Security system using existing network and personal computers

Electrical computers and digital processing systems: support – Multiple computer communication using cryptography – Protection at a particular protocol layer

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C709S224000, C340S568200

Reexamination Certificate

active

06308272

ABSTRACT:

FIELD OF THE INVENTION
The present invention relates to providing security through the use of existing personal computers and data transmission networks in a building. More particularly, the present invention involves attaching security devices such as motion detectors to a personal computer which has some data processing capabilities even when it is in its non-operational mode.
BACKGROUND OF THE INVENTION
Security of their business premises is important to companies, especially for those companies which have personal computers. The personal computers are becoming smaller and more easily portable (particularly laptop computers and network computers) at the same time that personal computers are providing an increasing amount of data processing to the desktop of the individual worker. Each personal computer is expensive in initial hardware costs, with software and service costs adding to the value of the personal computers, and personal computers store an increasing amount of data for a typical business organization. Loss of any of the personal computers would represent a loss of an investment as well as a decrease in the productivity of the business operation, in some cases reducing substantially the productivity of a worker.
While some businesses are operated around the clock every day, many are operated only part of the time, with the rest of the time, the facilities are expected to be idle. This idle time provides a risk, since the absence of authorized personnel implies an opportunity for devious (criminal) activity because no one is watching. This devious or criminal activity could range from stealing either equipment or data or altering the data to make it unusable or unreliable. Such devious or criminal activity can result from a person, either an employee or a visitor or even a stranger, getting into an area where the people are otherwise not present, as after normal working hours. It would desirable to detect the presence of an intruder after normal business hours so that the security can investigate and take appropriate steps to remove an inappropriate visitor.
Of course, one way to monitor premises for visitors in places where they aren't supposed to be at times when they are not supposed to be there is to install a security system of either cameras or motion detectors in the region, then monitor those devices for improper activity. But, a security system normally involves running new cables to attach the sensor devices such as motion detectors or cameras to a central monitoring station. Such cabling is expensive to run and may be the subject of additional requirements such as building codes and require a building permit to install.
It would be desirable to use the personal computers which are in place to assist in providing monitoring, but the personal computers are typically in their operational mode only during the normal working hours and are turned to non-operational mode when the working day ends, making it difficult to use the personal computers in monitoring of after-hours activities on the business premises. Further, leaving the personal computers in their operational mode would have disadvantages, both in terms of power consumption and in terms of device life, particularly the life of the monitor attached to the personal computer, where the coatings on the screen tend to degrade as the monitor accumulated hours of operation, a reason that “screen savers” have come into use to reduce the amount of deterioration of the coatings on the monitor.
Security devices may be operated individually or using remote communications techniques, but these are usually suitable only for small systems or line-of-sight applications. Each sensor in a security system could include its own visual or audible alarm, a system which would work well if the monitoring station could see or hear all the locations. The security system could communicate over infrared communications if the sensor and the receiver were in a line of sight relationship. A security system could communicate using radio or cell phone communications if the system had enough capabilities without becoming too expensive.
Other limitations and disadvantages of the prior art systems for providing security of premises will be apparent to those skilled in the relevant arts.
SUMMARY OF THE INVENTION
The present invention overcomes the limitations and disadvantages of the prior art systems by providing a security device (e.g., a motion detector) coupled to a personal computer, which, even when the personal computer is in its non-operational mode, still can communicate with a data transmission network to provide an alert when the security device is triggered by a security incident (e.g., motion above a threshold).
The present invention avoids the need for new cabling by using the existing cabling of a data transmission network to which the personal computers are already attached and through which the attached personal computers communicate.
The present invention has the advantageous feature that the personal computers need not be in their operational mode but, even in their non-operational mode, can communicate with a monitoring station over a data transmission network to report a security incident.
The present invention also has the advantageous feature that allows for the security devices to be monitored remotely and turned on and off remotely, either manually or in response to predetermined parameters, like time of day.
The security devices of the present invention have the advantage that, since they are coupled to a personal computer where the past historical activity can be recorded and analyzed, the historical activity of the security device can be considered in setting the thresholds at which the security device sets off an alarm.
The present invention has the advantage that, since different security devices are attached to different personal computers, each personal computer can be set individually to provide a different threshold and a different activation period for the security devices. That is, one security device may be present in an area which has personnel normally close by while another personal computer and security device may be in an area in which no personnel are expected to be close. Also, one area may inherently have greater background activity (noise) than another, such as an open area or an area adjacent a fan, open window or an opening for heating and cooling while another security device may be in an area which is closed and still.
The foregoing and other objects and advantages will be apparent to those skilled in the relevant art in view of the following detailed description of the preferred embodiment, taken together with the appended claims and the accompanying drawings.


REFERENCES:
patent: 5287519 (1994-02-01), Dayan et al.
patent: 5675321 (1997-10-01), McBride
patent: 5793840 (1998-08-01), Zhuang et al.
patent: 5861804 (1999-01-01), Fansa et al.
patent: 5945915 (1999-08-01), Cromer et al.
patent: 6002427 (1999-12-01), Kipust
patent: 6151678 (2000-11-01), Davis
patent: 2 262 372 A (1993-06-01), None
patent: WO 98/25243 A1 (1998-06-01), None
AMD white paper, AMD's AlertlT Technology for Advanced Systems Management, Dec. 1998, 5 pages.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Security system using existing network and personal computers does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Security system using existing network and personal computers, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Security system using existing network and personal computers will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-2607571

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.