Title
Alarm Activation System
Technical Field This invention concerns an alarm activation system. In particular, but not exclusively, the invention typically concerns an alarm activation system of a bank, however the system may be implemented in a range of different applications. The invention also concerns an alarm activation signal, a computer program and a method of activating an alarm.
Background Art
Banks typically have alarm systems that can be activated by tellers in the event of an alarm situation, such as a hold-up. The alarm system may be activated, for instance by pressing an alarm button mounted under a teller's desk.
Disclosure of the Invention
In one aspect the invention is an alarm activation system, comprising a networked computer system having: a hardware device programmed to receive an alarm activation signal and to take appropriate action when the alarm activation signal is received; and a first computer programmed to generate the alarm activation signal from a predetermined combination of keystrokes entered at the first computer and to send the alarm activation signal to the hardware device.
The invention enjoys a number of benefits, particularly in installation, configuration and modification which can be done entirely in software without the need to install special cables and switches.
The system can be installed into an existing networked computer system. The network may include a plurality of first computers that are each nodes on the network. The network may be operated by a bank. The hardware device may be an alarm panel. The keystrokes may be entered into a keyboard of the first computer. The combination of keystrokes may need to be pressed simultaneously. This helps to prevent the alarm activation signal being generated accidentally.
The combination of keystrokes may include any one or more of the 'Shift' key,
'Ctrl' key and the 'Alt' key. By using as part of the combination of keystrokes, combinations that are commonly used in the Windows ™ environment, the predetermined combination of keystrokes is easier to remember and easier to disguise
from onlookers. There may be a plurality of combinations of keystrokes that each cause the hardware device to take a different action, such as an action that is proportional to the alarm situation that the combination of keystrokes was entered in response to. The keystroke combination may be different for each computer. The keystroke combination may be user defined.
The computer network may be a Wide Area Network (WAN). The plurality of first computers may form a sub-network. The hardware device may be programmed to send a further alarm activation signal to a second computer that may be located externally to the sub-network that also takes the appropriate action. The second computer and sub-network may be operated by different parties.
The alarm activation signal may be sent to the hardware device using the network. The network may be wireless, connected via a Public Switched Telephone Network (PSTN), or Global System for Mobile Communication (GSM).
The second computer may further comprise a datastore, such as a database, and the second computer is programmed to store a record of the received further alarm activation signal in the datastore.
The appropriate action that is taken by the hardware device and/or second computer could be automatically communicating that the alarm situation exists to an enforcement agency such as the police, sending a Short Message Service (SMS), activating an audio alarm, sending an e-mail, printing the event on a printer, activating a light/strobe, and/or triggering a camera or microphone to record video/audio.
In a further aspect, the invention is an alarm activation signal that is generated by a first computer upon input of a predetermined combination of keystrokes entered at the first computer, and the alarm activation signal is sent to a hardware device to cause the hardware device to take an appropriate action.
In yet a further aspect, the invention is a computer program installed on a first computer, wherein the computer program operates the first computer to generate an alarm activation signal from a predetermined combination of keystrokes entered at the first computer and to send the alarm activation signal to a hardware device that automatically takes the appropriate action when the alarm activation signal is received by the hardware device.
Ih an even further aspect, the invention is a method of activating an alarm comprising the step of:
the first computer receiving input of a combination of keystrokes; the first computer automatically generating an alarm activation signal; the first computer automatically sending the alarm activation signal to a hardware device; and the hardware device receiving the alarm activation signal and automatically taking appropriate action.
The step of entering a combination of keystrokes may be performed in response to an alarm situation, such as in a bank robbery or where the user is in proximity to immediate violence.
Brief Description of the Drawings
An example of the invention will now be described with reference to the accompanying drawings, in which:
Fig. 1 is a schematic view of a computer network of the alarm activation system; Fig. 2 is a flow chart of the method of using the alarm activation system; and
Fig. 3 shows how the software is discretely hidden in the system tray of the computer.
Best Modes of the Invention The alarm activation system will now be described in reference to a computer network of a bank. Fig. 1 shows a network 8 having a series of nodes 10 interconnected via network cabling 12. Each node 10 includes a display device, such as a monitor 14, a CPU 16 and an input device having keys, such as a keyboard 18. The CPU 16 of the node 10 has installed a computer software programme that operates to recognise a predetermined combination of keystrokes entered via the keyboard 18. One possible combination may be simultaneously pressing the keys 'Ctrl', 'Alt' and any numeric key. A hardware device 20 is also connected to the network 8 via the network cabling 12, such as an alarm panel. The alarm panel 20 is programmed to receive an alarm activation signal and to take appropriate action when the alarm activation signal is received.
In Fig. 1 the network 8 is a Local Area Network (LAN). Alternatively, the network 8 could be a Wide Area Network (WAN). For example, the network may include a server 32 that is wirelessly connected to the network 8 and is located outside the bank. The server 32 may include a storage device, such as a hard disk to log all occurrences of an alarm activation signal having been received from the hardware
device 20. The server 32 could be maintained and operated by either the bank or a third party.
The alarm panel 20 can communicate with a computer system of an enforcement agency, such as a security company or the police 22. The alarm panel 20 may also be able to wirelessly communicate to a mobile device, such as a phone 24 by sending an
SMS to it. The bank also has an alarm that provides a visual and audio indication that it has been activated, such as a red light bulb 27 and a siren 26.
A method of using the alarm activation system of the bank will now be described in reference to Fig. 2. The computer software is initially installed 40 onto each node 10 to enable the CPU 16 to recognise when a predetermined combination of keystrokes is entered into the keyboard 18. The node 10 may then automatically create an active connection to the alarm panel 20. To do this the user may be prompted to provide the appropriate password.
The combination of keystrokes can be predefined by the software. There may be more than one combination, each combination specific to an alarm situation that causes the alarm panel to respond in a specific way. The software may also enable the user to alter the predefined keystroke combinations for their personal use. The user may need to provide a password in order to change any one of the keystroke combinations of keystrokes. This can make the combinations easier for the bank tellers to remember. Computer software is also installed 40 on the alarm panel 20 to enable it to recognise received alarm activation signals and to take the appropriate action.
The tellers use the node 10 in their usual manner in the absence of alarm situations, such as processing customer transactions. The software runs as a background task on the teller's node 14 and is discreetly disguised in the system tray. In the event of an alarm situation 42, such as a hold-up of the bank, the user enters 44 a predetermined combination of keystrokes into the keyboard 18. The combination of keystrokes may require specific keys to be entered in a particular order and/or to be held down simultaneously.
The predetermined combination is recognised by the CPU 16. The CPU 16 then sends 46 an alarm activation signal to the alarm panel 20. The alarm activation signal may include the combination of keystrokes that was entered. If there is more than one alarm panel 20 on the network, the CPU 16 could determine which alarm panel 20 the alarm activation signal should be sent to. The alarm activation signal is then sent to the alarm panel 20 through the network 8, via cables 12. All communications are encrypted to prevent tampering.
The alarm panel 20 then takes 48 the appropriate action. If there is more than one type of alarm activation signal that can be received by the alarm panel, the alarm panel 20 also determines what appropriate action should be performed. For example, if the alarm activation signal received is that of an armed hold-up alarm situation, the server 20 would then communicate this to the local police station 22. If the alarm activation signal is that of a violent customer, the alarm panel 20 could communicate that to a more senior employee of the bank, such as by sending them an SMS to their phone 24 or sending a message to be displayed on the monitor 14 of their node 10. In other situations, the alarm panel 20 may operate to activate the siren 26, e-mail a message 29, trigger a camera or microphone to record video/audio 28, print the event on a printer 32.
The alarm panel 20 may then relay the alarm signal to the server 32 that then logs the receipt of the alarm signal on the hard disk, such as making a record in a database. This data can be later analysed to better understand the security issues affecting the bank.
Fig. 3 shows how the software on node 10 is hidden discretely in the systems- tray. The diamond icon in Fig. 3 (a) shows a diamond in green signifying that the node 10 is connected to or is online with the alarm panel 20 and is ready to communicate an alarm activation signal once a combination of keystrokes is entered. Fig. 3(b) shows the diamond in red signifying that a combination of keystrokes has been entered and has triggered an alarm activation signal to be sent by the node 10. Fig. 3(c) shows the diamond in grey in front of a red cross signifying that the node's 10 connection to the alarm panel 20 has been lost.
The advantages of using the invention in accordance with the best mode just described includes:
- unique inexpensive approach to achieving functions that have been traditionally hard- wired
- offers an alternative to unsightly cabling and traditional duress button and note-clip devices - Use existing equipment (PCs) rather than investing in additional devices (i.e. can be retrofitted)
- Offers a solution to locations where running additional cabling is difficult
- create multiple key combinations to perform different tasks, and
- user friendly. It will be appreciated by persons skilled in the art that numerous variations and/or modifications may be made to the invention as shown in the specific
embodiments without departing from the spirit or scope of the invention as broadly described.
For example, the invention can be used in a commercial office. Keystroke combinations can be used to conveniently unlock a door after verifying a visitor's identity. The key combinations can also be used to arm and disarm the alarm system.
The present embodiments are, therefore, to be considered in all respects as illustrative and not restrictive.