Technical Field
[0001] The present disclosure relates to an alarm system and a method of operating an alarm
system.
Background
[0002] Alarm or security systems for detecting and notifying intrusion into a building or
the like are common. Historically, a user (that is, a bona fide or authorised user)
had to manually disable the alarm system, for example by manually entering a code
into a number pad of the alarm system, when entering the building to prevent the alarm
system triggering an alert. More recently, alarm systems are known that are automatically
disabled when the presence of a user device that is registered with the alarm system
is detected by the alarm system.
Summary
[0003] According to a first aspect disclosed herein, there is provided a method of operating
an alarm system, the alarm system having registration information for a user device
stored such that the user device is registered with the alarm system, the method comprising
the alarm system:
receiving a motion detection signal which indicates detection of motion within a region
monitored by the alarm system;
transmitting a notification to the registered user device upon receiving the motion
detection signal, the notification being such as to cause the registered user device
to play a sound; and
disabling the generation of an alarm in the case that the sound played by the registered
user device is detected by the alarm system.
[0004] In an example, the alarm system knows what sound should be played back by the registered
user device and disables the alarm only if that sound is detected.
[0005] It should be noted that in some examples, disabling the generation of an alarm may
mean that for example an alarm that is already being generated is caused to stop.
On the other hand, in some examples, disabling the generation of an alarm may mean
that no alarm is generated in the first place. The "alarm" may be one or more of an
audible alarm, a visual alarm and an intrusion notification which is sent to one or
more specific user devices or some security monitoring organisation say.
[0006] In an example, successive notifications transmitted to the registered user device
are such as to cause the registered user device to play different respective sounds.
[0007] This helps to avoid spoofing by malicious users. It also helps to avoid or at least
minimise the chances that the sound that the registered user device is instructed
to play back (coincidentally) being the same as other sounds being played by other
user devices that happen to be in the locality.
[0008] In an example, the alarm system causes an alarm to be generated in the case that
the alarm system does not detect the instructed sound being played within a predetermined
period of time following the transmitting of the notification.
[0009] That is, in this example the alarm system waits a while following transmission of
the notification before deciding whether or not the alarm should be generated.
[0010] In an example, the registered user device is a cellular network device and the notification
to the registered user device is transmitted over a cellular network.
[0011] This can be useful in the case that the registered user device does not have say
WiFi or Bluetooth functionality, or if for example the user of the registered user
device has switched off such functionality as commonly the user will still have left
the cellular functionality still switched on.
[0012] In an example, the alarm system resets after a predetermined period of time following
disabling the generation of an alarm and in the absence of receiving a motion detection
signal during said predetermined period of time.
[0013] According to a second aspect disclosed herein, there is provided an alarm system,
the alarm system comprising:
data storage for storing registration information for a user device such that the
user device is registered with the alarm system;
the alarm system being configured to:
cause a notification to be transmitted for receipt by a registered user device upon
the alarm system receiving a motion detection signal which indicates detection of
motion within a region monitored by the alarm system, the notification being such
as to cause a said registered user device to play a sound; and
disable the generation of an alarm in the case that said sound played by a said registered
user device is detected by the alarm system.
[0014] In an example, the alarm system is arranged such that successive notifications transmitted
to a registered user device are such as to cause a said registered user device to
play different respective sounds.
[0015] In an example, the alarm system is arranged to cause an alarm to be generated in
the case that the alarm system does not detect the instructed sound being played within
a predetermined period of time following the transmitting of the notification.
[0016] In an example, the alarm system is arranged such that the notification to a registered
user device is transmitted over a cellular network for receipt by a registered cellular
network device.
[0017] In an example, the alarm system is arranged to reset after a predetermined period
of time following disabling the generation of an alarm and in the absence of receiving
a motion detection signal during said predetermined period of time.
[0018] In an example, the alarm system comprises or is in communication with a motion detector
for detecting motion within a region monitored by the alarm system.
[0019] In an example, the alarm system comprises or is in communication with a microphone
or other sound transducer for detecting sounds within a region monitored by the alarm
system.
Brief Description of the Drawings
[0020] To assist understanding of the present disclosure and to show how embodiments may
be put into effect, reference is made by way of example to the accompanying drawings
in which:
Figure 1 shows schematically an example of an alarm system and a user and user device
outside the region monitored by the alarm system; and
Figure 2 shows schematically the alarm system and user and user device of Figure 1
inside the region monitored by the alarm system.
Detailed Description
[0021] As mentioned, alarm or security systems for detecting and notifying intrusion into
a building or the like are common. Historically, a (bona fide or authorised) user
had to manually disable the alarm system when entering the building to prevent the
alarm system triggering an alert. More recently, alarm systems are known that are
automatically disabled when the presence of a user device that is registered with
the alarm system is detected by the alarm system. In such known systems, the alarm
system detects the presence of the registered user device by virtue of the alarm system
and the registered user device communicating directly with each other using a local
wireless connection, such as for example WiFi, Bluetooth, RFID (Radio-frequency identification),
etc. However, not all user devices have such local wireless functionality. Alternatively,
the user device may have the required local wireless functionality but the user may
have switched it off (especially in the case of WiFi and Bluetooth say), for example
to save battery life for the user device or simply inadvertently or not realising
that it is required for proper operation of such alarm systems.
[0022] In examples described herein, an alarm system receives a motion detection signal
which indicates detection of motion within a region monitored by the alarm system.
The alarm system transmits a notification to a registered user device upon receiving
the motion detection signal. The notification causes the registered user device to
play a sound. The alarm system disables the generation of an alarm in the case that
the sound played by the registered user device is detected by the alarm system. In
an example, the alarm system "knows" what specific sound should be played back by
the registered user device and disables the alarm only if that specific sound is detected.
[0023] Referring now to Figure 1, this shows an example of an alarm system 10 and a user
30 and a user device 32 outside the region 12 being monitored by the alarm system
10. The alarm system 10 is shown as monitoring a house 12. Other regions 12 that may
be monitored include in general any building or a specific room or specific rooms
within a building, open areas outside buildings, etc.
[0024] The alarm system 10 has a processor and data storage (not shown) for storing at least
registration information for one or more user devices 32 that are registered with
the alarm system 10 and for storing a computer program for operation of the alarm
system 10. In the example shown, the alarm system 10 also has an alarm 14, which can
output an audible alarm or siren and/or a visible light to indicate that the alarm
system 10 has been triggered. Alternatively or additionally, the alarm system 10 may
send a notification that the alarm has been triggered to some central security monitoring
system, which may be provided locally or remotely as part of a security system for
the building or other region 12 which is being monitored. As discussed further below,
the alarm system 10 is also capable of sending notifications to one or more user devices
32 that are registered with the alarm system 10.
[0025] The alarm system 10 includes or is connected to receive signals from one or more
motion detectors 16. The or each motion detector 16 can detect motion within the region
12 monitored by the alarm system 10 and operates to output a corresponding signal
to the alarm system 10 to notify the alarm system 10 that motion within the region
12 has been detected. The or each motion detector 16 may be connected to the alarm
system 10 via wired and/or wireless connections. The motion detector(s) 16 may be
for example door or window sensors, which detect that a door or window has been opened,
using for example a combination of a reed switch and a magnet or other suitable arrangement.
Alternatively or additionally, the motion detector(s) 16 may be active sensors which
emit energy (e.g. light, including for example microwave, or sound) into the environment
in order to detect a change of some kind when the light or sound is interrupted. Alternatively
or additionally, the motion detector(s) 16 may be passive sensors, such as for example
PIR (passive infrared) detectors which detect infrared being emitted by an intruder.
As another example, the motion detector(s) 16 may detect sound in the region 12 being
monitored. Other types of motion detector 16 may be used.
[0026] The alarm system 10 also includes or is connected to receive signals from one or
more microphones 18 or other sound transducers which are located to detect sound in
the region 12 monitored by the alarm system 10. The or each microphone 18 may be connected
to the alarm system 10 by wired and/or wireless connections. One or more microphones
18 may be provided as part of a motion detector 16 and/or may be provided separately
in the region 12. So-called digital home assistants (such as "Alexa" by Amazon and
Google "Home") often have microphones for receiving voice input, and they may be used
as the microphone 18 or one of the microphones 18 which are used in conjunction with
or part of the alarm system 10 described here.
[0027] The user device 32 has a processor and data storage (not shown) for storing at least
a computer program that enables the user device 32 to interact with the alarm system
10 as described herein. The user device 32 may be a wireless device, that is, a device
that is capable of connecting wirelessly to a network. The user device 32 may have
for example connectivity for a cellular network, such as a so-called 2G, 3G, 4G, 5G
(second, third, fourth, fifth generation), etc. or other cellular network. The user
device 32 may also have connectivity for direct wireless communications with another
device, via for example WiFi and/or Bluetooth, etc. The user device 32 also has a
loudspeaker or other audio output device 34 via which the user device 32 can play
back sounds.
[0028] The user device 32 may be a mobile, battery-powered device. In general, the user
device 32 may be a mobile or cell phone (including a so-called "smart phone"), a personal
digital assistant, a pager, a tablet or laptop computer, a wearable communication
device (including so-called "smart watches"), a content-consumption or generation
devices (for music and/or video for example), etc. Here, a smart phone is a mobile
(cellular) phone with an operating system and an integrated mobile broadband cellular
network connection for voice and data communication. A smart phone typically enables
the user to have Internet access and typically includes a Web browser and one or more
of Wi-Fi connectivity and Bluetooth connectivity. The term "user equipment" or UE
is often used to refer to wireless devices in general, and particularly mobile wireless
devices.
[0029] In use, the user 30 first registers the user device 32 with the alarm system 10 such
that the alarm system 10 can send signals, including particularly notifications, to
the registered user device 32. For example, the user 30 can store a telephone number
or some other contact or identification information for the user device 32 with the
alarm system 10. The alarm system 10 may require a password to be entered to control
access to the alarm system 10 as a whole and to control access to the registration
details for the registered user device 32. Separate passwords may be required to enable
access to the alarm system 10 as a whole and for the or each registered user device
32.
[0030] Once the user device 32 is registered with the alarm system 10, the alarm system
10 in an example operates as follows.
[0031] In the case that the alarm system 10 detects motion within the region 12 being monitored,
for example by virtue of the or one of the motion detectors 16 detecting motion within
the region 12 and sending a motion detection signal to the alarm system 10, the alarm
system 10 transmits a notification for receipt by the user device 32.
[0032] In the case that the registered user device 32 is a cellular device, the notification
may be transmitted by the alarm system 10 to the user device 12 over a cellular network.
This has the advantage that in practice a user may have switched off other, local
wireless connectivity for the user device 32, such as WiFi or Bluetooth, or the user
device 32 may not have such local wireless connectivity in the first place, but in
practice is likely to have cellular connectivity switched on on the user device 32.
Nevertheless, in other examples the notification may be transmitted by the alarm system
10 to the user device 12 over a local wireless connection, such as for example WiFi
or Bluetooth, etc., either instead of or in addition to transmitting the notification
over a cellular network. For this purpose, the user may record with the alarm system
10 details of wireless connectivity options that are available for the user device
32 when the user registers the user device 32 with the alarm system 10 so that the
alarm system 10 knows which options are available to send notifications to the registered
user device 32 and can transmit the notification accordingly.
[0033] When received by the user device 32, the notification transmitted by the alarm system
10 causes the user device 32 to play back a sound via the speaker 34 or other audio
output device 34. The notification may also cause a visible indication, such as a
warning message or the like, to be displayed on a display screen of the user device
32. Alternatively or additionally, the alarm system 10 may send a separate notification
to be sent to the user device 32 to cause a visible indication to be displayed on
the display screen of the user device 32.
[0034] If the user device 32 is outside the region 12 being monitored, as indicated schematically
in Figure 1, the sound being played back by the user device 32 may simply act as a
notification to the user 30 that movement in the region 12 has been detected, indicating
a possible intrusion into the region 12. The user 30 may then take some appropriate
action.
[0035] On the other hand, if the user device 32 is inside the region 12 being monitored
when a notification 38 that causes sound to be output by the user device 32 is received,
as indicated schematically in Figure 2, the sound 36 being played back by the user
device 32 may be picked up by the microphone 18 or one of the microphones 18, which
relays the detected sound to the alarm system 10. In this case, the alarm system 10
recognises the sound being played back by the user device 32. The alarm system 10
therefore "knows" that the user device 32 and, by implication, the user 30 are in
the region 12 being monitored, or, at the very least, are in very close proximity
to the region 12 being monitored. In the case that the alarm system 10 recognises
the sound being played back by the user device 32, the alarm system 10 disables generation
of an alarm by the alarm system 10. In this regard, in the case that for example an
audible and/or visible alarm is currently being generated by the alarm system 10,
which may occur immediately that motion is detected as reported to the alarm system
10 by a motion detector 16, disabling generation of an alarm may cause the audible
and/or visible alarm to be stopped. In another example, this may prevent an audible
and/or visible alarm being generated in the first place and/or may prevent a notification
being sent by the alarm system 10 to some central security monitoring system, as the
case may be. The alarm system 10 may operate a timer such that an alarm is only generated
some time, such as a few seconds or tens of seconds, after motion is detected, such
that a false alarm can be prevented if play back of the sound by the user device 12
is detected within that predetermined period of time.
[0036] In any event, in this way the alarm system 10 learns whether the user device 32,
and therefore by implication the user 30, is in the region 12 and can prevent or stop
an alarm being generated if so. The user 30 does not have to manually disarm the alarm
system 10 on entering the region 12. This also overcomes the problem that the user
30 may simply have forgotten to disarm the alarm system 10. In the case that the alarm
system 10 uses a first wireless connection connectivity, such as connectivity for
a cellular network, for sending the notification to the user device 32, this avoids
the problem that some known systems have of using a different wireless connection
connectivity, such as connectivity for direct wireless communications such as for
example WiFi and/or Bluetooth, etc. for recognising the presence of the user device
32 given that the user 30 may have switched off such different wireless connection
connectivity or it may not be present on the user device 32 in the first place.
[0037] Moreover, the play back of the sound by the user device 32 may act as a prompt or
reminder for the user 30 to properly disarm the alarm system 10 whilst the user 30
is on the premises or in the region 12 being monitored.
[0038] In some examples, successive notifications sent by the alarm system 10 to cause the
user device 32 to play back a sound may be such that different sounds are played back
by the user device 32 on receipt of the respective notifications. For example, the
different sounds may have one or more of a different tone or pitch, different plural
pitches (as in a musical chord), different duration, different succession of notes,
such as a number of short "beeps" followed by a number of long "beeps", etc., etc.
In such a case, the alarm system 10 notes the sound that the notification should cause
the user device 32 to play back and only disables generation of the alarm if that
specific sound is heard via the microphone(s) 18 and recognised by the alarm system
10. This helps to avoid spoofing by malicious users, such as unauthorised intruders,
who may have devices that can play back sounds and attempt to disable the alarm system
10 by playing back sounds. This also helps to avoid or at least minimise the chances
that the sound that the registered user device 32 is instructed to play back (coincidentally)
is the same as other sounds being played by other user devices that happen to be in
the region 12 or locality. There may be for example a library of sounds effectively
stored by the user device 32 and the alarm system 10 may select different sounds from
the library from its own record of the available sounds. The alarm system 10 may select
different sounds from the library randomly or in a specific sequence.
[0039] In an example, if the generation of an alarm has been disabled by the alarm system
10 upon hearing an expected sound being played back by the registered user device
32, then the alarm system 10 may reset itself after a predetermined period of time
such that the alarm system 10 is "on" and enabled again to detect intrusion into the
region 12. In such a case, the alarm system 10 may reset itself after the predetermined
period of time only in the absence of receiving a motion detection signal from a motion
detector 16 during that predetermined period of time. This can be useful in the case
that the user 30 has set the alarm system 10 on to detect an intrusion but has re-entered
the region 12 being monitored: the alarm system 10 causes the user device 32 to play
back a sound which is then heard by the alarm system 10 to cause the alarm system
10 to be temporarily disabled. If the user 30 quickly leaves the region 12 again,
the alarm system 10 is re-enabled and ready to detect an intrusion. This allows users
to enter the region 12 briefly, for example to pick up a forgotten item, without the
user 30 having to turn off the alarm system 10 when entering the region 12 and then
turn it back on again when exiting the region 12 (or more generally having to do anything
about the armed alarm system 10).
[0040] It will be understood that the processor or processing system or circuitry referred
to herein may in practice be provided by a single chip or integrated circuit or plural
chips or integrated circuits, optionally provided as a chipset, an application-specific
integrated circuit (ASIC), field-programmable gate array (FPGA), digital signal processor
(DSP), graphics processing units (GPUs), etc. The chip or chips may comprise circuitry
(as well as possibly firmware) for embodying at least one or more of a data processor
or processors, a digital signal processor or processors, baseband circuitry and radio
frequency circuitry, which are configurable so as to operate in accordance with the
exemplary embodiments. In this regard, the exemplary embodiments may be implemented
at least in part by computer software stored in (non-transitory) memory and executable
by the processor, or by hardware, or by a combination of tangibly stored software
and hardware (and tangibly stored firmware).
[0041] Reference is made herein to data storage for storing data. This may be provided by
a single device or by plural devices. Suitable devices include for example a hard
disk and non-volatile semiconductor memory (e.g. a solid-state drive or SSD).
[0042] Although at least some aspects of the embodiments described herein with reference
to the drawings comprise computer processes performed in processing systems or processors,
the invention also extends to computer programs, particularly computer programs on
or in a carrier, adapted for putting the invention into practice. The program may
be in the form of non-transitory source code, object code, a code intermediate source
and object code such as in partially compiled form, or in any other non-transitory
form suitable for use in the implementation of processes according to the invention.
The carrier may be any entity or device capable of carrying the program. For example,
the carrier may comprise a storage medium, such as a solid-state drive (SSD) or other
semiconductor-based RAM; a ROM, for example a CD ROM or a semiconductor ROM; a magnetic
recording medium, for example a floppy disk or hard disk; optical memory devices in
general; etc.
[0043] The examples described herein are to be understood as illustrative examples of embodiments
of the invention. Further embodiments and examples are envisaged. Any feature described
in relation to any one example or embodiment may be used alone or in combination with
other features. In addition, any feature described in relation to any one example
or embodiment may also be used in combination with one or more features of any other
of the examples or embodiments, or any combination of any other of the examples or
embodiments. Furthermore, equivalents and modifications not described herein may also
be employed within the scope of the invention, which is defined in the claims.
1. A method of operating an alarm system, the alarm system having registration information
for a user device stored such that the user device is registered with the alarm system,
the method comprising the alarm system:
receiving a motion detection signal which indicates detection of motion within a region
monitored by the alarm system;
transmitting a notification to the registered user device upon receiving the motion
detection signal, the notification being such as to cause the registered user device
to play a sound; and
disabling the generation of an alarm in the case that the sound played by the registered
user device is detected by the alarm system.
2. A method according to claim 1, wherein successive notifications transmitted to the
registered user device are such as to cause the registered user device to play different
respective sounds.
3. A method according to claim 1 or claim 2, wherein the alarm system causes an alarm
to be generated in the case that the alarm system does not detect the instructed sound
being played within a predetermined period of time following the transmitting of the
notification.
4. A method according to any of claims 1 to 3, wherein the registered user device is
a cellular network device and the notification to the registered user device is transmitted
over a cellular network.
5. A method according to any of claims 1 to 4, wherein the alarm system resets after
a predetermined period of time following disabling the generation of an alarm and
in the absence of receiving a motion detection signal during said predetermined period
of time.
6. An alarm system, the alarm system comprising:
data storage for storing registration information for a user device such that the
user device is registered with the alarm system;
the alarm system being configured to:
cause a notification to be transmitted for receipt by a registered user device upon
the alarm system receiving a motion detection signal which indicates detection of
motion within a region monitored by the alarm system, the notification being such
as to cause a said registered user device to play a sound; and
disable the generation of an alarm in the case that said sound played by a said registered
user device is detected by the alarm system.
7. An alarm system according to claim 6, arranged such that successive notifications
transmitted to a registered user device are such as to cause a said registered user
device to play different respective sounds.
8. An alarm system according to claim 6 or claim 7, arranged to cause an alarm to be
generated in the case that the alarm system does not detect the instructed sound being
played within a predetermined period of time following the transmitting of the notification.
9. An alarm system according to any of claims 6 to 8, arranged such that the notification
to a registered user device is transmitted over a cellular network for receipt by
a registered cellular network device.
10. An alarm system according to any of claims 6 to 9, wherein the alarm system is arranged
to reset after a predetermined period of time following disabling the generation of
an alarm and in the absence of receiving a motion detection signal during said predetermined
period of time.
11. An alarm system according to any of claims 6 to 10, comprising or in communication
with a motion detector for detecting motion within a region monitored by the alarm
system.
12. An alarm system according to any of claims 6 to 11, comprising or in communication
with a microphone or other sound transducer for detecting sounds within a region monitored
by the alarm system.