Digital Healthcare – Samuel N. Zellner, Mark J. Enzmann, Robert T. Moton, Jr., AT&T Delaware Intellectual Property Inc

Abstract for “System and Method for Controlling Devices at a Location”

“A system and method of controlling one or more devices associated to a particular location by an outside entity. An example of the system architecture is an internal computer system that allows remote control of a device by an outside entity. This can be done through a communication session with the external computer network. An external computer network could be the Internet. Before the session can be established, outside entities must authenticate their identity information before they are allowed to control the device. A firewall is used in a preferred embodiment to protect the internal computer system. If the outside entity has the right identity information, the firewall will allow them to access the internal system to control it. The firewall may recognize the identity information of an outside entity as a password. The preferred embodiment of the identity information is a digital certification issued by a certificate authority to the outside entity. Preferable embodiments allow only the outside entity to terminate the communication session after it has been established.

Background for “System and Method for Controlling Devices at a Location”

“1. “1.

“The invention is related to telecommunication systems and, in particular, to a method and system for controlling devices at a specific location.”

“2. “2.

“Emergency telephone service is used around the globe to receive emergency calls. The United States has a 911 emergency number that is routed to a PSAP (public safety answering point) which dispatches emergency responders. Paramedics, firefighters, and police officers can all be emergency response professionals. The PSAP receives critical information from the caller, including the location, type, and whether there is anyone in imminent danger.

“FIG. “FIG. A 911 service is initiated by a caller at 100 using telephone 102 and telephone line 104 to dial number string?911. Public switched telephone network (PSTN), 106 to PSAP 108 automatically routes the 911 call. This is typically operated by emergency responders such as police, fire and other law enforcement officers. The voice session between the caller (or PSAP 108) and PSAP 108 is called a POTS (plain-old telephone service).

“Unlike regular telephone connections in which both the caller and the calling party have control over the connection,” 911 calls are controlled by the caller, in this instance PSAP 108. After establishing the POTS session, the 911 caller cannot end the session. After the call has been established, PSAP 108 cannot terminate the call. This is usually after the emergency has been properly resolved. This unique feature is essential to ensure that POTS sessions are preserved even if the caller accidentally disconnects telephone 102 but picks up telephone 022 later, until the emergency is resolved.

“Another advantage of emergency telephone services is their ability to identify the location of the caller, i.e. location 100. The telephone service provider, or PSAP 108, can keep a 911 database for wireline telephones. For example, database 110 catalogs the street address of every telephone line within the area where PSAP 108 is responsible. FIG. Referring to FIG. Telephone line 104 was used to initiate the call. The telephone number of telephone line104 corresponds to the street address 100 in database 110. Database 110 is sometimes referred to as “the 911 database”. Multiple methods for locating the calling party are available to 911 calls made by wireless telephones in accordance the Federal Communications Commission’s Enhanced 911 mandate (FCC).

The emergency telephone services currently known are limited to voice communications, such as the POTS session mentioned above. Multimedia communication sessions (including data sessions) will become more common in the future. Multimedia communication sessions can be established by using integrated voice, video, and data services, such as those offered with digital subscriber lines (DSL), broadband-integrated services digital networks (BISDN) and others. An individual could have a multimedia-capable computer system in his or her home. home. An internal computer system could be a local area networking (LAN) with a variety of components. The internal computer system is capable of communicating with external entities. An external computer network may allow communication between the internal and outside entities. An external computer network could be, for instance, the Internet.

Although the internal computer can communicate with outside entities via PSTN 106, it may not be fully integrated to PSTN 106. If a caller makes a 911 call over the voice-over Internet protocol (VoIP), PSAP 108 may not be able to communicate with them. In other words, PSAP 108 cannot control the call. PSAP 108 has no exclusive control over the VoIP communication session. The caller could lose communication with PSAP 108 before PSAP 108 can properly assess the situation. The subscriber cannot access emergency telephone services if he calls PSAP108 with a non-POTS device.

“FIG. “FIG. Location 200 could be a private residence, or a commercial building. Location 200 is equipped with telephone 202, which is connected to telephone line 204. The security system 212 is installed in 200. This system may also be known as the burglary alarm or simply a security system.

“Security system 212 may contain, for example, one or several sensing devices such as a glass-break sensor or motion detector. Security system 212 can call PSTN 106 to contact private security company 214 when one of its sensing devices is activated. Private security company 214 would then try to determine if the triggering event warrants an emergency response team dispatch. Private security firm 214 may call location 200 to verify if the triggering event is a false alarm, minor accident, or other non-life-threatening situation.

Private security company 214 cannot confirm that the triggering incident is not life-threatening. Instead, it calls PSAP108 to report the emergency. However, most of the time, calling PSAP 108 to report an emergency is unnecessary. One example is that a sensing device might have been accidentally activated. It is possible, for example, that loud thunder can cause a glass break sensor to go off. This could result in the police being dispatched to 200 unnecessarily and wasting resources.

“Technologies that are part of the existing 911 service or private security system as it exists today are sufficient to receive emergency calls. However, these technologies have some flaws. As mentioned above, VoIP calls do not have the same protection level as POTS calls. PSAP 108 has no means to assess, monitor, resolve, or handle an emergency situation. This is in addition to receiving second-hand information from the caller. Third, equipment and emergency personnel often arrive at the emergency scene without knowing which emergency response equipment is needed. Fourth, emergency response personnel and equipment often go to places that can be resolved by themselves. Fifth, private security companies cannot properly prescreen and verify emergency situations reported before dispatching the police or another emergency response team to that scene.

“The invention is a system for controlling one or more devices that are associated with a specific location by an external entity. An outside entity could be an emergency response unit or private security firm. A healthcare provider may also be considered as the outside entity. A location could be a building, a vehicle or a person. One or more of the devices could include a camera, sprinkler system, or pacemaker surgically placed on someone. One embodiment of the invention’s system architecture includes an internal computer system that allows remote control of the device. The internal computer system could be a LAN. An internal computer system could also be Bluetooth-enabled.

“When an outside entity requests to control the device, a multimedia communication channel is established between the internal computer system of the outside entity and the external computer network. Preferably, the Internet is the external computer network. A caller to the outside entity can request it using any of several methods. These include VoIP phone calls and POTS. One of many communication protocols can be used to establish a communication session between the internal and external computers. The digital communications protocol (DCP), and the transmission control protocol(TCP) are suitable communication protocols.

“In a preferred embodiment, an internal computer system is protected with a firewall. If the outside entity has the right identity information, the firewall will allow them to access the internal system to control it. The firewall may recognize the identity information of an outside entity as a password. The preferred embodiment of the identity information is a digital certification issued by a certificate authority to the outside entity. Before an outside entity can access the internal computer systems, the digital certificate must be authenticated by the certificate agency.

“When an outside entity creates a secure tunnel through the firewall to allow access to the internal computer systems, that outside entity can also control the device associated with the internal system. An outside entity can use this device to monitor the situation at the site. If necessary, the outside entity can use the device to solve the problem. Once the situation has been resolved, communication between the internal computer system (and the external computer network) is ended.

“In a preferred embodiment, an outside entity retains complete control of the communication session once it is established. The communication session can only be ended by the outside entity. This allows the outside entity to solve the problem without the interference of any other parties or the internal computer system.

“In a preferred embodiment each computer system is issued a digital certification by a certificate authority. The certificate authority must verify the digital certificates before the secure tunnel through firewall can be created. This ensures that both the inside and outside entities are communicating with each other. This process can also help to protect privacy. This authentication process is useful in ensuring that healthcare services are provided according to the invention.

“Accordingly, the object of this invention is to provide a secure method for an external entity to remotely control devices at any location.”

“It is another object in the present invention that an outside entity can resolve a situation at the location before dispatching emergency responders to the site.”

“It is another object in the present invention that an emergency response unit can fully observe an emergency situation prior to dispatching emergency responders to the site.”

“These and other objects are described in greater detail in detailed description, the attached drawings and the attached claims.”

“FIG. “FIG. Any location where the internal computer system 310 can be used to operate, monitor, or manipulate multiple components may be called Location 300. It could be a house, an office building or a moving object, such as a yacht, or automobile.

“The components of internal computer system 310 could include observation device 316, sensing apparatus 314, and emergency response device 318. One of many motion detectors that are commonly available on the market is sensing apparatus 314. Observation device 312, which may be either a common video camera or a more advanced surveillance camera, is a possible choice. Internal computer system 310 may activate emergency response device 318. This is a sprinkler system that can also be activated. Heating, ventilation, air conditioning, and telephone systems are just a few of the other components that can be linked to internal computer system 310.

“Through internal computer systems 310, all of the component system at location 300 are connected to one another so that they can work together. A first action of a component system can trigger a second system, which in turn activates another component system. This allows the second system to take a second action via internal computer system 310. One computer may constitute internal computer system 310. Internal computer system 310 could also be a network.

“Firewall 340 protects internal computer system 310 against unauthorized access from external entities. Firewall 340, for example, can protect internal computer system 390 from unwelcome access by 392 or 342. A communication link 342 could be a telephone, DSL, T1 or T3 line, as well as a B-ISDN, and other types of communications. Firewall 340 allows an internal computer system 310 user to access external network 370. It also prevents crackers, hackers, and others from accessing internal system 310 via external network 370. For example, external computer network 370 could be the Internet.

Firewall 340 may include a mixture of hardware and software. It is constructed using routers, servers and a variety software. Firewall 340 is customizable to meet your security needs. Firewall 340 can include a variety of elements, such as an internal screening router (sometimes called a “choker router”) that provides packet filtering. A bastion host, or proxy server, acts as a intermediary to maintain security and log all traffic between the internal computer system 310/external computer network 370. An exterior screening router is used to add an additional layer of protection in case the internal screening router fails.

Telephone 302 can be used to make POTS calls via PSTN106 to outside entities. This includes outside entity 390. An emergency response unit, such as PSAP108 of FIGS, may be outside entity 390. 1. and 2. An outside entity 390 could also be a private security company, such as private security company 214 of FIG. 2. Outside entity 390 can also be reached by wireless device 322 Wireless device 322 could be a wireless phone that can connect to outside entity 390 via wireless communication link 323 over base station 324 or mobile telephone switching office (MTSO 326).

“Database 38 is accessible by an outside entity 390. Database 380 may contain information not normally found in a 911 databank, such as FIG. 110. 1. and as described in our background section. Database 380 may include, for example, the street address of 300. Database 380 could also contain additional information, such as a profile for location 300 and the Internet Protocol (IP), address of internal computer system 311. Database 380 could also contain additional information about each component system. Database 380 may also contain information about the physical layout of each component system at location 300 and instructions for remote operation. Database 380 could also include medical profiles for residents at location 300.

Database 380 may also contain information about how an outside entity 390 might be authorized to access the internal computer system 310. Database 380 may contain information about how outside entity 390 might establish a secure tunnel through firewalls 340 and 342. Database 380, for example, can include identity information from outside entity 390. Identity information can be passwords, access codes, keys, and other types. It is preferred that the identity information be issued to an outside entity 390 via internal computer system 310. An identity certificate can also be issued digitally by certificate authority 360. An outside entity can use the identity information to bypass firewall 340 and access internal computer system 390. Database 380 can be improved with information about public key infrastructure (PKI) if desired. These capabilities can be added to the PKI:

Certificate authority 360 can issue and authenticate digital certificates that are associated with the PKI. An outside entity 390 or internal computer system 310 can request a digital certificate. To obtain a digital certificate, the user must provide their name and other identifying information. To verify its authenticity, the digital certificate can be digitally signed. The digital certificate can be stored on a computer’s hard drive or memory, and can also include a private key. The certificate can include the name of user, certificate authority 360 name, unique serial number, version number, expiration date, certificate’s expiration date, user’s public keys, digital signature 360 and user’s public keys. A standard can help define the format of the digital certificates. This standard could be the well-known X.509 standard.

“A communication session between an internal computer system 310, and an outside entity 390 can be established using external computer network370 and communication links 342 and 392. A multimedia session may be used to establish the communication session. Digital Communications Protocol (DCP), Transmission Control Protocol, (TCP) and Internet Protocol (IP) can be used together. The PKI described above can establish a secure tunnel through firewall 340 between the internal computer system 310, and the outside entity 390.

The creation of the secure tunnel can be initiated by either one or both the internal computer system 310 or the outside entity 390. The secured tunnel can also be established by the establishment of a POTS/VOIP session initiated and initiated by a caller who is associated with 300. The system of the invention can be modified so that the outside entity 390’s telephone number is dialed via wireless device 322 or telephone 302, and the dialing of this telephone number can be used to instruct internal computer system 310 to establish a communication session with 390. Outside entity 390 can initiate a communication session via communication link 342 with internal computer system 312. This is when the caller from location 300 contacts outside entity 390. From database 380, outside entity 390 can retrieve information about location 300. Outside entity 390 has the ability to control one or more component systems during the communication session (including observation device 314, sensing apparatus 314, and emergency response device 318). Firewall 340 can limit the scope of control.

“Preferred embodiments of this invention allow for control over the communication session to be given only to outside entity 390 after it has been established.” This means that only outside entities 390 and 310 can end a communication session once they have established a communication session.

“It is evident from the disclosure that the invention may have many embodiments. Below are three examples that demonstrate how the invention might be implemented. While the examples given here best illustrate the invention, an ordinary person of skill in the art will recognize that there are other possible embodiments. The system operation described in the flowcharts and diagrams is not intended to be limited in scope. However, the specific details can be used as examples of how the preferred embodiments may be implemented. Many other variations of the system operation, including different grouped or ordered method steps, are possible as would be obvious to someone with ordinary skill in art. The embodiments illustrated should not be considered the scope of the invention, but the appended claims and equivalents.

“FIG. “FIG. You can choose to have location 400 as a residence, office building, boat, automobile, or anywhere else that a LAN could be installed. LAN 410 may be identical to the internal computer system 310, as shown in FIG. 3. LAN 410 may include LAN server 430. This server can operate, monitor, control, and supervise all components that are connected to LAN 410. These components could include computer system 421, video and audio system 422, climate control system 424, fire alarm systems 425, 425, 426, 427, 427, 427, 428, and electrical system 427.

Computer system 421 can include one or more mainframe computers, desktop computers, laptop computers and any other peripherals such as printers, scanners and cameras. Video system 422, which may include television sets and video cassette recorders, can also be used as cameras. Stereos, compact disc players, intercoms are all examples of audio system 423. Climate control system 424 could include heating, ventilation and air conditioning units located at 400. These units may also be connected to sensors, thermostats and water heaters. Sprinkler systems and fire alarm system 425 could include, for instance, sprinkler systems or fire alarm units. Security system 426 could include motion detectors, surveillance cameras and glass-break sensors. The electrical system 427 is capable of operating all electrical equipment and appliances located at 400, including microwaves and baby monitors, refrigerators and photocopying machines. Telephone system 428 covers all CPE that communicates with PSTN106, including wireline and wireless telephones as well as facsimile machines.

“Through LAN Server 430, all component systems that are associated with LAN 410 have the ability to communicate with each other and share resources. Video system 422 may have common cameras with security system 426. Security system 426, telephone system 428 and PSTN 106 may also work together to report suspicious activity at location 400. Electrical system 427 and computer 421 can communicate with each other via PSTN 106 to allow remote control of electrical systems 427 or 421 by owners of locations 400 through external computer networks 370. Other systems may be controlled by LAN server 430, which is not shown in FIG. 4. As long as they are connected to LAN server 430, and part of LAN 410.

Firewall 440 can protect LAN server 430 from unauthorized access via communication link 442. The communication link 442 may be used to communicate with a DSL, T1 or T3 line, as well as a B-ISDN link. Firewall 440 could include one or more of the elements described above for firewall 342 in FIG. 3. An outside entity, such as an emergency response unit 490, can be required to provide identity data in order to pass firewall 440. Identity information could be a password, access code, key or key. A PSAP may be used by emergency response unit 490. Emergency response unit 490 can receive the identity information via LAN server 430.

“Preferably, identification information including a digital certificate that has been authenticated is required before an external entity can communicate with LAN server.430. To communicate with LAN server number 430, an emergency response unit 490 will need to provide its digital certificate that has been authenticated by certification authority 360. After certificate authority 360 authenticates emergency response unit 490’s digital certificate, a secured tunnel through firewall 44 may be established. Similarly, emergency respond unit 490 might need LAN server 430 in order to provide the digital certificate. Emergency response unit 490 could then operate any component system associated with LAN 410. The emergency response entity 490 can communicate via communication links 497 or 442 with LAN server 433. You can reach Certificate authority 360 via communication link 362 using an external computer network.

“Database480 could be very similar to database 380 from FIG. 3. This embodiment allows the owner of LAN 410 information to be supplied to database 480 by using any of several methods. The owner may provide the information via a POTS session using the telephone system 428 via PSTN106 over communication links 476 and 402. The owner may also be able to provide information about LAN 410 via a VoIP session using computer system 421 via an external computer network 370, communication links 472 or 478. Emergency response unit 490 can retrieve information about LAN 410 by using communication link 498. Emergency response entity 490 is able to communicate with the external computer network370 and PSTN106 via communication links 497 or 492. Any communication protocol may be used for communication over any of the communication links 442, 362, 478 and 497. One of the DCP or TCP protocols may be used, for example.

The system of the invention can be modified so that emergency response unit 490 can be contacted using either one or both of the telephone systems 421 or 428. Either LAN server 490 or emergency response system 490 can then initiate a communication session via communication link 442 via an external computer network. 370. The owner of LAN 410 can contact emergency response unit 490 to give permission for emergency response unit 490 to control one or more components of LAN 410. Firewall 440 can also be modified so that emergency response unit 490 has control over LAN 410 via a secure tunnel. Firewall 440 can be modified to give emergency response unit 490 access at different levels or provide security. One example is that emergency response unit 490 might have control over a single system component in LAN 410. Extremely, emergency response unit 490 could have unhindered and complete control over all components of LAN 410.

“FIG. “FIG.5” 5 shows the flowchart that illustrates the steps involved with the use of the preferred embodiment of this invention. As described above, LAN 410 may be established at 400 in step 502. LAN 410 may include LAN server 430, which is in communication to various components of LAN 410. These systems include computer system 421, video and audio system 422, climate control system 424 and fire alarm system 425. It also includes electrical system 427 and 428. Each component system may have one or more components or devices that can be used as emergency response devices, observation devices, or sensing apparatus. When a sensing device detects a trigger event, it can send LAN server 490 an alert. LAN 410 can make contact with emergency response unit 490 and request control of one or more devices that are part of LAN 410. An observation device allows emergency response unit 490 the ability to monitor and observe the situation at 400. A emergency response device can be used to allow emergency response unit 490 resolve the situation at 400. The functions of each sensing apparatus, observation device, and emergency response device can overlap.

“In step 504, firewall 440 is built to protect LAN 410. Firewall 440 can include one or more components, as described above. Different levels of security can be provided by firewall 440. In step 504, information can also be added to database 480 that is associated with emergency response unit 490. This information could be the same information that is in database 380, as mentioned above. The information could also include information about LAN 410 or its components, such as the IP address for LAN server 430. One of many methods can be used to populate database 480. The information can be sent to database 480 via computer system 421 or external computer network370. The information can also be provided via telephone system 428 via PSTN106. Database may receive identity information, such as passwords to firewall 440.

“In step 506, the owner or LAN 410 can decide how emergency response unit 490 may be authorized to access LAN 410 via a secure tunnel in firewall 440. It could be that emergency response unit 490 needs to provide a password or a digital cert authenticated by certificate authority 360 before they are granted access to LAN 410. It may also be agreed that emergency response unit 490 won’t be allowed access to LAN 410 unless one the components associated with LAN 410 has contacted 911 first.

“In step 508, a trigger event is detected at the location 400. One component system associated with LAN 410 may detect a suspicious movement as the triggering event. The triggering event can then be reported to emergency unit 490 in step 510 using any of the following methods. A telephone that is connected to telephone system 428 can be used for emergency response unit 490 via PSTN 106 during a POTS session. The triggering event can also be reported to emergency respond unit 490 by using a computer that’s associated with computer 421 via an external computer network 371 in a VoIP session. A wireless telephone can also be used to contact emergency respond unit 490. The preferred embodiment can notify LAN server 430 that emergency response unit 490 has been contacted regarding the triggering event.

“In step512, emergency response unit 490 receives a report about the triggering incident at location 400. Emergency response unit 490 then can consult database 480 in order to retrieve location 400 information. This information could include the password to access LAN 410 and the IP address of LAN Server 430 as well as information about the various components of LAN 410.

“In step 514 emergency response unit 490 may initiate a communication session to LAN 410. Because emergency response unit 490 is assigned the IP address for LAN server 430, it can initiate the communication session. Step 516 at firewall 440 can require emergency response unit 490 to provide proper authority. Emergency response unit 490 might be required to give the password. Alternately, emergency response unit 490 might be required to provide a digital certificate authenticated through certificate authority 360 before it can access LAN 410.

“In step 518, after the identity of emergency respond unit 490 has been verified by firewall 440 using either the password or digital certificate, a secure tunnel through firewall 44 can be established. One of the many communication protocols that can be used to establish a communication session between emergency respond unit 490 (or LAN server 433) is DCP or TCP. It is preferable that emergency response unit 490 has complete control over the communication session.

“In step520, emergency respond unit 490 can monitor the situation at place 400. Emergency response unit 490 can use information retrieved form database 480 to determine which system or components can be used to monitor the situation.

In step 522, emergency unit 490 could use one or more components of LAN 410 to address the emergency. Emergency response unit 490 might use a camera to identify a suspect person if they are able to see them moving around in location 400. Emergency response unit 490 can use a loudspeaker controlled via LAN server 430 in order to request that the person leave location 400. If necessary, emergency response unit 490 may dispatch police officers to the location 400.

“In step 524 the communication session can be ended when an emergency situation has been resolved. The communication session can be terminated if the emergency situation is resolved. Once the communication session has ended, the secured tunnel will be closed. This closes emergency response unit 490’s access at LAN 410. The LAN server 430 should have a display to indicate whether the communication session remains active. Emergency response unit 490 must complete steps 514-516 if a second triggering event occurs before it can connect with LAN 410.

“FIG. “FIG. 6” is a schematic diagram that illustrates the system architecture of the second preferred embodiment. This embodiment may refer to a location 600 that is an office building for a business entity, a residence or a yacht or any other location where an internal computer system may be installed. CPE 602, telephone number 604, internal computer system610, firewall 642, communication link 642, sensing device 614, observation device 616 and emergency response device 618 all look similar to the elements in FIG. 3. and are described above.

“Sensing device 614 can detect a trigger event at 600. The observation device 616 can be used for monitoring the situation at 600. The emergency response device 618 may be used to address the situation. Each of the sensing apparatus 614 and observation device 616 can be chosen from various components of video and audio system 422, climate control system 424 and fire alarm system 425. 4. Sensing apparatus 614 could be a thermostat that is part of climate control system 424. Observation device 616 might be a video camera that is part of video system 422. Emergency response device 618 could be a sprinkler system that is part or all of fire alarm system 425.

“Internal computer systems 610 are in communication with CPE602, sensing apparatus 614 and observation device 616 and emergency response device 618. Firewall 640 protects the internal computer system 610. This firewall can be used in conjunction with firewalls 340 or 440.

“When sensing apparatus 614 detects a triggering event (e.g., temperature at 600 has increased above a threshold), internal computer system610 can report the event to private security company 614. Private security firm 614 can make a report via telephone line 604 or PSTN 106. Private security firm 614 can be reached via telephone line 604. Private security firm 614 may control one or more devices that are part of internal computer system610 through the communication session. The communication session should be managed by private security firm 614. Private security company 614 can preferably retrieve information about the devices from database 680. PSAP 108, which has access to the database 110, can also be used by private security firm 614.

“FIG. “FIG. 7” is a flowchart that illustrates the steps involved with the use of the second preferred embodiment. The sensing apparatus 614 detects a trigger event in step 702. A temperature that is higher than the threshold associated with 600 could be the triggering event. A triggering event can also include noise at a particular intensity or motion at a specific time of the day.

“In step 704, private Security firm 614 is contacted in order to report the triggering incident. Contact can be made manually by calling the private security company 614 using CPE 602. The contact can be made with an internal computer system 610, or it may be done manually. Private security company 614 can also be reached via e-mail. Private security company 614 may have an IP adress to which an internal computer system 610 may send a report on the triggering event. Step 704 may not be necessary in one embodiment.

“In step 706, an internal computer system610 and private security company 614 can establish a communication session. The internal computer system 610 may place a priority QoS (quality-of-service) call to private security company 614. Establishing the communication session can be done via communication links 642 or 692 via an external computer network370. Digital certificates can be exchanged between the internal computer system 610 or private security firm 614 during the communication session. In step 708 certificate authority 360 can authenticate the identity of the parties.

“In step 710 after both parties have verified their identities through the authentication process private security firm 614 can use observation device 616 to observe the situation at 600. Private security firm 614 can use information from database 680 to operate the observation device 616 and monitor the situation at 600. Private security firm 614 might observe that the first person fainted in the kitchen. Private security company 614 might also notice that another person is watching a movie from a bedroom and not knowing the condition of the first.

Private security firm 614 may assess whether the situation can be resolved on its own in step 712. Private security firm 614 can determine if it is able to resolve the situation on its own using step 714. Private security firm 614 might use an emergency response device 618 to alert the second person in their bedroom that the first person fainted in their kitchen. Private security company 614 could use another emergency response device, such as a sprinkler in a kitchen, to wake the first person. You can modify the method so that the situation can be resolved in step 714. After the situation at 600 is resolved, the communication session can be ended by the private security company 614 in step 716.

Private security company 614 may contact a third party if it is unable to resolve the situation by itself. A third party could be an emergency response team, such as the 490 described above. The communication session can then be transferred to the third person in step 720.

“FIG. “FIG. 8” is a schematic diagram that illustrates the system architecture for a third preferred embodiment. The third preferred embodiment of the invention can be modified to work with Bluetooth-enabled technologies and devices. Bluetooth Protocol Architecture Version 1.0 (Aug. 25, 2000) contains information about Bluetooth technology. This document is hereby included by reference in its entirety.

Patient 800 may be someone with a chronic medical condition. Vital sign monitor 814 can be used to measure the pulse, blood pressure and blood oxygen saturation levels of patient 800. It is best that patient 800 wears it at all times. The vital sign monitor 814 can also be used to communicate with the healthcare computer 810. Healthcare computer 810 should be a portable, small-sized computer that is Bluetooth compatible. Firewall 840 can also be made using a combination hardware and software, as explained above. Firewall 840 can also be used in healthcare computer 810. Firewall 840 protects the healthcare computer 810 against unauthorized access. An electronic certificate issued to the healthcare computer 810 may be saved in the memory of the healthcare computer 810.

“In addition to the vital sign monitor 814 healthcare computer 810 may be linked with other components such as pacemaker 818 and video camera 816. The location where patient 800 spends the majority of their time may be where video camera 816 is installed. Video camera 816 could be installed, for example, in patient 800’s bedroom. As one skilled in this art knows, pacemaker 818 can be surgically implanted within patient 800’s body. It is also possible to have a pacemaker 818, video camera 816 and vital sign monitor 814 Bluetooth-enabled.

“When the vital sign monitor 814 detects an event that is triggering, it can notify healthcare computer 810. A triggering event could occur when patient 800’s pulse drops below a threshold or when their body temperature rises beyond a predetermined limit. The healthcare computer 810 can then communicate with 890 healthcare providers using wireless device 822. When the trigger event is detected, wireless device 822 can be used to contact healthcare provider 890. Wireless device 822 could be used to notify 890 healthcare providers about the conditions of patient 800. Another embodiment of wireless device 822 can communicate with 810 via Bluetooth. A person may observe that 800 patients require help and contact 890 healthcare provider using wireless device 822. This can also be a regular wireless phone. Wireless device 822 is able to communicate with healthcare provider 890 via communication link 823, basestation 324 and PSTN 106.

“Healthcare provider 890 should have information about patient 800. It is recommended that the information be stored in database 880 which can be accessed by healthcare provider 890. This information could include the patient’s medical history and any information related to healthcare computer 810. A digital certificate that was issued to 890 healthcare provider may be included in the information. This would allow 890 healthcare provider to pass through firewall 840 during a communication session. Healthcare provider 890 may operate components that are associated with healthcare computer 801 through an external computer network 370. Database 880 should have PKI information to allow access to 880. Healthcare provider 890, for example, can control pacemaker 818 in a communication session using communication links 892 or 842. Accessible via communication link 362, certificate authority 360 can provide authentication services for healthcare provider 890 or patient 800 in order to ensure that communication between healthcare provider890 and healthcare computer810 is secure.

“FIG. “FIG. 9” is a flowchart that illustrates the steps involved with the third preferred embodiment. Step 902 can be used to set up the healthcare computer 810 with its associated devices as described above. Database 880 is given information about patient 800 in step 904. This information could include the patient’s medical records and instructions for operating the various components of healthcare computer 810. The database 880 can also contain information about how to secure tunnel through firewall 840.

“In step 906, if a triggering incident occurs, vital sign monitor 804 can detect it. The wireless device 822 can be used to contact 890 healthcare provider. Step 910 allows healthcare provider 890 to consult the database 880 in order to find information about patient 800. Step 912 allows healthcare provider 890 to initiate a communication session via an external computer network 370 with healthcare computer 810.

“In step 914 healthcare provider 890 can exchange digital certificates with healthcare computer 810. The digital certificates can be authenticated in step 916. Certificate authority 360 can authenticate digital certificates. This authentication ensures that 890 healthcare providers are treating the correct patient, and 800 patients are being treated by their healthcare providers.

“If the digital certificates in step 916 are not authenticated, then the process is over and the healthcare provider 890 is denied access the healthcare computer 810. If both digital certificates have been authenticated in step 916, then a communication session is established between healthcare provider 890 (or 810) in step 918. It is recommended that the communication session be secured through firewall 840. Step 920 allows healthcare provider 890 to observe the patient’s condition 810. One or more of the vital sign monitors 814 and 816 can be used to observe the patient’s condition. Step 922 allows healthcare provider to control an emergency response device such as pacemaker 816 to improve patient 800’s medical condition. When healthcare provider 890 is satisfied that patient 800 is in good health, the communication session ends at step 924. Healthcare provider 890 has the final say in the termination of the communication session.

“The disclosures of embodiments and examples of the present invention have been made for illustration and description purposes only. This disclosure is not meant to be exhaustive nor to limit the invention’s potential forms. A person of ordinary skill in art will recognize many variations and modifications to the embodiments described in this disclosure. The claims and their equivalents are the only way to define the scope of the invention.

Summary for “System and Method for Controlling Devices at a Location”

“1. “1.

“The invention is related to telecommunication systems and, in particular, to a method and system for controlling devices at a specific location.”

“2. “2.

“Emergency telephone service is used around the globe to receive emergency calls. The United States has a 911 emergency number that is routed to a PSAP (public safety answering point) which dispatches emergency responders. Paramedics, firefighters, and police officers can all be emergency response professionals. The PSAP receives critical information from the caller, including the location, type, and whether there is anyone in imminent danger.

“FIG. “FIG. A 911 service is initiated by a caller at 100 using telephone 102 and telephone line 104 to dial number string?911. Public switched telephone network (PSTN), 106 to PSAP 108 automatically routes the 911 call. This is typically operated by emergency responders such as police, fire and other law enforcement officers. The voice session between the caller (or PSAP 108) and PSAP 108 is called a POTS (plain-old telephone service).

“Unlike regular telephone connections in which both the caller and the calling party have control over the connection,” 911 calls are controlled by the caller, in this instance PSAP 108. After establishing the POTS session, the 911 caller cannot end the session. After the call has been established, PSAP 108 cannot terminate the call. This is usually after the emergency has been properly resolved. This unique feature is essential to ensure that POTS sessions are preserved even if the caller accidentally disconnects telephone 102 but picks up telephone 022 later, until the emergency is resolved.

“Another advantage of emergency telephone services is their ability to identify the location of the caller, i.e. location 100. The telephone service provider, or PSAP 108, can keep a 911 database for wireline telephones. For example, database 110 catalogs the street address of every telephone line within the area where PSAP 108 is responsible. FIG. Referring to FIG. Telephone line 104 was used to initiate the call. The telephone number of telephone line104 corresponds to the street address 100 in database 110. Database 110 is sometimes referred to as “the 911 database”. Multiple methods for locating the calling party are available to 911 calls made by wireless telephones in accordance the Federal Communications Commission’s Enhanced 911 mandate (FCC).

The emergency telephone services currently known are limited to voice communications, such as the POTS session mentioned above. Multimedia communication sessions (including data sessions) will become more common in the future. Multimedia communication sessions can be established by using integrated voice, video, and data services, such as those offered with digital subscriber lines (DSL), broadband-integrated services digital networks (BISDN) and others. An individual could have a multimedia-capable computer system in his or her home. home. An internal computer system could be a local area networking (LAN) with a variety of components. The internal computer system is capable of communicating with external entities. An external computer network may allow communication between the internal and outside entities. An external computer network could be, for instance, the Internet.

Although the internal computer can communicate with outside entities via PSTN 106, it may not be fully integrated to PSTN 106. If a caller makes a 911 call over the voice-over Internet protocol (VoIP), PSAP 108 may not be able to communicate with them. In other words, PSAP 108 cannot control the call. PSAP 108 has no exclusive control over the VoIP communication session. The caller could lose communication with PSAP 108 before PSAP 108 can properly assess the situation. The subscriber cannot access emergency telephone services if he calls PSAP108 with a non-POTS device.

“FIG. “FIG. Location 200 could be a private residence, or a commercial building. Location 200 is equipped with telephone 202, which is connected to telephone line 204. The security system 212 is installed in 200. This system may also be known as the burglary alarm or simply a security system.

“Security system 212 may contain, for example, one or several sensing devices such as a glass-break sensor or motion detector. Security system 212 can call PSTN 106 to contact private security company 214 when one of its sensing devices is activated. Private security company 214 would then try to determine if the triggering event warrants an emergency response team dispatch. Private security firm 214 may call location 200 to verify if the triggering event is a false alarm, minor accident, or other non-life-threatening situation.

Private security company 214 cannot confirm that the triggering incident is not life-threatening. Instead, it calls PSAP108 to report the emergency. However, most of the time, calling PSAP 108 to report an emergency is unnecessary. One example is that a sensing device might have been accidentally activated. It is possible, for example, that loud thunder can cause a glass break sensor to go off. This could result in the police being dispatched to 200 unnecessarily and wasting resources.

“Technologies that are part of the existing 911 service or private security system as it exists today are sufficient to receive emergency calls. However, these technologies have some flaws. As mentioned above, VoIP calls do not have the same protection level as POTS calls. PSAP 108 has no means to assess, monitor, resolve, or handle an emergency situation. This is in addition to receiving second-hand information from the caller. Third, equipment and emergency personnel often arrive at the emergency scene without knowing which emergency response equipment is needed. Fourth, emergency response personnel and equipment often go to places that can be resolved by themselves. Fifth, private security companies cannot properly prescreen and verify emergency situations reported before dispatching the police or another emergency response team to that scene.

“The invention is a system for controlling one or more devices that are associated with a specific location by an external entity. An outside entity could be an emergency response unit or private security firm. A healthcare provider may also be considered as the outside entity. A location could be a building, a vehicle or a person. One or more of the devices could include a camera, sprinkler system, or pacemaker surgically placed on someone. One embodiment of the invention’s system architecture includes an internal computer system that allows remote control of the device. The internal computer system could be a LAN. An internal computer system could also be Bluetooth-enabled.

“When an outside entity requests to control the device, a multimedia communication channel is established between the internal computer system of the outside entity and the external computer network. Preferably, the Internet is the external computer network. A caller to the outside entity can request it using any of several methods. These include VoIP phone calls and POTS. One of many communication protocols can be used to establish a communication session between the internal and external computers. The digital communications protocol (DCP), and the transmission control protocol(TCP) are suitable communication protocols.

“In a preferred embodiment, an internal computer system is protected with a firewall. If the outside entity has the right identity information, the firewall will allow them to access the internal system to control it. The firewall may recognize the identity information of an outside entity as a password. The preferred embodiment of the identity information is a digital certification issued by a certificate authority to the outside entity. Before an outside entity can access the internal computer systems, the digital certificate must be authenticated by the certificate agency.

“When an outside entity creates a secure tunnel through the firewall to allow access to the internal computer systems, that outside entity can also control the device associated with the internal system. An outside entity can use this device to monitor the situation at the site. If necessary, the outside entity can use the device to solve the problem. Once the situation has been resolved, communication between the internal computer system (and the external computer network) is ended.

“In a preferred embodiment, an outside entity retains complete control of the communication session once it is established. The communication session can only be ended by the outside entity. This allows the outside entity to solve the problem without the interference of any other parties or the internal computer system.

“In a preferred embodiment each computer system is issued a digital certification by a certificate authority. The certificate authority must verify the digital certificates before the secure tunnel through firewall can be created. This ensures that both the inside and outside entities are communicating with each other. This process can also help to protect privacy. This authentication process is useful in ensuring that healthcare services are provided according to the invention.

“Accordingly, the object of this invention is to provide a secure method for an external entity to remotely control devices at any location.”

“It is another object in the present invention that an outside entity can resolve a situation at the location before dispatching emergency responders to the site.”

“It is another object in the present invention that an emergency response unit can fully observe an emergency situation prior to dispatching emergency responders to the site.”

“These and other objects are described in greater detail in detailed description, the attached drawings and the attached claims.”

“FIG. “FIG. Any location where the internal computer system 310 can be used to operate, monitor, or manipulate multiple components may be called Location 300. It could be a house, an office building or a moving object, such as a yacht, or automobile.

“The components of internal computer system 310 could include observation device 316, sensing apparatus 314, and emergency response device 318. One of many motion detectors that are commonly available on the market is sensing apparatus 314. Observation device 312, which may be either a common video camera or a more advanced surveillance camera, is a possible choice. Internal computer system 310 may activate emergency response device 318. This is a sprinkler system that can also be activated. Heating, ventilation, air conditioning, and telephone systems are just a few of the other components that can be linked to internal computer system 310.

“Through internal computer systems 310, all of the component system at location 300 are connected to one another so that they can work together. A first action of a component system can trigger a second system, which in turn activates another component system. This allows the second system to take a second action via internal computer system 310. One computer may constitute internal computer system 310. Internal computer system 310 could also be a network.

“Firewall 340 protects internal computer system 310 against unauthorized access from external entities. Firewall 340, for example, can protect internal computer system 390 from unwelcome access by 392 or 342. A communication link 342 could be a telephone, DSL, T1 or T3 line, as well as a B-ISDN, and other types of communications. Firewall 340 allows an internal computer system 310 user to access external network 370. It also prevents crackers, hackers, and others from accessing internal system 310 via external network 370. For example, external computer network 370 could be the Internet.

Firewall 340 may include a mixture of hardware and software. It is constructed using routers, servers and a variety software. Firewall 340 is customizable to meet your security needs. Firewall 340 can include a variety of elements, such as an internal screening router (sometimes called a “choker router”) that provides packet filtering. A bastion host, or proxy server, acts as a intermediary to maintain security and log all traffic between the internal computer system 310/external computer network 370. An exterior screening router is used to add an additional layer of protection in case the internal screening router fails.

Telephone 302 can be used to make POTS calls via PSTN106 to outside entities. This includes outside entity 390. An emergency response unit, such as PSAP108 of FIGS, may be outside entity 390. 1. and 2. An outside entity 390 could also be a private security company, such as private security company 214 of FIG. 2. Outside entity 390 can also be reached by wireless device 322 Wireless device 322 could be a wireless phone that can connect to outside entity 390 via wireless communication link 323 over base station 324 or mobile telephone switching office (MTSO 326).

“Database 38 is accessible by an outside entity 390. Database 380 may contain information not normally found in a 911 databank, such as FIG. 110. 1. and as described in our background section. Database 380 may include, for example, the street address of 300. Database 380 could also contain additional information, such as a profile for location 300 and the Internet Protocol (IP), address of internal computer system 311. Database 380 could also contain additional information about each component system. Database 380 may also contain information about the physical layout of each component system at location 300 and instructions for remote operation. Database 380 could also include medical profiles for residents at location 300.

Database 380 may also contain information about how an outside entity 390 might be authorized to access the internal computer system 310. Database 380 may contain information about how outside entity 390 might establish a secure tunnel through firewalls 340 and 342. Database 380, for example, can include identity information from outside entity 390. Identity information can be passwords, access codes, keys, and other types. It is preferred that the identity information be issued to an outside entity 390 via internal computer system 310. An identity certificate can also be issued digitally by certificate authority 360. An outside entity can use the identity information to bypass firewall 340 and access internal computer system 390. Database 380 can be improved with information about public key infrastructure (PKI) if desired. These capabilities can be added to the PKI:

Certificate authority 360 can issue and authenticate digital certificates that are associated with the PKI. An outside entity 390 or internal computer system 310 can request a digital certificate. To obtain a digital certificate, the user must provide their name and other identifying information. To verify its authenticity, the digital certificate can be digitally signed. The digital certificate can be stored on a computer’s hard drive or memory, and can also include a private key. The certificate can include the name of user, certificate authority 360 name, unique serial number, version number, expiration date, certificate’s expiration date, user’s public keys, digital signature 360 and user’s public keys. A standard can help define the format of the digital certificates. This standard could be the well-known X.509 standard.

“A communication session between an internal computer system 310, and an outside entity 390 can be established using external computer network370 and communication links 342 and 392. A multimedia session may be used to establish the communication session. Digital Communications Protocol (DCP), Transmission Control Protocol, (TCP) and Internet Protocol (IP) can be used together. The PKI described above can establish a secure tunnel through firewall 340 between the internal computer system 310, and the outside entity 390.

The creation of the secure tunnel can be initiated by either one or both the internal computer system 310 or the outside entity 390. The secured tunnel can also be established by the establishment of a POTS/VOIP session initiated and initiated by a caller who is associated with 300. The system of the invention can be modified so that the outside entity 390’s telephone number is dialed via wireless device 322 or telephone 302, and the dialing of this telephone number can be used to instruct internal computer system 310 to establish a communication session with 390. Outside entity 390 can initiate a communication session via communication link 342 with internal computer system 312. This is when the caller from location 300 contacts outside entity 390. From database 380, outside entity 390 can retrieve information about location 300. Outside entity 390 has the ability to control one or more component systems during the communication session (including observation device 314, sensing apparatus 314, and emergency response device 318). Firewall 340 can limit the scope of control.

“Preferred embodiments of this invention allow for control over the communication session to be given only to outside entity 390 after it has been established.” This means that only outside entities 390 and 310 can end a communication session once they have established a communication session.

“It is evident from the disclosure that the invention may have many embodiments. Below are three examples that demonstrate how the invention might be implemented. While the examples given here best illustrate the invention, an ordinary person of skill in the art will recognize that there are other possible embodiments. The system operation described in the flowcharts and diagrams is not intended to be limited in scope. However, the specific details can be used as examples of how the preferred embodiments may be implemented. Many other variations of the system operation, including different grouped or ordered method steps, are possible as would be obvious to someone with ordinary skill in art. The embodiments illustrated should not be considered the scope of the invention, but the appended claims and equivalents.

“FIG. “FIG. You can choose to have location 400 as a residence, office building, boat, automobile, or anywhere else that a LAN could be installed. LAN 410 may be identical to the internal computer system 310, as shown in FIG. 3. LAN 410 may include LAN server 430. This server can operate, monitor, control, and supervise all components that are connected to LAN 410. These components could include computer system 421, video and audio system 422, climate control system 424, fire alarm systems 425, 425, 426, 427, 427, 427, 428, and electrical system 427.

Computer system 421 can include one or more mainframe computers, desktop computers, laptop computers and any other peripherals such as printers, scanners and cameras. Video system 422, which may include television sets and video cassette recorders, can also be used as cameras. Stereos, compact disc players, intercoms are all examples of audio system 423. Climate control system 424 could include heating, ventilation and air conditioning units located at 400. These units may also be connected to sensors, thermostats and water heaters. Sprinkler systems and fire alarm system 425 could include, for instance, sprinkler systems or fire alarm units. Security system 426 could include motion detectors, surveillance cameras and glass-break sensors. The electrical system 427 is capable of operating all electrical equipment and appliances located at 400, including microwaves and baby monitors, refrigerators and photocopying machines. Telephone system 428 covers all CPE that communicates with PSTN106, including wireline and wireless telephones as well as facsimile machines.

“Through LAN Server 430, all component systems that are associated with LAN 410 have the ability to communicate with each other and share resources. Video system 422 may have common cameras with security system 426. Security system 426, telephone system 428 and PSTN 106 may also work together to report suspicious activity at location 400. Electrical system 427 and computer 421 can communicate with each other via PSTN 106 to allow remote control of electrical systems 427 or 421 by owners of locations 400 through external computer networks 370. Other systems may be controlled by LAN server 430, which is not shown in FIG. 4. As long as they are connected to LAN server 430, and part of LAN 410.

Firewall 440 can protect LAN server 430 from unauthorized access via communication link 442. The communication link 442 may be used to communicate with a DSL, T1 or T3 line, as well as a B-ISDN link. Firewall 440 could include one or more of the elements described above for firewall 342 in FIG. 3. An outside entity, such as an emergency response unit 490, can be required to provide identity data in order to pass firewall 440. Identity information could be a password, access code, key or key. A PSAP may be used by emergency response unit 490. Emergency response unit 490 can receive the identity information via LAN server 430.

“Preferably, identification information including a digital certificate that has been authenticated is required before an external entity can communicate with LAN server.430. To communicate with LAN server number 430, an emergency response unit 490 will need to provide its digital certificate that has been authenticated by certification authority 360. After certificate authority 360 authenticates emergency response unit 490’s digital certificate, a secured tunnel through firewall 44 may be established. Similarly, emergency respond unit 490 might need LAN server 430 in order to provide the digital certificate. Emergency response unit 490 could then operate any component system associated with LAN 410. The emergency response entity 490 can communicate via communication links 497 or 442 with LAN server 433. You can reach Certificate authority 360 via communication link 362 using an external computer network.

“Database480 could be very similar to database 380 from FIG. 3. This embodiment allows the owner of LAN 410 information to be supplied to database 480 by using any of several methods. The owner may provide the information via a POTS session using the telephone system 428 via PSTN106 over communication links 476 and 402. The owner may also be able to provide information about LAN 410 via a VoIP session using computer system 421 via an external computer network 370, communication links 472 or 478. Emergency response unit 490 can retrieve information about LAN 410 by using communication link 498. Emergency response entity 490 is able to communicate with the external computer network370 and PSTN106 via communication links 497 or 492. Any communication protocol may be used for communication over any of the communication links 442, 362, 478 and 497. One of the DCP or TCP protocols may be used, for example.

The system of the invention can be modified so that emergency response unit 490 can be contacted using either one or both of the telephone systems 421 or 428. Either LAN server 490 or emergency response system 490 can then initiate a communication session via communication link 442 via an external computer network. 370. The owner of LAN 410 can contact emergency response unit 490 to give permission for emergency response unit 490 to control one or more components of LAN 410. Firewall 440 can also be modified so that emergency response unit 490 has control over LAN 410 via a secure tunnel. Firewall 440 can be modified to give emergency response unit 490 access at different levels or provide security. One example is that emergency response unit 490 might have control over a single system component in LAN 410. Extremely, emergency response unit 490 could have unhindered and complete control over all components of LAN 410.

“FIG. “FIG.5” 5 shows the flowchart that illustrates the steps involved with the use of the preferred embodiment of this invention. As described above, LAN 410 may be established at 400 in step 502. LAN 410 may include LAN server 430, which is in communication to various components of LAN 410. These systems include computer system 421, video and audio system 422, climate control system 424 and fire alarm system 425. It also includes electrical system 427 and 428. Each component system may have one or more components or devices that can be used as emergency response devices, observation devices, or sensing apparatus. When a sensing device detects a trigger event, it can send LAN server 490 an alert. LAN 410 can make contact with emergency response unit 490 and request control of one or more devices that are part of LAN 410. An observation device allows emergency response unit 490 the ability to monitor and observe the situation at 400. A emergency response device can be used to allow emergency response unit 490 resolve the situation at 400. The functions of each sensing apparatus, observation device, and emergency response device can overlap.

“In step 504, firewall 440 is built to protect LAN 410. Firewall 440 can include one or more components, as described above. Different levels of security can be provided by firewall 440. In step 504, information can also be added to database 480 that is associated with emergency response unit 490. This information could be the same information that is in database 380, as mentioned above. The information could also include information about LAN 410 or its components, such as the IP address for LAN server 430. One of many methods can be used to populate database 480. The information can be sent to database 480 via computer system 421 or external computer network370. The information can also be provided via telephone system 428 via PSTN106. Database may receive identity information, such as passwords to firewall 440.

“In step 506, the owner or LAN 410 can decide how emergency response unit 490 may be authorized to access LAN 410 via a secure tunnel in firewall 440. It could be that emergency response unit 490 needs to provide a password or a digital cert authenticated by certificate authority 360 before they are granted access to LAN 410. It may also be agreed that emergency response unit 490 won’t be allowed access to LAN 410 unless one the components associated with LAN 410 has contacted 911 first.

“In step 508, a trigger event is detected at the location 400. One component system associated with LAN 410 may detect a suspicious movement as the triggering event. The triggering event can then be reported to emergency unit 490 in step 510 using any of the following methods. A telephone that is connected to telephone system 428 can be used for emergency response unit 490 via PSTN 106 during a POTS session. The triggering event can also be reported to emergency respond unit 490 by using a computer that’s associated with computer 421 via an external computer network 371 in a VoIP session. A wireless telephone can also be used to contact emergency respond unit 490. The preferred embodiment can notify LAN server 430 that emergency response unit 490 has been contacted regarding the triggering event.

“In step512, emergency response unit 490 receives a report about the triggering incident at location 400. Emergency response unit 490 then can consult database 480 in order to retrieve location 400 information. This information could include the password to access LAN 410 and the IP address of LAN Server 430 as well as information about the various components of LAN 410.

“In step 514 emergency response unit 490 may initiate a communication session to LAN 410. Because emergency response unit 490 is assigned the IP address for LAN server 430, it can initiate the communication session. Step 516 at firewall 440 can require emergency response unit 490 to provide proper authority. Emergency response unit 490 might be required to give the password. Alternately, emergency response unit 490 might be required to provide a digital certificate authenticated through certificate authority 360 before it can access LAN 410.

“In step 518, after the identity of emergency respond unit 490 has been verified by firewall 440 using either the password or digital certificate, a secure tunnel through firewall 44 can be established. One of the many communication protocols that can be used to establish a communication session between emergency respond unit 490 (or LAN server 433) is DCP or TCP. It is preferable that emergency response unit 490 has complete control over the communication session.

“In step520, emergency respond unit 490 can monitor the situation at place 400. Emergency response unit 490 can use information retrieved form database 480 to determine which system or components can be used to monitor the situation.

In step 522, emergency unit 490 could use one or more components of LAN 410 to address the emergency. Emergency response unit 490 might use a camera to identify a suspect person if they are able to see them moving around in location 400. Emergency response unit 490 can use a loudspeaker controlled via LAN server 430 in order to request that the person leave location 400. If necessary, emergency response unit 490 may dispatch police officers to the location 400.

“In step 524 the communication session can be ended when an emergency situation has been resolved. The communication session can be terminated if the emergency situation is resolved. Once the communication session has ended, the secured tunnel will be closed. This closes emergency response unit 490’s access at LAN 410. The LAN server 430 should have a display to indicate whether the communication session remains active. Emergency response unit 490 must complete steps 514-516 if a second triggering event occurs before it can connect with LAN 410.

“FIG. “FIG. 6” is a schematic diagram that illustrates the system architecture of the second preferred embodiment. This embodiment may refer to a location 600 that is an office building for a business entity, a residence or a yacht or any other location where an internal computer system may be installed. CPE 602, telephone number 604, internal computer system610, firewall 642, communication link 642, sensing device 614, observation device 616 and emergency response device 618 all look similar to the elements in FIG. 3. and are described above.

“Sensing device 614 can detect a trigger event at 600. The observation device 616 can be used for monitoring the situation at 600. The emergency response device 618 may be used to address the situation. Each of the sensing apparatus 614 and observation device 616 can be chosen from various components of video and audio system 422, climate control system 424 and fire alarm system 425. 4. Sensing apparatus 614 could be a thermostat that is part of climate control system 424. Observation device 616 might be a video camera that is part of video system 422. Emergency response device 618 could be a sprinkler system that is part or all of fire alarm system 425.

“Internal computer systems 610 are in communication with CPE602, sensing apparatus 614 and observation device 616 and emergency response device 618. Firewall 640 protects the internal computer system 610. This firewall can be used in conjunction with firewalls 340 or 440.

“When sensing apparatus 614 detects a triggering event (e.g., temperature at 600 has increased above a threshold), internal computer system610 can report the event to private security company 614. Private security firm 614 can make a report via telephone line 604 or PSTN 106. Private security firm 614 can be reached via telephone line 604. Private security firm 614 may control one or more devices that are part of internal computer system610 through the communication session. The communication session should be managed by private security firm 614. Private security company 614 can preferably retrieve information about the devices from database 680. PSAP 108, which has access to the database 110, can also be used by private security firm 614.

“FIG. “FIG. 7” is a flowchart that illustrates the steps involved with the use of the second preferred embodiment. The sensing apparatus 614 detects a trigger event in step 702. A temperature that is higher than the threshold associated with 600 could be the triggering event. A triggering event can also include noise at a particular intensity or motion at a specific time of the day.

“In step 704, private Security firm 614 is contacted in order to report the triggering incident. Contact can be made manually by calling the private security company 614 using CPE 602. The contact can be made with an internal computer system 610, or it may be done manually. Private security company 614 can also be reached via e-mail. Private security company 614 may have an IP adress to which an internal computer system 610 may send a report on the triggering event. Step 704 may not be necessary in one embodiment.

“In step 706, an internal computer system610 and private security company 614 can establish a communication session. The internal computer system 610 may place a priority QoS (quality-of-service) call to private security company 614. Establishing the communication session can be done via communication links 642 or 692 via an external computer network370. Digital certificates can be exchanged between the internal computer system 610 or private security firm 614 during the communication session. In step 708 certificate authority 360 can authenticate the identity of the parties.

“In step 710 after both parties have verified their identities through the authentication process private security firm 614 can use observation device 616 to observe the situation at 600. Private security firm 614 can use information from database 680 to operate the observation device 616 and monitor the situation at 600. Private security firm 614 might observe that the first person fainted in the kitchen. Private security company 614 might also notice that another person is watching a movie from a bedroom and not knowing the condition of the first.

Private security firm 614 may assess whether the situation can be resolved on its own in step 712. Private security firm 614 can determine if it is able to resolve the situation on its own using step 714. Private security firm 614 might use an emergency response device 618 to alert the second person in their bedroom that the first person fainted in their kitchen. Private security company 614 could use another emergency response device, such as a sprinkler in a kitchen, to wake the first person. You can modify the method so that the situation can be resolved in step 714. After the situation at 600 is resolved, the communication session can be ended by the private security company 614 in step 716.

Private security company 614 may contact a third party if it is unable to resolve the situation by itself. A third party could be an emergency response team, such as the 490 described above. The communication session can then be transferred to the third person in step 720.

“FIG. “FIG. 8” is a schematic diagram that illustrates the system architecture for a third preferred embodiment. The third preferred embodiment of the invention can be modified to work with Bluetooth-enabled technologies and devices. Bluetooth Protocol Architecture Version 1.0 (Aug. 25, 2000) contains information about Bluetooth technology. This document is hereby included by reference in its entirety.

Patient 800 may be someone with a chronic medical condition. Vital sign monitor 814 can be used to measure the pulse, blood pressure and blood oxygen saturation levels of patient 800. It is best that patient 800 wears it at all times. The vital sign monitor 814 can also be used to communicate with the healthcare computer 810. Healthcare computer 810 should be a portable, small-sized computer that is Bluetooth compatible. Firewall 840 can also be made using a combination hardware and software, as explained above. Firewall 840 can also be used in healthcare computer 810. Firewall 840 protects the healthcare computer 810 against unauthorized access. An electronic certificate issued to the healthcare computer 810 may be saved in the memory of the healthcare computer 810.

“In addition to the vital sign monitor 814 healthcare computer 810 may be linked with other components such as pacemaker 818 and video camera 816. The location where patient 800 spends the majority of their time may be where video camera 816 is installed. Video camera 816 could be installed, for example, in patient 800’s bedroom. As one skilled in this art knows, pacemaker 818 can be surgically implanted within patient 800’s body. It is also possible to have a pacemaker 818, video camera 816 and vital sign monitor 814 Bluetooth-enabled.

“When the vital sign monitor 814 detects an event that is triggering, it can notify healthcare computer 810. A triggering event could occur when patient 800’s pulse drops below a threshold or when their body temperature rises beyond a predetermined limit. The healthcare computer 810 can then communicate with 890 healthcare providers using wireless device 822. When the trigger event is detected, wireless device 822 can be used to contact healthcare provider 890. Wireless device 822 could be used to notify 890 healthcare providers about the conditions of patient 800. Another embodiment of wireless device 822 can communicate with 810 via Bluetooth. A person may observe that 800 patients require help and contact 890 healthcare provider using wireless device 822. This can also be a regular wireless phone. Wireless device 822 is able to communicate with healthcare provider 890 via communication link 823, basestation 324 and PSTN 106.

“Healthcare provider 890 should have information about patient 800. It is recommended that the information be stored in database 880 which can be accessed by healthcare provider 890. This information could include the patient’s medical history and any information related to healthcare computer 810. A digital certificate that was issued to 890 healthcare provider may be included in the information. This would allow 890 healthcare provider to pass through firewall 840 during a communication session. Healthcare provider 890 may operate components that are associated with healthcare computer 801 through an external computer network 370. Database 880 should have PKI information to allow access to 880. Healthcare provider 890, for example, can control pacemaker 818 in a communication session using communication links 892 or 842. Accessible via communication link 362, certificate authority 360 can provide authentication services for healthcare provider 890 or patient 800 in order to ensure that communication between healthcare provider890 and healthcare computer810 is secure.

“FIG. “FIG. 9” is a flowchart that illustrates the steps involved with the third preferred embodiment. Step 902 can be used to set up the healthcare computer 810 with its associated devices as described above. Database 880 is given information about patient 800 in step 904. This information could include the patient’s medical records and instructions for operating the various components of healthcare computer 810. The database 880 can also contain information about how to secure tunnel through firewall 840.

“In step 906, if a triggering incident occurs, vital sign monitor 804 can detect it. The wireless device 822 can be used to contact 890 healthcare provider. Step 910 allows healthcare provider 890 to consult the database 880 in order to find information about patient 800. Step 912 allows healthcare provider 890 to initiate a communication session via an external computer network 370 with healthcare computer 810.

“In step 914 healthcare provider 890 can exchange digital certificates with healthcare computer 810. The digital certificates can be authenticated in step 916. Certificate authority 360 can authenticate digital certificates. This authentication ensures that 890 healthcare providers are treating the correct patient, and 800 patients are being treated by their healthcare providers.

“If the digital certificates in step 916 are not authenticated, then the process is over and the healthcare provider 890 is denied access the healthcare computer 810. If both digital certificates have been authenticated in step 916, then a communication session is established between healthcare provider 890 (or 810) in step 918. It is recommended that the communication session be secured through firewall 840. Step 920 allows healthcare provider 890 to observe the patient’s condition 810. One or more of the vital sign monitors 814 and 816 can be used to observe the patient’s condition. Step 922 allows healthcare provider to control an emergency response device such as pacemaker 816 to improve patient 800’s medical condition. When healthcare provider 890 is satisfied that patient 800 is in good health, the communication session ends at step 924. Healthcare provider 890 has the final say in the termination of the communication session.

“The disclosures of embodiments and examples of the present invention have been made for illustration and description purposes only. This disclosure is not meant to be exhaustive nor to limit the invention’s potential forms. A person of ordinary skill in art will recognize many variations and modifications to the embodiments described in this disclosure. The claims and their equivalents are the only way to define the scope of the invention.

Click here to view the patent on Google Patents.