The field of the invention relates to alarm panels and more particularly to alarm panels that operate in conjunction with central monitoring stations.
Security systems are generally known. Such systems are typically used in conjunction with a secured area to protect assets and/or people within the secured area.
The secured area is typically protected with a physical barrier (e.g., walls, fences, etc.) extending along a periphery of the secured area. Located along the physical barrier may be one or more access points allowing access into the secured area by authorized persons.
The access points may each include some sort of lock and an intrusion detection device (e.g., a magnetic switch). A control panel is usually provided within the secured area near the access points where an authorized person may enter a code deactivating the system after entry.
The control panel may be located on or coupled to a security panel. The security panel is typically located within the secured area and functions to disarm the security system by matching the identifier entered through the security panel with a reference identifier saved within a computer file.
In the event of a security breach, the security panel generates a local alarm and also sends an alarm notification to a central monitoring station. In many cases, the alarm notification to the central monitoring station is transmitted over a telephone line.
While security systems work well, they are not particularly well adapted for change. In order to operate reliably, the programming of such systems is typically located within firmware of the alarm panel. Because of the need for flexibility, a need exists for better methods of easily modifying the routing of alarms.
Upon activation of the security system 10, a central processing unit (CPU) 20 loads an operating system, a number of security monitoring applications and a configuration file from memory 22. Included within the security monitoring applications and/or configuration files may be a set of system addresses that allows a monitoring processor 24 to monitor the intrusion sensors 14, 16 and at least one access point 26 that includes a keypad and/or an identification reader (e.g., a keypad, card reader, etc.).
In normal operation, the monitoring processor 24 of the alarm panel 18 continuously monitors the intrusion sensors 14, 16. When an intrusion is detected via activation of one of the sensors 14, 16, the monitoring processor 24 may generate an alarm immediately or wait a predetermined time for entry of an alarm cancel code through the identification reader of the access point 26. If an alarm cancel code is not provided, then the monitoring processor 24 may send an alarm notification message 30 to a central monitoring station 28.
In order to send an alarm notification message 30, the monitoring processor 24 forwards an identifier of the sensor 14, 16 and instructions to a communication processor 32. The communication processor 32 receives the identification of the sensor 14, 16 and composes the alarm notification message 30.
Included within the alarm notification message 30 may be a telephone number 34 of the first central monitoring station 28, a sensor identifier 36, an identifier of the security system 10 and a time. In order to send the message 30, the communication processor 32 may first seize a telephone connection 29 connected to a communication port 40 of the alarm panel 18 and outpulse or otherwise send the telephone number 34. The communication processor 32 may then wait for notification of a connection between the first central station monitoring station 28 and the alarm panel 18.
Once the communication processor 32 of the alarm panel detects the end-to-end connection between the communication processor 32 and the first central monitoring station 28, the communication processor 32 proceeds to send the remainder of the message 30. In this case, the communication processor 32 may use an internal modem to modulate a carrier with the remainder of the message including the identification of the alarm panel 18, the activated sensor 14, 16 and the time. Upon receipt of the alarm message, the first central monitoring station 28 may proceed in a conventional manner by notifying the appropriate entity (e.g., the owner of the secured premises 12, a private security firm, the local police, etc.).
Under an illustrated embodiment of the invention, the security system 10 may be easily modified to operate in conjunction with a second central monitoring station 38 that is different than the first central monitoring station 28. Such a change may become necessary for any of a number of different reasons. For example, the criticality of security within the secured premise may no longer allow the transmission of alarm signals through wires or other communication lines that could be damage or even cut by an intruder before forcibly entering the secured area. Alternatively, an owner of the secured area 12 may wish to obtain central monitoring from a different central monitoring station 38 for purposes of cost or for better service.
Under the illustrated embodiment, the conversion of the system 10 for operation with a different central monitoring station 38 may be accomplished via a rerouting box/processor 48 without modification of the alarm panel 18. In this case, the conventional telephone connection 29 is disconnected 42 from the port 40 of the alarm panel 18. Once the conventional telephone connection 29 is removed from the port 40, a similar connector 44 may be plugged 46 into the port 40, thereby connecting the alarm panel 18 to the rerouting processor 48.
The rerouting processor 48 may operate under any of a number of different formats to route alarm notification messages to the second central monitoring station 38. For example, the rerouting processor 48 may receive the alarm notification message 30 from the alarm panel 18, alter the message 30 by replacing the telephone number 34 of the first central monitoring station 28 with a telephone number of the second central monitoring station 38 and resend the altered message under a conventional format to the second central monitoring station 38 through a wire line connection 52. Alternatively, the rerouting processor 48 may reformat the message for transmission through a local cellular communication link 52 to the second central monitoring station 38. Under still another embodiment, the rerouting processor 48 may reformat the alarm notification message into a packet and send the alarm notification message as a packet to the second central monitoring station 38 through an Internet or Intranet communication channel 52.
The rerouting processor 48 may include a dual tone multi-frequency (DTMF) converter 54 that monitors the communication port 40 of the alarm panel 18. Any messages received through the port 40 are decoded and forwarded to a routing processor 56 for processing.
For example, if the communication processor 32 of the alarm panel 18 were to seize the telephone line of the port 40 and outdial the telephone number 34 of the first central monitoring station 28, then a routing processor 56 would detect the outgoing call and, after an appropriate predetermined time delay send an instruction to the DTMF tone decoder 54 to send a “RINGING” message to the alarm panel 18. After another appropriate predetermined delay, the routing processor 56 sends a “CONNECTED” signal to the alarm panel 18.
Upon receipt of the CONNECTED signal, the alarm panel 18 sends the remainder of the alarm notification message 30. Upon receipt of the reminder of the alarm notification message 30, the routing processor 56 completes processing of the message 30.
For example, from the dialed telephone number T134, the routing processor 56 identifies the message as being intended for the first central monitoring station 28. In response, the routing processor 56 alters the content of the message 30 by deleting the dialed telephone number 34 and replaces the dialed telephone number 34 with the telephone number T260 of the second central monitoring station 38. The routing processor 56 forwards the content of the altered message 50, including the telephone number T260 of the second central monitoring station 38, the identifier of the activated sensor 14, 16, an identifier of the alarm panel 18 and the time to a communication processor 58.
In response, the communication processor 58 composes and sends the altered alarm notification message 50 to the second central monitoring station 38. The composed message 50 may be forwarded to a second DTMF tone decoder 64 that formats and forwards the message 50 to the second central monitoring station 38.
Upon receipt of the alarm notification message 50, the second central monitoring station 38 may respond with an acknowledgement message. The routing processor 56 may receive the acknowledgement message through the DTMF tone decoder 64 and communication processor 58. The communication processor 58 may forward the acknowledgement message to the routing processor 56. The routing processor 56 may replace any source identifier of the second central monitoring station with the source identifier of the first central monitoring station and forward the acknowledgement message to the alarm panel 18.
In addition to exchanging alarm notification messages, the rerouting box/processor 48 may also exchange status messages between the alarm panel 18 and the second central monitoring station 38. As above, the rerouting processor 48 alters the message in each direction to allow the use of the second central monitoring station 38 in place of the first central monitoring station 28.
In another illustrated embodiment, the rerouting box/processor 48 may operate under a cellular format. In this case, the rerouting processor 48 may be provided with a cellular transceiver 66 operating under a GSM/GPRS format through a wireless link 52.
Under the GSM/GPRS format, the communication processor 58 may incorporate the message into a packet. A header of the packet may include a communication system identifier of the second central monitoring station 38. The communication processor 58 may forward the alarm notification message 50 to the cellular transceiver 66. In response, the cellular transceiver 66 may search for and identify a control channel of a local cellular base station.
Once a control channel of a local cellular base station has been identified, the cellular transceiver may send the packet to the cellular base station. The base station may forward the packet to the second central monitoring station 38. The packet may be formatted under any appropriate format (e.g., mail, instant message, etc.).
Under still another illustrated embodiment, the communication link 52 may operate as an Internet or Intranet channel including a local wireless connection between the secured area 12 and a local base station of the cellular network or entirely through the Internet or Intranet channel. As above, transmission through this link 52 may be entirely packet based.
A specific embodiment of method and apparatus for forwarding alarm notification messages in a security system has been described for the purpose of illustrating the manner in which the invention is made and used. It should be understood that the implementation of other variations and modifications of the invention and its various aspects will be apparent to one skilled in the art, and that the invention is not limited by the specific embodiments described. Therefore, it is contemplated to cover the present invention and any and all modifications, variations, or equivalents that fall within the true spirit and scope of the basic underlying principles disclosed and claimed herein.
Number | Name | Date | Kind |
---|---|---|---|
5029196 | Morganstein | Jul 1991 | A |
5233640 | Kostusiak | Aug 1993 | A |
5323444 | Ertz et al. | Jun 1994 | A |
5424708 | Ballesty et al. | Jun 1995 | A |
5454024 | Lebowitz | Sep 1995 | A |
5517547 | Ladha et al. | May 1996 | A |
5862201 | Sands | Jan 1999 | A |
5943394 | Ader et al. | Aug 1999 | A |
6125126 | Hallenst.ang.l | Sep 2000 | A |
6366647 | Webb | Apr 2002 | B1 |
6608895 | Avidan | Aug 2003 | B1 |
6831557 | Hess | Dec 2004 | B1 |
7825796 | Simon | Nov 2010 | B1 |
7864672 | DeCaluwe et al. | Jan 2011 | B1 |
8171136 | Petite | May 2012 | B2 |
8265605 | Marett et al. | Sep 2012 | B2 |
20070121923 | Pildner | May 2007 | A1 |
20080111676 | Dobbs | May 2008 | A1 |
20080224848 | Meyer | Sep 2008 | A1 |
Entry |
---|
Author: Robert Auger; Title: Socket Capable Broser Plugin Results In Transparent Proxy Abuse; Publisher: www.thesecuritypractice.com; vol.: 2.00; Pertinent Page: Entire Document. |
Number | Date | Country | |
---|---|---|---|
20110133909 A1 | Jun 2011 | US |