Method and System for Enhancing Functionality of Security Systems
Original Publication Date: 2002-Jun-25
Included in the Prior Art Database: 2003-Jun-21
Disclosed are several ideas contained within this publication: First, is the idea of using voice recognition to disarm a home or business alarm system. Second, the idea of combining this voice recognition with speech recognition to perform critical functions, such as silent alarm execution. Third, the idea of using different tones to represent normal disarming versus silent alarm. It is recognized that the concepts expounded are applicable to security systems in any setting, from home to business, and even to automobiles. For the sake of simplicity, after initial exposition, reference is made to "home systems" almost exclusively. This is for brevity, and the broad applicability of the concepts here should not underestimated, given the unilateral references. The demand for security, both in homes and businesses, has seen tremendous growth in the past decade. Rising from virtually nowhere, the demand for electronic security systems has exploded, and accordingly, both electronics companies and monitoring services have arisen to provide the products and services that will deliver the security requested by customers. From very simple and humble beginnings, the complexity of such systems has kept pace with the overall technological expansion seen in the communications and computing sectors. It may be asked, of course, as increasingly powerful processors and functions are packed into home security systems, where might the next steps be taken in this arms race of home and business protection? Viewing the home security system for what it is, a computer which is "always on" within the household, certain new technologies may be applied within its processor to deliver new and unique functionality to the security environment. Specifically, various permutations of speech and voice recognition technologies may be applied to novel ends within the security arena. Application of voice recognition to security systems presents an advantage over the traditional use of personal identification numbers (PINs), in that PINs may be forgotten or compromised. The following methodology would be used for ascertaining who may arm or disarm the system. This group may be synonymous or disparate, in that persons having one permission may or may not have the other permission.