ALARM SYSTEM

20190073895 ยท 2019-03-07

Assignee

Inventors

Cpc classification

International classification

Abstract

An alarm system including a plurality of alarm sensors, each having a BLUETOOTH module to establish communication link using a BLUETOOTH protocol to at least one neighbouring sensor in a way such that a BLUETOOTH Mesh Network is formed, and a controller connected to the BLUETOOTH Mesh Network, configured to monitor and manage the status of each alarm sensor and to trigger at least one alarm device based on the status of the alarm sensors, wherein the status data of each alarm sensor is transmitted to the controller, and vice versa, instructions of the controller are transmitted to at least one sensor via the BLUETOOTH Mesh Network.

Claims

1. An alarm system comprising: a plurality of alarm sensors, each having a BLUETOOTH module to establish communication link using a BLUETOOTH protocol to at least one neighbouring sensor in a way such that a BLUETOOTH Mesh Network is formed; and a controller connected to the BLUETOOTH Mesh Network, configured to monitor and manage the status of each alarm sensor and to trigger at least one alarm device based on the status of the alarm sensors; wherein the status data of each alarm sensor is transmitted to the controller, and vice versa, instructions of the controller are transmitted to at least one sensor via the BLUETOOTH Mesh Network.

2. The alarm system according to claim 1, wherein the at least one alarm device is connected to the controller via the BLUETOOTH Mesh Network.

3. The alarm system according to claim 1, wherein the status data generated by each alarm sensor is in the form of electronic pulses and the BLUETOOTH module is further configured to convert the electronic pulses into digital format.

4. The alarm system according to claim 1, further comprising a cloud server connected to the controller.

5. The alarm system according to claim 4, wherein the controller is further configured to forward the status data of each alarm sensor and alarm device to the cloud server.

6. The alarm system according to claim 5, further comprising at least one computing device connected to the cloud server.

7. The alarm system according to claim 6, wherein the cloud server is configured to generate a push notification to the computing device when the alarm device is triggered.

8. The alarm system according to claim 6, further comprising at least one camera connected to the controller via the BLUETOOTH Mesh Network.

9. The alarm system according to claim 8, wherein the controller is further configured to activate the camera to capture image or record video based on the status of the alarm sensors and to retrieve and forward the image or video to the cloud server.

10. The alarm system according to claim 9, wherein the computing device is installed with an application for logged-in user to retrieve the image or video from the server and to display the retrieved data.

11. The alarm system according to claim 10, wherein the application further provides a virtual button for logged-in user to trigger the alarm device through the cloud server.

12. The alarm system according to claim 11, wherein the application further provides a virtual button for logged-in user to trigger the cloud server to generate a status report and to retrieve the status report for display.

Description

BRIEF DESCRIPTION OF THE DRAWINGS

[0015] For the purpose of facilitating an understanding of the present invention, there is illustrated in the accompanying drawing the preferred embodiments from an inspection of which when considered in connection with the following description, the present invention, its construction and operation and many of its advantages would be readily understood and appreciated.

[0016] FIG. 1 is a schematic diagram illustrating a cloud based BLUETOOTH alarm system, in accordance to the preferred embodiment of the present invention.

[0017] FIG. 2 shows the process flow of account setting.

[0018] FIG. 3 shows the process flow of creating user account.

[0019] FIG. 4 shows the process flow of connecting a BLUETOOTH alarm controller to a server.

[0020] FIG. 5 shows the process flow of setting BLUETOOTH sensors and its secure modes.

[0021] FIG. 6 shows the process flow of retrieving data after login.

DETAILED DESCRIPTION OF THE INVENTION

[0022] The present invention is described below with reference to flowchart illustrations and/or block diagrams of methods, apparatuses (systems) and computer program products according to embodiments of the present invention. It will be understood that each block of the flowchart illustrations and/or block diagrams, and combinations of blocks in the flowchart illustrations and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, or other programmable data processing apparatus to produce a machine, such that the instructions, that execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions/acts specified in the flowchart and/or block diagram block or blocks.

[0023] These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means that implement the function/act specified in the flowchart and/or block diagram block or blocks.

[0024] The computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions that execute on the computer or other programmable apparatus provide steps for implementing the functions/acts specified in the flowchart and/or block diagram block or blocks.

[0025] Referring to FIG. 1, a general architecture of a cloud based BLUETOOTH alarm system, as illustrated therein, includes a plurality of alarm sensors 101, at least one alarm device 102, at least one camera 103, a controller 201, a server 401, and at least one mobile device 501. The alarm sensors 101 can be magnetic contact sensors, motion detectors, smoke or carbon dioxide detectors, water sensors, glass break detectors, temperature sensors, heat detectors, sound detectors, roller/plunger sensors, photodetectors, or any combination thereof. The alarm device 102 can be any system or device that gives an audible, visual or other form of alarm signal about a problem or condition.

[0026] Each alarm sensor 101, alarm device 102, and camera 103 includes a BLUETOOTH module to establish communication link using a BLUETOOTH protocol to at least one neighbouring component 101-103 in a way such that a BLUETOOTH Mesh Network is formed, and the controller 201 connected to the BLUETOOTH Mesh Network, configured to monitor and manage the different devices 101-103. Preferably, the BLUETOOTH module employs BLUETOOTH Low Energy technology with mesh capability that enables many-to-many device communication and is optimised for creating large-scale device network. The BLUETOOTH module allows the respective device to be transformed into a network node with low energy consumption. In addition to that, the BLUETOOTH module can be configured to convert electronic pulse generated by the alarm sensor 101 into computer readable data for BLUETOOTH transmission within the BLUETOOTH Mesh Network. Under the BLUETOOTH Mesh Network technology, each sensor with the supported BLUETOOTH Mesh technology module can work as either a node or router. When it is working a router, it can receive BLUETOOTH signal from one source and broadcast it to the nearby nodes. As such, the BLUETOOTH coverage can be expand to further distance via a further node. Once the sensors are activated, they start to broadcast information via BLUETOOTH Mesh Network. The broadcast information includes sensor's serial number, type, battery status and health status (rest or trigger status).

[0027] The controller 201 includes a processor for processing data, the BLUETOOTH module to connect to the BLUETOOTH Mesh Network, a wired or wireless communication module for accessing internet 301 via a router, and a local storage for storing settings, configurations and temporary data. The BLUETOOTH module allows the controller 201 to establish communication link with devices which are connected to the BLUETOOTH Mesh Network. This enables the controller 201 to manage/control all the connected devices and to collect data from those devices.

[0028] The server 401 can be a cloud based service, operated by one or more heavy duty computers and any known devices or group of devices 402 to provide sufficient capacity for storing data. Preferably, the server 402 is linked to the controller 201 and the at least one mobile device 501 via internet 301. The server 401 serves as a cloud based platform to collect data from the controller 201, to process the collected data and generates status reports, to produce notification to the mobile device 501, to receive instructions from the mobile device 501 and forwards the instructions to the controller 201 for executing the designated operation, and to provide software updates to both the controller 201 and the mobile device 501.

[0029] The mobile device 501 can be a personal digital assistants (PDA), smart phone, tablet, laptop, netbook, phablet, phoblet, or any suitable means which capable of processing data and performing data transmission. Preferably, the mobile device 501 is installed with an application module configured to provide a user interface, to provide functional virtual keys or buttons for triggering different operations through the server 401, and to receive notification from the server 401.

[0030] FIG. 2 illustrates the process flow of creating an admin account. The system admin can first create an account on the server through the application. The details of such information will be stored under an account database in the server.

[0031] FIG. 3 illustrates the process flow of creating a user account. The cloud based server is capable of handling operations for multiple users. In the first step, the system admin creates a new user accounts by using individual email address. The created user accounts will be stored into the account database and such information is under the control or supervision of the system admin. The server then sends invitation emails to the individual user to login and create login password through the application. In general, there are two types of account, one is the system admin account and the other one is the user account. The system admin account has full accessibility to the functions/operations of the alarm system and can restrict the accessibility of each user account by configuring access level of each user account. The user account only has partial accessibility to the functions/operations defined by the system admin. The password verification can be replaced by biometric verification, in which the biometric data of the system admin and the user can be acquired through a biometric module of the mobile device.

[0032] FIG. 4 illustrates the process flow of pairing a new controller to the server. Firstly, the system admin through the application submits the serial number of the controller to the server. The server shall verify the serial number and create a pairing password. The pairing password will be sent to the controller and to be stored within the local storage of the controller. This pairing password is the communication key between the application and the controller and this key must be inserted to pair the mobile device to the controller so that the paired mobile device can manage the controller.

[0033] FIG. 5 illustrates the process flow of configuring the sensors and its secure modes. The system admin firstly switch on the sensors to enable its BLUETOOTH module to detect and to establish a BLUETOOTH communication link with neighbouring sensors so that the BLUETOOTH Mesh Network can be formed. Once the BLUETOOTH Mesh Network is formed, the system admin can through the application connects the controller to the BLUETOOTH Mesh Network and detect all the sensors. The status of each sensor will be shown in the application and the system admin is allowed to rename each sensor and to categorise the sensors into different groups. The application also provides three different secure modes for each sensor, namely Day mode, Night mode, and 24-hours away mode. The system admin can select from the application a mode for a group of sensors or the sensors can be customised individually with their designated mode. The controller can also be configured to automate the triggering of alarm device upon detection of abnormal activity by the sensors.

[0034] FIG. 6 illustrates the process flow of retrieving data upon system admin or user login. When the sensors are in a usual operation, the detection status and battery status of each sensor will be transmitted to the server via the controller in every predetermined period or in real time depending on the settings. The login of the system admin or the user into the application will triggers the server to firstly check access level of the account, determine controller that is paired to the account, check the list of sensors connected to the controller and individual status, and then forward the data to the application for displaying the condition of the alarm system in real time. The server can also determine the sensor's condition and the possible type alert detected based on the received data. Such condition can include but not limited to low battery condition, loss of connection, etc. Computer logics can be implemented to generate an alert message to the application if these conditions are met or such alert is detected. If the system admin detected deflective sensors, the system admin is also being provided with the option of bypassing or excluding the deflective sensors via the application. In addition to that, status report can be generated automatically depending on the preference of the system admin.

[0035] Alternatively, the camera can be connected to the controller via the BLUETOOTH Mesh Network. In this embodiment, the controller can be configured to activate the camera to capture image or record video based on the status of the alarm sensors and to retrieve and forward the image or video to the server. The system admin can also, through the application, retrieve the image or video from the server and manually triggers the alarm device if abnormal activity is spotted.

[0036] The present disclosure includes as contained in the appended claims, as well as that of the foregoing description. Although the present invention has been described in its preferred form with a degree of particularity, it is understood that the present disclosure of the preferred form has been made only by way of example and that numerous changes in the details of construction and the combination and arrangements of parts may be resorted to without departing from the scope of the present invention.