System and method for remote home monitoring utilizing a VoIP phone

ABSTRACT

A system and method for remote monitoring through a voice over Internet Protocol phone. An indicator configured to activate a video interface of the VoIP phone is received. A determination is made whether the indicator authorizes the video interface. The video interface of the VoIP phone is activated in response to determining the indicator authorizes the video interface. Video communications are sent and received between the VoIP phone utilized by a receiving party and a communications device utilized by a calling party. An action is performed in response to recognizing a response from the receiving party.

CROSS REFERENCE TO RELATED APPLICATION

This application is a continuation of U.S. Patent Application No.12/044,792, filed Mar. 7, 2008 by Johnny D. Hawkins and entitled,“System and Method for Remote Home Monitoring Utilizing a VOIP Phone”,which is hereby incorporated by reference in its entirety.

BACKGROUND

The use of and development of communications has grown nearlyexponentially in recent years. The growth is fueled by larger networkswith more reliable protocols and better communications hardwareavailable to service providers and consumers. Users have similarly grownto expect better communications from home, work, and on the go. Forexample, users now expect faster connection speeds, increased bandwidth,better reliability, and greater availability from all types ofcommunications networks. In many cases, the growth is driven by peoplelooking to give up traditional communications schemes for theefficiency, effectiveness, and availability of new networks.

For example options for communications with a phone have notsignificantly improved with changing technology. Most communicationswith family members at home, assisted living centers, and senior centersare limited to legacy systems, such as answering machines and speakerphones. Many individuals would warmly embrace technologies and featuresthat enhance communication with aging parents and other family membersto ensure well being, security, and peace of mind. There is a need forenhanced features for Voice over Internet Protocol (VoIP), standardtelephones, wireless data and voice networks, and other communicationsdevices, mediums, and networks.

SUMMARY

One embodiment provides a system and method for remote monitoringthrough a voice over Internet Protocol phone. An indicator configured toactivate a video interface of the VoIP phone may be received. Adetermination may be made whether the indicator authorizes the videointerface. The video interface of the VoIP phone may be activated inresponse to determining the indicator authorizes the video interface.Video communications may be sent and received between the VoIP phoneutilized by a receiving party and a communications device utilized by acalling party. An action may be performed in response to recognizing aresponse from the receiving party.

Another embodiment provides a VoIP monitoring system. The VoIPmonitoring system may include a function trigger for intercepting anincoming call destined for the VoIP monitoring system. The functiontrigger may be configured to receive a user selection to enable an videointerface of the VoIP monitoring system. The VoIP monitoring system mayfurther include logic configured to determine whether a pass codeentered by the calling party authorizes video communications with theVoIP monitoring system. The logic may enable the video interface toperform the video communications based on the user selection. The logicmay perform an action in response to recognizing a response from areceiving party.

Yet another embodiment provides a VoIP phone. The VoIP phone may includea processing unit for processing a set of instructions and a memoryconfigured to store the set of instructions. The set of instructions mayreceive an indicator configured to activate a video interface of theVoIP phone, determines whether the indicator authorizes the videointerface, activates the video interface of the VoIP phone in responseto determining the indicator authorizes the video interface, sends andreceives video communications between the VoIP phone utilized by areceiving party and a communications device utilized by a calling party,and performs an action in response to recognizing a response from thereceiving party.

BRIEF DESCRIPTION OF THE DRAWINGS

Illustrative embodiments of the present invention are described indetail below with reference to the attached drawing figures, which areincorporated by reference herein and wherein:

FIG. 1 is a perspective drawing of a communication system in accordancewith an illustrative embodiment;

FIG. 2 is a perspective drawing of a video enabled VoIP system inaccordance with an illustrative embodiment;

FIG. 3 is a block diagram of a home communication system in accordancewith an illustrative embodiment;

FIG. 4 is a flowchart of a process for remote monitoring in accordancewith an illustrative embodiment; and

FIG. 5 is a flowchart of a process for home monitoring and using a homeintercom in accordance with an illustrative embodiment.

DETAILED DESCRIPTION OF THE DRAWINGS

Illustrative embodiments provide a system and method for Voice overInternet Protocol (VoIP) monitoring. The monitoring may be performed foraging parents, children, or a specified location. The VoIP phone may bevideo-enabled. The VoIP is a telephonic device configured to send andreceive voice communications, video, images, and other data through anetwork connection. The user may be required to receive an authorizationor present a pass code that authorizes the user to monitor or carry on atwo-way conversation with the VoIP telephone remotely. As a result, theuser may receive voice signals and/or video from the VoIP phone.Alternatively, the user may carry on an intercom or video conversationwith a user that is unable to answer calls using traditional methods.

One or more VoIP phones or other communications devices may also beconfigured to send automated messages to one or more receiving parties.The automated messages may remind the receiving party to take amedicine, feed the dog, or perform other tasks. The automated messagemay require an acknowledgement such as a voice command, gesture, facialrecognition, number input, or other information to acknowledge that themessage was received and/or performed. For example, the message maydetermine whether an aging parent is doing well in an assisted livingcenter. An automated call may play an audio file from the aging parent'schild, such as “How are you doing mother?”. No messages are sent if theparent responds “Good”, “I am fine”, or any other pre-programmedresponse. If however, the aging parent responds “not well”, “bad”, oranother response that is not an affirmative response, the VoIP phone maysend a message, call, or otherwise communicate to a user specified byuser preferences. The VoIP phone may be configured to take any number ofactions based on the affirmative or negative responses of the user.

FIG. 1 is a pictorial representation of a communications system inaccordance with an illustrative embodiment. The communication system 100of FIG. 1 includes various elements used for wireless and wiredcommunication including remote monitoring. The communications system 100may include a mobile switching center (MSG 102, a local exchange 104,voicemail systems 106 and 108, a database 110, wireless devices 112 and114, a transmission tower 116, a wired network 118, a center 120, phones122 and 124, and a client 126. In one embodiment, the different elementsand components of the communications system 100 communicate usingwireless communications including satellite connections or hardwiredconnections, such as fiber optics, T1, cable, DSL, high speed trunks,and telephone lines.

The wireless devices 112 and 114 may communicate with the transmissiontower 116 using communications protocols, such as time division multipleaccess (TDMA), code division multiple access (CDMA), global systems formobile (GSM) communications, personal communications systems (PCS),WLAN, WiMAX, or other frequently used cellular and data communicationsprotocols and standards. The wireless devices 112 and 114 may includecellular phones, Blackberry®, personal digital assistances (PDA), mp3players, laptops, evolution data optimized (EDO) cards, multi-modedevices, and other wireless communication devices and elements.

Communications within the communications system 100 may occur on anynumber of networks which may include wireless networks, data or packetnetworks, private networks, publicly switched telephone networks (PSTN),and the wired network 118. The networks of the communications system 100may represent the hardware, software, and services of a singlecommunication service provider or multiple communications servicesproviders. The features of the embodiments may be implemented by one ormore elements of the communications system 100 independently or as anetworked implementation.

In one embodiment, the MSC 102, voicemail system 106, and transmissiontower 116 are part of a wireless network that is operated by a wirelessservice provider. For example, the control signals and operationalfeatures may be performed by the MSC 102 and the wireless signals may bebroadcast from the transmission tower 116 to the wireless devices 112and 114. The wireless network may include any number of systems, towers,servers, and other network and communications devices for implementingthe features and performing the methods herein described. For example, auser may monitor a VoIP phone from a cell phone enabled to send andreceive live video.

The MSC 102 may be a switch used for wireless call control andprocessing. The MSC 102 may also serve as a point of access to the localexchange 104. The MSC 102 is a telephone exchange that provides circuitswitched calling and mobility management and may also provide GSM or PCSservices to the wireless devices 112 and 114 located within the area theMSC 102 serves. The MSC 102 may include a home location register (IALR)and visitor location register (VLR) that may be used to implementdifferent features of the illustrative embodiments. The voicemail system106 may be an integrated part of the MSC 102 or alternatively may be anexternally connected device.

In one embodiment, the voicemail system 106 may include an integrateddatabase for storing customer and usage information and data. The usermay communicate, interact, or send and receive data, information, andcommands to the voicemail system 106 through the telephones 122 and 124,wireless devices 112 and 114, or the client 126. The MSC 102 andvoicemail system 106 may include any number of hardware and softwarecomponents.

The local exchange 104, the MSC 102, and/or other elements of thecommunications system 100 may communicate using a signal controlprotocol, such as a signaling system number 7 (SS7) protocol. The SS7protocol is used in publicly switched networks for establishingconnections between switches, performing out-of-band signaling insupport of the call-establishment, billing, routing, and implementinginformation-exchange functions of the wired network 118. The localexchange 104 may be owned and operated by a local exchange carrier thatprovides standard telephone service to any number of users. In oneembodiment, the local exchange 104 may be a class 5 switch that is partof the network systems of the local carrier. The local exchange 104 mayinclude or may be connected to the voicemail system 106. However, thelocal exchange 104 may also be a Digital Subscriber Line AccessMultiplexer (DSLAM), Internet Protocol (IP) gateway, base station, orany other suitable network access point.

The local exchange 104 may be a wire-line switch or public exchangeusing time domain multiplexing to provide telecommunications services toa particular subscriber or groups of subscribers. The local exchange 104may be located at a local telephone company's central office, or at abusiness location serving as a private branch exchange. The localexchange 104 may provide dial-tone, calling features, and additionaldigital and data services to subscribers, such as home phones 122 and124. In one embodiment, the local exchange 104 enables VoIPcommunication of the phones 122 and 124 through a data network. VoIPworks by sending voice information in digital form, such as packets,rather than using the traditional circuit-committed protocols of thepublicly switched network. The local exchange 104 may be or include afeature server, a call control agent, or an IP gateway for implementingVoIP communications.

The communications system 100 may further include any number of hardwareand software elements that may not be shown in the example of FIG. 1.For example, in order to facilitate VoIP communications, thecommunications system and the MSC 102 and local exchange 104 inparticular, may include additional application servers, media servers,service brokers, call agents, edge routers, gateways (signaling,trunking, access, sub, etc.), IP network service providers, adapters,exchanges, switches, users, and networks. The voicemail system 108 issimilar to the voicemail system 106 except that it is equipped to handlevoicemail for landline customers rather than wireless customers. Thelocal exchange 104 or other components of a wire line network, such as adata, PSTN, VoIP, or other wired network may transfer the data andinformation utilized to perform the methods herein described.

The MSC 102 and the local exchange 104 may include an authenticationspace. The authentication space may be a partition, module, or otherstorage or memory of the server designated by the communications serviceprovider. The authentication space may validate that a user or device,such as client 126, is allowed to authorize the MSC 102, local exchange104, or corresponding voicemail systems 106 and 108 to enablemonitoring, set preferences, implement changes, configure automatedmessages and settings, review information, or perform other updates. Forexample, a user may be first required to provide a secure identifier,such as a user name, password, pass code, or other authentication codeor hardware interface, to verify the user is authorized to make changeswithin the authentication space.

The authentication information may be used to create a secure connectionbetween the client and the MSC 102 or the local exchange 104. The secureconnection may be a virtual private network tunnel, an encryptedconnection, firewall, or other form of secured communications link. TheMSC 102 and local exchange 104 may use any number of gateways, proxies,applications, or interfaces for allowing the client 126 to the MSC 102and local exchange 104 through the wired network 118. Alternatively, theclient 126 may use a wireless network or other network to access the MSC102 and local exchange 104. The MSC 102 and local exchange 104 may use ahost client application for communicating with numerous clients.

The center 120 is an example of an assisted living facility, dwelling,nursing home, apartment, residence, senior center, business, or locationof a person or group that may utilize any number of communicationsservices. The center 120 is shown as a residence in the illustratedexample, however, the center 120 may also be an office, business, orother structure wired or otherwise suitably equipped to providetelephone, data, and other communication services to one or morecustomers. In one embodiment, the center 120 is equipped with multiplecommunication devices, including phones 122 and 124 and client 126. Thephones 122 and 124 may be standard devices that provide dialing andvoice conversation capabilities. Phone 122 may be integrated in anynumber of other devices or may be used in different forms. For example,the phone 122 may be part of a refrigerator or intercom system. Inanother embodiment, the phone 124 may be integrated with a personalcomputer, such as client 126.

The communications services accessible from the phones 122 and 124 mayinclude standard telephone service or VoIP telephone service. The phones122 and 124 may be VoIP telephones or may be standard telephones thatinclude a modem and/or VoIP adapters for enabling VoIP communications.In one embodiment, a special dial tone, message, web alert, or otherfeedback may specify once or repeatedly that the phones 122 and 124 aregoing off-hook or performing monitoring. For example, the phones 122 and124 may sound a double chirp when the video is automatically enabled forthe phone 122. In another embodiment, the phones 122 and 124 give noindication that the monitoring is being performed. The phones 122 and124 may be silent in order not to wake or disturb a person in the center120 or in order to more securely determine the surroundings, settings,and security of the center 120 and any occupants. The user may canceluse of any features by reentering the feature command, hanging up, orentering a cancellation command.

The client 126 may be a personal computer for performing and executingprograms and instructions and accessing the wired network 118. However,the client 126 may be any computing devices suitable for communicatingwith the wired network 118 through a network connection. The wirednetwork 118 may be a fiber optic, cable, or telephone network or otherwired network suitable for communication over a hard wired connectionwith the client 126. In one embodiment, the center 120 may include awireless router, adapter, switch, hub, or other suitable interface thatallows the client 126 to communicate with the wired network 118.Alternatively, the client 126 may communicate with the wired network 118through a wireless connection. The MSC 102 and local exchange 104 mayuse a graphical user interface (GUI), such as website or programaccessible from the client 126 in order to enter and receive inputpreferences for performing the remote monitoring or setting automaticcalling preferences.

In an illustrative embodiment, the user may provide user input, viewcontent, make a video enhanced call, or otherwise make selections andcommunicate commands using devices, such as or similar to wirelessdevices 112 and 114, phones 122 and 124, and client 126.

At any time, a user may select to enable, order, initiate, configure,reconfigure, cancel, or otherwise configure the way the remotemonitoring is performed. For example, the user may use a command thatinforms a function trigger of a device or the device itself, such as theMSC 102, local exchange 104, voicemail systems 106 and 108, wirelessdevices 112 and 114, phones 122 and 124, or client 126, to begin remotemonitoring. In one example, the user may submit a command to activatethe remote monitoring by dialing *2 on the phone 122 and then entering apass code, account code, password, pin number, or other identifier. Inanother embodiment, a user may activate the feature by dialing *79 onthe wireless device 112. The command may also be a password, voiceactivated, time activated, preset by user selection or any othersuitable option, setting, command, or user input. In another embodiment,the various features may be implemented using tactile commands.

FIG. 2 shows examples of communications devices in accordance with anembodiment of the present invention. FIG. 2 includes a VoIP telephone202 and a cordless telephone 204. The VoIP phone 202 and the cordlessphone 204 may include a video camera 206 and a display 208 in additionto the standard hardware, software, and features.

The video camera 206 is a visual recording device. The video camera 206may allow the VoIP phone 202 and the cordless phone 204 to record orstream live video images through a telephone or network connection ofthe VoIP phone 202. The display 208 is a graphical representationdevice. The display 208 may show text, video, images, graphics, or otherdata and information. The VoIP phone 202 and cordless phone 204 mayinclude any number of interface elements.

In one embodiment, the VoIP phone 202 and the cordless phone 204 mayinclude a feature button. The feature button may be an interface thatallows the user to send a signal or command to a class 5 switch, mobileswitching center, or voicemail system or other component of thecommunication system 100 of FIG. 1 to activate remote monitoring.Alternatively, the feature button may activate the individual device toperform the requested service.

The feature button may be a dedicated button, programmable or otherwiseassignable graphical user interface, touch screen, microphone, scrollwheel, or other input device that generates the command signal thatactivates the feature for the VoIP phone 202 and the cordless telephone204. The VoIP telephone 202 and cordless phone 204 are particularimplementations of the phones 122 or 124 of FIG. 1. The interfaces ofthe VoIP phone 202 and the cordless phone 204 may be utilized toactivate any of the methods, services, and features herein described inaddition to features available for standard VoIP phones and cordlessphones.

The VoIP phone 202 and cordless phone 204 are telephonic devices thatoperate in conjunction with a data or packet network and/or VoIP networkelements. The telephone 202 and cordless telephone 204 are provided dialtone connectivity through a data or network connection for a home,business or other location in which the VoIP phone 202 and cordlessphone 204 are located. In another embodiment, the VoIP telephone 202 maybe a plain old telephone service (POTS) phone that functions using ananalog connection.

In one embodiment, the VoIP phone 202 may operate as a cordless basestation for the cordless phone 204. For example, the two devices mayshare a single phone number. The VoIP phone may establish a radiofrequency link with the cordless phone 204 over a small distance, suchas five hundred feet or less. The wireless frequency between thecordless phone 204 and VoIP phone 202 may be any frequency commonly usedfor short range communications including, but not limited to 1.7 MHz, 27MHz, 43-50 MHz, 900 MHz, 1.9 GHz, 2.4 GHz, 5.8 GHz, Bluetooth®, WiFi®All voice, streaming video, data, and other information that arereceived during a phone call are channeled through the VoIP phone 202 toa user operating the cordless phone 204.

As a result, the VoIP phone 202 or the cordless phone 204 may beutilized to monitor or be remotely monitored. For example, a user mayposition the cordless phone 204 so that the phone may be automaticallyactivated during a call to monitor one or more individuals in a room.For example, the cordless phone 204 may be positioned on a bedroom tableto monitor a bed-ridden family member throughout the day. The VoIP phone202 and the cordless phone 204 may be enabled to receive audio andvisual feedback from a caller or receiving party. In particular, theVoIP phone 202 and the cordless phone 204 may recognize any number ofresponses inclduing frames, actions, gestures, or content received bythe video camera 206. For example, the VoIP phone 202 and the cordlessphone 204 may recognize responses which may include voice input, facialgestures, body position, motions, hand gestures, or other feedback thata receiving party may be capable of performing.

FIG. 3 is a block diagram of a VoIP system in accordance with anillustrative embodiment. VoIP system 300 is a particular implementationof the VoIP phone 202 and/or cordless phone 204 of FIG. 2. The VoIPsystem 300 may be one or more telephonic devices, software modulesand/or other devices configured to both make and receive a call formonitoring purposes.

In one embodiment, the VoIP system 300 includes a processor 302, amemory 304, a function trigger 306, call monitoring logic 308,monitoring preferences 310, and automated settings 312. The VoIP system300 may communicate with a telephonic device 314. In one embodiment, thetelephonic device may be another VoIP phone which may include theelements of the VoIP system 300.

The processor 302, memory 304, function trigger 306, call monitoringlogic 308, monitoring preferences 310, and automated settings 312 may beimplemented individually, or collectively in a single element, device,or software component to provide the features herein described. The userinput that is used by the function trigger 306 to enable the featuresdescribed may be received directly by the VoIP system 300 through aninterface, touch screen, buttons, dials, or indicators or from thetelephonic device 314 or other computing or communications devices.

The processor 302 is circuitry or logic enabled to control execution ofa set of instructions. The processor 302 may be a microprocessor,digital signal processor, central processing unit, or other devicesuitable for controlling an electronic device including one or morehardware and software elements, executing software, instructions,programs, and applications, converting and processing signals andinformation, and performing other related tasks. The processor 302 maybe a single chip or integrated with other computing or communicationselements. The processor 302 may process voice signals which may includedecoding and reassembling as well as packetizing outgoing voice signalsfor transmission. The processor 302 may also execute a set of softwaremodules to execute video monitoring.

The memory 304 is a hardware element, device, or recording mediaconfigured to store data for subsequent retrieval or access at a latertime. The memory 304 may be static or dynamic memory. The memory 304 mayinclude a hard disk, random access memory, cache, removable media drive,mass storage, or other storage suitable for recording data,instructions, and information. In one embodiment, the memory 304 andprocessor 302 may be integrated. The memory may use any type of volatileor non-volatile storage techniques and mediums. The VoIP system 300 orthe memory 304 may include hardware or software for implementing voicecommands and voice recognition. For example, utilizing voice recognitiona user may access the VoIP system 300 or enter a message for delivery toany number of other VoIP devices.

In one embodiment, the function trigger 302 may be a software moduletriggered to implement monitoring using the VoIP system 300. Thefunction trigger 302 activates the call monitoring logic 308 in responseto receiving a pass code, password, or other designated identifier. Forexample, after calling the VoIP system 300, a user may enter a code,such as *882 that the function trigger 306 receives and utilizes toactivate the call monitoring logic 308.

In one embodiment, when an incoming call is received, the functiontrigger 306 may play a prompt to the calling party. This prompt may onlybe recognizable by the calling party for security purposes. Once thefunction trigger 306 has played the prompt or sent the prompt signal tothe calling party, the function trigger 306 listens for a userselection. Once the function trigger receives the user selection, thefunction trigger prompts the calling party to enter a pass code. Thepass code may be an identifier, password, authorization voice queue, orother authentication message that ensures that the calling party isauthorized to activate call monitoring or intercom communication. Nextthe function trigger 306 determines whether the pass code is correct. Ifthe pass code is correct, the function trigger 306 activates the callmonitoring logic 308 based on the previous user selection.

In one embodiment, the memory 304 of the VoIP system 300 may allow acalling party to record the intercom conversation or monitoredconversation. This may be particularly useful if there is a dramaticevent occurring during the time the VoIP system 300 is being used tomonitor a telephone, such as phones 122 and 124 of FIG. 1.

Call monitoring logic 308 is the digital logic, instructions, circuitsor other elements that activate the VoIP system 300 to performmonitoring. The call monitoring logic 308 may be connected to a videocamera, such as video camera 206 of FIG. 2, for streaming or recordingvideo for transmission through a network connection. The call monitoringlogic 308 may capture both audio and video content. The monitoringpreferences 310 are the operational and procedural settings that definehow and when the call monitoring logic 308 may be utilized. Themonitoring preferences 310 may be established utilizing a user interfaceof the VoIP system 300 or externally through another device orinterface. In one embodiment, the user may utilize a client device and agraphical user interface or a wireless device to set the preferences forthe call monitoring logic 308.

The call monitoring logic 308 may be remotely or locally activated. Forexample, a child calling a parent at an assisted living facility mayhave previously agreed with the parent to enable the call monitoringlogic 308 to be activated by the child remotely entering a pass code. Asa result, the child is able to see how the parent is doing at any timewithout requiring user interaction of the parent.

In another embodiment, the call monitoring logic 308 may be configuredto be activated only if the person called grants authorization throughdirect input, voice command, facial or bodily gesture, or otherprogrammed input. For example, a parent may grant authorization for thefunction trigger 306 to activate the call monitoring logic 308 by saying“video”. The monitoring preferences 310 establish how and when themonitoring may be utilized. The receiving party may use a do-not-disturbfeature to specify that incoming calls are not allowed to monitor theVoIP system 300 regardless of whether they have a pass code or not. Inaddition to storing remote access preferences, the monitoringpreferences 310 may specify times of day that the call monitoring logic308 may or may not be activated. In another example, a couple out on adate may be able to easily determine whether the babysitter has theirchildren in bed for the night or determine whether the babysitter isstill acting responsibly based on the streaming audio and video.

Additionally, the call monitoring logic 308 may be used to visuallycommunicate with children, pets, disabled or handicapped family members,or other individuals that are incapable of answering the VoIP system300. For example, a wheelchair bound person may be able to speak but maybe unable to reach the phone. As a result, the call monitoring logic 308may activate a video camera or a speaker function of the VoIP system 300or a linked handset so that the calling party may communicate with thedisabled person in the room without the disabled person being requiredto perform any tasks. The call monitoring logic 308 may be referred toas logic or an audio interface for implementing the monitoringcommunication described herein. The call monitoring logic 308 mayestablish whether an alert, prompt, or indicator is played to the userindicating that the VoIP is off-hook in video and/or audio monitoringmode.

The automated settings 312 are instructions for automatically contactingone or more parties. As previously described, the VoIP system 300 may bethe calling device that may communicate with an identical or differentVoIP enabled-system. The automated settings 312 may include instructionsfor automatically contact a party or for conveying a message. In oneembodiment, the automated settings 312 may be configured to call a partyat specified intervals. The call may request a desired input from thereceiving party, such as a voice response, facial gesture, or buttoninput. In the event the desired input is not entered, another action maybe taken. For example, the VoIP system 300 may be configured to callanother VoIP phone in the room of an assisted living facility to checkon a user's brother. The call monitoring logic 308 may call the user'sbrother every four hours during the day or twice a day and play anrecorded audio message stating “How are you doing David?” If the user'sbrother provides a reply that is determined to be fine, the call ends.If however, the user's brother does not respond or responds in thenegative that he is not doing well, the VoIP system 300 may take furtheraction. For example, the VoIP system 300 may send an email, text, orvideo message. Alternatively, the VoIP system 300 may automatically callthe user on a specified number or device and then link or bridge thecalls so that the user may personally speak or attempt to speak with theuser's brother.

The automated settings 312 may store pre-recorded messages or files thatare to be played directly to the receiving party or that are to beconverted to speech and then played. The automated settings 312 may alsostore potential responses of a receiving party and actions to take basedon the type of response. For example, if no answer is received at thetime the user calls, the VoIP system 300 may link with an intercomsystem of the center or facility and repeat the message or try back atspecified intervals to determine the status of the receiving party. Theautomated settings 312 may store contact information which may includephone numbers, Internet Protocol (IP) addresses, account numbers, emailaddresses, user names, and other similar communications information.

In another embodiment, the automated settings 312 may be configured toretrieve, lookup, or synchronize schedules, tasks, messages or otherinformation from outside servers, devices, or applications, such asOutlook, Goggle Calendar, and Microsoft Project Manager. For example,the user may enter a message and delivery times using a client device tobe synchronized with the automated settings 312 of the VoIP system 300.

In one embodiment, the calling party may configure the automatedsettings 312 to call the receiving party three times a day at 9:00 a.m.,12:30 p.m., and 5:30 p.m. to remind the receiving party to takemedications and to determine how the receiving party is responding tothe medications. If the response indicates that the receiving party isnot responding well, the automated settings 312 may be configured tosend a text message to a wireless device of the calling party and bridgethe call to the receiving party's doctor or pharmacist.

The call monitoring logic 308 may control other communications systemswithin the home. In one embodiment, the VoIP system 300 may beintegrated with a specialized bed providing services to a disabledindividual. The VoIP system 3008 may also communicate with a homesecurity system or media system. For example, the speakers andmicrophones of the home security system may be used to further monitorthe home and perform intercom communication.

The call monitoring logic 308 may be configured to recognize voiceinput, motions, gestures, or other input through a video camera ormicrophone of the VoIP system 300. The user and/or a receiving party mayprogram a library of gestures, motions, or other commands that are to beassociated with a specified action. The call monitoring logic 308 mayinclude an algorithm configured to search for and recognize the responseand perform an associated action. For example, if the receiving partywaves in her hand in a specified manner, the call may be terminated. Ifhowever, the user raises both fists, the call monitoring logic 308 mayrecognize that this image, subject matter, or content as captured by thevideo camera indicates that the VoIP system 300 is to call 911immediately and sound an alert. The call monitoring logic 308 may allowa user to pre-record a response in order to recognize responsesutilizing comparison, video analysis, facial analysis, or other similarsearching, or recognition logic.

FIG. 4 is a flowchart of a process for configuring messages for remotemonitoring in accordance with an illustrative embodiment. The process ofFIG. 4 may be implemented by one or more VoIP phones or systems. Theprocess may begin by receiving a phone number for a receiving party(step 402). The receiving party may be the party the calling party iscalling, such as a child or aging parent. The phone number mayalternatively be an IP address, account number, nickname, or othercalling or communication information.

The VoIP phone prompts a calling party to enter a message for automaticdelivery (step 404). The message may be any type of message for thereceiving party. The message may also encompass a question, such as howare you doing today or have you taken your medicine yet today. The useof a message that provides comfort or an inquiry may be especiallyuseful in the event that the user is unable to personally call thereceiving party multiple times through out the day, week, or month.

Next, the VoIP records the message from the calling party and receiveactions to take based on potential responses (step 406). In oneembodiment, the calling party may record the message using the VoIPphone. In another embodiment, the message may be imported, downloaded,or otherwise received by the VoIP phone in the form of a file or otherelectronic media. The message may be an audio or video message recordedto make the message more personal. In another embodiment, the callingparty may enter text that is converted to a voice message usingtext-to-speech applications utilized by the VoIP phone.

The calling party may also specify any number of expected or desiredresponses to the message in step 406. In one embodiment, the callingparty may agree with the receiving party about potential responses andhow they should be dealt with. For example, if the receiving partyindicates that she is having a negative response to some newmedications, a phone call may be bridged to a wireless device of thecalling party and the receiving party's pharmacist.

The responses may also be recorded from the receiving party or thecalling party. The response may be any number of actions that may bereceived or recorded by the VoIP phone. The responses may include voiceresponses, selections made utilizing the VoIP phone or a wireless devicelinked with the VoIP phone, bodily, motions, or facial, gestures, orother video-based responses. The response may be based on the physicalabilities or capacity of the receiving party. For example, the receivingparty maybe temporarily incapacitated and only able to give responses byblinking. The VoIP phone may use a video camera to receive the blinkingresponse and make a determination what the response means or how it isto be categorized for taking an action. In one embodiment, a library ofpotential responses may be linked with any number of actions.

The responses may then be linked with any number of actions that are tobe taken by the VoIP phone. The actions may include sending additionaltext, voicemail, email, or voice messages to a designated number ordevice, bridging a phone call, changing the interval of the call,engaging an intercom, activating an alarm or other networked system, orreattempting the automated message. In some cases, there may be noresponse to the message because the user is away from the phone,sleeping, unconscious, or otherwise unavailable. The actions may alsoindicate an action to take when no response is received, such asattempting the call and automated message again at a shortened intervalof fifteen minutes instead of four hours.

Next, the VoIP phone receives monitoring preferences (step 408). Themonitoring preferences may specify further details regarding how thecall is made or implemented. For example, the monitoring preferences mayspecify whether the response is recorded, whether audio and video areavailable and other elements for implementing the remote monitoring orautomated message.

FIG. 5 is a flowchart of a process for remote monitoring in accordancewith an illustrative embodiment. The process of FIG. 5 describes aremote monitoring for a caller 502 and a VoIP phone 504. The caller 502may be utilizing a VoIP system or phone to perform the monitoring asdescribed in FIG. 5. Alternatively, the caller 502 may use any number ofdevices enabled for video communication.

The process begins with the caller 502 dialing a VoIP phone (step 506).In another embodiment, a secondary VoIP phone may automatically call theVoIP phone 504 as a pre-programmed function or setting.

The VoIP phone 504 prompts the caller for a pass code (step 508). In oneembodiment, during step 508, the VoIP phone 504 may play a prompt,alert, or indicator that informs the caller 502 that remote monitoringmay be available. The prompt of step 508 may be played or activatedduring the ring back period for allowing the caller 502 to enter aselection. In another embodiment, the VoIP phone 504 may not play aprompt in order to enhance security and the privacy of a receiving partyutilizing the VoIP phone 504.

Next, the caller 502 enters the pass code (step 510). The pass code maybe a button sequence, voice signal, command, or other information thatauthorizes the caller 502 to perform a monitoring feature. Next, theVoIP phone 504 determines whether the pass code is correct (step 512).If the pass code is not correct, the process terminates. The pass codeensures that unauthorized parties are not able to monitor the home toavoid privacy and security issues.

If the pass code is correct in step 512, the VoIP phone 504 plays amonitor alert (step 514). The monitor alert may indicate to anyindividuals in the home that the phone is about to enter a monitor mode.The monitor alert may or may not be played based on the preferences,permissions, or other authorizations of a receiving party.

Next, the VoIP phone 504 enters a video monitoring mode (step 516).During the video monitoring mode of step 516, the VoIP phone 504 maysend and receive regular phone communications or video communications.The caller 502 may be enabled to see or hear anything within range ofthe VoIP phone 504. In another embodiment, the VoIP phone 504 may alsocommunicate with a handset or other monitoring devices through aBluetooth, WiFi, or other wireless or wired connection. Monitoring maybe terminated when the caller 502 enters user input to terminate thecall.

In another embodiment, the pass code may be automatically entered by aVoIP device pre-programmed by the caller 502 to send an automatedmessage. Once, the video monitoring mode is activated, the VoIP devicemay play an automated message to the VoIP phone 504. The automatedmessage may be a comment, message of encouragement, information, or aninquiry? In one example, the message asks how an elderly family memberis doing. The response may be received by the VoIP phone 504 andtransmitted back to the VoIP system or device. The response may beanalyzed by the VoIP phone 504 or the VoIP device linked with the caller502 to determine whether a pre-defined action linked with the responseshould be taken. For example, if a sequential blinking responseindicates that the elderly family member in proximity to the VoIP is notdoing well, the call may be linked or transferred to a registered worknumber utilized by the caller 502 so that the caller 502 may personallytalk to the user. Alternatively, an email or text message may be sent tothe caller 502 utilizing one or more alternative forms of communication.

The features of the present invention may be used independently or incombination to provide improved communications options and security fora user from a VoIP telephone or other similar communications device. Thefeatures and services herein described may be implemented as a babymonitor, to monitor remote properties, or for other similar uses orpurposes. The previous detailed description is of a small number ofembodiments for implementing the invention and is not intended to belimiting in scope. The following claims set forth a number of theembodiments of the invention disclosed with greater particularity.

What is claimed is:
 1. A method for remote monitoring a premises througha voice over Internet Protocol (VoIP) phone, the method comprising:receiving, at the VoIP phone, a telephone call from a calling partyremote from the premises; receiving, at the VoIP phone and through thetelephone call, an indicator from the calling party, the indicatorconfigured to activate a video interface of the VoIP phone; determining,at the VoIP phone, whether the indicator authorizes the video interface;activating the video interface of the VoIP phone in response todetermining the indicator authorizes the video interface, withoutinteraction from any person at the premises; playing, with the VoIPphone, a monitor alert to indicate that the VoIP phone is monitoring thepremises; and sending video communications over the telephone call formonitoring by the calling party remote from the premises, withoutinteraction from any person at the premises; receiving, via the VoIPphone, one or more automated settings defining an at least one automatedevent; executing, with the VoIP phone, the at least one automated eventas defined by the one or more automated settings; determining, with theVoIP phone, whether the at least one action requires an acknowledgmentfrom a person at the premises; in response to determining that the atleast one action requires the acknowledgment, determining, at the VoIPphone, whether the acknowledgment is an affirmative response or anegative response; performing, with the VoIP phone, a first action inresponse to determining that the acknowledgment is an affirmativeresponse, as defined in the one or more automated settings; andperforming, with the VoIP phone, a second action in response todetermining that the acknowledgment is a negative response, as definedin the one or more automated settings; wherein at least one of the firstor second action is to call 911 and sound an emergency alert; andwherein at least one of the first or second action is to call one ormore recipients via the VoIP phone.
 2. The method according to claim 1,wherein the indicator is a pass code and wherein the method furthercomprises: prompting the calling party for the pass code; determiningwhether the pass code is correct.
 3. The method according to claim 1,wherein the VoIP phone provides no indication that monitoring is beingperformed.
 4. The method according to claim 1, further comprising:recording, with the VoIP phone, the monitored video communications. 5.The method according to claim 1, wherein the acknowledgment directlyspecifies at least one of the first or second action to be performed. 6.The method according to claim 1, wherein at least one of the first orsecond action is a message sent to one or more recipients.
 7. A VolPphone comprising: a processing unit; and a memory configured to store anon-transitory set of instructions executable by the processing unit,the set of instructions comprising: instructions to receive, at the VolPphone, a telephone call from a calling party remote from the premises;instructions to receive, at the VolP phone and through the telephonecall, an indicator from the calling party, the indicator configured toactivate a video interface of the VolP phone; instructions to determine,at the VolP phone, whether the indicator authorizes the video interface;instructions to activate the video interface of the VolP phone inresponse to determining the indicator authorizes the video interface,without interaction from any person at the premises; instructions toplay a monitor alert to indicate that the VolP phone is monitoring thepremises; and instructions to send video communications over thetelephone call for viewing by the calling party remote from thepremises, without interaction from any person at the premises;instructions to receive one or more automated settings defining an atleast one automated event; instructions to execute the at least oneautomated event as defined by the one or more automated settings;instructions to determine whether the at least one action requires anacknowledgment from a person at the premises; instructions to determine,in response to determining that the at least one action requires theacknowledgment, whether the acknowledgment is an affirmative response ora negative response; instructions to perform a first action in responseto determining that the acknowledgment is an affirmative response, asdefined in the one or more automated settings; and instructions toperform a second action in response to determining that theacknowledgment is a negative response, as defined in the one or moreautomated settings; wherein at least one of the first or second actionis to call 911 and sound an emergency alert; and wherein at least one ofthe first or second action is to call one or more recipients via theVoIP phone.
 8. The VoIP phone according to claim 7, wherein theindicator is a pass code and wherein the set of instructions furthercomprises: instructions to prompt the calling party for the pass code;instructions to determine whether the pass code is correct.
 9. The VoIPphone according to claim 7, wherein the VoIP phone provides noindication that monitoring is being performed.
 10. The VoIP phoneaccording to claim 7, wherein the set of instructions further comprises:instructions to record, with the VoIP phone, the monitored videocommunications.
 11. The VoIP phone according to claim 7, wherein theacknowledgment directly specifies at least one of the first or secondaction to be performed.
 12. The VolP phone according to claim 7, whereinat least one of the first or second action is a message sent to one ormore recipients.