Browse Prior Art Database

Method and System for Enhancing Functionality of Security Systems

IP.com Disclosure Number: IPCOM000016039D
Original Publication Date: 2002-Jun-25
Included in the Prior Art Database: 2003-Jun-21
Document File: 3 page(s) / 43K

Publishing Venue

IBM

Abstract

Disclosed are several ideas contained within this publication: First, is the idea of using voice recognition to disarm a home or business alarm system. Second, the idea of combining this voice recognition with speech recognition to perform critical functions, such as silent alarm execution. Third, the idea of using different tones to represent normal disarming versus silent alarm. It is recognized that the concepts expounded are applicable to security systems in any setting, from home to business, and even to automobiles. For the sake of simplicity, after initial exposition, reference is made to "home systems" almost exclusively. This is for brevity, and the broad applicability of the concepts here should not underestimated, given the unilateral references. The demand for security, both in homes and businesses, has seen tremendous growth in the past decade. Rising from virtually nowhere, the demand for electronic security systems has exploded, and accordingly, both electronics companies and monitoring services have arisen to provide the products and services that will deliver the security requested by customers. From very simple and humble beginnings, the complexity of such systems has kept pace with the overall technological expansion seen in the communications and computing sectors. It may be asked, of course, as increasingly powerful processors and functions are packed into home security systems, where might the next steps be taken in this arms race of home and business protection? Viewing the home security system for what it is, a computer which is "always on" within the household, certain new technologies may be applied within its processor to deliver new and unique functionality to the security environment. Specifically, various permutations of speech and voice recognition technologies may be applied to novel ends within the security arena. Application of voice recognition to security systems presents an advantage over the traditional use of personal identification numbers (PINs), in that PINs may be forgotten or compromised. The following methodology would be used for ascertaining who may arm or disarm the system. This group may be synonymous or disparate, in that persons having one permission may or may not have the other permission.

This text was extracted from a PDF file.
This is the abbreviated version, containing approximately 45% of the total text.

Page 1 of 3

Method and System for Enhancing Functionality of Security Systems

Disclosed are several ideas contained within this publication: First, is the idea of using voice recognition to disarm a home or business alarm system. Second, the idea of combining this voice recognition with speech recognition to perform critical functions, such as silent alarm execution. Third, the idea of using different tones to represent normal disarming versus silent alarm. It is recognized that the concepts expounded are applicable to security systems in any setting, from home to business, and even to automobiles. For the sake of simplicity, after initial exposition, reference is made to "home systems" almost exclusively. This is for brevity, and the broad applicability of the concepts here should not underestimated, given the unilateral references.

The demand for security, both in homes and businesses, has seen tremendous growth in the past decade. Rising from virtually nowhere, the demand for electronic security systems has exploded, and accordingly, both electronics companies and monitoring services have arisen to provide the products and services that will deliver the security requested by customers. From very simple and humble beginnings, the complexity of such systems has kept pace with the overall technological expansion seen in the communications and computing sectors.

It may be asked, of course, as increasingly powerful processors and functions are packed into home security systems, where might the next steps be taken in this arms race of home and business protection? Viewing the home security system for what it is, a computer which is "always on" within the household, certain new technologies may be applied within its processor to deliver new and unique functionality to the security environment. Specifically, various permutations of speech and voice recognition technologies may be applied to novel ends within the security arena.

Application of voice recognition to security systems presents an advantage over the traditional use of personal identification numbers (PINs), in that PINs may be forgotten or compromised. The following methodology would be used for ascertaining who may arm or disarm the system. This group may be synonymous or disparate, in that persons having one permission may or may not have the other permission.

(1) Upon depression of a button, entry of a numerical code, or speaking of a keyword, the alarm goes into "listen" mode.
(2) The user speaks a set of words or terms, as dictated by the speech patterns necessary to capture an accurate voiceprint of the person with the desired permission.
(3) Upon capture of adequate speech examples to recognize the voice of the system user, other users may register with the alarm system as well, using the same technique, if desired.
(4) Once all desired household participants have registered their voices with the system, the alarm is ready for use in a nominal fashion.

1

Page 2 of 3

An optional meth...