US20060103520A1 - Active security system - Google Patents
Active security system Download PDFInfo
- Publication number
- US20060103520A1 US20060103520A1 US10/979,985 US97998504A US2006103520A1 US 20060103520 A1 US20060103520 A1 US 20060103520A1 US 97998504 A US97998504 A US 97998504A US 2006103520 A1 US2006103520 A1 US 2006103520A1
- Authority
- US
- United States
- Prior art keywords
- security
- data packet
- control unit
- local
- premises
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Classifications
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B25/00—Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems
- G08B25/01—Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems characterised by the transmission medium
- G08B25/08—Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems characterised by the transmission medium using communication transmission lines
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B29/00—Checking or monitoring of signalling or alarm systems; Prevention or correction of operating errors, e.g. preventing unauthorised operation
- G08B29/12—Checking intermittently signalling or alarm systems
- G08B29/123—Checking intermittently signalling or alarm systems of line circuits
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M11/00—Telephonic communication systems specially adapted for combination with other electrical systems
- H04M11/04—Telephonic communication systems specially adapted for combination with other electrical systems with alarm systems, e.g. fire, police or burglar alarm systems
Definitions
- the present invention relates generally to home and business security systems.
- a typical security system When an alarm condition is detected, a typical security system functions by using a connection to the Public Switched Telephone Network (PSTN) to communicate the condition to an outside source. Such a communication, however, can be easily defeated. By simply cutting the telephone connection outside the premises, those seeking to gain entrance to a home or building can do so without any outside source being contacted. Many security systems also rely on a connection to the power grid. A determined criminal can simply disconnect power to a home or building to gain access.
- PSTN Public Switched Telephone Network
- a system and method for actively maintaining security of a premises.
- the method can include the operation of establishing a data link between a local security controller within the premises and a monitoring station located remote from the premises.
- a security data packet can be transmitted between the local security controller and the monitoring station at a predefined periodic rate.
- a check of the premises can be initiated if the monitoring station does not receive the security data packet within a predetermined time frame.
- Selected electronic neighborhood watch subscribers can be notified if the monitoring station does not receive the security data packet within the predetermined time frame.
- FIG. 1 is a block diagram of an active security system in accordance with an example embodiment of the present invention
- FIG. 2 is a block diagram of an example embodiment of a local security controller in accordance with the present invention.
- FIG. 3 is a block diagram of an example embodiment of a subscriber controller unit in accordance with the present invention.
- FIG. 4 is a flowchart depicting a method for actively maintaining security of a premises in accordance with an example embodiment of the present invention.
- an active security system 100 is shown in an example implementation in accordance with the invention.
- the active security system comprises a local security controller 102 located within a premises 110 .
- the local security controller can be monitored by a subscriber control unit 125 over a security digital subscriber line (SECDSL) 115 .
- SECDSL security digital subscriber line
- the SECDSL connection can be achieved over a plain old telephone service (POTS) connection between the premises and a central office 130 of the public switched telephone network or in any useful location.
- POTS plain old telephone service
- Plain old telephone service also known as the public switched telephone network
- Plain old telephone service is essentially unchanged from the design implemented at the turn of the twentieth century. Because the same basic design has been used for so long, it has allowed the telephone system to become arguably the most reliable network in the world.
- the public switched telephone network even has its own backup power, allowing phone operation during blackouts.
- a typical POTS connection consists of two copper wires strung between a premises and a central telephone office.
- the two copper wires known as tip and ring, have traditionally been used for voice communications.
- tip and ring have traditionally been used for voice communications.
- new technologies have allowed the same two copper wires to be used for a variety of other purposes, including sending and receiving broadband data.
- the Federal Communication Commission has promulgated rules in the Telecommunications Act of 1996 that requires incumbent local exchange carriers (ILEC) (the local telephone company) to share certain telecommunications resources on the public switched telephone network with competitive local exchange carriers.
- ILEC incumbent local exchange carriers
- One of the rules enables a competitive local exchange carrier to use telephone lines of an ILEC, in conjunction with the ILEC, to offer telecommunications services to customers of the ILEC.
- Such line sharing arrangements allows the competitive local exchange carrier to provide digital subscriber line (DSL) services over the same loop that is used by the ILEC for voice communications.
- DSL digital subscriber line
- SECDSL connection can use the telephone lines of an ILEC to provide a connection between the premises 110 , 120 and the central office 130 .
- Previous alarm systems have usually incorporated the POTS connection due to its high level of reliability in connecting the alarm to an external security service.
- the prior art alarm systems are typically designed to call the external security service whenever an alarm condition is present.
- a determined intruder can simply cut or disable the external POTS connection before intruding on the premises. For example, an intruder could ground the POTS tip and ring wires, effectively breaking the POTS connection.
- the intruder breaks into the premises and the alarm condition is activated, the external security service cannot be contacted if the POTS connection is first disabled.
- previously designed alarm systems are no more fool proof than the doors and windows in the premises, all of which can be broken by the determined intruder.
- the active security system 100 does not rely on passive notification of an external security service. Rather, the active security system takes advantage of the new technologies designed for the POTS lines in the information age. Instead of relying on the POTS line to be continuously functioning, the active security system can be used to transmit a security data packet at a predetermined periodic rate between a premises 110 and a monitoring station 130 . If the security data packet is not received at the monitoring station within a predetermined amount of time, then an alarm condition can be raised and sent to an external investigative service 140 . Rather than relying on the POTS connection, a premises using the active security system can be protected during any disruption in the communication line.
- the subscriber control unit 125 can be connected to the ILEC at the telephone company's central office 130 .
- Each subscriber control unit can be connected to a plurality of local security controllers 102 to form the SECDSL connection with each of the premises 110 , 120 .
- each subscriber control unit can be connected to 16 local security controllers.
- a plurality of subscriber control units can be located at each central office. For example, 64 subscriber control units can be placed in one or more racks and located at a central office, enabling 1,024 local security controllers to be connected.
- the SECDSL connection can also be accomplished using a wireless connection between the subscriber control unit 125 and a plurality of local security controllers 102 .
- a wireless connection between the subscriber control unit 125 and a plurality of local security controllers 102 .
- cell phones or wireless communications such as the IEEE 802.16 standard or developments made by the WiMAX ForumTM can be used to transit data packets between each local security controller and a subscriber control unit.
- each local security controller 102 has a SECDSL connection 115 to the subscriber control unit 125 at the central office 130 , a variety of new opportunities are available with the active security system 100 .
- Security systems have long struggled with the vexing problems of false alarms and the lengthy time for security personnel to respond to a real alarm.
- the SECDSL connection can enable the active security system 100 to be part of an electronic neighborhood watch program.
- the electronic neighborhood watch program allows neighbors 110 and 120 to monitor each others houses electronically.
- a local security controller can be programmed with information relating to one or more neighbors 120 who also have an active security system. When an alarm condition at a local security controller at a first house 110 is activated, then the alarm data can be sent to the subscriber control unit at the central office.
- the subscriber control unit can forward the alarm condition of the local security controller at the first house to the neighbor's 120 local security controller 102 , enabling neighbors to check on each others' houses when an alarm condition is activated.
- the cost of surveillance can be reduced by enabling a greater reliance on neighbors watching out for each other. If the alarm condition at the first house is caused by a door ajar, the neighbor can be notified and can check to see if anyone is home and alert a security service of false alarms.
- the neighbor 120 can quickly determine if they should call the fire department or if it was a false alarm. Saving even a few minutes in response time can be critical in fires.
- the reduced response time through the use of an electronic neighborhood watch can allow property, pets, and even lives to be saved.
- the electronic neighborhood watch can enable quicker responses and reduce the number of false alarms which typically occur with security systems. It can be predetermined which alarm conditions are sent to one or more members of the electronic neighborhood watch, which are sent to an external investigative service, or both.
- the active security system 100 can function by configuring each subscriber control unit 125 to transmit a security data packet to each connected local security controller 102 at the predetermined periodic rate on a signal centered at a first non-interfering frequency over a POTS connection.
- the subscriber control unit can receive a response from each connected local security controller on a signal centered at a second non-interfering frequency over the same POTS connection.
- a data link can be established between the subscriber control unit and each local security controller by transmitting a first security data packet from the subscriber control unit to each local security controller, or by transmitting the first security data packet from each local security controller to the subscriber control unit.
- the frequency at which the data is transmitted over the POTS connection can be selected such that it will interfere minimally with the local voice and data communications on the POTS connection.
- the bandwidth from 300 Hz to 3300 Hz on a POTS line is typically used for voice communications.
- the first and second non-interfering frequencies used in a SECDSL connection can be located above the voice communications band (3300 Hz) and below the upstream band used for ADSL (25 KHz).
- the first frequency may be 18 KHz and the second frequency may be 22 KHz.
- the data may be transmitted in one of the channels of an ADSL modem.
- Transmitting the signals centered at the first and second non-interfering frequencies in this unused bandwidth on the POTS line can allow the subscriber control unit to effectively communicate with each local security controller with very little interference to other POTS functions, such as voice communications and data transmitted over a DSL. Communication in the unused bandwidth can also allow the subscriber control unit 125 and each local security controller 102 to communicate when the POTS line is on-hook, off-hook, and in use for voice or data communications.
- the active security system 100 can be able to effectively communicate between the premises and an off-site location substantially all of the time whether or not a phone at the premises is in use. Local telephone service for voice communications with an ILEC may not be necessary to accommodate a SECDSL connection.
- the security data packet sent from the subscriber control unit 125 can comprise data necessary to determine if each connected local security controller 102 is effectively communicating and whether any alarm conditions are present at a local security controller.
- the security data packet can include a subscriber seven digit telephone number, subscriber alarm codes, and alarm coordinate locations. The seven digit telephone number can be used by the subscriber control unit to identify the specific local security controller.
- Alarm coordinate locations can be used to determine the location of the alarm within a specific residence, such as a broken window, or a smoke alarm in an upstairs bedroom.
- Global Positioning Satellite (GPS) coordinates can be included in the data packet to enable emergency services personnel to quickly locate the premises.
- the amount of data in the security data packet can be determined according to customer needs. For example, a local security controller at a medium sized business office may be more complex, requiring more data to be sent.
- the security data packet can also contain information concerning selected electronic neighborhood watch members.
- An active security system subscriber can select specific neighbors to be within their electronic neighborhood watch program.
- three different active security system subscribers can be selected to be in an electronic neighborhood watch.
- the seven digit telephone numbers of the three subscribers, along with any alarm codes of those subscribers, can be included in the security data packet.
- the security data packet can be made substantially secure by including miscellaneous data used in scrambling, including variable or random embedded sequence strings. Cyclic redundancy codes can also be included within the security data packet. Scrambling and/or encrypting the security data packet can help to ensure that the security data packet cannot be tampered with. When scrambling of the security data packet is implemented, even a determined intruder with technologically advanced tools for receiving and transmitting the security data packet can be thwarted from interfering with the security data packet.
- the subscriber control unit 125 can be programmed to repeatedly send the security data packet to each connected local security controller 102 at a predetermined rate.
- the subscriber control unit can send the security data packets serially over the POTS tip and ring conductors comprising the SECDSL connection 115 to each local security controller.
- Each local security controller can receive the security data packet, which can include a substantially correct date, time, and subscriber identifier, such as the seven digit phone number.
- the local security controller can be programmed to interpret the security data packet.
- the local security controller can then respond to the security data packet received from the subscriber control unit and send a local input security data packet back to the subscriber control unit on the second non-interfering frequency.
- the subscriber control unit 125 can receive each local input security data packet and analyze it for alarm data.
- the subscriber control unit can be programmed to determine if one or more alarm conditions in the input security data packet are within predetermined parameters.
- a master clock in the subscriber control unit can be used to compare the time in the incoming local input security data packets with the master clock to be certain the data is new. If the time recorded by the local security controller in the local input security data packet is off by more than a predetermined amount, or if the local input security data packet is not received within the predetermined amount of time, a line disconnected alarm can be sent to the investigative service 140 and all of the electronic neighborhood watch subscribers identified in the last local input security data packet.
- the local input security data packet or a selected portion of the security data packet containing alarm and identification information can be sent over a communication line to the other subscriber control units located within the central office 130 .
- the subscriber control unit can then continue servicing all of the connected local security controllers 102 .
- the subscriber control unit 125 can request and receive each local input security data packet and analyze it for alarm data.
- the local security controller 102 may determine that alarms are not within predetermined limits and this data can be included in the input security data packet.
- the subscriber control unit can be programmed to respond to the alarm data in the input security data packet as previously discussed.
- the subscriber control unit 125 can send a security data packet to each connected local security controller 102 at a rate of at least once a second.
- the subscriber control unit repeats the process in the previous paragraph until the investigative service 140 or the subscriber within the premises 110 sends an acknowledgment that the problem is being addressed.
- the acknowledgement can be sent by entering a code on a keypad at the local security controller or via some other method.
- the subscriber control unit can then flag the local security controller and skip notification of alarm conditions until an all clear indication is sent to the subscribe control unit for the specific local security controller.
- the subscriber control unit 125 can include a pause control configured to enable test connections to be made without causing alarms. Disconnect jumpers for each POTS connection can enable the insertion of a test device to monitor proper operation of the subscriber control unit and the local security controller. A carrier detect indicator can be used to verify proper transmission connections.
- the pause control can put the subscriber control unit in an inactive condition for a predetermined amount of time while the test device is connected.
- the local security controller 102 and the subscriber control unit 125 can be configured using a variety of hardware, software, and firmware.
- the local security controller can be configured as shown in FIG. 2 .
- the local security controller can comprise a receiver 220 configured to receive the security data packet transmitted by the subscriber control unit 125 ( FIG. 1 ).
- the receiver can be electrically connected to a telephone jack 214 , a computer jack 212 , and a microprocessor 218 configured to monitor the security data packet sent from the subscriber control unit.
- the microprocessor can also be used to monitor security sensors.
- the microprocessor may contain an electrically erasable programmable read only memory (EEPROM) which can be used to store set-point values for each sensor to determine proper operation and alarm conditions. This will be discussed in further detail below.
- EEPROM electrically erasable programmable read only memory
- the telephone jack can be a modular RJ-11 connector.
- the computer jack 212 can be an RJ-11 or RJ-45 connector.
- the microprocessor can be a central processing unit, such as an X86 processor, a power PC processor, or the like. It may also be a digital signal processor, a microcontroller, a field programmable gate array (FPGA), a reconfigurable FPGA such as a Xilinx processor, or any other processor capable of analyzing the security data packet.
- FPGA field programmable gate array
- reconfigurable FPGA such as a Xilinx processor
- a keypad 222 can be electrically connected to the microprocessor and used for, among other things, programming the local security controller, activating the security system, and triggering an all-clear after an alarm condition has been activated.
- the keypad may be numeric or alphanumeric.
- the subscriber can use the keypad to enter alarm code numbers.
- Programmed alarm code numbers can be used to turn certain sensors off. The length of time the sensors are off can be programmed for certain sensors such as doors used during the day and windows that are to be opened. Special one digit codes can be used to allow exit from the premises, with the alarm being reactivated for the door sensor within a set amount of time.
- One or more separate keypads may be placed at entrance locations outside the premises and electrically connected to the microprocessor. The external keypads can be used to enter external entrance codes for entrance to the premises when the alarm system is on. The alarm can be reactivated for the door sensor within a set time of entrance into the premises.
- a display screen 202 can be electrically connected to the microprocessor and configured to display the status of the local security controller during programming and operation of the active security system 100 ( FIG. 1 ).
- the display screen may be a liquid crystal display, a field emission display, an organic light emitting diode display, a thin film transistor display, a plasma display, or any other type of display capable of showing the status of the local security controller.
- a transmitter 216 can be electrically connected to the telephone jack 214 , computer jack 212 , and microprocessor 218 .
- the transmitter can be configured to transmit the local input security data packet to the subscriber controller unit 125 ( FIG. 1 ).
- An automatic dialer 208 and data access arrangement (DAA) module 210 can be electrically connected to the telephone jack and microprocessor.
- the automatic dialer and DAA module can allow full access to the public switched telephone network over normal dial up methods and when answering incoming calls when so instructed by the subscriber.
- a voice digitizer 209 can allow selectable pre-recorded voice messages to be announced over an external speaker 207 and over the telephone line to the subscriber and emergency personnel.
- Voice messages can be prerecorded and stored using the keypad 222 .
- the voice messages can be made concerning the type of sensor having an alarm condition, the location of the sensor, and so on. For example, when a smoke alarm is activated a prerecorded voice message can be initiated at the local security controller 102 stating that a smoke alarm in the upstairs bedroom has an alarm condition.
- Pre-recorded voice messages can also be recorded concerning selected electronic neighborhood watch members.
- a voice message may state “a smoke alarm has been activated at the Jones' house in the downstairs family room.”
- the prerecorded voice message may also include location information, such as an address or GPS coordinates.
- the local security controller 102 can be powered using an AC power supply 206 .
- the power supply can be used to recharge a battery 204 .
- the battery can be configured to power the local security controller for at least 24 hours in the event of a power outage.
- the AC power supply and battery can also be configured to power external devices connected to the local security controller through an external sensor connector 203 .
- the subscriber control unit 125 can include a microprocessor 304 , as shown in FIG. 3 .
- the subscriber control unit can be connected to one or more local security controllers 102 ( FIG. 1 ), as previously discussed.
- the microprocessor can be programmed to send a security data packet to the one or more local security units using a transmitter 306 .
- a receiver 310 can be used to receive the local input security data packet sent from the local security controller.
- the local input security data packet can be stored in an EEPROM within the processor (not shown).
- the processor can scan the memory and analyze each packet for any alarm indicators included in any of the local input security data packets.
- a card rear edge connector 308 can be used to connect to the tip and ring connections to the one or more local security controllers 102 ( FIG. 1 ).
- the connector can also include connections to program the microprocessor, for a data transfer bus between cards and racks, an output for a direct line to the investigative surface 130 ( FIG. 1 ), and for power from a power supply card (not shown).
- a pause control (not shown) can be connected to a card front edge connector 302 to allow test connections without causing alarms at the local security controllers.
- the card front edge connector can also include disconnect jumpers for each POTS connection and carrier detect indicators for each connection to one or more the local security controllers.
- the active security system 100 can further include sensors 104 which can be placed throughout the premises 110 as needed to secure the premises from unwanted entry, and from internal problems.
- the sensors may be placed to monitor doors and windows through which an intruder can gain access to the premises.
- Motion detectors may be placed within the premises.
- the sensors may also include smoke alarms, fire alarms, and moisture sensors to detect if water breaks have occurred.
- a moisture sensor can be placed beneath a washing machine. If a malfunction with the washing machine or the water supply causes flooding, then an alarm condition can be sounded within the premises and also at one or more neighbors 120 which have been selected as an electronic neighborhood watch member.
- Various smart home sensors such as light and appliance automation sensors, motor temperature and current sensors, sump water level detectors, vibration sensors, temperature and vapor sensors for furnace rooms, water heater rooms, gas and oil fired steam plant rooms, and water quality and pH sensors can also be connected to the local security controller.
- the local security controller can be used to monitor the condition of any appliance or system which a subscriber may want observed.
- the local security controller 102 can be connected to one or more of the sensors 104 through the external sensor connector 203 ( FIG. 2 ).
- the sensors can be connected to the local security controller using a single connection means, such as a cable 106 .
- the cable may be a two conductor cable.
- the cable can also be constructed to be capable of sending signals over a longer distance, such as a twisted shielded pair cable.
- the cable can be used to supply power to each of the sensors as well as to enable the sensors to transmit their condition to the local security controller.
- the sensors can communicate with the local security controller using a wireless communications standard, such as IEEE 802.11 or 802.15.
- the sensors 104 can transmit analog or digital signals relating to their operational status to the local security controller 102 .
- the keypad 222 ( FIG. 2 ) can enable an installer or subscriber to enter operational setpoints peculiar to the subscriber's sensors.
- the local security controller can monitor the set points and determine the operational status of one or more of the sensors attached to the cable 106 .
- standard smoke detectors typically used throughout the world include a test point that provides a variable voltage proportional to air particulates, such as smoke, that enter the detector. A smoke detector sensor can utilize this test point to report the quality of the air passing through the smoke detector to the local security controller.
- Power can also be provided to the standard detector using the cable by means of a small package the size of a nine volt battery that connects to the same snap type battery connectors used in most sensors.
- the condition of the smoke alarm can be monitored at the local security controller. If the smoke detector sensor voltage in the smoke alarm begins to operate outside of a predetermined range, an alarm condition can be reported and the operation of the smoke detector can be checked and fixed, if necessary.
- Other types of sensors and detectors connected to the local security controller can be similarly monitored to ensure that they are operating within operational parameters.
- the local security controller can also be in communication with sensors which transmit digital signals relating to their operational status.
- the local security controller 102 at the premises 110 can be programmed to be “always on”.
- the local security controller can be programmed to be on during predetermined times during the day during which the premises is not occupied or is desired to be protected.
- the local security controller can be programmed to be active from 11:00 PM at night until 7:00 AM the next morning and from 8:30 AM until 5:30 PM while the occupants are gone to work. If the occupants are home during that time, they can manually turn the local security controller off for a set amount of time. After that set amount of time, the controller will automatically revert to the “always on” schedule. This allows the active security system to be useful without relying on an occupant or subscriber to manually arm the system each time the premises are vacated.
- the local security controller can also be programmed to only be active when manually armed, as typical alarm systems are.
- An example prototype active security system has been configured with a local security controller 102 , as shown in FIG. 2 , comprising a Hantronix 1HDM40416L-4-L30S LCD display screen 202 , an Eagle Pitcher CF-12V1.3 battery 204 , a PHIHONG PSC10A-1505 wall mount AC power supply 206 , a Panasonic WM-R30B speaker 207 , a National Semiconductor DS3695 automatic dialer 208 , a Windbond Electronics ISD2560S voice digitizer 209 , a Cermetek CHI 840 automatic dialer 210 , an Analog Devices AD654 transmitter 216 , a Motorola MC68HC912B32 microprocessor 218 , a National Semiconductor LMC568 receiver, a Grayhill 88AB2-143 keypad 222 , and various connectors and standard electronic and mechanical components used to assemble and interconnect the prototype parts.
- a local security controller 102 comprising a Hantronix 1HDM40416
- An example prototype subscriber control unit 125 has been configured comprising a Motorola MC68HC912B32 microprocessor 304 , an Analog Devices AD654 transmitter 308 , and a National Semiconductor LMC568 receiver 310 .
- Various connectors are used for connecting a plurality of local security controllers 102 ( FIG. 1 ) to the subscriber controller unit, connecting the subscriber controller unit to the security investigative service 140 ( FIG. 1 ), interconnecting a plurality of subscriber control units, and for receiving power from an external power supply card.
- Miscellaneous standard electronic and mechanical components are also used to assemble and interconnect the prototype parts.
- the active security system includes a method for actively maintaining security of a premises, as shown in the flowchart of FIG. 4 .
- the method can include the operation of establishing a data link between a local security controller within the premises and a monitoring station located remote from the premises, as shown in block 410 .
- the data link can be configured as a security digital subscriber line (SECDSL) between the local security controller and the monitoring station.
- SECDSL security digital subscriber line
- the monitoring station can be a telephone central office, where a subscriber control unit can be used to connect the local security controller to the public switched telephone network.
- a further operation can involve transmitting a security data packet between the local security controller and the monitoring station at a predefined periodic rate, as shown in block 420 .
- the security data packet can comprise an output security data packet sent from the subscriber control unit to one or more local security controllers.
- the output security data packet can be sent over a POTS line between the local security controller and the subscriber control unit.
- the POTS line can serve as the SECDSL connection.
- the output security data packet can be transmitted as a digital or analog signal which can be modulated to transmit over the SECDSL connection by altering the phase, frequency, or amplitude of the signal. For example, frequency shift keying can be used to modulate the signal onto a carrier frequency.
- the output security data packet sent to each local security controller can contain a small amount of data, such as less than 100 bytes of data.
- the subscriber control unit can send an output security data packet to one or more subscriber control units at the predefined periodic rate. In one embodiment, the output security data packet can be sent once a second. Therefore, the bandwidth necessary to transmit the output security data packet can be quite narrow.
- the packet can be sent using a digital or analog signal centered at a frequency of greater than 4 KHz.
- the security data packet can be sent with substantially little interference to voice communications on the POTS line.
- the SECDSL connection can operate substantially all the time, no matter whether the subscriber's phone is in use, on-hook, or off-hook.
- the local security controller can receive the output security data packet from the subscriber control unit.
- the local security controller can respond with a local input security data packet.
- the local input security data packet can contain data necessary to determine if each connected local security controller is effectively communicating and whether any alarm conditions are present at a local security controller, as previously disclosed.
- Another operation can involve initiating a check of the premises if the monitoring station does not receive the security data packet within a predetermined time frame, as shown in block 430 .
- the local input security data packet can be received at the subscriber control unit. If the local input security data packet is not received, an alarm condition can be reported after a predetermined amount of time.
- the subscriber control unit can also monitor the local input security data packet to determine if an alarm condition is reported by the security data packet. If an alarm condition is reported, either by the local input security data packet or the lack of security data packet at the subscriber control unit, the subscriber control unit can send a notification of the alarm condition to an investigative service.
- the investigative service can have a connection to the subscriber control unit through the public switched telephone network, ensuring a reliable connection between the subscriber control unit and the investigative service.
- a further operation can include notifying selected electronic neighborhood watch subscribers if the monitoring station does not receive the security data packet within the predetermined time frame, as shown in block 440 .
- the subscriber control unit can also send a notification of any alarm conditions to selected electronic network neighborhood members.
- a prerecorded message at the electronic network neighborhood members' local security controllers can alert them to the alarm condition.
- the prerecorded message can identify the type of alarm and its source. For example, the message can identify the alarm condition as a smoke alarm in an upstairs bedroom at the Jones' house. One or more neighbors would be able to take appropriate action to determine if smoke was present, and call the fire department or an emergency number.
- Members of the electronic neighborhood watch can respond quicker and more efficiently than the investigative service. Subscribers can determine which alarm conditions should be reported to the investigative service, which should be reported to electronic neighborhood watch members, and which should be reported to both.
- the active security system 100 can also use other communication means to effectively communicate security data packets between the local security controller 102 and the subscriber control unit 125 .
- a computer (not shown) can be connected to the local security controller through an RJ-11 or RJ-45 connector 212 .
- the communication means can then be directed through the computer, using a broadband Internet connection such as DSL or Cable, or a dial-up modem connection connected to the computer.
- Software can be used to effectively communicate the security data packet between the local security controller 102 and the monitoring station 130 at a predetermined periodic rate.
- the public switched telephone network has evolved over the last century as one of the most reliable networks in the world.
- the network is much more reliable than wireless and cellular telephone systems.
- Security systems can rely on the network's reliability in reporting an alarm condition.
- a determined intruder can easily disconnect a POTS connection from a premises.
- An active security system can be implemented by sending a security data packet between a local security controller at the premises and a subscriber control unit, the security of the POTS connection can be closely monitored. Any disruption in the signal can be quickly reported.
- Sending the security data packet through a security digital subscriber line over the POTS connection can further enhance the reliability of the active security system.
- the SECDSL connection can allow the security data packet to be received and transmitted with minimal disruption to voice and data communications over the POTS connection.
- the SECDSL connection can also enable the establishment of an electronic neighborhood watch, which will allow neighbors to quickly respond to any alarm conditions.
- a secure, inexpensive, security system allowing a nearly instantaneous response to alarm conditions can now be implemented.
- a quicker response will allow property and lives to be saved in the event of a fire. Intruders will think twice before entering a home with an active security system, knowing that neighbors will be quickly notified of any intrusion or disruption in communication with the local security controller.
Abstract
A system and method is disclosed for actively maintaining security of a premises. The method can include the operation of establishing a data link between a local security controller within the premises and a monitoring station located remote from the premises. A security data packet can be transmitted between the local security controller and the monitoring station at a predefined periodic rate. A check of the premises can be initiated if the monitoring station does not receive the security data packet within a predetermined time frame. Selected electronic neighborhood watch subscribers can be notified if the monitoring station does not receive the security data packet within the predetermined time frame.
Description
- The present invention relates generally to home and business security systems.
- Home and business security systems are widely available on the market today. These systems are typically used to increase the peace of mind of the owner or occupier of a structure. Most systems operate by relying on sensors to detect an intrusion. In order for a security system to operate as designed, the sensors should be performing optimally. Once a security system is installed, however, most people fail to take the time to test the security system sensors. Sensors relying on batteries, such as smoke alarms, can easily run out of power and become inoperable. Even sensors connected to the electrical grid can fail to function and/or become reduced in capability. Without a method for automatically detecting and tracking the functioning of each detector within an alarm system, the system can easily become non-functional and its operation can be diminished with age. A system configured to continuously test the functioning of each detector within an alarm system is needed to ensure the operation of the alarm system.
- When an alarm condition is detected, a typical security system functions by using a connection to the Public Switched Telephone Network (PSTN) to communicate the condition to an outside source. Such a communication, however, can be easily defeated. By simply cutting the telephone connection outside the premises, those seeking to gain entrance to a home or building can do so without any outside source being contacted. Many security systems also rely on a connection to the power grid. A determined criminal can simply disconnect power to a home or building to gain access.
- Even when security systems function properly, they can still be fairly ineffective. When the outside source is contacted by an alarm system, the outside source normally takes a substantial amount of time to respond. A response time of 15 minutes or more to a business or residential alarm is typical. In that time, a fire can quickly spread out of control, or a thief can easily gain entrance to the home or building and make off with much of the valuable contents inside.
- A system and method is disclosed for actively maintaining security of a premises. The method can include the operation of establishing a data link between a local security controller within the premises and a monitoring station located remote from the premises. A security data packet can be transmitted between the local security controller and the monitoring station at a predefined periodic rate. A check of the premises can be initiated if the monitoring station does not receive the security data packet within a predetermined time frame. Selected electronic neighborhood watch subscribers can be notified if the monitoring station does not receive the security data packet within the predetermined time frame.
- Additional features and advantages of the invention will be apparent from the detailed description which follows, taken in conjunction with the accompanying drawings, which together illustrate, by way of example, features of the invention; and, wherein:
-
FIG. 1 is a block diagram of an active security system in accordance with an example embodiment of the present invention; -
FIG. 2 is a block diagram of an example embodiment of a local security controller in accordance with the present invention; -
FIG. 3 is a block diagram of an example embodiment of a subscriber controller unit in accordance with the present invention; and -
FIG. 4 is a flowchart depicting a method for actively maintaining security of a premises in accordance with an example embodiment of the present invention. - Reference will now be made to the exemplary embodiments illustrated, and specific language will be used herein to describe the same. It will nevertheless be understood that no limitation of the scope of the invention is thereby intended.
- As illustrated in
FIG. 1 , anactive security system 100 is shown in an example implementation in accordance with the invention. The active security system comprises alocal security controller 102 located within apremises 110. The local security controller can be monitored by asubscriber control unit 125 over a security digital subscriber line (SECDSL) 115. The SECDSL connection can be achieved over a plain old telephone service (POTS) connection between the premises and acentral office 130 of the public switched telephone network or in any useful location. The SECDSL connection will be described in more detail below. - Plain old telephone service, also known as the public switched telephone network, is essentially unchanged from the design implemented at the turn of the twentieth century. Because the same basic design has been used for so long, it has allowed the telephone system to become arguably the most reliable network in the world. The public switched telephone network even has its own backup power, allowing phone operation during blackouts. A typical POTS connection consists of two copper wires strung between a premises and a central telephone office. The two copper wires, known as tip and ring, have traditionally been used for voice communications. With the advent of the Internet, however, new technologies have allowed the same two copper wires to be used for a variety of other purposes, including sending and receiving broadband data.
- The Federal Communication Commission (FCC) has promulgated rules in the Telecommunications Act of 1996 that requires incumbent local exchange carriers (ILEC) (the local telephone company) to share certain telecommunications resources on the public switched telephone network with competitive local exchange carriers. One of the rules enables a competitive local exchange carrier to use telephone lines of an ILEC, in conjunction with the ILEC, to offer telecommunications services to customers of the ILEC. Such line sharing arrangements allows the competitive local exchange carrier to provide digital subscriber line (DSL) services over the same loop that is used by the ILEC for voice communications. Similarly, the SECDSL connection can use the telephone lines of an ILEC to provide a connection between the
premises central office 130. - Previous alarm systems have usually incorporated the POTS connection due to its high level of reliability in connecting the alarm to an external security service. The prior art alarm systems are typically designed to call the external security service whenever an alarm condition is present. A determined intruder, however, can simply cut or disable the external POTS connection before intruding on the premises. For example, an intruder could ground the POTS tip and ring wires, effectively breaking the POTS connection. When the intruder breaks into the premises and the alarm condition is activated, the external security service cannot be contacted if the POTS connection is first disabled. Thus, previously designed alarm systems are no more fool proof than the doors and windows in the premises, all of which can be broken by the determined intruder.
- In contrast, the
active security system 100 does not rely on passive notification of an external security service. Rather, the active security system takes advantage of the new technologies designed for the POTS lines in the information age. Instead of relying on the POTS line to be continuously functioning, the active security system can be used to transmit a security data packet at a predetermined periodic rate between apremises 110 and amonitoring station 130. If the security data packet is not received at the monitoring station within a predetermined amount of time, then an alarm condition can be raised and sent to an externalinvestigative service 140. Rather than relying on the POTS connection, a premises using the active security system can be protected during any disruption in the communication line. - To achieve the active security system, the
subscriber control unit 125 can be connected to the ILEC at the telephone company'scentral office 130. Each subscriber control unit can be connected to a plurality oflocal security controllers 102 to form the SECDSL connection with each of thepremises - In another embodiment, the SECDSL connection can also be accomplished using a wireless connection between the
subscriber control unit 125 and a plurality oflocal security controllers 102. For example, cell phones or wireless communications such as the IEEE 802.16 standard or developments made by the WiMAX Forum™ can be used to transit data packets between each local security controller and a subscriber control unit. - Because each
local security controller 102 has aSECDSL connection 115 to thesubscriber control unit 125 at thecentral office 130, a variety of new opportunities are available with theactive security system 100. Security systems have long struggled with the vexing problems of false alarms and the lengthy time for security personnel to respond to a real alarm. The SECDSL connection can enable theactive security system 100 to be part of an electronic neighborhood watch program. The electronic neighborhood watch program allowsneighbors more neighbors 120 who also have an active security system. When an alarm condition at a local security controller at afirst house 110 is activated, then the alarm data can be sent to the subscriber control unit at the central office. The subscriber control unit can forward the alarm condition of the local security controller at the first house to the neighbor's 120local security controller 102, enabling neighbors to check on each others' houses when an alarm condition is activated. The cost of surveillance can be reduced by enabling a greater reliance on neighbors watching out for each other. If the alarm condition at the first house is caused by a door ajar, the neighbor can be notified and can check to see if anyone is home and alert a security service of false alarms. - If the alarm condition is caused by a serious alarm condition, such as a smoke alarm at the
first house 110, theneighbor 120 can quickly determine if they should call the fire department or if it was a false alarm. Saving even a few minutes in response time can be critical in fires. The reduced response time through the use of an electronic neighborhood watch can allow property, pets, and even lives to be saved. The electronic neighborhood watch can enable quicker responses and reduce the number of false alarms which typically occur with security systems. It can be predetermined which alarm conditions are sent to one or more members of the electronic neighborhood watch, which are sent to an external investigative service, or both. - The
active security system 100 can function by configuring eachsubscriber control unit 125 to transmit a security data packet to each connectedlocal security controller 102 at the predetermined periodic rate on a signal centered at a first non-interfering frequency over a POTS connection. The subscriber control unit can receive a response from each connected local security controller on a signal centered at a second non-interfering frequency over the same POTS connection. It should be apparent to one skilled in the art that a data link can be established between the subscriber control unit and each local security controller by transmitting a first security data packet from the subscriber control unit to each local security controller, or by transmitting the first security data packet from each local security controller to the subscriber control unit. The frequency at which the data is transmitted over the POTS connection can be selected such that it will interfere minimally with the local voice and data communications on the POTS connection. - The bandwidth from 300 Hz to 3300 Hz on a POTS line is typically used for voice communications. An asynchronous digital subscriber line (ADSL), employing the popular carrierless amplitude/phase (CAP) standard, generally uses the 25 KHz to 160 KHz band on the POTS line for upstream communications (from the premises to the central office). In one embodiment, the first and second non-interfering frequencies used in a SECDSL connection can be located above the voice communications band (3300 Hz) and below the upstream band used for ADSL (25 KHz). For example, the first frequency may be 18 KHz and the second frequency may be 22 KHz. Alternatively, the data may be transmitted in one of the channels of an ADSL modem.
- Transmitting the signals centered at the first and second non-interfering frequencies in this unused bandwidth on the POTS line can allow the subscriber control unit to effectively communicate with each local security controller with very little interference to other POTS functions, such as voice communications and data transmitted over a DSL. Communication in the unused bandwidth can also allow the
subscriber control unit 125 and eachlocal security controller 102 to communicate when the POTS line is on-hook, off-hook, and in use for voice or data communications. Thus, theactive security system 100 can be able to effectively communicate between the premises and an off-site location substantially all of the time whether or not a phone at the premises is in use. Local telephone service for voice communications with an ILEC may not be necessary to accommodate a SECDSL connection. - The security data packet sent from the
subscriber control unit 125 can comprise data necessary to determine if each connectedlocal security controller 102 is effectively communicating and whether any alarm conditions are present at a local security controller. In one embodiment, the security data packet can include a subscriber seven digit telephone number, subscriber alarm codes, and alarm coordinate locations. The seven digit telephone number can be used by the subscriber control unit to identify the specific local security controller. Alarm coordinate locations can be used to determine the location of the alarm within a specific residence, such as a broken window, or a smoke alarm in an upstairs bedroom. Global Positioning Satellite (GPS) coordinates can be included in the data packet to enable emergency services personnel to quickly locate the premises. The amount of data in the security data packet can be determined according to customer needs. For example, a local security controller at a medium sized business office may be more complex, requiring more data to be sent. - The security data packet can also contain information concerning selected electronic neighborhood watch members. An active security system subscriber can select specific neighbors to be within their electronic neighborhood watch program. In one embodiment, three different active security system subscribers can be selected to be in an electronic neighborhood watch. The seven digit telephone numbers of the three subscribers, along with any alarm codes of those subscribers, can be included in the security data packet.
- The security data packet can be made substantially secure by including miscellaneous data used in scrambling, including variable or random embedded sequence strings. Cyclic redundancy codes can also be included within the security data packet. Scrambling and/or encrypting the security data packet can help to ensure that the security data packet cannot be tampered with. When scrambling of the security data packet is implemented, even a determined intruder with technologically advanced tools for receiving and transmitting the security data packet can be thwarted from interfering with the security data packet.
- In one embodiment, the
subscriber control unit 125 can be programmed to repeatedly send the security data packet to each connectedlocal security controller 102 at a predetermined rate. The subscriber control unit can send the security data packets serially over the POTS tip and ring conductors comprising theSECDSL connection 115 to each local security controller. Each local security controller can receive the security data packet, which can include a substantially correct date, time, and subscriber identifier, such as the seven digit phone number. The local security controller can be programmed to interpret the security data packet. The local security controller can then respond to the security data packet received from the subscriber control unit and send a local input security data packet back to the subscriber control unit on the second non-interfering frequency. - The
subscriber control unit 125 can receive each local input security data packet and analyze it for alarm data. The subscriber control unit can be programmed to determine if one or more alarm conditions in the input security data packet are within predetermined parameters. A master clock in the subscriber control unit can be used to compare the time in the incoming local input security data packets with the master clock to be certain the data is new. If the time recorded by the local security controller in the local input security data packet is off by more than a predetermined amount, or if the local input security data packet is not received within the predetermined amount of time, a line disconnected alarm can be sent to theinvestigative service 140 and all of the electronic neighborhood watch subscribers identified in the last local input security data packet. If the electronic neighborhood watch subscribers are not connected to the same subscriber control unit, the local input security data packet or a selected portion of the security data packet containing alarm and identification information can be sent over a communication line to the other subscriber control units located within thecentral office 130. The subscriber control unit can then continue servicing all of the connectedlocal security controllers 102. - In another embodiment, the
subscriber control unit 125 can request and receive each local input security data packet and analyze it for alarm data. Thelocal security controller 102 may determine that alarms are not within predetermined limits and this data can be included in the input security data packet. The subscriber control unit can be programmed to respond to the alarm data in the input security data packet as previously discussed. - In one embodiment, the
subscriber control unit 125 can send a security data packet to each connectedlocal security controller 102 at a rate of at least once a second. When a local input security data packet is received from a local security controller which had alarm conditions reported in a previous local input security data packet, the subscriber control unit repeats the process in the previous paragraph until theinvestigative service 140 or the subscriber within thepremises 110 sends an acknowledgment that the problem is being addressed. The acknowledgement can be sent by entering a code on a keypad at the local security controller or via some other method. The subscriber control unit can then flag the local security controller and skip notification of alarm conditions until an all clear indication is sent to the subscribe control unit for the specific local security controller. - The
subscriber control unit 125 can include a pause control configured to enable test connections to be made without causing alarms. Disconnect jumpers for each POTS connection can enable the insertion of a test device to monitor proper operation of the subscriber control unit and the local security controller. A carrier detect indicator can be used to verify proper transmission connections. The pause control can put the subscriber control unit in an inactive condition for a predetermined amount of time while the test device is connected. - As understood by persons skilled in the art to which this invention pertains, the
local security controller 102 and thesubscriber control unit 125 can be configured using a variety of hardware, software, and firmware. In one embodiment, the local security controller can be configured as shown inFIG. 2 . The local security controller can comprise areceiver 220 configured to receive the security data packet transmitted by the subscriber control unit 125 (FIG. 1 ). The receiver can be electrically connected to atelephone jack 214, acomputer jack 212, and amicroprocessor 218 configured to monitor the security data packet sent from the subscriber control unit. The microprocessor can also be used to monitor security sensors. The microprocessor may contain an electrically erasable programmable read only memory (EEPROM) which can be used to store set-point values for each sensor to determine proper operation and alarm conditions. This will be discussed in further detail below. - The telephone jack can be a modular RJ-11 connector. The
computer jack 212 can be an RJ-11 or RJ-45 connector. The microprocessor can be a central processing unit, such as an X86 processor, a power PC processor, or the like. It may also be a digital signal processor, a microcontroller, a field programmable gate array (FPGA), a reconfigurable FPGA such as a Xilinx processor, or any other processor capable of analyzing the security data packet. - A
keypad 222 can be electrically connected to the microprocessor and used for, among other things, programming the local security controller, activating the security system, and triggering an all-clear after an alarm condition has been activated. The keypad may be numeric or alphanumeric. The subscriber can use the keypad to enter alarm code numbers. Programmed alarm code numbers can be used to turn certain sensors off. The length of time the sensors are off can be programmed for certain sensors such as doors used during the day and windows that are to be opened. Special one digit codes can be used to allow exit from the premises, with the alarm being reactivated for the door sensor within a set amount of time. One or more separate keypads (not shown) may be placed at entrance locations outside the premises and electrically connected to the microprocessor. The external keypads can be used to enter external entrance codes for entrance to the premises when the alarm system is on. The alarm can be reactivated for the door sensor within a set time of entrance into the premises. - A
display screen 202 can be electrically connected to the microprocessor and configured to display the status of the local security controller during programming and operation of the active security system 100 (FIG. 1 ). The display screen may be a liquid crystal display, a field emission display, an organic light emitting diode display, a thin film transistor display, a plasma display, or any other type of display capable of showing the status of the local security controller. - A
transmitter 216 can be electrically connected to thetelephone jack 214,computer jack 212, andmicroprocessor 218. The transmitter can be configured to transmit the local input security data packet to the subscriber controller unit 125 (FIG. 1 ). Anautomatic dialer 208 and data access arrangement (DAA)module 210 can be electrically connected to the telephone jack and microprocessor. The automatic dialer and DAA module can allow full access to the public switched telephone network over normal dial up methods and when answering incoming calls when so instructed by the subscriber. - A
voice digitizer 209 can allow selectable pre-recorded voice messages to be announced over anexternal speaker 207 and over the telephone line to the subscriber and emergency personnel. Voice messages can be prerecorded and stored using thekeypad 222. The voice messages can be made concerning the type of sensor having an alarm condition, the location of the sensor, and so on. For example, when a smoke alarm is activated a prerecorded voice message can be initiated at thelocal security controller 102 stating that a smoke alarm in the upstairs bedroom has an alarm condition. Pre-recorded voice messages can also be recorded concerning selected electronic neighborhood watch members. A voice message may state “a smoke alarm has been activated at the Jones' house in the downstairs family room.” The prerecorded voice message may also include location information, such as an address or GPS coordinates. - The
local security controller 102 can be powered using anAC power supply 206. The power supply can be used to recharge abattery 204. In one embodiment, the battery can be configured to power the local security controller for at least 24 hours in the event of a power outage. The AC power supply and battery can also be configured to power external devices connected to the local security controller through anexternal sensor connector 203. - The
subscriber control unit 125 can include amicroprocessor 304, as shown inFIG. 3 . The subscriber control unit can be connected to one or more local security controllers 102 (FIG. 1 ), as previously discussed. The microprocessor can be programmed to send a security data packet to the one or more local security units using atransmitter 306. Areceiver 310 can be used to receive the local input security data packet sent from the local security controller. The local input security data packet can be stored in an EEPROM within the processor (not shown). The processor can scan the memory and analyze each packet for any alarm indicators included in any of the local input security data packets. - A card
rear edge connector 308 can be used to connect to the tip and ring connections to the one or more local security controllers 102 (FIG. 1 ). The connector can also include connections to program the microprocessor, for a data transfer bus between cards and racks, an output for a direct line to the investigative surface 130 (FIG. 1 ), and for power from a power supply card (not shown). A pause control (not shown) can be connected to a cardfront edge connector 302 to allow test connections without causing alarms at the local security controllers. The card front edge connector can also include disconnect jumpers for each POTS connection and carrier detect indicators for each connection to one or more the local security controllers. - Returning to
FIG. 1 , theactive security system 100 can further includesensors 104 which can be placed throughout thepremises 110 as needed to secure the premises from unwanted entry, and from internal problems. For example, the sensors may be placed to monitor doors and windows through which an intruder can gain access to the premises. Motion detectors may be placed within the premises. The sensors may also include smoke alarms, fire alarms, and moisture sensors to detect if water breaks have occurred. For example, a moisture sensor can be placed beneath a washing machine. If a malfunction with the washing machine or the water supply causes flooding, then an alarm condition can be sounded within the premises and also at one ormore neighbors 120 which have been selected as an electronic neighborhood watch member. Various smart home sensors, such as light and appliance automation sensors, motor temperature and current sensors, sump water level detectors, vibration sensors, temperature and vapor sensors for furnace rooms, water heater rooms, gas and oil fired steam plant rooms, and water quality and pH sensors can also be connected to the local security controller. The local security controller can be used to monitor the condition of any appliance or system which a subscriber may want observed. - The
local security controller 102 can be connected to one or more of thesensors 104 through the external sensor connector 203 (FIG. 2 ). In one embodiment, the sensors can be connected to the local security controller using a single connection means, such as acable 106. The cable may be a two conductor cable. The cable can also be constructed to be capable of sending signals over a longer distance, such as a twisted shielded pair cable. The cable can be used to supply power to each of the sensors as well as to enable the sensors to transmit their condition to the local security controller. In another embodiment, the sensors can communicate with the local security controller using a wireless communications standard, such as IEEE 802.11 or 802.15. - In one embodiment, the
sensors 104 can transmit analog or digital signals relating to their operational status to thelocal security controller 102. The keypad 222 (FIG. 2 ) can enable an installer or subscriber to enter operational setpoints peculiar to the subscriber's sensors. The local security controller can monitor the set points and determine the operational status of one or more of the sensors attached to thecable 106. For example, standard smoke detectors typically used throughout the world include a test point that provides a variable voltage proportional to air particulates, such as smoke, that enter the detector. A smoke detector sensor can utilize this test point to report the quality of the air passing through the smoke detector to the local security controller. Power can also be provided to the standard detector using the cable by means of a small package the size of a nine volt battery that connects to the same snap type battery connectors used in most sensors. Thus, the condition of the smoke alarm can be monitored at the local security controller. If the smoke detector sensor voltage in the smoke alarm begins to operate outside of a predetermined range, an alarm condition can be reported and the operation of the smoke detector can be checked and fixed, if necessary. Other types of sensors and detectors connected to the local security controller can be similarly monitored to ensure that they are operating within operational parameters. The local security controller can also be in communication with sensors which transmit digital signals relating to their operational status. - The
local security controller 102 at thepremises 110 can be programmed to be “always on”. In this embodiment, the local security controller can be programmed to be on during predetermined times during the day during which the premises is not occupied or is desired to be protected. For example, the local security controller can be programmed to be active from 11:00 PM at night until 7:00 AM the next morning and from 8:30 AM until 5:30 PM while the occupants are gone to work. If the occupants are home during that time, they can manually turn the local security controller off for a set amount of time. After that set amount of time, the controller will automatically revert to the “always on” schedule. This allows the active security system to be useful without relying on an occupant or subscriber to manually arm the system each time the premises are vacated. Alternatively, the local security controller can also be programmed to only be active when manually armed, as typical alarm systems are. - An example prototype active security system has been configured with a
local security controller 102, as shown inFIG. 2 , comprising a Hantronix 1HDM40416L-4-L30SLCD display screen 202, an Eagle Pitcher CF-12V1.3battery 204, a PHIHONG PSC10A-1505 wall mountAC power supply 206, a Panasonic WM-R30B speaker 207, a National Semiconductor DS3695automatic dialer 208, a Windbond ElectronicsISD2560S voice digitizer 209, a Cermetek CHI 840automatic dialer 210, an AnalogDevices AD654 transmitter 216, aMotorola MC68HC912B32 microprocessor 218, a National Semiconductor LMC568 receiver, a Grayhill 88AB2-143keypad 222, and various connectors and standard electronic and mechanical components used to assemble and interconnect the prototype parts. - An example prototype
subscriber control unit 125, as shown inFIG. 3 , has been configured comprising aMotorola MC68HC912B32 microprocessor 304, an AnalogDevices AD654 transmitter 308, and a NationalSemiconductor LMC568 receiver 310. Various connectors are used for connecting a plurality of local security controllers 102 (FIG. 1 ) to the subscriber controller unit, connecting the subscriber controller unit to the security investigative service 140 (FIG. 1 ), interconnecting a plurality of subscriber control units, and for receiving power from an external power supply card. Miscellaneous standard electronic and mechanical components are also used to assemble and interconnect the prototype parts. - Another aspect of the active security system includes a method for actively maintaining security of a premises, as shown in the flowchart of
FIG. 4 . The method can include the operation of establishing a data link between a local security controller within the premises and a monitoring station located remote from the premises, as shown inblock 410. The data link can be configured as a security digital subscriber line (SECDSL) between the local security controller and the monitoring station. The monitoring station can be a telephone central office, where a subscriber control unit can be used to connect the local security controller to the public switched telephone network. - A further operation can involve transmitting a security data packet between the local security controller and the monitoring station at a predefined periodic rate, as shown in
block 420. The security data packet can comprise an output security data packet sent from the subscriber control unit to one or more local security controllers. The output security data packet can be sent over a POTS line between the local security controller and the subscriber control unit. The POTS line can serve as the SECDSL connection. - The output security data packet can be transmitted as a digital or analog signal which can be modulated to transmit over the SECDSL connection by altering the phase, frequency, or amplitude of the signal. For example, frequency shift keying can be used to modulate the signal onto a carrier frequency. The output security data packet sent to each local security controller can contain a small amount of data, such as less than 100 bytes of data. The subscriber control unit can send an output security data packet to one or more subscriber control units at the predefined periodic rate. In one embodiment, the output security data packet can be sent once a second. Therefore, the bandwidth necessary to transmit the output security data packet can be quite narrow. The packet can be sent using a digital or analog signal centered at a frequency of greater than 4 KHz. By transmitting the output security data packet at a frequency greater than 4 KHz, the security data packet can be sent with substantially little interference to voice communications on the POTS line. Thus, the SECDSL connection can operate substantially all the time, no matter whether the subscriber's phone is in use, on-hook, or off-hook.
- In one embodiment, the local security controller can receive the output security data packet from the subscriber control unit. The local security controller can respond with a local input security data packet. The local input security data packet can contain data necessary to determine if each connected local security controller is effectively communicating and whether any alarm conditions are present at a local security controller, as previously disclosed.
- Another operation can involve initiating a check of the premises if the monitoring station does not receive the security data packet within a predetermined time frame, as shown in
block 430. The local input security data packet can be received at the subscriber control unit. If the local input security data packet is not received, an alarm condition can be reported after a predetermined amount of time. The subscriber control unit can also monitor the local input security data packet to determine if an alarm condition is reported by the security data packet. If an alarm condition is reported, either by the local input security data packet or the lack of security data packet at the subscriber control unit, the subscriber control unit can send a notification of the alarm condition to an investigative service. The investigative service can have a connection to the subscriber control unit through the public switched telephone network, ensuring a reliable connection between the subscriber control unit and the investigative service. - A further operation can include notifying selected electronic neighborhood watch subscribers if the monitoring station does not receive the security data packet within the predetermined time frame, as shown in
block 440. The subscriber control unit can also send a notification of any alarm conditions to selected electronic network neighborhood members. A prerecorded message at the electronic network neighborhood members' local security controllers can alert them to the alarm condition. The prerecorded message can identify the type of alarm and its source. For example, the message can identify the alarm condition as a smoke alarm in an upstairs bedroom at the Jones' house. One or more neighbors would be able to take appropriate action to determine if smoke was present, and call the fire department or an emergency number. Members of the electronic neighborhood watch can respond quicker and more efficiently than the investigative service. Subscribers can determine which alarm conditions should be reported to the investigative service, which should be reported to electronic neighborhood watch members, and which should be reported to both. - The active security system 100 (
FIG. 1 ) can also use other communication means to effectively communicate security data packets between thelocal security controller 102 and thesubscriber control unit 125. For example, a computer (not shown) can be connected to the local security controller through an RJ-11 or RJ-45connector 212. The communication means can then be directed through the computer, using a broadband Internet connection such as DSL or Cable, or a dial-up modem connection connected to the computer. Software can be used to effectively communicate the security data packet between thelocal security controller 102 and themonitoring station 130 at a predetermined periodic rate. - The public switched telephone network has evolved over the last century as one of the most reliable networks in the world. The network is much more reliable than wireless and cellular telephone systems. Security systems can rely on the network's reliability in reporting an alarm condition. A determined intruder, however, can easily disconnect a POTS connection from a premises. An active security system can be implemented by sending a security data packet between a local security controller at the premises and a subscriber control unit, the security of the POTS connection can be closely monitored. Any disruption in the signal can be quickly reported. Sending the security data packet through a security digital subscriber line over the POTS connection can further enhance the reliability of the active security system. The SECDSL connection can allow the security data packet to be received and transmitted with minimal disruption to voice and data communications over the POTS connection. The SECDSL connection can also enable the establishment of an electronic neighborhood watch, which will allow neighbors to quickly respond to any alarm conditions. Thus, a secure, inexpensive, security system allowing a nearly instantaneous response to alarm conditions can now be implemented. A quicker response will allow property and lives to be saved in the event of a fire. Intruders will think twice before entering a home with an active security system, knowing that neighbors will be quickly notified of any intrusion or disruption in communication with the local security controller.
- While the forgoing examples are illustrative of the principles of the present invention in one or more particular applications, it will be apparent to those of ordinary skill in the art that numerous modifications in form, usage and details of implementation can be made without the exercise of inventive faculty, and without departing from the principles and concepts of the invention. Accordingly, it is not intended that the invention be limited, except as by the claims set forth below.
Claims (37)
1. A method for actively maintaining security of a premises, comprising the steps of:
establishing a security digital subscriber line connection over a public switched telephone network line between one or more local security controllers and a subscriber control unit located at a monitoring station located remote from the premises;
transmitting a security data packet between the local security controller and the monitoring station at a predefined periodic rate at a frequency that will not substantially interfere with ordinary use of the public switched telephone network line for voice communications; and
initiating a check of the premises if the monitoring station does not receive the security data packet within a predetermined time frame.
2. A method as in claim 1 , wherein the step of initiating a check of the premises further comprises the step of initiating a check of the premises if the security data packet includes one or more alarm indicators.
3. A method as in claim 37 , wherein the step of notifying selected electronic neighborhood watch subscribers further comprises the step of notifying selected electronic neighborhood watch subscribers if the security data packet includes one or more alarm indicators.
4. A method as in claim 1 , wherein the step of establishing a data link further comprises the step of establishing a bi-directional data link between the local security controller within the premises and the monitoring station.
5. (canceled)
6. A method as in claim 1 , further comprising the step of locating one or more subscriber control units at a public switched telephone network central office connected through an incumbent local exchange carrier.
7. A method as in claim 1 , wherein the step of transmitting a security data packet further comprises the step of transmitting an output security data packet from the subscriber control unit to the local security controller at a predefined periodic transmit rate.
8. A method as in claim 7 , further comprising the step of electronically responding when the output data packet is received at the local security controller by transmitting an input security data packet to the subscriber control unit.
9. A method as in claim 8 , further comprising the step of monitoring the input security data packets sent from one or more local security controllers over the security digital subscriber line to the subscriber control unit, wherein the subscriber control unit monitors the input security data packets for one or more conditions selected from the group consisting of an alarm condition, a delayed time, an unexpected data packet format, and one or more missing input security data packets.
10. A method as in claim 9 , further comprising the step of transmitting the output data packet when the one or more conditions occur, wherein the output data packet is configured to notify one or more locations of the condition, the locations selected from the group consisting of a premises transmitting the input security data packet having one or more conditions, one or more selected electronic network neighborhood members, and an investigative service.
11. (canceled)
12. A method as in claim 7 , further comprising the step of transmitting the output security data packet and input security data packet on a signal centered at an output frequency greater than 3300 Hertz.
13. A method as in claim 7 , further comprising the step of receiving the output security data packet at the one or more local security controllers, wherein each of the local security controllers is configured to interpret the output security data packet and respond by transmitting an input security data packet from the local security controller to the subscriber control unit.
14. A method as in claim 13 , further comprising the step of configuring the input security data packet to comprise one or more pieces of information selected from the group consisting of a date, a time, a subscriber identifier code, and one or more alarm conditions.
15. A method as in claim 14 , further comprising the step of receiving the input security data packet at the subscriber control unit, wherein the subscriber control unit is configured to receive the input security data packet from one or more local security controllers and to determine if the one or more alarm conditions in the input security data packet are within predetermined parameters.
16. A method as in claim 1 , wherein the step of initiating a check of the premises further comprises the step of initiating a check of the premises according to one or more predetermined alarm conditions as decided by a security system subscriber.
17. A method as in claim 1 , wherein the step of initiating a check of the premises further comprises the step of initiating a check of the premises when an alarm indicator is received at the subscriber control unit indicating an alarm condition consisting of one or more sensors selected from the group consisting or a door sensor, a window sensor, a motion sensor, a smoke alarm sensor, and a fire alarm sensor.
18. A method as in claim 37 , wherein the step of notifying selected electronic neighborhood watch subscribers further comprises the step of notifying selected electronic neighborhood watch subscribers according to one or more predetermined alarm conditions as decided by a security system subscriber.
19. A method as in claim 37 , wherein the step of notifying selected electronic neighborhood watch subscribers further comprises the step of notifying selected electronic neighborhood watch subscribers when an alarm indicator is received at the subscriber control unit indicating an alarm condition consisting of one or more sensors selected from the group consisting of a door sensor, a window sensor, a smoke alarm sensor, a fire alarm sensor, a moisture sensor, and a sump water level detector.
20. A method as in claim 1 , wherein the predefined periodic rate is less than five seconds.
21. A method as in claim 1 , wherein the predefined periodic rate is less than 15 minutes.
22. A method as in claim 1 , further comprising the step of configuring the local security controller to include one or more sensors selected from the group consisting of a smoke alarm, a fire alarm, a door sensor, a window sensor, a motion detector, a moisture sensor, a lawn moisture sensor, a thermostat, a sump water level detector, a refrigeration monitor, a vibration sensor, and a water quality sensor.
23. A method as in claim 22 , further comprising the step of connecting the one or more sensors to the local security controller using a single cable.
24. A method as in claim 23 , further comprising the step of supplying power through the single cable to the one or more sensors from a power supply located at the local security controller.
25. A method as in claim 23 , further comprising the step of supplying power through the single cable to the one or more sensors from a battery located at the local security controller.
26. A method as in claim 22 , further comprising the step of connecting the one or more sensors to the local security controller using a wireless communications standard selected form the group consisting of IEEE 802.11 and IEEE 802.15.
27. A method as in claim 22 , further comprising the step of testing the local security controller by entering a test code at the local security controller to test the local security controller and the one or more sensors.
28. A method as in claim 22 , further comprising the step of monitoring an operating condition of the one or more sensors at the subscriber control unit and reporting a fault condition when any of the one or more sensors' condition is outside predetermined parameters.
29. A method as in claim 1 , further comprising configuring the local security controller to have a voice messaging system and speaker which can be used to advise residents of the premises of an alarm condition at the resident's premises or selected electronic neighborhood watch subscribers' premises.
30. A system for actively maintaining security of a premises, comprising:
a local security controller located on a premises and configured to communicate with one or more sensors used for monitoring security at the premises;
a security digital subscriber line configured to transmit a security data packet at a predefined periodic rate over a public switched telephone network between the local security controller;
a subscriber control unit located remote from the premises, wherein the security data packet is transmitted over the security digital subscriber line at a frequency above a voice communication band on the public switched telephone network; and
the subscriber control unit configured to analyze the security data packet transmitted at the predefined periodic rate for one or more alarm conditions and notify an investigative service in communication with the subscriber control unit if the security data packet is not received at the subscriber control unit within a predetermined period.
31. The system of claim 30 , wherein the security digital subscriber line is configured to operate as a bi-directional data link between the subscriber control unit and the local security controller.
32. The system of claim 30 , wherein the subscriber control unit is further configured to notify the investigative service if the security data packet contains one or more alarm conditions.
33. The system of claim 30 , wherein the local security controller is further configured to receive an output security data packet transmitted from the subscriber control unit.
34. The system of claim 33 , wherein the output security data packet includes one or more alarm conditions from one or more neighbor's local security controller.
35. The system of claim 30 , wherein the subscriber control unit further comprises a pause control configured to enable a test module to be connected to the subscriber control unit for testing of the subscriber control unit and local security controller from the subscriber control unit.
36. The system of claim 30 , further comprising one or more sensors in communication with the local security controller selected from the group of sensors consisting of a smoke alarm, a fire alarm, a door sensor, a window sensor, a motion detector, a moisture sensor, a lawn moisture sensor, a thermostat, a sump water level detector, a refrigeration monitor, a vibration sensor, and a water quality sensor.
37. A method as in claim 1 , further comprising notifying selected electronic neighborhood watch subscribers if the monitoring station does not receive the security data packet within the predetermined time frame.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US10/979,985 US7053765B1 (en) | 2004-11-02 | 2004-11-02 | Active security system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US10/979,985 US7053765B1 (en) | 2004-11-02 | 2004-11-02 | Active security system |
Publications (2)
Publication Number | Publication Date |
---|---|
US20060103520A1 true US20060103520A1 (en) | 2006-05-18 |
US7053765B1 US7053765B1 (en) | 2006-05-30 |
Family
ID=36385698
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US10/979,985 Expired - Fee Related US7053765B1 (en) | 2004-11-02 | 2004-11-02 | Active security system |
Country Status (1)
Country | Link |
---|---|
US (1) | US7053765B1 (en) |
Cited By (97)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20050249334A1 (en) * | 1997-11-03 | 2005-11-10 | Light Elliott D | Method and apparatus for obtaining telephone status over a network |
US20060078101A1 (en) * | 1997-11-03 | 2006-04-13 | Light Elliott D | System and method for obtaining a status of an authorization device over a network |
US20060193456A1 (en) * | 1997-11-03 | 2006-08-31 | Light Elliott D | System and method for obtaining equipment status data over a network |
US20070142927A1 (en) * | 2005-12-21 | 2007-06-21 | Mark Nelson | Systems and methods for notifying of persistent states of monitored systems using distributed monitoring devices |
US20080068783A1 (en) * | 2006-09-19 | 2008-03-20 | Surveillance Specialties, Ltd. | Rack mounted access/security control panel |
WO2008127495A2 (en) * | 2007-02-01 | 2008-10-23 | Angel Secure Networks, Inc. | Container security devices, systems, and methods |
US20090034708A1 (en) * | 2007-07-31 | 2009-02-05 | Honeywell International, Inc. | Advanced call forwarding |
US20090128321A1 (en) * | 2007-10-23 | 2009-05-21 | Mi Kyung Ha | Home appliance with security function |
US20090231118A1 (en) * | 2008-03-13 | 2009-09-17 | Viking Electronic Services, Llc | Forwarding and fall back monitoring in an alarm system |
US20090231091A1 (en) * | 2008-03-12 | 2009-09-17 | Surveillance Specialties Ltd. | Wall-mounted access/security control panel |
US20090243836A1 (en) * | 2008-02-13 | 2009-10-01 | Mija Industries, Inc. | Object Tracking with Emergency Equipment |
US20100073161A1 (en) * | 2008-09-25 | 2010-03-25 | Harry Engel | Systems, Methods, and Computer Program for Monitoring Crime Activity and Dissemination of Crime Related Information and Alerts Over a Multi-User Network |
US20100277277A1 (en) * | 2009-04-29 | 2010-11-04 | Job Site Resources, Llc | Mobile tool facility |
US20110178630A1 (en) * | 2010-01-15 | 2011-07-21 | Job Site Resources, Llc | Portable asset dispensing device |
US8344885B2 (en) | 2008-01-22 | 2013-01-01 | Angel Secure Networks Inc. | Container with interior enclosure of composite material having embedded security element |
US20130009749A1 (en) * | 2011-07-06 | 2013-01-10 | Honeywell International Inc. | Method of neighborhood watch implemented in-part with electronic surveillance system |
WO2013003667A3 (en) * | 2011-06-29 | 2013-03-14 | Kelly Research Corp. | Security system |
US8717181B2 (en) | 2010-07-29 | 2014-05-06 | Hill-Rom Services, Inc. | Bed exit alert silence with automatic re-enable |
US20140266681A1 (en) * | 2013-03-14 | 2014-09-18 | Vivint, Inc. | Dynamic linking of security systems |
US20140372811A1 (en) * | 2009-04-30 | 2014-12-18 | Alan Wade Cohn | Server-based notification of alarm event subsequent to communication failure with armed security system |
US9123224B2 (en) | 2011-06-01 | 2015-09-01 | Jobsite Resources, Llc | Mobile perimeter access security system |
US20150356865A1 (en) * | 2014-06-05 | 2015-12-10 | Honeywell International Inc. | Apparatus and method for alarm panel wifi alarm audio verification connectivity test |
US20160117916A1 (en) * | 2014-10-24 | 2016-04-28 | Numerex Corp. | Method and system for detecting alarm system tampering |
US20160191264A1 (en) * | 2012-12-21 | 2016-06-30 | Jung Soo Kim | Security system and method using home gateway alliance |
US20160274759A1 (en) | 2008-08-25 | 2016-09-22 | Paul J. Dawes | Security system with networked touchscreen and gateway |
US20170363767A9 (en) * | 2007-02-01 | 2017-12-21 | Angel Secure Networks, Inc. | Container defense system |
US10051078B2 (en) | 2007-06-12 | 2018-08-14 | Icontrol Networks, Inc. | WiFi-to-serial encapsulation in systems |
US10062245B2 (en) | 2005-03-16 | 2018-08-28 | Icontrol Networks, Inc. | Cross-client sensor user interface in an integrated security network |
US10062273B2 (en) | 2010-09-28 | 2018-08-28 | Icontrol Networks, Inc. | Integrated security system with parallel processing architecture |
US10079839B1 (en) | 2007-06-12 | 2018-09-18 | Icontrol Networks, Inc. | Activation of gateway device |
US10078958B2 (en) | 2010-12-17 | 2018-09-18 | Icontrol Networks, Inc. | Method and system for logging security event data |
US10091014B2 (en) | 2005-03-16 | 2018-10-02 | Icontrol Networks, Inc. | Integrated security network with security alarm signaling system |
US10127801B2 (en) | 2005-03-16 | 2018-11-13 | Icontrol Networks, Inc. | Integrated security system with parallel processing architecture |
US10142394B2 (en) | 2007-06-12 | 2018-11-27 | Icontrol Networks, Inc. | Generating risk profile using data of home monitoring and security system |
US10140840B2 (en) | 2007-04-23 | 2018-11-27 | Icontrol Networks, Inc. | Method and system for providing alternate network access |
US10142392B2 (en) | 2007-01-24 | 2018-11-27 | Icontrol Networks, Inc. | Methods and systems for improved system performance |
US10142166B2 (en) | 2004-03-16 | 2018-11-27 | Icontrol Networks, Inc. | Takeover of security network |
US10156831B2 (en) | 2004-03-16 | 2018-12-18 | Icontrol Networks, Inc. | Automation system with mobile interface |
US10156959B2 (en) | 2005-03-16 | 2018-12-18 | Icontrol Networks, Inc. | Cross-client sensor user interface in an integrated security network |
US10200504B2 (en) | 2007-06-12 | 2019-02-05 | Icontrol Networks, Inc. | Communication protocols over internet protocol (IP) networks |
US10237237B2 (en) | 2007-06-12 | 2019-03-19 | Icontrol Networks, Inc. | Communication protocols in integrated systems |
US10313303B2 (en) | 2007-06-12 | 2019-06-04 | Icontrol Networks, Inc. | Forming a security network including integrated security system components and network devices |
US10339791B2 (en) | 2007-06-12 | 2019-07-02 | Icontrol Networks, Inc. | Security network integrated with premise security system |
US10348575B2 (en) | 2013-06-27 | 2019-07-09 | Icontrol Networks, Inc. | Control system user interface |
US10365810B2 (en) | 2007-06-12 | 2019-07-30 | Icontrol Networks, Inc. | Control system user interface |
US10382452B1 (en) | 2007-06-12 | 2019-08-13 | Icontrol Networks, Inc. | Communication protocols in integrated systems |
US10380871B2 (en) | 2005-03-16 | 2019-08-13 | Icontrol Networks, Inc. | Control system user interface |
US10389736B2 (en) | 2007-06-12 | 2019-08-20 | Icontrol Networks, Inc. | Communication protocols in integrated systems |
US10423309B2 (en) | 2007-06-12 | 2019-09-24 | Icontrol Networks, Inc. | Device integration framework |
US10498830B2 (en) | 2007-06-12 | 2019-12-03 | Icontrol Networks, Inc. | Wi-Fi-to-serial encapsulation in systems |
US10523689B2 (en) | 2007-06-12 | 2019-12-31 | Icontrol Networks, Inc. | Communication protocols over internet protocol (IP) networks |
US10522026B2 (en) | 2008-08-11 | 2019-12-31 | Icontrol Networks, Inc. | Automation system user interface with three-dimensional display |
US10530839B2 (en) | 2008-08-11 | 2020-01-07 | Icontrol Networks, Inc. | Integrated cloud system with lightweight gateway for premises automation |
US10559193B2 (en) | 2002-02-01 | 2020-02-11 | Comcast Cable Communications, Llc | Premises management systems |
US10616075B2 (en) | 2007-06-12 | 2020-04-07 | Icontrol Networks, Inc. | Communication protocols in integrated systems |
US10666523B2 (en) | 2007-06-12 | 2020-05-26 | Icontrol Networks, Inc. | Communication protocols in integrated systems |
US10721087B2 (en) | 2005-03-16 | 2020-07-21 | Icontrol Networks, Inc. | Method for networked touchscreen with integrated interfaces |
US10747216B2 (en) | 2007-02-28 | 2020-08-18 | Icontrol Networks, Inc. | Method and system for communicating with and controlling an alarm system from a remote server |
US10777056B2 (en) | 2017-12-05 | 2020-09-15 | Js2 Logistic Solutions, Llc | Mobile storage, tracking and security system and method thereof |
US10785319B2 (en) | 2006-06-12 | 2020-09-22 | Icontrol Networks, Inc. | IP device discovery systems and methods |
US10841381B2 (en) | 2005-03-16 | 2020-11-17 | Icontrol Networks, Inc. | Security system with networked touchscreen |
US10979389B2 (en) | 2004-03-16 | 2021-04-13 | Icontrol Networks, Inc. | Premises management configuration and control |
US10999254B2 (en) | 2005-03-16 | 2021-05-04 | Icontrol Networks, Inc. | System for data routing in networks |
US11089122B2 (en) | 2007-06-12 | 2021-08-10 | Icontrol Networks, Inc. | Controlling data routing among networks |
US11113950B2 (en) | 2005-03-16 | 2021-09-07 | Icontrol Networks, Inc. | Gateway integrated with premises security system |
US11146637B2 (en) | 2014-03-03 | 2021-10-12 | Icontrol Networks, Inc. | Media content management |
US11153266B2 (en) | 2004-03-16 | 2021-10-19 | Icontrol Networks, Inc. | Gateway registry methods and systems |
US11182060B2 (en) | 2004-03-16 | 2021-11-23 | Icontrol Networks, Inc. | Networked touchscreen with integrated interfaces |
US11201755B2 (en) | 2004-03-16 | 2021-12-14 | Icontrol Networks, Inc. | Premises system management using status signal |
US11212192B2 (en) | 2007-06-12 | 2021-12-28 | Icontrol Networks, Inc. | Communication protocols in integrated systems |
US11218878B2 (en) | 2007-06-12 | 2022-01-04 | Icontrol Networks, Inc. | Communication protocols in integrated systems |
US11240059B2 (en) | 2010-12-20 | 2022-02-01 | Icontrol Networks, Inc. | Defining and implementing sensor triggered response rules |
US11237714B2 (en) | 2007-06-12 | 2022-02-01 | Control Networks, Inc. | Control system user interface |
US11244545B2 (en) | 2004-03-16 | 2022-02-08 | Icontrol Networks, Inc. | Cross-client sensor user interface in an integrated security network |
US11258625B2 (en) | 2008-08-11 | 2022-02-22 | Icontrol Networks, Inc. | Mobile premises automation platform |
US11277465B2 (en) | 2004-03-16 | 2022-03-15 | Icontrol Networks, Inc. | Generating risk profile using data of home monitoring and security system |
US11282374B2 (en) | 2019-08-19 | 2022-03-22 | Ademco Inc. | Systems and methods for building and using a false alarm predicting model to determine whether to alert a user and/or relevant authorities about an alarm signal from a security system |
US11316958B2 (en) | 2008-08-11 | 2022-04-26 | Icontrol Networks, Inc. | Virtual device systems and methods |
US11316753B2 (en) | 2007-06-12 | 2022-04-26 | Icontrol Networks, Inc. | Communication protocols in integrated systems |
US11343380B2 (en) | 2004-03-16 | 2022-05-24 | Icontrol Networks, Inc. | Premises system automation |
US11368327B2 (en) | 2008-08-11 | 2022-06-21 | Icontrol Networks, Inc. | Integrated cloud system for premises automation |
US11368429B2 (en) | 2004-03-16 | 2022-06-21 | Icontrol Networks, Inc. | Premises management configuration and control |
US11398147B2 (en) | 2010-09-28 | 2022-07-26 | Icontrol Networks, Inc. | Method, system and apparatus for automated reporting of account and sensor zone information to a central station |
US11424980B2 (en) | 2005-03-16 | 2022-08-23 | Icontrol Networks, Inc. | Forming a security network including integrated security system components |
US11423756B2 (en) | 2007-06-12 | 2022-08-23 | Icontrol Networks, Inc. | Communication protocols in integrated systems |
US11451409B2 (en) | 2005-03-16 | 2022-09-20 | Icontrol Networks, Inc. | Security network integrating security system and network devices |
US11489812B2 (en) | 2004-03-16 | 2022-11-01 | Icontrol Networks, Inc. | Forming a security network including integrated security system components and network devices |
US11496568B2 (en) | 2005-03-16 | 2022-11-08 | Icontrol Networks, Inc. | Security system with networked touchscreen |
US11528454B2 (en) | 2018-03-12 | 2022-12-13 | Innovation Lock, Llc | Lock system including automation notification and surveillance integration |
US11545025B2 (en) * | 2018-03-12 | 2023-01-03 | Innovation Lock, Llc | Security system including automation notification and surveillance integration |
US11582065B2 (en) | 2007-06-12 | 2023-02-14 | Icontrol Networks, Inc. | Systems and methods for device communication |
US11646907B2 (en) | 2007-06-12 | 2023-05-09 | Icontrol Networks, Inc. | Communication protocols in integrated systems |
US11706045B2 (en) | 2005-03-16 | 2023-07-18 | Icontrol Networks, Inc. | Modular electronic display platform |
US11750414B2 (en) | 2010-12-16 | 2023-09-05 | Icontrol Networks, Inc. | Bidirectional security sensor communication for a premises security system |
US11792330B2 (en) | 2005-03-16 | 2023-10-17 | Icontrol Networks, Inc. | Communication and automation in a premises management system |
US11792036B2 (en) | 2008-08-11 | 2023-10-17 | Icontrol Networks, Inc. | Mobile premises automation platform |
US11962672B2 (en) | 2023-05-12 | 2024-04-16 | Icontrol Networks, Inc. | Virtual device systems and methods |
Families Citing this family (31)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US11811845B2 (en) | 2004-03-16 | 2023-11-07 | Icontrol Networks, Inc. | Communication protocols over internet protocol (IP) networks |
US11916870B2 (en) | 2004-03-16 | 2024-02-27 | Icontrol Networks, Inc. | Gateway registry methods and systems |
US11677577B2 (en) | 2004-03-16 | 2023-06-13 | Icontrol Networks, Inc. | Premises system management using status signal |
US7598880B2 (en) * | 2005-03-14 | 2009-10-06 | Liebert Corporation | Wireless battery monitoring system and method |
US11700142B2 (en) | 2005-03-16 | 2023-07-11 | Icontrol Networks, Inc. | Security network integrating security system and network devices |
US11615697B2 (en) | 2005-03-16 | 2023-03-28 | Icontrol Networks, Inc. | Premise management systems and methods |
US11706279B2 (en) | 2007-01-24 | 2023-07-18 | Icontrol Networks, Inc. | Methods and systems for data communication |
US8380355B2 (en) | 2007-03-19 | 2013-02-19 | Wayne/Scott Fetzer Company | Capacitive sensor and method and apparatus for controlling a pump using same |
US20080303661A1 (en) * | 2007-06-06 | 2008-12-11 | Chick James S | Compact and self-contained security system |
US11601810B2 (en) | 2007-06-12 | 2023-03-07 | Icontrol Networks, Inc. | Communication protocols in integrated systems |
US11831462B2 (en) | 2007-08-24 | 2023-11-28 | Icontrol Networks, Inc. | Controlling data routing in premises management systems |
US20090085704A1 (en) * | 2007-10-01 | 2009-04-02 | Infineon Technologies Austria Ag | Chip inductor |
US11916928B2 (en) | 2008-01-24 | 2024-02-27 | Icontrol Networks, Inc. | Communication protocols over internet protocol (IP) networks |
US20170185278A1 (en) | 2008-08-11 | 2017-06-29 | Icontrol Networks, Inc. | Automation system user interface |
US11729255B2 (en) | 2008-08-11 | 2023-08-15 | Icontrol Networks, Inc. | Integrated cloud system with lightweight gateway for premises automation |
US11758026B2 (en) | 2008-08-11 | 2023-09-12 | Icontrol Networks, Inc. | Virtual device systems and methods |
US7903566B2 (en) * | 2008-08-20 | 2011-03-08 | The Boeing Company | Methods and systems for anomaly detection using internet protocol (IP) traffic conversation data |
US7995496B2 (en) * | 2008-08-20 | 2011-08-09 | The Boeing Company | Methods and systems for internet protocol (IP) traffic conversation detection and storage |
US8726382B2 (en) * | 2008-08-20 | 2014-05-13 | The Boeing Company | Methods and systems for automated detection and tracking of network attacks |
US8762515B2 (en) * | 2008-08-20 | 2014-06-24 | The Boeing Company | Methods and systems for collection, tracking, and display of near real time multicast data |
US8813220B2 (en) | 2008-08-20 | 2014-08-19 | The Boeing Company | Methods and systems for internet protocol (IP) packet header collection and storage |
US20110110792A1 (en) * | 2009-11-12 | 2011-05-12 | Joseph Kendall Mauro | Sensors and methods and apparatus relating to same |
US20110110794A1 (en) * | 2009-11-12 | 2011-05-12 | Philip Mayleben | Sensors and methods and apparatus relating to same |
US11405463B2 (en) | 2014-03-03 | 2022-08-02 | Icontrol Networks, Inc. | Media content management |
US10909607B2 (en) | 2015-06-05 | 2021-02-02 | Boveda Inc. | Systems, methods and devices for controlling humidity in a closed environment with automatic and predictive identification, purchase and replacement of optimal humidity controller |
US10055781B2 (en) | 2015-06-05 | 2018-08-21 | Boveda Inc. | Systems, methods and devices for controlling humidity in a closed environment with automatic and predictive identification, purchase and replacement of optimal humidity controller |
US10711788B2 (en) | 2015-12-17 | 2020-07-14 | Wayne/Scott Fetzer Company | Integrated sump pump controller with status notifications |
US11162496B2 (en) | 2016-11-11 | 2021-11-02 | Wayne/Scott Fetzer Company | Pump with external electrical components and related methods |
USD893552S1 (en) | 2017-06-21 | 2020-08-18 | Wayne/Scott Fetzer Company | Pump components |
USD890211S1 (en) | 2018-01-11 | 2020-07-14 | Wayne/Scott Fetzer Company | Pump components |
US10694363B1 (en) | 2018-12-04 | 2020-06-23 | At&T Mobility Ii Llc | Facilitation of community notification for emergency events |
Citations (16)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US2520007A (en) * | 1947-11-21 | 1950-08-22 | Bell Telephone Labor Inc | Testing circuit for carrier communication system with automatic reset timer |
US3163856A (en) * | 1961-11-14 | 1964-12-29 | Frederick G Kirby | Alarm device for indicating lack of motion |
US3470553A (en) * | 1966-10-28 | 1969-09-30 | Daniel D Miller | System for detecting potential failure in bowling pin-setting machines |
US3803579A (en) * | 1972-12-29 | 1974-04-09 | M Compton | Automatic alarm system for bathroom |
US4012732A (en) * | 1976-03-19 | 1977-03-15 | Herrick Kennan C | Security device |
US4331953A (en) * | 1979-12-26 | 1982-05-25 | The Boeing Company | Communication system for use in hazardous confined areas |
US4682153A (en) * | 1985-10-23 | 1987-07-21 | Amerace Corporation | Fail-safe sensor system |
US5027383A (en) * | 1987-06-12 | 1991-06-25 | Versus Technology, Inc. | Supervised, interactive alarm reporting system |
US5576689A (en) * | 1993-08-27 | 1996-11-19 | Queen; Andrew | Self testing personal response system with programmable timer values |
US5686910A (en) * | 1995-04-10 | 1997-11-11 | Ford Motor Company | Vehicular emergency message system with automatic periodic call-in |
US5686886A (en) * | 1994-07-01 | 1997-11-11 | Stensney; John S. | Electronic neighborhood watch alert system and unit therefor |
US6134303A (en) * | 1999-01-20 | 2000-10-17 | Tempa Communication Inc. | United home security system |
US6351212B1 (en) * | 1998-01-28 | 2002-02-26 | Adam Q. Lynch | System for monitoring operability of fire event sensors |
US20020177428A1 (en) * | 2001-03-28 | 2002-11-28 | Menard Raymond J. | Remote notification of monitored condition |
US20030184436A1 (en) * | 2002-04-02 | 2003-10-02 | Seales Todd Z. | Security system |
US20040189460A1 (en) * | 2001-01-30 | 2004-09-30 | Michael Heaton | Method and system for monitoring events |
-
2004
- 2004-11-02 US US10/979,985 patent/US7053765B1/en not_active Expired - Fee Related
Patent Citations (16)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US2520007A (en) * | 1947-11-21 | 1950-08-22 | Bell Telephone Labor Inc | Testing circuit for carrier communication system with automatic reset timer |
US3163856A (en) * | 1961-11-14 | 1964-12-29 | Frederick G Kirby | Alarm device for indicating lack of motion |
US3470553A (en) * | 1966-10-28 | 1969-09-30 | Daniel D Miller | System for detecting potential failure in bowling pin-setting machines |
US3803579A (en) * | 1972-12-29 | 1974-04-09 | M Compton | Automatic alarm system for bathroom |
US4012732A (en) * | 1976-03-19 | 1977-03-15 | Herrick Kennan C | Security device |
US4331953A (en) * | 1979-12-26 | 1982-05-25 | The Boeing Company | Communication system for use in hazardous confined areas |
US4682153A (en) * | 1985-10-23 | 1987-07-21 | Amerace Corporation | Fail-safe sensor system |
US5027383A (en) * | 1987-06-12 | 1991-06-25 | Versus Technology, Inc. | Supervised, interactive alarm reporting system |
US5576689A (en) * | 1993-08-27 | 1996-11-19 | Queen; Andrew | Self testing personal response system with programmable timer values |
US5686886A (en) * | 1994-07-01 | 1997-11-11 | Stensney; John S. | Electronic neighborhood watch alert system and unit therefor |
US5686910A (en) * | 1995-04-10 | 1997-11-11 | Ford Motor Company | Vehicular emergency message system with automatic periodic call-in |
US6351212B1 (en) * | 1998-01-28 | 2002-02-26 | Adam Q. Lynch | System for monitoring operability of fire event sensors |
US6134303A (en) * | 1999-01-20 | 2000-10-17 | Tempa Communication Inc. | United home security system |
US20040189460A1 (en) * | 2001-01-30 | 2004-09-30 | Michael Heaton | Method and system for monitoring events |
US20020177428A1 (en) * | 2001-03-28 | 2002-11-28 | Menard Raymond J. | Remote notification of monitored condition |
US20030184436A1 (en) * | 2002-04-02 | 2003-10-02 | Seales Todd Z. | Security system |
Cited By (178)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7529350B2 (en) * | 1997-11-03 | 2009-05-05 | Light Elliott D | System and method for obtaining equipment status data over a network |
US20060078101A1 (en) * | 1997-11-03 | 2006-04-13 | Light Elliott D | System and method for obtaining a status of an authorization device over a network |
US20060193456A1 (en) * | 1997-11-03 | 2006-08-31 | Light Elliott D | System and method for obtaining equipment status data over a network |
US20050249334A1 (en) * | 1997-11-03 | 2005-11-10 | Light Elliott D | Method and apparatus for obtaining telephone status over a network |
US7356128B2 (en) * | 1997-11-03 | 2008-04-08 | Intellectual Ventures Fund 30, Llc | Method and apparatus for obtaining status of monitoring devices over a network |
US20080137822A1 (en) * | 1997-11-03 | 2008-06-12 | Intellectual Ventures Funds 30 Llc | Method and apparatus for obtaining telephone status over a network |
US8464359B2 (en) | 1997-11-03 | 2013-06-11 | Intellectual Ventures Fund 30, Llc | System and method for obtaining a status of an authorization device over a network |
US7986770B2 (en) | 1997-11-03 | 2011-07-26 | Intellectual Ventures Fund 30 Llc | Method and apparatus for obtaining telephone status over a network |
US10559193B2 (en) | 2002-02-01 | 2020-02-11 | Comcast Cable Communications, Llc | Premises management systems |
US10156831B2 (en) | 2004-03-16 | 2018-12-18 | Icontrol Networks, Inc. | Automation system with mobile interface |
US10691295B2 (en) | 2004-03-16 | 2020-06-23 | Icontrol Networks, Inc. | User interface in a premises network |
US11810445B2 (en) | 2004-03-16 | 2023-11-07 | Icontrol Networks, Inc. | Cross-client sensor user interface in an integrated security network |
US10447491B2 (en) | 2004-03-16 | 2019-10-15 | Icontrol Networks, Inc. | Premises system management using status signal |
US10142166B2 (en) | 2004-03-16 | 2018-11-27 | Icontrol Networks, Inc. | Takeover of security network |
US10992784B2 (en) | 2004-03-16 | 2021-04-27 | Control Networks, Inc. | Communication protocols over internet protocol (IP) networks |
US11656667B2 (en) | 2004-03-16 | 2023-05-23 | Icontrol Networks, Inc. | Integrated security system with parallel processing architecture |
US10979389B2 (en) | 2004-03-16 | 2021-04-13 | Icontrol Networks, Inc. | Premises management configuration and control |
US11537186B2 (en) | 2004-03-16 | 2022-12-27 | Icontrol Networks, Inc. | Integrated security system with parallel processing architecture |
US11037433B2 (en) | 2004-03-16 | 2021-06-15 | Icontrol Networks, Inc. | Management of a security system at a premises |
US11043112B2 (en) | 2004-03-16 | 2021-06-22 | Icontrol Networks, Inc. | Integrated security system with parallel processing architecture |
US10692356B2 (en) | 2004-03-16 | 2020-06-23 | Icontrol Networks, Inc. | Control system user interface |
US11489812B2 (en) | 2004-03-16 | 2022-11-01 | Icontrol Networks, Inc. | Forming a security network including integrated security system components and network devices |
US11082395B2 (en) | 2004-03-16 | 2021-08-03 | Icontrol Networks, Inc. | Premises management configuration and control |
US10890881B2 (en) | 2004-03-16 | 2021-01-12 | Icontrol Networks, Inc. | Premises management networking |
US11182060B2 (en) | 2004-03-16 | 2021-11-23 | Icontrol Networks, Inc. | Networked touchscreen with integrated interfaces |
US11153266B2 (en) | 2004-03-16 | 2021-10-19 | Icontrol Networks, Inc. | Gateway registry methods and systems |
US10735249B2 (en) | 2004-03-16 | 2020-08-04 | Icontrol Networks, Inc. | Management of a security system at a premises |
US11159484B2 (en) | 2004-03-16 | 2021-10-26 | Icontrol Networks, Inc. | Forming a security network including integrated security system components and network devices |
US11410531B2 (en) | 2004-03-16 | 2022-08-09 | Icontrol Networks, Inc. | Automation system user interface with three-dimensional display |
US10754304B2 (en) | 2004-03-16 | 2020-08-25 | Icontrol Networks, Inc. | Automation system with mobile interface |
US11378922B2 (en) | 2004-03-16 | 2022-07-05 | Icontrol Networks, Inc. | Automation system with mobile interface |
US11368429B2 (en) | 2004-03-16 | 2022-06-21 | Icontrol Networks, Inc. | Premises management configuration and control |
US11175793B2 (en) | 2004-03-16 | 2021-11-16 | Icontrol Networks, Inc. | User interface in a premises network |
US11343380B2 (en) | 2004-03-16 | 2022-05-24 | Icontrol Networks, Inc. | Premises system automation |
US11277465B2 (en) | 2004-03-16 | 2022-03-15 | Icontrol Networks, Inc. | Generating risk profile using data of home monitoring and security system |
US11244545B2 (en) | 2004-03-16 | 2022-02-08 | Icontrol Networks, Inc. | Cross-client sensor user interface in an integrated security network |
US11201755B2 (en) | 2004-03-16 | 2021-12-14 | Icontrol Networks, Inc. | Premises system management using status signal |
US10796557B2 (en) | 2004-03-16 | 2020-10-06 | Icontrol Networks, Inc. | Automation system user interface with three-dimensional display |
US11184322B2 (en) | 2004-03-16 | 2021-11-23 | Icontrol Networks, Inc. | Communication protocols in integrated systems |
US11451409B2 (en) | 2005-03-16 | 2022-09-20 | Icontrol Networks, Inc. | Security network integrating security system and network devices |
US10156959B2 (en) | 2005-03-16 | 2018-12-18 | Icontrol Networks, Inc. | Cross-client sensor user interface in an integrated security network |
US11824675B2 (en) | 2005-03-16 | 2023-11-21 | Icontrol Networks, Inc. | Networked touchscreen with integrated interfaces |
US10721087B2 (en) | 2005-03-16 | 2020-07-21 | Icontrol Networks, Inc. | Method for networked touchscreen with integrated interfaces |
US10841381B2 (en) | 2005-03-16 | 2020-11-17 | Icontrol Networks, Inc. | Security system with networked touchscreen |
US11424980B2 (en) | 2005-03-16 | 2022-08-23 | Icontrol Networks, Inc. | Forming a security network including integrated security system components |
US10930136B2 (en) | 2005-03-16 | 2021-02-23 | Icontrol Networks, Inc. | Premise management systems and methods |
US10062245B2 (en) | 2005-03-16 | 2018-08-28 | Icontrol Networks, Inc. | Cross-client sensor user interface in an integrated security network |
US11113950B2 (en) | 2005-03-16 | 2021-09-07 | Icontrol Networks, Inc. | Gateway integrated with premises security system |
US11367340B2 (en) | 2005-03-16 | 2022-06-21 | Icontrol Networks, Inc. | Premise management systems and methods |
US11496568B2 (en) | 2005-03-16 | 2022-11-08 | Icontrol Networks, Inc. | Security system with networked touchscreen |
US10091014B2 (en) | 2005-03-16 | 2018-10-02 | Icontrol Networks, Inc. | Integrated security network with security alarm signaling system |
US10380871B2 (en) | 2005-03-16 | 2019-08-13 | Icontrol Networks, Inc. | Control system user interface |
US10127801B2 (en) | 2005-03-16 | 2018-11-13 | Icontrol Networks, Inc. | Integrated security system with parallel processing architecture |
US10999254B2 (en) | 2005-03-16 | 2021-05-04 | Icontrol Networks, Inc. | System for data routing in networks |
US11792330B2 (en) | 2005-03-16 | 2023-10-17 | Icontrol Networks, Inc. | Communication and automation in a premises management system |
US11706045B2 (en) | 2005-03-16 | 2023-07-18 | Icontrol Networks, Inc. | Modular electronic display platform |
US7693590B2 (en) * | 2005-12-21 | 2010-04-06 | Panasonic Electric Works Co., Ltd. | Systems and methods for notifying of persistent states of monitored systems using distributed monitoring devices |
US20070142927A1 (en) * | 2005-12-21 | 2007-06-21 | Mark Nelson | Systems and methods for notifying of persistent states of monitored systems using distributed monitoring devices |
US11418518B2 (en) | 2006-06-12 | 2022-08-16 | Icontrol Networks, Inc. | Activation of gateway device |
US10616244B2 (en) | 2006-06-12 | 2020-04-07 | Icontrol Networks, Inc. | Activation of gateway device |
US10785319B2 (en) | 2006-06-12 | 2020-09-22 | Icontrol Networks, Inc. | IP device discovery systems and methods |
US20080068783A1 (en) * | 2006-09-19 | 2008-03-20 | Surveillance Specialties, Ltd. | Rack mounted access/security control panel |
US11418572B2 (en) | 2007-01-24 | 2022-08-16 | Icontrol Networks, Inc. | Methods and systems for improved system performance |
US10225314B2 (en) | 2007-01-24 | 2019-03-05 | Icontrol Networks, Inc. | Methods and systems for improved system performance |
US10142392B2 (en) | 2007-01-24 | 2018-11-27 | Icontrol Networks, Inc. | Methods and systems for improved system performance |
US11412027B2 (en) | 2007-01-24 | 2022-08-09 | Icontrol Networks, Inc. | Methods and systems for data communication |
US8537009B2 (en) * | 2007-02-01 | 2013-09-17 | Angel Secure Networks, Inc. | Container security devices, systems, and method |
US20170363767A9 (en) * | 2007-02-01 | 2017-12-21 | Angel Secure Networks, Inc. | Container defense system |
WO2008127495A2 (en) * | 2007-02-01 | 2008-10-23 | Angel Secure Networks, Inc. | Container security devices, systems, and methods |
WO2008127495A3 (en) * | 2007-02-01 | 2008-12-04 | Angel Secure Networks Inc | Container security devices, systems, and methods |
US20110095887A1 (en) * | 2007-02-01 | 2011-04-28 | Hess Charles T | Container security devices, systems, and method |
US11194320B2 (en) | 2007-02-28 | 2021-12-07 | Icontrol Networks, Inc. | Method and system for managing communication connectivity |
US10747216B2 (en) | 2007-02-28 | 2020-08-18 | Icontrol Networks, Inc. | Method and system for communicating with and controlling an alarm system from a remote server |
US10657794B1 (en) | 2007-02-28 | 2020-05-19 | Icontrol Networks, Inc. | Security, monitoring and automation controller access and use of legacy security control panel information |
US11809174B2 (en) | 2007-02-28 | 2023-11-07 | Icontrol Networks, Inc. | Method and system for managing communication connectivity |
US11132888B2 (en) | 2007-04-23 | 2021-09-28 | Icontrol Networks, Inc. | Method and system for providing alternate network access |
US10672254B2 (en) | 2007-04-23 | 2020-06-02 | Icontrol Networks, Inc. | Method and system for providing alternate network access |
US10140840B2 (en) | 2007-04-23 | 2018-11-27 | Icontrol Networks, Inc. | Method and system for providing alternate network access |
US10051078B2 (en) | 2007-06-12 | 2018-08-14 | Icontrol Networks, Inc. | WiFi-to-serial encapsulation in systems |
US10200504B2 (en) | 2007-06-12 | 2019-02-05 | Icontrol Networks, Inc. | Communication protocols over internet protocol (IP) networks |
US11423756B2 (en) | 2007-06-12 | 2022-08-23 | Icontrol Networks, Inc. | Communication protocols in integrated systems |
US11316753B2 (en) | 2007-06-12 | 2022-04-26 | Icontrol Networks, Inc. | Communication protocols in integrated systems |
US10498830B2 (en) | 2007-06-12 | 2019-12-03 | Icontrol Networks, Inc. | Wi-Fi-to-serial encapsulation in systems |
US10444964B2 (en) | 2007-06-12 | 2019-10-15 | Icontrol Networks, Inc. | Control system user interface |
US10616075B2 (en) | 2007-06-12 | 2020-04-07 | Icontrol Networks, Inc. | Communication protocols in integrated systems |
US10423309B2 (en) | 2007-06-12 | 2019-09-24 | Icontrol Networks, Inc. | Device integration framework |
US10666523B2 (en) | 2007-06-12 | 2020-05-26 | Icontrol Networks, Inc. | Communication protocols in integrated systems |
US11237714B2 (en) | 2007-06-12 | 2022-02-01 | Control Networks, Inc. | Control system user interface |
US10389736B2 (en) | 2007-06-12 | 2019-08-20 | Icontrol Networks, Inc. | Communication protocols in integrated systems |
US10382452B1 (en) | 2007-06-12 | 2019-08-13 | Icontrol Networks, Inc. | Communication protocols in integrated systems |
US11582065B2 (en) | 2007-06-12 | 2023-02-14 | Icontrol Networks, Inc. | Systems and methods for device communication |
US10365810B2 (en) | 2007-06-12 | 2019-07-30 | Icontrol Networks, Inc. | Control system user interface |
US11894986B2 (en) | 2007-06-12 | 2024-02-06 | Icontrol Networks, Inc. | Communication protocols in integrated systems |
US11218878B2 (en) | 2007-06-12 | 2022-01-04 | Icontrol Networks, Inc. | Communication protocols in integrated systems |
US10339791B2 (en) | 2007-06-12 | 2019-07-02 | Icontrol Networks, Inc. | Security network integrated with premise security system |
US11212192B2 (en) | 2007-06-12 | 2021-12-28 | Icontrol Networks, Inc. | Communication protocols in integrated systems |
US11611568B2 (en) | 2007-06-12 | 2023-03-21 | Icontrol Networks, Inc. | Communication protocols over internet protocol (IP) networks |
US10313303B2 (en) | 2007-06-12 | 2019-06-04 | Icontrol Networks, Inc. | Forming a security network including integrated security system components and network devices |
US11625161B2 (en) | 2007-06-12 | 2023-04-11 | Icontrol Networks, Inc. | Control system user interface |
US11646907B2 (en) | 2007-06-12 | 2023-05-09 | Icontrol Networks, Inc. | Communication protocols in integrated systems |
US11089122B2 (en) | 2007-06-12 | 2021-08-10 | Icontrol Networks, Inc. | Controlling data routing among networks |
US10237237B2 (en) | 2007-06-12 | 2019-03-19 | Icontrol Networks, Inc. | Communication protocols in integrated systems |
US10079839B1 (en) | 2007-06-12 | 2018-09-18 | Icontrol Networks, Inc. | Activation of gateway device |
US10523689B2 (en) | 2007-06-12 | 2019-12-31 | Icontrol Networks, Inc. | Communication protocols over internet protocol (IP) networks |
US10142394B2 (en) | 2007-06-12 | 2018-11-27 | Icontrol Networks, Inc. | Generating risk profile using data of home monitoring and security system |
US20090034708A1 (en) * | 2007-07-31 | 2009-02-05 | Honeywell International, Inc. | Advanced call forwarding |
US8199894B2 (en) * | 2007-07-31 | 2012-06-12 | Honeywell International Inc. | Advanced call forwarding |
US20090128321A1 (en) * | 2007-10-23 | 2009-05-21 | Mi Kyung Ha | Home appliance with security function |
US8917177B2 (en) | 2008-01-22 | 2014-12-23 | Angel Secure Networks, Inc. | Security structure of composite material having embedded security elements |
US8344885B2 (en) | 2008-01-22 | 2013-01-01 | Angel Secure Networks Inc. | Container with interior enclosure of composite material having embedded security element |
US8981927B2 (en) * | 2008-02-13 | 2015-03-17 | En-Gauge, Inc. | Object Tracking with emergency equipment |
US20090243836A1 (en) * | 2008-02-13 | 2009-10-01 | Mija Industries, Inc. | Object Tracking with Emergency Equipment |
US20090231091A1 (en) * | 2008-03-12 | 2009-09-17 | Surveillance Specialties Ltd. | Wall-mounted access/security control panel |
US20090231118A1 (en) * | 2008-03-13 | 2009-09-17 | Viking Electronic Services, Llc | Forwarding and fall back monitoring in an alarm system |
US11641391B2 (en) | 2008-08-11 | 2023-05-02 | Icontrol Networks Inc. | Integrated cloud system with lightweight gateway for premises automation |
US10522026B2 (en) | 2008-08-11 | 2019-12-31 | Icontrol Networks, Inc. | Automation system user interface with three-dimensional display |
US11258625B2 (en) | 2008-08-11 | 2022-02-22 | Icontrol Networks, Inc. | Mobile premises automation platform |
US11792036B2 (en) | 2008-08-11 | 2023-10-17 | Icontrol Networks, Inc. | Mobile premises automation platform |
US11368327B2 (en) | 2008-08-11 | 2022-06-21 | Icontrol Networks, Inc. | Integrated cloud system for premises automation |
US11616659B2 (en) | 2008-08-11 | 2023-03-28 | Icontrol Networks, Inc. | Integrated cloud system for premises automation |
US11190578B2 (en) | 2008-08-11 | 2021-11-30 | Icontrol Networks, Inc. | Integrated cloud system with lightweight gateway for premises automation |
US11316958B2 (en) | 2008-08-11 | 2022-04-26 | Icontrol Networks, Inc. | Virtual device systems and methods |
US10530839B2 (en) | 2008-08-11 | 2020-01-07 | Icontrol Networks, Inc. | Integrated cloud system with lightweight gateway for premises automation |
US10375253B2 (en) | 2008-08-25 | 2019-08-06 | Icontrol Networks, Inc. | Security system with networked touchscreen and gateway |
US20160274759A1 (en) | 2008-08-25 | 2016-09-22 | Paul J. Dawes | Security system with networked touchscreen and gateway |
US20100073161A1 (en) * | 2008-09-25 | 2010-03-25 | Harry Engel | Systems, Methods, and Computer Program for Monitoring Crime Activity and Dissemination of Crime Related Information and Alerts Over a Multi-User Network |
US8686831B2 (en) * | 2009-04-29 | 2014-04-01 | Job Site Resources, Llc | Mobile tool facility |
US20100277277A1 (en) * | 2009-04-29 | 2010-11-04 | Job Site Resources, Llc | Mobile tool facility |
US11856502B2 (en) | 2009-04-30 | 2023-12-26 | Icontrol Networks, Inc. | Method, system and apparatus for automated inventory reporting of security, monitoring and automation hardware and software at customer premises |
US11129084B2 (en) | 2009-04-30 | 2021-09-21 | Icontrol Networks, Inc. | Notification of event subsequent to communication failure with security system |
US10674428B2 (en) | 2009-04-30 | 2020-06-02 | Icontrol Networks, Inc. | Hardware configurable security, monitoring and automation controller having modular communication protocol interfaces |
US11223998B2 (en) | 2009-04-30 | 2022-01-11 | Icontrol Networks, Inc. | Security, monitoring and automation controller access and use of legacy security control panel information |
US11284331B2 (en) | 2009-04-30 | 2022-03-22 | Icontrol Networks, Inc. | Server-based notification of alarm event subsequent to communication failure with armed security system |
US10237806B2 (en) | 2009-04-30 | 2019-03-19 | Icontrol Networks, Inc. | Activation of a home automation controller |
US10332363B2 (en) | 2009-04-30 | 2019-06-25 | Icontrol Networks, Inc. | Controller and interface for home security, monitoring and automation having customizable audio alerts for SMA events |
US11601865B2 (en) | 2009-04-30 | 2023-03-07 | Icontrol Networks, Inc. | Server-based notification of alarm event subsequent to communication failure with armed security system |
US10275999B2 (en) * | 2009-04-30 | 2019-04-30 | Icontrol Networks, Inc. | Server-based notification of alarm event subsequent to communication failure with armed security system |
US10813034B2 (en) | 2009-04-30 | 2020-10-20 | Icontrol Networks, Inc. | Method, system and apparatus for management of applications for an SMA controller |
US11356926B2 (en) | 2009-04-30 | 2022-06-07 | Icontrol Networks, Inc. | Hardware configurable security, monitoring and automation controller having modular communication protocol interfaces |
US20140372811A1 (en) * | 2009-04-30 | 2014-12-18 | Alan Wade Cohn | Server-based notification of alarm event subsequent to communication failure with armed security system |
US11665617B2 (en) | 2009-04-30 | 2023-05-30 | Icontrol Networks, Inc. | Server-based notification of alarm event subsequent to communication failure with armed security system |
US11553399B2 (en) | 2009-04-30 | 2023-01-10 | Icontrol Networks, Inc. | Custom content for premises management |
US20110178630A1 (en) * | 2010-01-15 | 2011-07-21 | Job Site Resources, Llc | Portable asset dispensing device |
US8570169B2 (en) * | 2010-01-15 | 2013-10-29 | Job Site Resources, Llc | Portable asset dispensing device |
US8717181B2 (en) | 2010-07-29 | 2014-05-06 | Hill-Rom Services, Inc. | Bed exit alert silence with automatic re-enable |
US10223903B2 (en) | 2010-09-28 | 2019-03-05 | Icontrol Networks, Inc. | Integrated security system with parallel processing architecture |
US10062273B2 (en) | 2010-09-28 | 2018-08-28 | Icontrol Networks, Inc. | Integrated security system with parallel processing architecture |
US11398147B2 (en) | 2010-09-28 | 2022-07-26 | Icontrol Networks, Inc. | Method, system and apparatus for automated reporting of account and sensor zone information to a central station |
US10127802B2 (en) | 2010-09-28 | 2018-11-13 | Icontrol Networks, Inc. | Integrated security system with parallel processing architecture |
US11750414B2 (en) | 2010-12-16 | 2023-09-05 | Icontrol Networks, Inc. | Bidirectional security sensor communication for a premises security system |
US10741057B2 (en) | 2010-12-17 | 2020-08-11 | Icontrol Networks, Inc. | Method and system for processing security event data |
US11341840B2 (en) | 2010-12-17 | 2022-05-24 | Icontrol Networks, Inc. | Method and system for processing security event data |
US10078958B2 (en) | 2010-12-17 | 2018-09-18 | Icontrol Networks, Inc. | Method and system for logging security event data |
US11240059B2 (en) | 2010-12-20 | 2022-02-01 | Icontrol Networks, Inc. | Defining and implementing sensor triggered response rules |
US9123224B2 (en) | 2011-06-01 | 2015-09-01 | Jobsite Resources, Llc | Mobile perimeter access security system |
WO2013003667A3 (en) * | 2011-06-29 | 2013-03-14 | Kelly Research Corp. | Security system |
US9613522B2 (en) | 2011-06-29 | 2017-04-04 | Kelly Research Corp. | Security system |
US8749383B2 (en) * | 2011-07-06 | 2014-06-10 | Honeywell International Inc. | Method of neighborhood watch implemented in-part with electronic surveillance system |
US20130009749A1 (en) * | 2011-07-06 | 2013-01-10 | Honeywell International Inc. | Method of neighborhood watch implemented in-part with electronic surveillance system |
US9544163B2 (en) * | 2012-12-21 | 2017-01-10 | Ambus Co., Ltd. | Security system and method using home gateway alliance |
US20160191264A1 (en) * | 2012-12-21 | 2016-06-30 | Jung Soo Kim | Security system and method using home gateway alliance |
US20140266681A1 (en) * | 2013-03-14 | 2014-09-18 | Vivint, Inc. | Dynamic linking of security systems |
US9589453B2 (en) * | 2013-03-14 | 2017-03-07 | Vivint, Inc. | Dynamic linking of security systems |
US10217335B2 (en) * | 2013-03-14 | 2019-02-26 | Vivint, Inc. | Dynamic linking of security systems |
US11296950B2 (en) | 2013-06-27 | 2022-04-05 | Icontrol Networks, Inc. | Control system user interface |
US10348575B2 (en) | 2013-06-27 | 2019-07-09 | Icontrol Networks, Inc. | Control system user interface |
US11146637B2 (en) | 2014-03-03 | 2021-10-12 | Icontrol Networks, Inc. | Media content management |
US10839676B2 (en) * | 2014-06-05 | 2020-11-17 | Ademco Inc. | Apparatus and method for alarm panel WIFI alarm audio verification connectivity test |
US20150356865A1 (en) * | 2014-06-05 | 2015-12-10 | Honeywell International Inc. | Apparatus and method for alarm panel wifi alarm audio verification connectivity test |
US20160117916A1 (en) * | 2014-10-24 | 2016-04-28 | Numerex Corp. | Method and system for detecting alarm system tampering |
US9449497B2 (en) * | 2014-10-24 | 2016-09-20 | Numerex Corp. | Method and system for detecting alarm system tampering |
US10777056B2 (en) | 2017-12-05 | 2020-09-15 | Js2 Logistic Solutions, Llc | Mobile storage, tracking and security system and method thereof |
US11528454B2 (en) | 2018-03-12 | 2022-12-13 | Innovation Lock, Llc | Lock system including automation notification and surveillance integration |
US11545025B2 (en) * | 2018-03-12 | 2023-01-03 | Innovation Lock, Llc | Security system including automation notification and surveillance integration |
US11893877B2 (en) * | 2018-03-12 | 2024-02-06 | Innovation Lock, Llc | Security system including automation notification and surveillance integration |
US11776387B2 (en) | 2019-08-19 | 2023-10-03 | Ademco Inc. | Systems and methods for building and using a false alarm predicting model to determine whether to alert a user and/or relevant authorities about an alarm signal from a security system |
US11282374B2 (en) | 2019-08-19 | 2022-03-22 | Ademco Inc. | Systems and methods for building and using a false alarm predicting model to determine whether to alert a user and/or relevant authorities about an alarm signal from a security system |
US11962672B2 (en) | 2023-05-12 | 2024-04-16 | Icontrol Networks, Inc. | Virtual device systems and methods |
Also Published As
Publication number | Publication date |
---|---|
US7053765B1 (en) | 2006-05-30 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US7053765B1 (en) | Active security system | |
US11194320B2 (en) | Method and system for managing communication connectivity | |
US6067346A (en) | Method and system for providing redundancy in security systems served by a public switched telephone network | |
US7855635B2 (en) | Method and system for coupling an alarm system to an external network | |
US7561038B2 (en) | Telemetry system | |
US7253728B2 (en) | Telemetry system | |
US8396446B2 (en) | Two way voice communication through GSM with alarm communication | |
CA2274572C (en) | Security alarm system | |
CA2346638C (en) | Wireless home fire and security alarm system | |
US5146486A (en) | Cellular network data transmission system | |
US8666357B2 (en) | System and method for transmitting an emergency message over an integrated wireless network | |
US20120231758A1 (en) | Alarm system providing wireless voice communication | |
WO2001040912A2 (en) | Security system linked to the internet | |
US6014426A (en) | Telephone line integrity monitoring system | |
US20070178879A1 (en) | Alarm system | |
US6263050B1 (en) | Method and system for responding to security system breaches via a wireless network | |
JP4620218B2 (en) | Home security system | |
JP2005184190A (en) | Monitoring device and program thereof | |
JPH11283160A (en) | Detour reporting system in case of telephone line disconnection | |
CA2214525C (en) | Improvements in or relating to telephone line monitoring | |
US20050031091A1 (en) | Panel SaverTM CPE detection apparatus and method | |
JP2003078904A (en) | Remote supervisory system | |
AU2007203059B2 (en) | A Telemetry System | |
EP1028582A2 (en) | Method and system for detecting a security system breach using telecommunications equipment | |
KR20050115171A (en) | Apparatus and method for alarming in home automation system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: PROVIDER SERVICES, INC., UTAH Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:CLARK, RUEL ROSS;REEL/FRAME:015966/0220 Effective date: 20041102 |
|
REMI | Maintenance fee reminder mailed | ||
LAPS | Lapse for failure to pay maintenance fees | ||
STCH | Information on status: patent discontinuation |
Free format text: PATENT EXPIRED DUE TO NONPAYMENT OF MAINTENANCE FEES UNDER 37 CFR 1.362 |
|
FP | Lapsed due to failure to pay maintenance fee |
Effective date: 20100530 |