security
`systems involves electronic Surveillance equipment moni
`tored at a centralized location. Current development of
`45
`security systems attempts to do away with human-oriented
`services and replace the human security guard with high
`technology solutions to security problems. Only a limited
`number of currently developed security systems utilize a
`combination of guards in close conjunction with the elec
`tronic equipment. Most of the time, these systems involve
`one guard who monitors a video feed or alarm panel for
`intrusion or other related alerts. These security systems are
`commonly built, installed and implemented without any
`regard for the particular facilities of other systems, for
`example, the facilities of built-in environmental and climate
`control, the tracking of people and assets within the building
`or complex, and fire/Smoke detection as well as transport
`systems such as elevators, etc.
`Therefore, it would be highly desirable to have a new and
`improved security system which not only enhances the
`human security guard services, but also integrates facilities
`management, and allows for identification and global posi
`tioning satellite (GPS) tracking of people as well as assets
`Such as computers, and other valuable instrumentation, all in
`a readily scalable configuration utilizing off the shelf elec
`tronic security and communications components.
`
`50
`
`55
`
`60
`
`65
`
`Case 6:20-cv-00770-ADA Document 1-3 Filed 08/25/20 Page 11 of 19
`
`

`

`10
`
`15
`
`Case 6:20-cv-00770-ADA Document 1-3 Filed 08/25/20 Page 12 of 19
`
`US 9,449,484 B2
`
`3
`are present within the facility feel protected and well taken
`care of, and these individuals will often speak to the security
`guards or become familiar with them to avoid any misun
`derstanding as to their access authorization or the like.
`Additionally, the highly automated image processor and 5
`related complex software used to differentiate between
`actual foe intrusions and friendly false alarms is inherently
`limited in its capability to observe, compare and react to the
`myriad of potential one time or entirely novel situations
`which might occur. This type of security monitoring can
`only be accomplished with highly trained, well equipped,
`and competently Supervised human security guards on duty
`in numbers corresponding to the amount of space or activity
`required to be secure from outside threats.
`Therefore, it would be highly desirable to have a new and
`improved system for technological augmentation of human
`guards who are irreplaceable in terms of providing a deter
`rent to intrusion and who are capable of observing, assessing
`and responding to novel and unusual situations and whose 20
`actions would automatically be reported to a centralized
`headquarters with integrated automated daily events and
`incident real time reporting.
`Finally, U.S. Pat. No. 5,825.283 provides for an apparatus
`for monitoring Subjects having a location determining 25
`device which provides the location of the subject to a
`processor. The processor then stores and retrieves data
`generated or received by the processor. The primary means
`by which the subject is tracked is by usage of a GPS.
`Comparison of the parameters of given geographical bound- 30
`aries to the data from the location determining device may
`determine if the subject has deviated from those parameters.
`The claimed invention mandates detection of at least one
`physiological parameter of the Subject in order to compare
`existing Subject data previously stored.
`This imaginative invention does provide for tracking and
`determination of the general area in which a subject is to be
`found and a means by which to compare the location with a
`pre-determined geographic location. Unfortunately, while
`the location and tracking device may show a general area in 40
`which the Subject is located, there is no way of determining
`the exact location of the Subject at any given point in time.
`In addition, this system again depends upon a complex
`processor which must be programmed with any number of
`parameters. The system may fail to operate properly or may 45
`not operate at all if incorporated into a pre-existing security
`system, especially one having less complex processors
`available on site.
`Therefore, it would be highly desirable to have a new and
`improved system for technological augmentation of human 50
`guards automatically reporting exact location and time to a
`centralized headquarters with daily events and incident
`reporting automation which could give exact locations and
`time records of movement of the guards which would
`readily incorporate pre-existing hardware and software. 55
`Moreover, it would be highly desirable to enable said guards
`to wear a garment which would incorporate a wireless
`communications apparatus, or have said guards carry hand
`held computers for this purpose.
`With respect to security system and environmental system 60
`monitoring there have been no significant advances recently,
`especially in the area of software development that can be
`used to integrate far flung and varying system hardware
`configurations. However, the development of global com
`puter networks such as the Internet have sparked new 65
`languages capable of being effectively used in numerous
`alternative applications. One such language is Hypertext
`
`35
`
`4
`Markup Language or HTML and another such language is
`Extensible Markup Language or XML.
`Most documents on the Web are stored and transmitted in
`HTML. HTML is a simple language well suited for hyper
`text, multimedia, and the display of Small and reasonably
`simple documents. HTML is based on SGML (Standard
`Generalized Markup Language, ISO 8879), a standard sys
`tem for defining and using document formats.
`SGML allows documents to describe their own gram
`mar—that is, to specify the tag set used in the document and
`the structural relationships that those tags represent. HTML
`applications are applications that hard-wire a small set of
`tags in conformance with a single SGML specification.
`Freezing a small set of tags allows users to leave the
`language specification out of the document and makes it
`much easier to build applications, but this ease comes at the
`cost of severely limiting HTML in several important
`respects, chief among which are extensibility, structure, and
`validation.
`Extensibility. HTML does not allow users to specify their
`own tags or attributes in order to parameterize or
`otherwise semantically qualify their data.
`Structure. HTML does not support the specification of
`deep structures needed to represent database schemas
`or object-oriented hierarchies.
`Validation. HTML does not support the kind of language
`specification that allows consuming applications to
`check data for structural validity on importation.
`In contrast to HTML stands generic SGML. A generic
`SGML application is one that supports SGML language
`specifications of random complexity and makes possible the
`qualities of extensibility, structure, and validation missing
`from HTML. SGML makes it possible to define your own
`formats for your own documents, to handle large and
`complex documents, and to manage large information
`repositories. However, full SGML contains many optional
`features that are not needed for Web applications and has
`proven to have a cost/benefit ratio unattractive to current
`vendors of Web browsers.
`The World Wide Web Consortium (W3C) has created an
`SGML Working Group to build a set of specifications to
`make it easy and straightforward to use the beneficial
`features of SGML on the Web. Extensible Markup Language
`(XML) is a simple, very flexible text format derived from
`SGML (ISO 8879). Originally designed to meet the chal
`lenges of large-scale electronic publishing, XML is also
`playing an increasingly important role in the exchange of a
`wide variety of data on the Web.
`XML advantages:
`Enables internationalized media-independent electronic
`publishing
`Allows industries to define platform-independent proto
`cols for the exchange of data, especially the data of
`electronic commerce
`Delivers information to client users in a form that allows
`automatic processing after receipt.
`Makes it easier to develop software to handle specialized
`information distributed over the Web
`Makes it easy for people to process data using inexpen
`sive software
`Allows people to display information the way they want
`it, under style sheet control
`Provides a standard packaging/transport mechanism for
`any type of information
`XML Syntax
`The best way to appreciate what XML documents look
`like is with a simple example. Imagine a company that sells
`
`

`

`US 9,449,484 B2
`
`5
`products on-line. Marketing descriptions of the products are
`written in HTML, but names and addresses of customers,
`and also prices and discounts are formatted with XML. Here
`is the information describing a customer:
`
`6
`ware equipment thus providing a high level of integration
`with off the shelf security devices now existing or not yet
`conceived.
`It is a further object of the instant invention to provide a
`system of security which is able to be custom configured and
`scaled up or down, by being individually tailored to site
`conditions such as site component configurations, check
`point locations, building type material, building transporta
`tion systems, facilities environmental control systems, such
`as climate control, fire and Smoke detection, and other varied
`parameters.
`Yet another object of the present invention is to provide a
`system which would automatically monitor and control
`certain movable and fixed site conditions such as people and
`vehicles at checkpoints, safety systems, access control sys
`tems, position sensors, transportation control systems,
`power Supply systems, water and hydraulic control systems,
`warning systems, lighting systems, communications systems
`and miscellaneous site-specific systems such as greenhouse
`temperature controls.
`Still another object of the instant invention is to provide
`a system for security which monitors the identification and
`authorization of personnel inside secured areas through use
`of a two points access Subsystem composed of a fixed device
`installed at a checkpoint and a mobile device (wearable or
`hand held) carried by authorized personnel which could be
`configured to integrate pre-existing security systems without
`modification of the core program.
`Another object of the instant invention is to provide a
`guard activity and real time reporting Support system which
`includes a scheduled building and real time guard tour
`tracking system.
`Yet another object of the instant invention is to provide a
`computer implemented communications protocol whereby
`bi-directional data and command transmissions may occur
`between a base station and any designated personal identi
`fication devices, which enables assistance deployment and
`transmits the location of the person, group of persons,
`security guards and/or guard vehicles.
`A further object of the instant invention is to provide a
`computer implemented communications protocol which
`records real-time object identification data and tracking
`Subsystems data for indoor and outdoor areas.
`Another object of the present invention is to provide a site
`Video monitoring system that generates data which will be
`recorded, transmitted and displayed at a base station (com
`puter or server configuration) with the option of video data
`processing, to recognize and alert of certain predetermined
`events, such as access verification, etc.
`Still another object of the invention is to provide a
`computer implemented communications protocol which will
`allow integration of hardware already existing at the site into
`the system without requiring purchase of redundant hard
`Wae.
`Yet another object of the invention is to provide a com
`puter implemented communications protocol and system
`that allows for data exchange between base station and
`headquarters and between base station and any other speci
`fied hardware system and any other off-site computers (such
`as remote workstations).
`It is also another object of the present invention to provide
`a computer implemented communications protocol and sys
`tem which would automate time sheets, payroll recap and
`other accounting operations.
`It is another object of the present invention to provide a
`computer implemented communications protocol and sys
`tem which provides complete availability of site level infor
`
`<customer-details id+ “AcPharm39156'>
`<name>Acme Pharmaceuticals Co.<name>
`<address country-- “US">
`<streets-7301 Smokey Boulevard</streets
`<city>Smallville-city>
`<state-Indiana</state
`<postalD94571</postal
`<address>
`<customer-details.>
`
`10
`
`15
`
`The XML syntax uses matching start and end tags, such
`as <name> and </name>, to mark up information. A piece of
`information marked by the presence of tags is called an
`element: elements may be further enriched by attaching
`name-value pairs (for example, country--"US in the
`example above) called attributes. Its simple syntax is easy to
`process by machine, and has the attraction of remaining
`understandable to humans. XML is based on SGML, and is
`familiar in look and feel to those accustomed to HTML.
`Building Applications with XML
`XML is a low-level syntax for representing structured
`data. You can use this simple syntax to support a wide
`variety of applications. For this reason, XML now underpins
`a number of Web markup languages and applications.
`Outside and inside W3C, many groups are already defin
`ing new formats for information interchange. The number of
`XML applications is growing rapidly, and the growth
`appears likely to continue. There are many areas, for
`example, the health-care industry, the on-line revenue gen
`eration, database analysis and government and finance,
`where XML applications are used to store and process data.
`XML as a simple method for data representation and orga
`nization will mean that problems of data incompatibility and
`tedious manual re-keying will become more manageable.
`40
`Therefore, it would be highly desirable to have an XML
`based communications method and protocol capable of
`enabling the integration of varying security and environ
`mental hardware monitoring devices, and allowing commu
`nication between said devices and a core system application
`45
`for the purpose of monitoring security systems and/or envi
`ronmental systems within one or more subject sites, both on
`site and remotely using direct and indirect means.
`
`25
`
`30
`
`35
`
`Case 6:20-cv-00770-ADA Document 1-3 Filed 08/25/20 Page 13 of 19
`
`SUMMARY OF THE INVENTION
`
`It is therefore a principal object of the instant invention to
`provide a multiple site, integrated security system which
`incorporates and enhances the performance of human guards
`within said security system and a method and protocol for
`communications between real time hardware and a real time
`security monitoring Software system.
`It is another object of the instant invention to provide the
`human guards with the latest technology, in the form of
`wearable and hand held computers or other data processors
`capable of wireless communications, in order to make the
`guards more knowledgeable and responsible to the guarded
`facilities complex interactive environment.
`Another object of the instant invention is to provide a
`method and communications protocol which would be flex
`ible in incorporating new technology and pre-existing hard
`
`50
`
`55
`
`60
`
`65
`
`

`

`7
`mation from a centralized headquarters, or remotely away
`from a centralized headquarters.
`Still another object of the present invention is to provide
`a computer implemented communications protocol and sys
`tem which would provide access to historical information
`Such as time sheets, event logs, and alert logs to designated
`personnel.
`Yet another object of the present invention is to provide a
`means of communication via the Internet with a central
`console monitoring application.
`Still another object of the present invention is to provide
`a system with failure-resistance and robustness against hard
`ware denials and intentional attacks by providing data
`backup on both facilities site and a security headquarter
`levels.
`It is yet another object of the present invention to provide
`a computer implemented communications protocol capable
`of communicating with preexisting and/or pre-built system
`configurations to be installed at specific kinds of sites.
`It is another object of the present invention to provide a
`computer implemented communications protocol which
`would support several levels of Software security, users,
`data, application and communication, and whereby security
`tasks are performed and verified by the guard during the
`guard tour and that information is recorded by the guard in
`a checkpoint data processing application, then a base station
`processing application. The ability to provide central moni
`toring of guard tours is dependent upon novel wearable and
`hand held devices which are capable of wireless communi
`cations with the data processing checkpoint stations.
`Briefly, the objects and advantages of the present inven
`tion are realized by providing a computer implemented
`process for real time communications between security
`hardware devices and a security system core application
`(SCA). The security devices transmit data in varying device
`language. A security site checkpoint computer collects data
`messages from these security devices and translates the
`device language into standardized converted messages
`before input into and use by the SCA. The SCA then
`generates a message and transmits converted messages via
`various direct and indirect means to other computers running
`the security SCA. Base station computers then receive said
`messages and analyzes, reports and logs the transmitted
`messages for the purpose of monitoring environmental and
`security conditions within a Subject site.
`Therefore, a new and improved computer implemented
`communications protocol is provided, which is an XML
`based communications protocol for security monitoring pur
`50
`poses. This unique XML based communications protocol is
`implemented through numerous modules which receive and
`convert data messages from diverse security devices and
`sensors, standardize and send converted messages, and
`encrypt and decrypt said data messages as necessary. With
`the set modules, the data messages are filtered and trans
`mitted from checkpoint computers to base station comput
`ers, which analyzes, reports and logs environmental as well
`as security events within a subject site. The resulting inte
`grated security system provides better trained security
`guards, who are more alert and responsive, and more closely
`Supervised and easily scheduled, enhanced financial moni
`toring, more accurately paid and costed security services,
`better archived and reported security related events, as well
`as being better coordinated with public agencies, enhanced
`safety, and readily upgraded and integrated with existing and
`future technologies.
`
`US 9,449,484 B2
`
`8
`Other objects and advantages of the present invention will
`become apparent to those of skill in the art upon contem
`plation of the disclosure herein in conjunction with the
`drawings as described below.
`
`BRIEF DESCRIPTION OF THE DRAWINGS
`
`The above mentioned and other objects and features of
`this invention and the manner of attaining them will become
`apparent, and the invention itself will be best understood by
`reference to the following description of the embodiment of
`the invention in conjunction with the accompanying draw
`ings, wherein:
`FIG. 1 is a representational diagram of a multiple site
`integrated security system constructed in accordance with
`the present invention;
`FIG. 2 is an enlarged detailed diagram of a communica
`tions scheme between multiple checkpoint data processors
`and a central base station computer, constructed in accor
`dance with the present invention;
`FIG. 3 is an enlarged detailed diagram of a headquarters
`server with multiple workstations and hard wired as well as
`global computer network communications capabilities, con
`structed in accordance with the present invention;
`FIG. 4 is a block diagram of the checkpoint data process
`ing architecture and communications system between the
`security system event sensors and said checkpoint data
`processor, in greater detail, constructed in accordance with
`the present invention;
`FIG. 5 is a block diagram showing the checkpoint hard
`ware architecture in greater detail, including communica
`tions routes between numerous checkpoint data processing
`units and a base station, constructed in accordance with the
`present invention;
`FIG. 6 is a block diagram of an integrated security system
`encrypted XML communications protocol illustrating com
`munications between system sensors, checkpoint data pro
`cessing units and the s

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket