[go: up one dir, main page]

WO2006037149A1 - Alarm activation system - Google Patents

Alarm activation system Download PDF

Info

Publication number
WO2006037149A1
WO2006037149A1 PCT/AU2005/001417 AU2005001417W WO2006037149A1 WO 2006037149 A1 WO2006037149 A1 WO 2006037149A1 AU 2005001417 W AU2005001417 W AU 2005001417W WO 2006037149 A1 WO2006037149 A1 WO 2006037149A1
Authority
WO
WIPO (PCT)
Prior art keywords
alarm
alarm activation
computer
keystrokes
activation signal
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Ceased
Application number
PCT/AU2005/001417
Other languages
French (fr)
Inventor
Greg Strohfeldt
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Pacom Systems Pty Ltd
Original Assignee
Pacom Systems Pty Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from AU2004905745A external-priority patent/AU2004905745A0/en
Application filed by Pacom Systems Pty Ltd filed Critical Pacom Systems Pty Ltd
Publication of WO2006037149A1 publication Critical patent/WO2006037149A1/en
Anticipated expiration legal-status Critical
Ceased legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B25/00Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems
    • G08B25/14Central alarm receiver or annunciator arrangements

Definitions

  • This invention concerns an alarm activation system.
  • the invention typically concerns an alarm activation system of a bank, however the system may be implemented in a range of different applications.
  • the invention also concerns an alarm activation signal, a computer program and a method of activating an alarm.
  • Banks typically have alarm systems that can be activated by tellers in the event of an alarm situation, such as a hold-up.
  • the alarm system may be activated, for instance by pressing an alarm button mounted under a teller's desk.
  • the invention is an alarm activation system, comprising a networked computer system having: a hardware device programmed to receive an alarm activation signal and to take appropriate action when the alarm activation signal is received; and a first computer programmed to generate the alarm activation signal from a predetermined combination of keystrokes entered at the first computer and to send the alarm activation signal to the hardware device.
  • the invention enjoys a number of benefits, particularly in installation, configuration and modification which can be done entirely in software without the need to install special cables and switches.
  • the system can be installed into an existing networked computer system.
  • the network may include a plurality of first computers that are each nodes on the network.
  • the network may be operated by a bank.
  • the hardware device may be an alarm panel.
  • the keystrokes may be entered into a keyboard of the first computer. The combination of keystrokes may need to be pressed simultaneously. This helps to prevent the alarm activation signal being generated accidentally.
  • the combination of keystrokes may include any one or more of the 'Shift' key,
  • the predetermined combination of keystrokes is easier to remember and easier to disguise from onlookers.
  • the keystroke combination may be different for each computer.
  • the keystroke combination may be user defined.
  • the computer network may be a Wide Area Network (WAN).
  • the plurality of first computers may form a sub-network.
  • the hardware device may be programmed to send a further alarm activation signal to a second computer that may be located externally to the sub-network that also takes the appropriate action.
  • the second computer and sub-network may be operated by different parties.
  • the alarm activation signal may be sent to the hardware device using the network.
  • the network may be wireless, connected via a Public Switched Telephone Network (PSTN), or Global System for Mobile Communication (GSM).
  • PSTN Public Switched Telephone Network
  • GSM Global System for Mobile Communication
  • the second computer may further comprise a datastore, such as a database, and the second computer is programmed to store a record of the received further alarm activation signal in the datastore.
  • a datastore such as a database
  • the appropriate action that is taken by the hardware device and/or second computer could be automatically communicating that the alarm situation exists to an enforcement agency such as the police, sending a Short Message Service (SMS), activating an audio alarm, sending an e-mail, printing the event on a printer, activating a light/strobe, and/or triggering a camera or microphone to record video/audio.
  • SMS Short Message Service
  • the invention is an alarm activation signal that is generated by a first computer upon input of a predetermined combination of keystrokes entered at the first computer, and the alarm activation signal is sent to a hardware device to cause the hardware device to take an appropriate action.
  • the invention is a computer program installed on a first computer, wherein the computer program operates the first computer to generate an alarm activation signal from a predetermined combination of keystrokes entered at the first computer and to send the alarm activation signal to a hardware device that automatically takes the appropriate action when the alarm activation signal is received by the hardware device.
  • the invention is a method of activating an alarm comprising the step of: the first computer receiving input of a combination of keystrokes; the first computer automatically generating an alarm activation signal; the first computer automatically sending the alarm activation signal to a hardware device; and the hardware device receiving the alarm activation signal and automatically taking appropriate action.
  • the step of entering a combination of keystrokes may be performed in response to an alarm situation, such as in a bank robbery or where the user is in proximity to immediate violence.
  • Fig. 1 is a schematic view of a computer network of the alarm activation system
  • Fig. 2 is a flow chart of the method of using the alarm activation system
  • Fig. 3 shows how the software is discretely hidden in the system tray of the computer.
  • Fig. 1 shows a network 8 having a series of nodes 10 interconnected via network cabling 12.
  • Each node 10 includes a display device, such as a monitor 14, a CPU 16 and an input device having keys, such as a keyboard 18.
  • the CPU 16 of the node 10 has installed a computer software programme that operates to recognise a predetermined combination of keystrokes entered via the keyboard 18. One possible combination may be simultaneously pressing the keys 'Ctrl', 'Alt' and any numeric key.
  • a hardware device 20 is also connected to the network 8 via the network cabling 12, such as an alarm panel.
  • the alarm panel 20 is programmed to receive an alarm activation signal and to take appropriate action when the alarm activation signal is received.
  • the network 8 is a Local Area Network (LAN).
  • the network 8 could be a Wide Area Network (WAN).
  • the network may include a server 32 that is wirelessly connected to the network 8 and is located outside the bank.
  • the server 32 may include a storage device, such as a hard disk to log all occurrences of an alarm activation signal having been received from the hardware device 20.
  • the server 32 could be maintained and operated by either the bank or a third party.
  • the alarm panel 20 can communicate with a computer system of an enforcement agency, such as a security company or the police 22.
  • the alarm panel 20 may also be able to wirelessly communicate to a mobile device, such as a phone 24 by sending an
  • the bank also has an alarm that provides a visual and audio indication that it has been activated, such as a red light bulb 27 and a siren 26.
  • the computer software is initially installed 40 onto each node 10 to enable the CPU 16 to recognise when a predetermined combination of keystrokes is entered into the keyboard 18.
  • the node 10 may then automatically create an active connection to the alarm panel 20. To do this the user may be prompted to provide the appropriate password.
  • the combination of keystrokes can be predefined by the software. There may be more than one combination, each combination specific to an alarm situation that causes the alarm panel to respond in a specific way.
  • the software may also enable the user to alter the predefined keystroke combinations for their personal use. The user may need to provide a password in order to change any one of the keystroke combinations of keystrokes. This can make the combinations easier for the bank tellers to remember.
  • Computer software is also installed 40 on the alarm panel 20 to enable it to recognise received alarm activation signals and to take the appropriate action.
  • the tellers use the node 10 in their usual manner in the absence of alarm situations, such as processing customer transactions.
  • the software runs as a background task on the teller's node 14 and is discreetly disguised in the system tray.
  • an alarm situation 42 such as a hold-up of the bank
  • the user enters 44 a predetermined combination of keystrokes into the keyboard 18.
  • the combination of keystrokes may require specific keys to be entered in a particular order and/or to be held down simultaneously.
  • the predetermined combination is recognised by the CPU 16.
  • the CPU 16 then sends 46 an alarm activation signal to the alarm panel 20.
  • the alarm activation signal may include the combination of keystrokes that was entered. If there is more than one alarm panel 20 on the network, the CPU 16 could determine which alarm panel 20 the alarm activation signal should be sent to. The alarm activation signal is then sent to the alarm panel 20 through the network 8, via cables 12. All communications are encrypted to prevent tampering.
  • the alarm panel 20 then takes 48 the appropriate action. If there is more than one type of alarm activation signal that can be received by the alarm panel, the alarm panel 20 also determines what appropriate action should be performed. For example, if the alarm activation signal received is that of an armed hold-up alarm situation, the server 20 would then communicate this to the local police station 22.
  • the alarm panel 20 could communicate that to a more senior employee of the bank, such as by sending them an SMS to their phone 24 or sending a message to be displayed on the monitor 14 of their node 10. In other situations, the alarm panel 20 may operate to activate the siren 26, e-mail a message 29, trigger a camera or microphone to record video/audio 28, print the event on a printer 32.
  • the alarm panel 20 may then relay the alarm signal to the server 32 that then logs the receipt of the alarm signal on the hard disk, such as making a record in a database. This data can be later analysed to better understand the security issues affecting the bank.
  • Fig. 3 shows how the software on node 10 is hidden discretely in the systems- tray.
  • the diamond icon in Fig. 3 (a) shows a diamond in green signifying that the node 10 is connected to or is online with the alarm panel 20 and is ready to communicate an alarm activation signal once a combination of keystrokes is entered.
  • Fig. 3(b) shows the diamond in red signifying that a combination of keystrokes has been entered and has triggered an alarm activation signal to be sent by the node 10.
  • Fig. 3(c) shows the diamond in grey in front of a red cross signifying that the node's 10 connection to the alarm panel 20 has been lost.
  • the invention can be used in a commercial office. Keystroke combinations can be used to conveniently unlock a door after verifying a visitor's identity. The key combinations can also be used to arm and disarm the alarm system.

Landscapes

  • Business, Economics & Management (AREA)
  • Emergency Management (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Alarm Systems (AREA)

Abstract

This invention concerns an alarm activation system. In particular, but not exclusively, the invention typically concerns an alarm activation system of a bank. The system is comprised of a networked computer system (8) having a hardware device (20) programmed to receive an alarm activation signal and to take appropriate action when the alarm activation signal is received; and a first computer (10) programmed to generate the alarm activation signal from a predetermined combination of keystrokes entered at the first computer (10) and to send the alarm activation signal to the hardware device (20). The invention also concerns an alarm activation signal, a computer program and a method of activating an alarm.

Description

Title
Alarm Activation System
Technical Field This invention concerns an alarm activation system. In particular, but not exclusively, the invention typically concerns an alarm activation system of a bank, however the system may be implemented in a range of different applications. The invention also concerns an alarm activation signal, a computer program and a method of activating an alarm.
Background Art
Banks typically have alarm systems that can be activated by tellers in the event of an alarm situation, such as a hold-up. The alarm system may be activated, for instance by pressing an alarm button mounted under a teller's desk.
Disclosure of the Invention
In one aspect the invention is an alarm activation system, comprising a networked computer system having: a hardware device programmed to receive an alarm activation signal and to take appropriate action when the alarm activation signal is received; and a first computer programmed to generate the alarm activation signal from a predetermined combination of keystrokes entered at the first computer and to send the alarm activation signal to the hardware device.
The invention enjoys a number of benefits, particularly in installation, configuration and modification which can be done entirely in software without the need to install special cables and switches.
The system can be installed into an existing networked computer system. The network may include a plurality of first computers that are each nodes on the network. The network may be operated by a bank. The hardware device may be an alarm panel. The keystrokes may be entered into a keyboard of the first computer. The combination of keystrokes may need to be pressed simultaneously. This helps to prevent the alarm activation signal being generated accidentally.
The combination of keystrokes may include any one or more of the 'Shift' key,
'Ctrl' key and the 'Alt' key. By using as part of the combination of keystrokes, combinations that are commonly used in the Windows ™ environment, the predetermined combination of keystrokes is easier to remember and easier to disguise from onlookers. There may be a plurality of combinations of keystrokes that each cause the hardware device to take a different action, such as an action that is proportional to the alarm situation that the combination of keystrokes was entered in response to. The keystroke combination may be different for each computer. The keystroke combination may be user defined.
The computer network may be a Wide Area Network (WAN). The plurality of first computers may form a sub-network. The hardware device may be programmed to send a further alarm activation signal to a second computer that may be located externally to the sub-network that also takes the appropriate action. The second computer and sub-network may be operated by different parties.
The alarm activation signal may be sent to the hardware device using the network. The network may be wireless, connected via a Public Switched Telephone Network (PSTN), or Global System for Mobile Communication (GSM).
The second computer may further comprise a datastore, such as a database, and the second computer is programmed to store a record of the received further alarm activation signal in the datastore.
The appropriate action that is taken by the hardware device and/or second computer could be automatically communicating that the alarm situation exists to an enforcement agency such as the police, sending a Short Message Service (SMS), activating an audio alarm, sending an e-mail, printing the event on a printer, activating a light/strobe, and/or triggering a camera or microphone to record video/audio.
In a further aspect, the invention is an alarm activation signal that is generated by a first computer upon input of a predetermined combination of keystrokes entered at the first computer, and the alarm activation signal is sent to a hardware device to cause the hardware device to take an appropriate action.
In yet a further aspect, the invention is a computer program installed on a first computer, wherein the computer program operates the first computer to generate an alarm activation signal from a predetermined combination of keystrokes entered at the first computer and to send the alarm activation signal to a hardware device that automatically takes the appropriate action when the alarm activation signal is received by the hardware device.
Ih an even further aspect, the invention is a method of activating an alarm comprising the step of: the first computer receiving input of a combination of keystrokes; the first computer automatically generating an alarm activation signal; the first computer automatically sending the alarm activation signal to a hardware device; and the hardware device receiving the alarm activation signal and automatically taking appropriate action.
The step of entering a combination of keystrokes may be performed in response to an alarm situation, such as in a bank robbery or where the user is in proximity to immediate violence.
Brief Description of the Drawings
An example of the invention will now be described with reference to the accompanying drawings, in which:
Fig. 1 is a schematic view of a computer network of the alarm activation system; Fig. 2 is a flow chart of the method of using the alarm activation system; and
Fig. 3 shows how the software is discretely hidden in the system tray of the computer.
Best Modes of the Invention The alarm activation system will now be described in reference to a computer network of a bank. Fig. 1 shows a network 8 having a series of nodes 10 interconnected via network cabling 12. Each node 10 includes a display device, such as a monitor 14, a CPU 16 and an input device having keys, such as a keyboard 18. The CPU 16 of the node 10 has installed a computer software programme that operates to recognise a predetermined combination of keystrokes entered via the keyboard 18. One possible combination may be simultaneously pressing the keys 'Ctrl', 'Alt' and any numeric key. A hardware device 20 is also connected to the network 8 via the network cabling 12, such as an alarm panel. The alarm panel 20 is programmed to receive an alarm activation signal and to take appropriate action when the alarm activation signal is received.
In Fig. 1 the network 8 is a Local Area Network (LAN). Alternatively, the network 8 could be a Wide Area Network (WAN). For example, the network may include a server 32 that is wirelessly connected to the network 8 and is located outside the bank. The server 32 may include a storage device, such as a hard disk to log all occurrences of an alarm activation signal having been received from the hardware device 20. The server 32 could be maintained and operated by either the bank or a third party.
The alarm panel 20 can communicate with a computer system of an enforcement agency, such as a security company or the police 22. The alarm panel 20 may also be able to wirelessly communicate to a mobile device, such as a phone 24 by sending an
SMS to it. The bank also has an alarm that provides a visual and audio indication that it has been activated, such as a red light bulb 27 and a siren 26.
A method of using the alarm activation system of the bank will now be described in reference to Fig. 2. The computer software is initially installed 40 onto each node 10 to enable the CPU 16 to recognise when a predetermined combination of keystrokes is entered into the keyboard 18. The node 10 may then automatically create an active connection to the alarm panel 20. To do this the user may be prompted to provide the appropriate password.
The combination of keystrokes can be predefined by the software. There may be more than one combination, each combination specific to an alarm situation that causes the alarm panel to respond in a specific way. The software may also enable the user to alter the predefined keystroke combinations for their personal use. The user may need to provide a password in order to change any one of the keystroke combinations of keystrokes. This can make the combinations easier for the bank tellers to remember. Computer software is also installed 40 on the alarm panel 20 to enable it to recognise received alarm activation signals and to take the appropriate action.
The tellers use the node 10 in their usual manner in the absence of alarm situations, such as processing customer transactions. The software runs as a background task on the teller's node 14 and is discreetly disguised in the system tray. In the event of an alarm situation 42, such as a hold-up of the bank, the user enters 44 a predetermined combination of keystrokes into the keyboard 18. The combination of keystrokes may require specific keys to be entered in a particular order and/or to be held down simultaneously.
The predetermined combination is recognised by the CPU 16. The CPU 16 then sends 46 an alarm activation signal to the alarm panel 20. The alarm activation signal may include the combination of keystrokes that was entered. If there is more than one alarm panel 20 on the network, the CPU 16 could determine which alarm panel 20 the alarm activation signal should be sent to. The alarm activation signal is then sent to the alarm panel 20 through the network 8, via cables 12. All communications are encrypted to prevent tampering. The alarm panel 20 then takes 48 the appropriate action. If there is more than one type of alarm activation signal that can be received by the alarm panel, the alarm panel 20 also determines what appropriate action should be performed. For example, if the alarm activation signal received is that of an armed hold-up alarm situation, the server 20 would then communicate this to the local police station 22. If the alarm activation signal is that of a violent customer, the alarm panel 20 could communicate that to a more senior employee of the bank, such as by sending them an SMS to their phone 24 or sending a message to be displayed on the monitor 14 of their node 10. In other situations, the alarm panel 20 may operate to activate the siren 26, e-mail a message 29, trigger a camera or microphone to record video/audio 28, print the event on a printer 32.
The alarm panel 20 may then relay the alarm signal to the server 32 that then logs the receipt of the alarm signal on the hard disk, such as making a record in a database. This data can be later analysed to better understand the security issues affecting the bank.
Fig. 3 shows how the software on node 10 is hidden discretely in the systems- tray. The diamond icon in Fig. 3 (a) shows a diamond in green signifying that the node 10 is connected to or is online with the alarm panel 20 and is ready to communicate an alarm activation signal once a combination of keystrokes is entered. Fig. 3(b) shows the diamond in red signifying that a combination of keystrokes has been entered and has triggered an alarm activation signal to be sent by the node 10. Fig. 3(c) shows the diamond in grey in front of a red cross signifying that the node's 10 connection to the alarm panel 20 has been lost.
The advantages of using the invention in accordance with the best mode just described includes:
- unique inexpensive approach to achieving functions that have been traditionally hard- wired
- offers an alternative to unsightly cabling and traditional duress button and note-clip devices - Use existing equipment (PCs) rather than investing in additional devices (i.e. can be retrofitted)
- Offers a solution to locations where running additional cabling is difficult
- create multiple key combinations to perform different tasks, and
- user friendly. It will be appreciated by persons skilled in the art that numerous variations and/or modifications may be made to the invention as shown in the specific embodiments without departing from the spirit or scope of the invention as broadly described.
For example, the invention can be used in a commercial office. Keystroke combinations can be used to conveniently unlock a door after verifying a visitor's identity. The key combinations can also be used to arm and disarm the alarm system.
The present embodiments are, therefore, to be considered in all respects as illustrative and not restrictive.

Claims

Claims
1. An alarm activation system, comprising a networked computer system having: a hardware device programmed to receive an alarm activation signal and to take appropriate action when the alarm activation signal is received; and a first computer programmed to generate the alarm activation signal from a predetermined combination of keystrokes entered at the first computer and to send the alarm activation signal to the hardware device.
2. An alarm activation system according to claim 1, wherein the network includes a plurality of first computers.
3. An alarm activation system according to claim 1 or 2, wherein the network is operated by a bank.
4. An alarm activation system according to claim 1, 2 or 3, wherein the hardware device is an alarm panel.
5. An alarm activation system according to any one of the preceding claims, wherein the combination of keystrokes is entered into a keyboard of the first computer.
6. An alarm activation system according to any one of the preceding claims, wherein the combination of keystrokes may need to be pressed simultaneously.
7. An alarm activation system according to any one of the preceding claims, wherein the combination of keystrokes includes any one or more of the 'Shift' key, 'Ctrl' key and the 'Alt' key.
8. An alarm activation system according to claim 2, wherein there is a plurality of combinations of keystrokes that each cause the hardware device to take a different action.
9. An alarm activation system according to any one of the preceding claims, wherein, the combination of keystrokes is user defined.
10. An alarm activation system according to claim 2 or 8, wherein the plurality of first computers forms a sub-network and the hardware device takes the action of sending a further alarm activation signal to a second computer that is be located externally to the sub-network that also takes an appropriate action.
11. An alarm activation system according to claim 10, wherein the second computer and sub-network are operated by different parties.
12. An alarm activation system according to any one of the preceding claims, wherein the alarm activation signal is sent to the hardware device using the network.
13. An alarm activation system according to claim 10 or 11, wherein the second computer further comprises a datastore and the second computer is programmed to store a record of the further received alarm activation signal in the datastore.
14. An alarm activation system according to any one of the preceding claims, wherein the appropriate action that is taken by the hardware device is any one or more of automatically communicating that the alarm situation exists to an enforcement agency, sending a Short Message Service (SMS), activating an audio alarm, sending an e-mail, printing the event on a printer, activating a light/strobe, and/or triggering a camera or microphone to record video/audio.
15. An alarm activation signal that is generated by a first computer upon input of a predetermined combination of keystrokes entered at the first computer, and the alarm activation signal is sent to a hardware device to cause the hardware device to take an appropriate action.
16. An alarm activation signal according to claim 15, wherein the hardware device is an alarm panel.
17. An alarm activation signal according to claim 15 or 16, wherein the combination of keystrokes is entered into a keyboard of the first computer.
18. An alarm activation signal according to claim 15, 16 or 17, wherein the combination of keystrokes is pressed simultaneously.
19. An alarm activation signal according to any one of claims 15 to 18, wherein the combination of keystrokes includes any one or more of the 'Shift' key, 'Ctrl' key and the Alt' key.
5 20. An alarm activation signal according to any one of claims 15 to 19, wherein there is a plurality of predetermined combination of keystrokes and the content of the alarm activation signal is dependent upon which predetermined combination of keystrokes is entered.
10 21. An alarm activation signal according to any one of claims 15 to 20, wherein the alarm activation signal is sentto a second computer.
22. An alarm activation signal according to any one of claims 15 to 21, wherein the alarm activation signal is sent to the hardware device using the network that the first
15 computer and hardware devices are connected to.
23. A computer program installed on a first computer, wherein the computer program operates the first computer to generate an alarm activation signal from a predetermined combination of keystrokes entered at the first computer and to send the
20 alarm activation signal to a hardware device that automatically takes the appropriate action when the alarm activation signal is received by the hardware device.
24. A computer program according to claim 23, wherein the hardware device is an alarm panel.
25 25. A computer program according to claim 23 or 24, wherein the combination of keystrokes is entered into a keyboard of the first computer.
26. A computer program according to claim 23, 24 or 25, wherein the combination of keystrokes is pressed simultaneously.
30
27. A computer program according to claim 23, wherein the combination of keystrokes includes any one or more of the 'Shift' key, 'Ctrl' key and the 'Alt' key.
28. A computer program according to claim 23, wherein there is a plurality of 35 combinations of keystrokes that each cause the hardware device to take a different action.
29. A computer program according to claim 23, wherein the program allows the user to define the keys that comprise the combination of keystrokes.
30. A method of activating an alarm comprising the step of: the first computer receiving input of a combination of keystrokes ; the first computer automatically generating an alarm activation signal; the first computer automatically sending the alarm activation signal to a hardware device; and the hardware device receiving the alarm activation signal and automatically taking appropriate action.
31. A method of activating an alarm according to claim 30, wherein the step of receiving the input of the combination of keystrokes is performed in response to an alarm situation.
32. A method of activating an alarm according to claim 30 or 31, wherein the hardware device is an alarm panel.
33. A method of activating an alarm according to claim 30, 31 or 32, wherein the step of receiving the input of the combination of keystrokes is performed on a keyboard of the first computer.
34. A method of activating an alarm according to any one of claims 30 to 33, wherein the step of receiving the input of the combination of keystrokes comprises pressing the combination of keystrokes simultaneously.
35. A method of activating an alarm according to any one of claims 30 to 34, wherein the step of receiving the input of the combination of keystrokes includes receiving any one or more of the 'Shift' key, 'Ctrl' key and the 'Alt' key.
36. A method of activating an alarm according to any one of claims 30 to 35, wherein there is a plurality of combinations of keystrokes, and the step of automatically taking the appropriate action is related to the combination of keystrokes that is received by the first computer.
37. A method of activating an alarm according to any one of claims 30 to 36, wherein a plurality of first computers forms a sub-network and the step of taking the appropriate action includes sending a further alarm activation signal to a second computer that is be located externally to the sub-network.
38. A method of activating an alarm according to any one of claims 30 to 37, wherein the step of sending the alarm activation signal to the hardware device is performed over the computer network that the first computer and hardware device are connected to.
PCT/AU2005/001417 2004-10-05 2005-09-16 Alarm activation system Ceased WO2006037149A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
AU2004905745A AU2004905745A0 (en) 2004-10-05 Alarm Activation Signals
AU2004905745 2004-10-05

Publications (1)

Publication Number Publication Date
WO2006037149A1 true WO2006037149A1 (en) 2006-04-13

Family

ID=36142220

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/AU2005/001417 Ceased WO2006037149A1 (en) 2004-10-05 2005-09-16 Alarm activation system

Country Status (1)

Country Link
WO (1) WO2006037149A1 (en)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4667183A (en) * 1985-09-09 1987-05-19 Napco Security Systems, Inc. Keyboard hold-down functions for a multi-zone intrusion detection system
US5579238A (en) * 1994-10-21 1996-11-26 Krugman; Michael Instrumented computer keyboard for prevention of injury
US6400285B1 (en) * 1992-10-08 2002-06-04 Henry Gifford Ergonomic keyboard

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4667183A (en) * 1985-09-09 1987-05-19 Napco Security Systems, Inc. Keyboard hold-down functions for a multi-zone intrusion detection system
US6400285B1 (en) * 1992-10-08 2002-06-04 Henry Gifford Ergonomic keyboard
US5579238A (en) * 1994-10-21 1996-11-26 Krugman; Michael Instrumented computer keyboard for prevention of injury

Similar Documents

Publication Publication Date Title
US10619380B2 (en) Wireless electronic lock system and method
US11775661B2 (en) Limiting device functionality based on data detection and processing
US7356835B2 (en) Security monitor for PDA attached telephone
US20030071724A1 (en) Security system linked to the internet
US20120001755A1 (en) Virtual Presence after Security Event Detection
US20160378961A1 (en) Security system, apparatus and method using additional code
US20080242268A1 (en) Methods, Systems and Computer Program Products for Remotely Controlling Wireless Terminals
US20020171546A1 (en) Universal, customizable security system for computers and other devices
EP3136273B1 (en) Intrusion security device with sms based notification and control
WO2009079648A1 (en) Threat based adaptable network and physical security system
CN102084371A (en) System for mitigating the unauthorized use of a device
US20100030856A1 (en) Instant messaging applications in security systems
CN102084370A (en) System for mitigating the unauthorized use of a device
US20150302674A1 (en) System and method to access/restrict a security system for temporary users using a mobile application
WO2019080218A1 (en) Door lock and prying-resistant alarm device thereof
KR100853039B1 (en) Laptop anti-theft system
US20080062132A1 (en) Kvm switch capable of detecting keyword input and method thereof
CN106874795B (en) Mobile terminal and machine disassembly prevention method and device thereof
US9754467B1 (en) Interactive notification system for remote control of a gun safe or the like
WO2006037149A1 (en) Alarm activation system
Spero et al. Security begins at home: everyday security behaviour and lessons for cybersecurity research
US8963709B2 (en) Media management in a security system
US7004387B1 (en) System and method for preventing theft at automatic teller machines
JP2005273176A (en) Electronic lock control system and program
KR102565723B1 (en) Integrated wiring panel alarm guidance system

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A1

Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BW BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EC EE EG ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KM KP KR KZ LC LK LR LS LT LU LV LY MA MD MG MK MN MW MX MZ NA NG NI NO NZ OM PG PH PL PT RO RU SC SD SE SG SK SL SM SY TJ TM TN TR TT TZ UA UG US UZ VC VN YU ZA ZM ZW

AL Designated countries for regional patents

Kind code of ref document: A1

Designated state(s): GM KE LS MW MZ NA SD SL SZ TZ UG ZM ZW AM AZ BY KG KZ MD RU TJ TM AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IS IT LT LU LV MC NL PL PT RO SE SI SK TR BF BJ CF CG CI CM GA GN GQ GW ML MR NE SN TD TG

121 Ep: the epo has been informed by wipo that ep was designated in this application
NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase