ASSET MONITORING SYSTEM AND PORTABLE SECURITY SYSTEM THEREFOR
A portable security system for monitoring an asset has one or more alarm sensors and a wireless transmitter/receiver that communicates via wireless communication with a host system. The portable security system is switchable between a disabled (partially powered) state and an enabled (fully powered state) in response to commands received from the host system. In an aspect, the portable security system has a plurality of alarm sensors which a user can separately activate and deactivate via the host system. In an aspect, the portable security system includes a base unit and an auxiliary unit. The base unit includes one or more of the alarm sensors that serves a dual purpose depending on whether the base unit is mated with the auxiliary unit. In an aspect, the host system can be utilized by multiple users to manage portable security systems associated with the respective users, including management by group. In an aspect, the host system notifies a user(s) of an alarm condition(s).
Latest CATTAIL TECHNOLOGIES, LLC Patents:
This application is a divisional of U.S. patent application Ser. No. 11/840,436 filed Aug. 17, 2007 and claims the benefit of U.S. Provisional Application No. 60/838,910 filed on Aug. 18, 2006. The disclosure of the above applications are incorporated herein by reference.
FIELDThe present disclosure relates to asset monitoring systems and portable security systems therefor.
SUMMARYIn an aspect, a portable security system has one or more alarm sensors and a wireless transceiver that communicates via wireless communication with a host system. The portable security system is switchable between a disabled (partially powered) state and an enabled (fully powered state) in response to commands received from the host system. In an aspect, the portable security system is shipped from a manufacturer in the disabled state and is enabled by the host system, such as in response to the user registering the portable security system with the host system and activating it via the host system. In an aspect, the wireless communication is cellular communication. In an aspect, the system is provisioned with parameters necessary for its operation prior to being shipped from the manufacturer in the disabled state.
In an aspect, the portable security system has a plurality of alarm sensors which a user can separately activate and deactivate via the host system. In an aspect, the user activates and deactivates each alarm sensor via a web interface with the host system.
In an aspect, the portable security system includes a base unit and an auxiliary unit. The base unit includes one or more of the alarm sensors including a window/door sensor that serves a dual purpose depending on whether the base unit is mated with the auxiliary unit. When the base unit is not mated with the auxiliary unit, the window/door sensor senses whether a window or door is opened. When the base unit is mated with the auxiliary unit, the window/door sensor senses whether the auxiliary unit is being tampered with, such as being removed from the base unit. In an aspect, the window/door sensor is a magnetic sensor and the auxiliary unit includes a housing having a receptacle in which the base unit is received. The housing includes a hinged cover having a magnet that is in proximity with the window/door sensor of the base unit when the hinged cover is closed. If the hinged cover is opened, the window/door sensor responds to the change in magnetic field caused by the magnet moving away from the window/door sensor and generates an alarm signal. The base unit then sends an alarm signal to the host system that the cover of the auxiliary unit has been opened and the host system notifies the user associated with that portable security system. In an aspect, the auxiliary unit is a battery pack.
In an aspect, the base unit includes a tamper sensor that provides a signal in response to the base unit being removed from a surface on which it is mounted. The base unit responds to this signal and sends a tamper alarm to the host system and then the host system notifies the user associated with that portable security system of the tamper condition. In an aspect, this surface is a surface of an asset being monitored by the portable security system. In an aspect, the base unit includes a window/door sensor, a vibration sensor and a temperature sensor.
In an aspect, the auxiliary unit includes an actuator for the tamper sensor so that the tamper sensor is operative when the base unit is mated in the auxiliary unit and the auxiliary unit is mounted on the surface. When the auxiliary unit is removed from the surface, the tamper sensor actuator in the auxiliary unit actuates the tamper sensor so that the tamper sensor generates the signal indicating that the auxiliary unit has been removed from the surface. In an aspect, the auxiliary unit may be a battery pack or a motion detector.
In an aspect, the host system can be utilized by multiple users to manage portable security systems associated with the respective users. In an aspect, each user can assign any of the portable security systems associated with that user to a group and also have multiple groups. The user can then configure as a group the portable security systems assigned to a group. The user configures the settings for the desired group which results in the settings for all the portable security systems assigned to that group being configured according to the group settings.
In an aspect, the host system notifies a user(s) of an alarm condition(s) by calling one or more contact number(s) designated by the user(s) during configuration of the portable security system(s), sending an e-mail to one or more e-mail address(es) designated by the user(s) during configuration of the portable security system(s), or both. In an aspect, the system does so sequentially by attempting to call each contact one at a time and calling the next contact if the first contact does not answer.
The drawings described herein are for illustration purposes only and are not intended to limit the scope of the present disclosure in any way.
The following description is merely exemplary in nature and is not intended to limit the present disclosure, application, or uses. It should be understood that throughout the drawings, corresponding reference numerals indicate like or corresponding parts and features.
Portable security system 100 includes a base unit 101. Base unit 101 includes a controller 102 coupled to a cellular module 104, a global positioning system (GPS) module 106, one or more sensors 108, battery 110, speaker 112 and an accessory port 114. In an illustrative embodiment, GPS module 106 is an assisted GPS module 106. In an illustrative aspect, battery 110 is a lithium ion battery and a battery heater 116 is coupled to battery 110 and controller 102. GPS module 106 is coupled to a GPS antenna 118 and cellular module 104 is coupled to cellular antenna 120. The foregoing components are disposed in a housing, such as housing 200 shown in
Temperature sensor(s) 124 may illustratively be a thermistor, window/door sensor(s) 126 may illustratively be a magnetic sensor (such as a hall effect transducer or reed switch), tamper sensor(s) 128 may illustratively include a magnetic sensor and plunger assembly, as described below, and vibration sensor(s) 130 may illustratively be a cantilever-type vibration sensor, such as a Minisense 100 Vibration Sensor available from Measurement Specialties, Inc., 1000 Lucas Way, Hampton, Va. 23666. It should be understood that the sensors 124, 126, 128 and 130 may be types of sensors other than the foregoing types, and each of sensors 124, 126, 128 and 130 may be any sensor suitable for sensing the condition that the sensor is to sense. For example, window/door sensor 126 may illustratively be a magnetically actuated reed switch; and tamper sensor 128 may illustratively be a push button switch.
A printed circuit board 202 is mounted within housing 200. Controller 102, cellular module 104, cellular antenna 120, GPS module 106, GPS antenna 118, accessory port 114, and associated electronic components are mounted on printed circuit board 202. An electromagnetic shield 204, such as a metal can, is mounted on printed circuit board 202 over RF circuits. Accessory port 114 may illustratively be a 7 pin mini-DIN connector. Battery 110 may illustratively be a lithium ion battery and in the embodiment shown in
Speaker 112 is disposed in housing 200 and has lead wires (not shown) that connect to a connector 207 on printed circuit board 202.
Housing 200 includes one or more features used to mount housing 200 on an asset to be protected or in an area to be protected or monitored. These mounting features may illustratively include one or more mounting magnets 208 disposed in housing 200. In the illustrative embodiment shown in
In use, base unit 101 of portable security device 100 is mounted, such to an asset to be protected, using magnets 208 and/or screws (not shown) placed through screw hole(s) 212. For example, if base unit 101 is to be mounted on a metal tool box or metal tool cabinet, magnets 208 can be used to hold base unit 101 to the asset. If base unit 101 is to be mounted on a wood tool cabinet, screws can be inserted into screw holes 212 and tightened to affix base unit 101 to the asset. In some cases, base unit 101 can simply be placed on top of the asset, such as on the top surface of a tool box.
In the illustrative embodiment shown in
To provide portable security system 100 with additional functionality yet enable base unit 101 to remain small, base unit 101 is adapted to interface with accessory units, such as auxiliary battery unit 400 (
With reference to
Portable security system 100 has one or more of the following features. It does not have any physical on/off switch or button accessible on the outside of base unit 101. It can be activated, deactivated, and configured or programmed only through wireless communications through cellular module 104. Management (e.g., activation, deactivation, configuration and/or messaging) is via a server that a user can communicate with via the Internet or by phone (e.g., by an interactive voice response system).
With reference to
As discussed, sensors 108 may include temperature sensor 124, window/door sensor 126, tamper sensor 128 and vibration sensor 130. Sensors 108 may also include other types of sensors as discussed above. In the event that controller 102 based on an input from temperature sensor 124 determines that a temperature where portable security system 100 is located is over or under temperature, controller 102 sends a temperature alarm message via cellular communication using cellular module 104 to server 602 that the temperature is out of range. In the event that controller 102 determines that a window or door has opened based on an input from window/door sensor 126, controller 102 sends an window/door open alarm message to server 602 that the window or door has been opened. Similarly, if controller 102 determines that base unit 101 has been removed from asset 600 based on an input from tamper sensor 128, it sends a tamper alarm message to server 602 that portable security 100 has been tampered with. If controller 102 determines that asset 600 is being moved such as based on an input from vibration sensor 130, controller 102 sends a vibration alarm message to server 602. If portable security system 100 includes auxiliary motion detector 500, and controller 102 determines that movement has occurred based on an input from auxiliary motion detector 500, it sends an intrusion alarm message to server 602. Controller 102 may also sound an audible alarm in each case where it sends an alarm message to server 602. It should be understood that portable security unit 100 is user configurable, via wireless programming as discussed below, to set which sensors 108 are active. Controller 602 will send alarm messages to server 602 only in response to an appropriate input from a sensor that is configured as active. Similarly, portable security unit 100 is user configurable, via wireless programming as discussed below, to set which alarm conditions will also result in controller 102 sounding an audible alarm with speaker 112. In some cases, it may be desirable that an audible alarm not be sounded upon controller detecting an alarm condition where it sends an alarm message to server 602. For example, when portable security system 100 is utilizing auxiliary motion detector 500 to monitor an area, to avoid alerting intruders that their presence has been detected, portable security system 100 may be configured so that upon detecting motion, controller 102 sends an intrusion alarm message to server 602 but does not sound an audible alarm.
In an aspect, window/door sensor 126 is a magnetic sensor, such as a hall effect transducer, disposed in housing 200, such as on printed circuit board 202 (
In an aspect, window/door sensor 126 can also be used to indicate a tamper condition of an auxiliary device, described using auxiliary battery unit 400 as an example. In this example, window/door sensor 126 is a magnetic sensor, such as a hall effect transducer. Hinged cover 406 of auxiliary battery unit 400 has a magnet 409 mounted thereon. When hinged cover 406 is closed, magnet 409 is adjacent window/door sensor 126 of base unit 101, such as by being received in a recess 417 of housing base 404 of housing 402 of auxiliary battery unit 400. When hinged cover 406 is opened, window/door sensor 126 responds to the change in magnetic field and provides controller 102 of base unit 101 a signal indicative of the magnet moving away from window/door sensor 126. This causes controller 102 to determine that a tamper condition occurred, and it generates a tamper alarm. In this illustrative aspect, controller 102 determines that the tamper condition is housing cover 406 being opened and sends server 602 an tamper condition alarm message indicating that hinged cover 406 had been opened. Server 602 sends an alarm message to the contact(s) designated for that portable security system 100 indicating that the hinged cover 406 of the auxiliary battery unit had been opened.
In an aspect, portable security system 100, after it is assembled at the factory, is provisioned with that data necessary for testing it and then tested. In an aspect, it is also provisioned prior to shipment with the parameters needed for operation. In an aspect, portable security system 100 is then shipped from the manufacturer in a disabled state with battery 110 partially charged. In an aspect, in the disabled state, battery 110 can't be charged and portable security system 100 can't send cellular messages (e.g., sending of 1XRTT messages is disabled). Portable security system 100 must then be enabled by the user. An illustrative process of enabling portable security system 100 is described with reference to
Server 602 then enables the base unit 101 of the portable security system 100 at 706. Base unit 101 of portable security system 100 is shipped from the manufacturer in a disabled state. By disabled, it is meant that battery 110 is partially charged and provides power only to those components of components of base unit 101 that are involved in switching from enabled to disabled states. As shown representatively by the simplified schematic of
With reference to
Management of a portable security system 100 via management site 610 is discussed with reference to the pages of the web site of management site 610. Portable security system 100 can also be managed by calling the customer service number for management site 610 and accessing it via the interactive voice response system, although some features, such as map location display, may not be suitable for phone communication and may thus be available only on the website. The user accesses a logon page (not shown) of the website management site 610 and logins which takes the user to a home page of management site 610 that is provisioned for that user, referred to herein as Units—Accounts Summary page 1000. All the portable security systems 100 associated with that user are shown on User—Accounts Summary home page 1000, along with various buttons (e.g., arm, locate, request status, settings) for selecting functions to manage the portable security systems 100 and links (shown along the left hand side of the page) that the user can select to manage portable security systems 100. Also, if these portable security systems 100 are also associated with groups, they will by shown by group. Also, the links are typically displayed along the left hand side of each of the sub pages as can be seen from
If the user wishes to enter or update the user's profile, the user selects “user profile” link under the Users heading. This takes the user to the Users—User Profile page 1002 (
If the user selects the “suggestion box” link under the Admin heading, the user is taken to “Comment/Suggestion” page 1004 (
If the user selects the “customize units” link, the user is taken to the Unit Settings/Unit History page 1008 (
Under Speaker, the user can select by checking the appropriate box whether the selected portable security system will sound an audible alarm or message using speaker 112 (
Page 1008 also displays the Unit History for the selected portable security system 100 in the “Unit History” box. This is a log of the events for the selected portable security system 100, such as alarm messages, page events, etc.
Page 1008 also displays the arm/disarm status of the selected portable security system 100, which the user can obtain by clicking “Status”button 1010. It also allows the user to arm and disarm the selected portable security system 100 by clicking the arm and disarm buttons 1012 and 1014, respectively. When the selected portable security system 100 is armed, it will, upon receiving an appropriate input from an active sensor, generate a corresponding alarm message that it sends out as discussed above. When the selected portable security system 100 is disarmed, it won't generate an alarm message or sound an audible alarm.
The “Page” button 1016 is used to turn the “Page” function on (indicated by “+” on the button) and off (indicated by (−) on the button. When the page function of the selected portable security system 100 is on, the selected portable security system 100 emits a sound from speaker 112 so that those in the vicinity of the selected portable security system 100 can locate it by the sound emanating from its speaker 112. The “Page” function can be advantageously used to locate assets, such as a particular tool, on a jobsite. The base unit 101 of a portable security system 100 is attached to the asset and when personnel on the jobsite need to locate that asset, they can turn the “Page” function for that portable security system 100 on and use the sound emanating from the speaker of that portable security system 100 to locate the asset. In an aspect, a portable security system 100 having its Page function on emits a sound from its speaker for a period of time, such as sixty seconds. In an aspect, a portable security system 100 having its Page function on emits a sound from its speaker 112 until its Page function is deactivated.
A “Locate” button (
If the user clicks the “Add a New Unit” link under the Units heading, the user is taken to Units—Add a New Unit page 1020 (
Clicking the “Update Alarm Contacts” link takes the user to “Units—Update Alarm Contacts” page 1022 (
In this regard, in an aspect, the contact information includes prioritization information and server 602 sends a notification message to one or more of the contacts based on the prioritization information. In an aspect, server 602 sends the notification messages to the contacts based on priority order with server 602 sending the notification message to the next lower priority contact only if server 602 receives no response from the contact to which it sent the notification message.
In an aspect, the alarm message is one of a plurality of different types of alarm messages and the contact information set in server 602 includes contact information for a plurality of contacts for server 602 to contact upon receipt of the alarm message wherein different contacts are associated with different ones of the different types of alarm messages. Server 602 sends a notification message upon receipt of the alarm message to the contact associated with the type of alarm message that corresponds to the received alarm message.
With reference to
Clicking the “Arm Schedule” link takes the user to Arm/Disarm schedule page 1026 (
Clicking the “Maintain Users” link takes the user to Add/Update Users page 1027 (
In aspect, management site 610 provides for multiple levels of authority. That is, personnel who have access to management site 610 are provided various levels of authority with regard to which functions of management site 610 that they can access or use. In an aspect, levels of authority include customer service support which provides customer support personnel of the provider that manages management site 610 access to all accounts for troubleshooting, and a “super user” that provides rights in addition to those provided customer service support personnel. For end users, e.g., users associated with portable security systems 100, three levels of authority are provided in an aspect. These are “Account Owner,” “Master User,” and “User.”
In an aspect, there is one Account Owner per account and the Account Owner has access to all functions for the portable security systems 100 associated with that account as well as functions associated with the account. The Account Owner sets up the account, manages the payments for the account, and has authority to set up Master Users and Users.
In an aspect, there can be an unlimited number of Master Users for each account. A Master User has access to all functions for the portable security systems 100 associated with the account. A Master User can purchase locates for the account using his/her credit card, such as by clicking the “Purchase Locates” link. A Master User can set up other Master Users and Users.
In an aspect, there can be an unlimited number of Users for each account. In an aspect, a User has access only to the arm and disarm functions for the portable security systems 100 associated with the account. It should be understood that the lower case term “user” is used herein to refer to an person having access to management site 610 regardless of the level of authority assigned to that person while the capitalized term “User” is used herein to refer to a user of management site 610 assigned the “User” level of authority.
The “Accounts” link and sublinks thereunder take a user to pages used to set up and manage accounts. Again, the access to these pages and functions available thereon depends on the level of authority assigned to the user.
Clicking the Account Maintenance link takes the user to Account page 1028 (
Clicking the “Account Selection” link on home page 1000 takes the user to Account Selection page 1030 (
In addition to managing portable security systems 100 individually by selecting each portable security system 100, portable security systems 100 assigned to an account can be managed by groups. That is, individual portable security systems 100 can be assigned to a group and that portable security systems 100 assigned to that group managed collectively. For example, a group may be set up for all portable security systems 100 that are at single location, with a different group being set up for different locations. The different locations may, for example, be different jobsites with one group being for one jobsite and a second group being for a different jobsite. A group can also be created so that all of the features for the portable security systems 100 in the group can be set at the same time. In an aspect, the features available for groping are arm, disarm, create schedule, change sensor settings and change speaker settings.
Clicking the “Group Management” link takes the user to “Group” page 1032 (
Clicking the “Customize Group” link takes the user to the “Customize Group” page 1038 (
Clicking the “Group Schedule” link (
Clicking the “Event History” button under Reports takes the user to a report page 1042 (
The base unit 101 of a portable security system 100 can advantageously be used to monitor the temperature in the area around the base unit and when the temperature is out of range, cause a user to be alerted, such as by server 602 calling a number assigned by the user or sending an e-mail to an e-mail address assigned by the user, such as has been described above with reference to the contacts for unit page 1022 (
Assuming a successful location function has been performed for a, clicking the Location History link takes the user the user to a page displaying a map, such a satellite image map as shown in
With reference to
At 1200, portable security system 100 is powered up and goes through an initialization self-check. At 1202, the settings of portable security system 100 such as sent by server 602 are made active and in an illustrative aspect, speaker 112 chirps to signify that portable security system 100 is armed. At 1204, a check is made whether tamper sensor 128 has been tripped. If so, and if the configuration setting for a tamper condition was set to sound an audible alarm, an audible tamper alarm is sounded at 1208 using speaker 112 and a call initiated to server 602 at 1210 and status information sent to server 602 at 1212. It should be understood that the audible alarm can be a unique sound for each type of alarm. The status information can include one or more of the following:
Identification Number of the Portable Security System 100
Armed/Disarmed status
Tamper
Time of Day (clock)
Time to Arm
Time to Disarm
Temperature
Cell Signal Strength
Battery Charge Level
Charging or Not
Last GPS Coordinates
Passive Infrared (motion) Activity
Vibration Activity
Siren Active/Silent
Door/Window Activity
If tamper sensor 128 is not tripped, a check is made at 1214 whether vibration sensor 130 has detected any vibration activity. If so, the routine proceeds to 1208 as discussed above.
If no vibration activity was detected, a check is made at 1216 whether auxiliary motion sensor 500 (if being used) has detected motion. If so, the routine proceeds to 1208.
If no motion was detected, a check is made at 1218 whether the temperature as sensed by temperature sensor 124 is too high or too low (as applicable based on the configuration settings sent by server 602). If so, the routine proceeds to 1208.
If the temperature was not too high or too low, a check is made at 1220 whether battery 110 is low. If so, a check is made at 1222 whether battery 110 is being charged and if not, the routine branches to 1210.
If battery 110 was not low, a check is made at 1224 whether the battery is being charged. If so, a check is made at 1226 whether the battery is fully charged and if so, the routine branches to 1210. If the battery 110 is not being charged, or is not fully charged, a check is then made at to see if cellular module 104 is active. If not, the routine branches to 1204. If cellular module 104 is active, the routine branches to 1212.
After status information is sent to server 602 at 1212 and server 602 receives it, server 602 sends alarm messages to the contacts set up for that portable security system 100 as discussed above. In the illustrative operation shown in
Once a user completes interacting with server, the connection between the portable security system 100 and server 602 is terminated and the routine branches back to 1202.
A user can request a status report from the portable security system 100 by accessing server 602 by phone at 1242 and being connected to the interactive voice response system, or by accessing management site 610 via the Internet at 1244. Server 602 establishes cellular communication with the portable security system 100 at 1246 and commands a status report from a selected portable security system 100, which the selected portable security system 100 sends to server 602 at 1248. The routine then branches to 1234 as discussed above.
Claims
1. A method of managing a portable security system having a base unit having a housing in which a controller, a wireless transmitter/receiver receiver are disposed, the wireless transmitter/receiver coupled to the controller, the portable security system having a plurality of alarm sensors coupled to the controller, the method comprising:
- accessing a host system and setting settings in the host system for which alarm sensors of the portable security system are to be active and which are to be inactive;
- sending a configuration message from the host system to the portable security system via wireless communication that includes the set settings to configure the portable security system to set as active the alarm sensors that were set to be active and to set as inactive the alarm sensors that were set to be inactive;
- setting with the controller in response to the configuration message the alarm sensors as active that were set to be active and setting the alarm sensors as inactive that were set to be inactive;
- responding with the controller only to an alarm sensor that was set as active to generate with the controller an alarm message upon that alarm sensor sensing an alarm condition and providing an alarm signal to the controller and generating an alarm message with the controller in response thereto; and
- sending with the wireless transmitter/receiver the alarm message via wireless communication to the host system.
2. The method of claim 1 including accessing the host system and setting parameters for those alarm sensors that require parameters and including the set parameters in the configuration message sent to the portable security system.
3. The method of claim 1 including accessing the host system and setting an arm/disarm status for the portable security system and sending an arm message from the host system to the portable security system via wireless communication to arm the portable security system when the arm/disarm status is set to arm and sending a disarm message from the host system to the portable security system via wireless communication to disarm the portable security system when the arm/disarm status is set to disarm.
4. The method of claim 3 including setting in the host system an arm time and a disarm time for the security system and at the arm time sending the arm message from the host system to the portable security system and at the disarm time sending the disarm message from the host system to the portable security system.
5. The method of claim 1 including accessing the host system and initiating a locate by setting a request locate for the portable security system and sending a locate request message from the host system to the portable security system via wireless communication when the request locate is set, obtaining location information via a global position sensor module and sending the location information via wireless communication with the wireless transmitter/receiver to the host system.
6. The method of claim 1 including managing a plurality of security systems by accessing the host system and setting settings for each of the portable security systems to be configured to set which alarm sensors of each such security system are to be active and which are to be inactive and sending configuration messages to each such security system.
7. The method of claim 6 including accessing the host system and setting parameters for those alarm sensors of each of the portable security systems that require parameters and including the settings for the parameters in the configuration message sent to the portable security system.
8. The method of claim 6 including accessing the host system and setting an arm/disarm status for each of the portable security systems to be armed/disarmed and sending an arm message to each portable security system to be armed via wireless communication to arm that portable security system when the arm/disarm status for that portable security system is set to arm and sending a disarm message to the portable security system via wireless communication to disarm the portable security system when the arm/disarm status is set to disarm.
9. The method of claim 6 including assigning in the host system two or more of the portable security systems to one or more groups and accessing the host system and setting settings for one or more of the groups group to set the settings for each portable security system assigned to each such group and sending configuration messages from the host system to each portable security system assigned to each such group.
10. The method of claim 9 including accessing the host system and setting parameters for those alarm sensors that require parameters for one or more of the groups and including the settings for the parameters in the configuration messages sent to the portable security systems assigned to each such group.
11. The method of claim 6 including assigning in the host system two or more of the portable security systems to one or more groups and accessing the host system and setting arm/disarm statuses for one or more of the groups group to set the arm/disarm status and sending an arm message to each portable security system assigned to each such group when the arm/disarm status for that group is set to arm and sending a disarm message to each portable security system assigned to each such group when the arm/disarm status for that group is set to disarm.
12. The method of claim 1 including setting in the host system contact information for a plurality of contacts for the host system to contact upon receipt of the alarm message, the contact information including prioritization information, the host system sending a notification message to one or more of the contacts based on the prioritization information.
13. The method of claim 12 wherein the host system sends the notification messages to the contacts based on priority order with the host system sending the notification message to the next lower priority contact only if the host system receives no response from the contact to which it sent the notification message.
14. The method of claim 12 wherein the alarm message is one of a plurality of different types of alarm messages, the method including setting in the host system contact information for a plurality of contacts for the host system to contact upon receipt of the alarm message wherein different contacts are associated with different ones of the different types of alarm messages, and the host system sending a notification message upon receipt of the alarm message to the contact associated with the type of alarm message that corresponds to the received alarm message.
15. A method of managing a plurality of portable security systems, each portable security system having a base unit having a housing in which a controller, a wireless transmitter and a wireless receiver are disposed, the wireless transmitter and the wireless receiver coupled to the controller, the portable security system having a plurality of alarm sensors coupled to the controller, the method comprising:
- assigning in a host system two or more portable security systems to one or more groups,
- setting settings in the host system for one or more of the groups group to set settings for each portable security system assigned to each such group and sending configuration messages from the host system to each portable security system assigned to each such group;
- sending a configuration message from the host system to each portable security system assigned to each such group via wireless communication that includes the set settings to configure each portable security system assigned to each such group;
- the controller of each portable security system receiving the configuration message configuring its portable security system according to the set settings in the configuration message.
16. The method of claim 15 wherein the alarm sensors include a plurality of types of alarm sensors and setting the settings includes setting an active/inactive status for at least one of the types of alarm sensors.
17. The method of claim 15 wherein the setting the settings include setting an arm/disarm status.
18. The method of claim 15 wherein setting the settings include setting an arm time and a disarm time.
19. The method of claim 15 wherein assigning the portable security systems to one or more groups includes assigning portable security systems associated with a first user to one or more groups associated with that first user and assigning portable security systems associated with a second user to one or more groups associated with that second user.
Type: Application
Filed: Jan 4, 2011
Publication Date: Apr 28, 2011
Applicant: CATTAIL TECHNOLOGIES, LLC (Towson, MD)
Inventors: Fred S. Watts (New Freedom, PA), Francis J. Rosenthal (Street, MD), Maureen Silber (Baltimore, MD)
Application Number: 12/984,118
International Classification: G08B 1/08 (20060101);