Automated, remotely-verified alarm system with intrusion and video surveillance and digital video recording

ABSTRACT

An automated self-monitored alarm verification solution including at least a premises portion, a server portion, and an end user device portion. Alarm verification includes capturing by an image capture device at least one image in response to a detection event, and transmitting a first data signal including the image to a local signal processing device. The signal processing device transmits a second signal including at least a portion of the image to a remote hosted server according to at least a first set of predetermined parameters. After receiving the second signal, the server transmits a third signal including at least a portion of the image from the hosted server to a user device. Using the user device, a user views the image and indicates a validity status of the alarm based at least in part on the content of the image. Based at least upon either the validation status indicated by the user, or upon a failure to receive a message including a validation status from the user within a predetermined duration of time, the server portion may send an alarm signal to an emergency response service.

RELATED APPLICATIONS

The present application claims priority to U.S. Provisional PatentApplication Ser. No. 60/800,505, entitled AUTOMATED SELF-MONITORED ALARMVERIFICATION SOLUTION and filed 15 May 2006, and U.S. Provisional PatentApplication Ser. No. 60/800,504, entitled SELF-MONITORED INTRUSION ANDVIDEO SURVEILLANCE SOLUTION WITH DIGITAL VIDEO RECORDING filed May 15,2006, the disclosures of which are incorporated herein in their entiretyby this reference.

FIELD OF THE INVENTION

The present invention relates generally to intrusion alarm systems, andmore specifically it relates to an automated, remotely-monitored alarmverification solution for visually identifying the root cause of alarmevents.

BACKGROUND OF THE INVENTION

It can be appreciated that intrusion alarm systems have been in use foryears and are commonplace in commercial and residential applications.Typically, intrusion alarm systems are comprised of one or more passivesensors connected to a burglar alarm panel located at the monitoredbuilding or area. When the system is “armed” and any of the sensors isactivated, a notification is sent to a central monitoring facilityusually via a dial-up connection. Typically, an operator at the centralstation calls back the location and attempts to validate the alarm,usually via verbal exchange of a “secret” code or password. Failure tovalidate the alarm usually results in a call being placed to 3rd partiessuch as law enforcement officials.

These types of systems consist of one or more sensors connected to acontrol panel, which monitors the sensors, and delivers a status messageto an alarm monitoring station when activated. In normal applicationsthese types of sensors can only provide binary information indicatingthe active state of an alarm condition. In most instances, the alarmsensors are connected to an intrusion control panel, which monitors thesensors and determines the state of an alarm condition. The alarmactivations are then sent to a manned alarm monitoring station usuallyvia a public switched telephone network (PSTN) dial-up connection.

The main problem with conventional intrusion alarm systems is that theyare very prone to false alarms due to inadequacies with existingtechnologies, and they provide no inexpensive means to visually validatean alarm remotely. False alarm statistics are persistently in the high90% range, an extremely costly false-positive problem. Attempts havebeen made to try to address the false-alarm issue by deployingtraditional closed circuit television (CCTV) cameras, however, theseattempts have not met with success due to the cost of installation andequipment. Another problem with conventional intrusion alarm systems isthat they are very expensive both for the initial equipment cost andmonthly recurring charge to the end-user. Installation costs aretypically passed on to the end-user. In addition, these systemstypically use a dial-up connection to communicate alarm conditions backto a central monitoring station making validation a slow and tediousprocess. Another problem with conventional intrusion alarm systems isthat they need to be actively monitored, generally requiring the use ofa third-party monitoring service which can be prohibitively expensiveand does substantially reduce the false positive problem.

BRIEF DESCRIPTION OF THE DRAWINGS

FIG. 1 depicts an iconic representation of a premises portion of analarm system according to an embodiment of the invention.

FIG. 2 depicts an iconic representation of an extended portion of analarm system according to an embodiment of the invention.

FIG. 3 depicts a block diagram of a server portion of an alarm systemaccording to an embodiment of the invention.

FIG. 4 depicts a block diagram of an end-user device portion of an alarmsystem according to an embodiment of the invention.

FIG. 5 depicts an iconic diagram of data flow pathways within a premisesportion of an alarm system according to an embodiment of the invention.

FIG. 6 depicts an iconic diagram of data flow pathways throughout anextended portion of an alarm system according to an embodiment of theinvention.

FIG. 7 depicts a block flow diagram of an alarm verification methodaccording to an embodiment of the invention.

DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENTS

The invention, in accordance with a typical embodiment, involvesintrusion alarm systems which are verified remotely (e.g., by a user oranother authorized entity, collectively “user” hereinafter forsimplicity of description). The remotely-verified alarm solutions of thepresent invention substantially depart from the conventional conceptsand designs of the prior art. In so doing, the invention providesembodiments of a system primarily developed for the purpose of visuallyidentifying the root cause of alarm events directly and immediately,while utilizing modem high-speed Internet, phone networks, or privatenetworks and web-enabled devices for remotely-monitoring. Furthermore,embodiments of the invention provide for contacting law enforcementagencies, other emergency response services, and/or any other thirdparty designated by a user or other authorized entity, only if an alarmevent is valid, and substantially or entirely without the interventionof a third party alarm monitoring company.

An end user can install a premise security system, and verify an alarmevent regardless of the proximity of the end-user to the monitoredlocation. When an alarm event takes place, the system delivers an alarmcondition substantially autonomously to an end-user. The system useswired and/or wireless Internet, phone networks, private networks, and/orother communication networks to deliver to the end user an image-basedindication of the cause of an alarm.

Given the high incidence of false alarms due to less capable alarmsystems, a highly desirable feature in embodiments of the invented alarmsystem is the ability to remotely and visually verify an alarmcondition. False alarms can be caused in a variety of ways, includingdefective sensors and user error, such as failing to deactivate an alarmsystem upon entry. Common means for remotely verifying an actual alarmcondition includes calling the premises and/or sending personnel tovisit the premises from which the alarm signal originated. The inventionseeks to alleviate the need for such inefficient, costly, and slow meansof validation by providing the premise owner the ability to interrogatethe cause of an alarm over any public network, Internet, phone network,or private network.

According to one embodiment of the present invention, an automated,remotely-verified alarm system includes: a) an integrated PassiveInfraRed (PIR) sensor (or other motion sensor) for motion detection withan integrated camera (PIRCam) or separate sensor and camera, or motionsensing camera; b) a premise Security System Media Gateway (SSMG) withstorage that manages a number of PIRs, cameras, or PIRCams and transmitsalarm events and associated video or static images to a remote centralserver; c) a hosted remote web-server (“central server”) that providesauthentication, communication and data delivery to external remoteend-users and law enforcement agencies; and d) remote end-usercommunication devices to receive telephone voice messages and/or datamessages via email, instant messaging including text messaging, SystemsManagement Server (SMS) and/or Multimedia Messaging Service (MMS)messaging, and/or other network or web-enabled communication media. Theembodiments of the invention, however, are not so limited.

Therefore, it is to be understood that the invention is not limited inits application to the details of construction and to the arrangementsof the components set forth in the following description or illustratedin the drawings. The invention is capable of other embodiments and ofbeing practiced and carried out in various ways. Also, it is to beunderstood that the terms and phrases employed herein are for thepurpose of simplicity and clarity in the description and should not beregarded as limiting.

Premises Portion of Alarm System

FIG. 1 depicts an embodiment of a portion of a remotely-verified alarmsystem configured to monitor a user's premises 15 (or “premisesportion”). Included in the system, according to embodiments, are one ormore image capture means such as cameras 2 for capturing images ofportions of a monitored location. Most notably, locations such asbuilding access points, windows, hallways, rooms containing high-valueitems, and other locations are typically beneficially monitored forintrusion detection or other exigencies and/or emergencies. Cameras 2can be affixed to or at least partially within structural features of abuilding, such as a wall, ceiling, roof, structural support, ventilationpassage, or other features. Alternatively, cameras can be provided insuch landscape features as trees, shrubs, retaining walls, or otherfeatures. Wherever affixed, a camera 2 is configured so as to capture animage of an area where intrusion monitoring is desired. When numerousareas are to be monitored, cameras can be deployed in multiple locationsas part of a distributed, interconnected monitoring network.

Cameras 2 in embodiments include stationary cameras, cameras capable ofautomatically sweeping from side to side to capture a larger area than acomparable stationary camera. Cameras can include those capable ofmultiple directional angles and/or directionally controllable eitherremotely or according to a pre-programmed scanning pattern. Cameras 2can be configured to capture still images, full motion images(hereinafter, video), or a combination thereof, and such images willtypically, but not exclusively, be either black-and-white or colorimages. Alternatively, cameras are used that are configured forextremely low light conditions (e.g., night vision) or for capturingviewable images of transient thermal differentials (e.g., thermalimaging) in the ambient environment.

Due to the highly variable placement of cameras 2, it may not always beconvenient to extend wiring to a camera for wired transmission ofsignals to and from the camera. Therefore, while cameras are frequentlyconnected by a wire, they may also transmit and receive signalswirelessly. Likewise, it may not be possible to maintain a continuouspower supply to a camera 2 in various locations and/or situations.Therefore, an alternative and/or self-contained power supply can beprovided in some situations. Examples of such include power provided bybatteries, by a solar panel, by a generator, by an uninterruptible powersupply (i.e., U.P.S.), by a redundant hardwired power supply, or byanother device or method.

Cameras 2 used in a system according to embodiments may also possessother capabilities for enhancing the informational value from capturedimages. For example, cameras can include the ability to zoom in or out,such as to widen or narrow a field of view and increase the resolutionof distant or small objects, or to compensate for changing lightconditions.

In embodiments, a camera 2 includes a sensor capable of detectingchanges in the ambient environmental conditions (hereinafter, alarmevent and/or detection event), and the camera 2 is further configured toreact to such changes by turning on or off, or by capturing a stillimage or video image (collectively, images). Alarm events can include atransient thermal (e.g., infrared, hereinafter IR) differential, ahuman-audible or inaudible sound, a transient reflection of a beam orsignal wave emitted by the camera or another device, or other suchchanges. In embodiments, a sensor of a camera 2 can be calibratedrelative to the background (e.g., normal) conditions of the environmentwhere the camera 2 is affixed and is to operate. Further, a sensor of acamera 2, such as a passive IR sensor, can be configured to specificallydetect and/or indicate the presence or occurrence of an alarm event onlywhen such changes reach and/or exceed some threshold level (hereinafter,threshold).

While a sensor can be configured as a unitary part of a camera 2, inother embodiments, a sensor can be coupled with a camera 2 either by awire or wirelessly, and be located relatively separately from the camera2. For example, a sensor can include a magnetically coupled circuitaffixed relative to a window or entryway such that the opening of a dooror window breaks the circuit and causes the sensor to indicate athreshold alarm event to the camera 2. Likewise, a sensor can include apressure and/or tensile sensitive device (e.g., pad, plate, strip), anoptical beam emitter/detector system, any of the integral sensorsdescribed above, or any other capable of detecting a threshold alarmevent. In general, one or more cameras 2 capable of detecting athreshold alarm event, whether having integral or separately coupledsensors, are collectively referred to hereinafter as “motion sensingcameras”, or simply “cameras”.

In still other embodiments, cameras 2 may simply be passive imagegathering cameras not configured with threshold alarm eventdiscrimination capability, but simply gather and transmit images to asignal processing device that has such capability. A signal processingdevice is described in more detail below.

Each embodiment of a camera 2 has the capability to convert a capturedimage into an electronic and/or optical signal and to transmit thesignal out from the camera 2. In embodiments of a wireless camera, awireless signal transmitter could transmit a signal including aconverted image via IR transmission, laser, radio, BlueTooth technology,or some other relatively local and/or line of sight signal transmissiontechnology. Alternatively, a camera transmitter can transmit anelectronic signal via a conductive wire, or to convert an electronicsignal to a suitable optical signal and transmit it via optical fiber.Therefore, a transmitter of a camera may be understood, according toalternate embodiments, to be one of a wired or wireless transmitter ofelectronic and/or optical signals including data corresponding to acaptured image.

A transmitted signal from a camera deployed as described in a premisesportion 15 of the system, is received in embodiments at a signalprocessing means 4 (hereinafter SSMG) configured to receive signals ofthe type transmitted by each of the cameras in the premises portion 15.A SSMG 4 can be thought of as a Security System Media Gateway; and itserves as a central collection and transmission device for securitysystems described in embodiments of the invention. Further, an SSMG 4acts as a gateway for command signals sent to cameras 2 by one or morecontrol devices in a system embodiment, either automatically or asdirected by a user. The SSMG 4 typically is configured to and capable ofmonitoring, exchanging signals with, and/or controlling numerous cameras2.

An example of a device that can be used as a SSMG 4 is a Media Gatewaydevice available from MTeye Security Ltd, although the embodiments arenot so limited, and others can be used according to alternativeembodiments. The SSMG can be configured to receive power from a primarypower source, for example an external 12V DC adaptor, but may alsoinclude a secondary (e.g., backup) power source, such as one of thosedescribed above relative to cameras 2. The SSMG can be configured withstatus indicators for power, wireless connectivity, and alerts, althoughmore or fewer than these may also be included.

In an embodiment, the SSMG 4 continuously polls each camera 2 for analarm condition over a secure wireless link, which is indicated by achange in state in, for example, a sensor device. Upon detection, theSSMG downloads an image from the camera and stores it locally. A signalrelay device may be used in situations where a camera 2 is placed toofar from the signal processing device 4 for consistent or effectivesignal transfer. For example, a camera 2 can transmit a wireless signal3 to an intermediately located relay device, which then transmits thesignal by wire to the signal processing device 4. Furthermore, anembodiment can include the camera 2 and the SSMG 4 integrated as arelatively unitary device, wherein signal transmission between thecamera 2 and the SSMG 4 occurs internally within the integrated device.One having ordinary skill in the art will recognize numerous otheralternatives, so they are not exhaustively described herein.

The SSMG 4 can alternatively be configured with a data storage means 12enabling local storage of captured images. Storage means 12 can be anintegrated or peripheral hard disc drive, a memory chip or chip device(e.g., dual in-line memory module, DIMM or integrated memory within amicro processor), fixed or removable memory of any known format (e.g.,RAM, flash, compact flash), an optical storage media device (e.g., DVD,CD), or some other mass storage device or combination of devices asknown to those having skill in the art as the embodiments are not solimited. Further, inasmuch as storage media and device technologiescontinue to develop and change in form, capabilities, and perhaps mostnotably in capacity relative to size, embodiments of the invention arenot limited to only those storage media and/or devices now in use.Rather, the disclosure of storage means 12 herein is intended toencompass any storage devices or media capable of storing datacorresponding to images (e.g., memory chip, optically and/ormagnetically encoded data, or other memory device). In a particularlyuseful embodiment, the SSMG 4 is configured to include the functions andcapabilities of a digital video recorder (DVR), either integrally withinthe SSMG 4 or as a peripheral component controllably coupled with theSSMG 4.

The SSMG 4 will typically, but not always, be coupled with othercomponents within the premises 15. For example, a signal transmittingmeans 6 (e.g., router, modem, cable converter box, computer) can becoupled in communication with the SSMG 4, either by a wire 5, orwirelessly. The signal transmitting means 6, for example, will furtherinclude a continuous and/or non-continuous connection, by wire 7 and/orwirelessly, to elements of the system external to the premises 15. Inother embodiments, the functions of a signal transmitting means 6 can beintegrated into the SSMG 4, thus eliminating the need for a peripheralsignal transmitting means 6. Signal transmitting means 6, whetherconfigured integrally with the SSMG 4 or separately, is configured totransmit a signal including data corresponding to one or more images, byat least one of the numerous transmission means and/or technologiescurrently available. Such transmission means and/or technologies caninclude any one or more of cable broadband, DSL, WAN, WiMAX, Wi-Fi,cellular phone signal, satellite, and/or others as known in the art.

The SSMG 4 can be further coupled with a data input and/or computingmeans 9, such as a computer (hereinafter “local computer”) (e.g.,desktop computer, portable computer) or similar device. Such localcomputer 9 is configured, according to alternative embodiments, toperform one or more of receiving, processing, storing, and/or conveyingto the SSMG 4 at least a first set of configuration parameters.Configuration parameters can include any one or more of camera controlparameters (e.g. image capture settings, camera identification data),sensor control parameters (e.g., event trigger thresholds settings),data storage parameters (e.g., compression, format, location), DVRfunctional parameters, security parameters (e.g., access codes, userpasswords), and automated and/or remote system activation/deactivationparameters, although this is not intended to be an exclusive list, andother system configuration parameters are also anticipated according toembodiments. The local computer 9 can also be preconfigured withconfiguration parameters including contact information and/orcommunication method selection for connecting with a central server uponthe occurrence of an alarm event, with a remote end-user device, andcontact information for emergency response services and/or agencies.

The local computer 9 can be configured to be a DVR device, rather thanthe SSMG 4 in an embodiment, including capacity and means for storage,retrieval, and/or viewing of images. With regard to either the SSMG 4 orthe local computer 9, DVR capabilities can be configured at least inpart as software instructions fixed in a tangible medium, such as a harddisc drive medium or an optical storage medium.

The local computer 9 is coupled in communication with the SSMG 4 by awire 8 according to an embodiment, but could alternatively be coupledwirelessly. For purposes of clarification, a “wire” as referred tothroughout this description includes any tangible signal conveying meansembodied as hardware (i.e., not air), such as an optical fiber orbundle, or an electrically conductive wire or cable, and is not limitedto any one particular form. The local computer 9 typically includes astorage means for storing at least one or more configuration parameters,captured images, or other data related to system functions. A localcomputer 9 typically also includes a peripheral input device (e.g.,mouse, keyboard), a display device (e.g., monitor), and/or an outputdevice (e.g., printer), although one or more of these may be omitted insome configurations. Further, embodiments of a local computer 9 can alsoinclude an integrated signal transmitting means 6, obviating the needfor a stand-alone signal transmitting means 6 or a signal transmittingmeans 6 integrated with the SSMG 4.

While the local computer 9 typically exists separately from the SSMG, aparticularly integrated embodiment of the SSMG 4 can incorporate one ormore of the features, devices, or functions of the local computer 9, orcan even obviate the need for a separate local computer 9. Conversely,the functions and/or structural features of an SSMG 4 can be integratedinto a local computer 9. Alternatively, the local computer can insteadbe a remote computer located remotely from the premises, yet performingall or substantially all of the functions as described herein, such asby communicating with the SSMG 4 over a public or private network.

While most of the elements of a premises portion 15 typically remainrelatively stationary, a system can include a portable, wireless signaltransmitting means 11 configured to transmit a wireless signal 10 forremotely altering the activation status of the system. For example, aportable, wireless signal transmitter 11 can be configured as a keychain device (e.g., key fob) or other remote control device.Alternatively, a portable, wireless signal transmitter 11 can beintegrated into another electronic device. Generally the portable,wireless signal transmitter 11 will be configured for relatively shortrange transmission, but is not necessarily so limited, and can providefor control even at extended distances. Further, the portable, wirelesssignal transmitter 11 will generally include an integral power supply,such as a replaceable or rechargeable battery, to enable portability.The portable, wireless signal transmitter 11 can be used to activateand/or deactivate the alarm system, and/or lock or unlock a door, andmay include functions for otherwise altering at least a first set ofconfiguration parameters of an embodiment of a remotely-verified alarmsystem. In such embodiments, a wireless transceiver will be included inthe SSMG 4 to receive and/or exchange signals with the portable,wireless signal transmitter 11, enabling the SSMG 4 to affect changes tothe alarm system in response to the signals.

Elements of the premises portion 15 will generally be powered by anexisting electrical power system present at the monitored location(e.g., a residence, business office). However, the electrical powersystem can be intentionally and/or accidentally interrupted. Therefore,embodiments of the premises portion of a self-monitored alarm systeminclude a back-up power source to provide substantially continuous alarmsystem operation despite the interruption of a primary electricalsystem. A back-up system can include at least one of a solar energypower source, a power generator (e.g., gasoline powered), a commercialuninterruptible power supply (UPS), a battery system, or other powersource.

Server Portion of Alarm System

The premises portion 15 comprises only a portion of embodiments of theinvention. As shown in FIG. 2, the monitored premises 20 (and thepremises portion 15) is coupled in communication with a central server22 (server). The central server 22 typically includes both hardware andsoftware components, and is hosted at an off-site location relative tothe user's monitored premises 20. It provides, among other functions,premise and end-user authentication and/or authorization, storage ofpreconfigured settings, and communication capabilities including but notlimited to email, IP, SMS messaging, MMS messaging, and telephonetext-to-speech communication, to communicate with both the remoteend-user device 25 and emergency response services 27. The centralserver 22 also archives alarm events and associated video or images andmakes those available for remote end-user viewing from, for example, astandard web-browser utility.

As discussed above relative to the signal transmitting means 6, premises20 is coupled with the server 22 by a signal conveying means 21 (e.g.,optical, electrically conductive) in some embodiments, while in others,the communicative coupling is partially or entirely wireless. The signalconveying means 21 is generally part of a public network, Internet,phone network, or private network, but is not so limited.

The central server 22 (or “server”) can be a hosted web-server, and willgenerally be monitored, either locally or remotely, by a humanattendant. However, it can also perform many if not all of its alarmsystem functions according to pre-configured parameters, settings and/orprograms without substantial human intervention.

A server 22 is also coupled with a data storage means 23 in embodiments.The data storage means 23 enables storage and retrieval of datacorresponding to images transmitted from the premise 20 to the server22. It can also retain predetermined configuration parameters and/orinstructions relating to individual end users, premises 20, emergencyresponse services 27, and/or other detection and alarm activationrelevant data. Therefore, storage of image data is not necessarilyrequired at the premises portion 15 in all embodiments, simplifying thecomponents and functions present at the premises portion 15 of the alarmsystem.

While in embodiments, server 22 comprises a relatively unitary networkservice device, as depicted in FIG. 2, server 22 is broadly contemplatedas an collection of functional modules, structurally embodied, andcollectively considered a “server portion”. Referring to FIG. 3, theserver portion 30 is represented as a block diagram including numerousstructural and/or functional modules, one or more of which is coupledwith a data storage module 29 and with at least another module. Signalconveying means 21 from the premises is coupled with a Detection. SignalReceiving Module 31 (DSR module) of the server portion 30. The DSRmodule 31 can include structural elements, for example an antenna or acable connection structure. The DSR module 31 can also includediscriminating elements (e.g. signal analytics) embodied in softwareand/or firmware which identify at least one of the source, nature, andstatus of a received signal based, for example, on the signal strengthand/or based on other data associated with the signal. The DSR module 31can subsequently alter the signal by adding data to the signal and canconvey the signal to a Detection Signal Routing Module 32 (routingmodule), or can convey the signal to the routing module substantiallyunchanged.

The routing module 32 receives the signal, and evaluates characteristicsof the signal as defined by data included in the signal. For example,the signal can include data identifying a unique user, and/or image datathat can be compared to baseline image data stored in data storagemodule 29 to identify anomalies relative to the baseline image data. Therouting module 32 can then utilize the identification and/or other datato retrieve unique transmission parameters from data storage module 29,the transmission parameters providing instructions and/or informationneeded for transmitting a signal to the appropriate end user includingat least the image data. Alternatively, the necessary transmissionparameters can be included in the signal as transmitted from thepremises 20 and received at the DSR module 31.

The routing module 32 subsequently conveys the transmission parametersand the received images to a Detection Signal Transmission Module 33(transmission module). The transmission module 33 reads and recognizesthe transmission parameters and transmits a signal 24 a including theimages to an end user device 25 depicted in FIG. 2.

Alternatively and/or independently, if optionally enabled by the user,transmission of the signal 24 a to the end user device 25 is recognizedby a Signal Interval Timing Module 34 (timing module), and identified asto both the user and the specific signal 24 a. This is possible, inembodiments, due to the signal 24 a including associated data uniquelyidentifying the user and the transmitted signal, such as by date- and/ortime-related data, or a unique code generated specifically for eachsignal transmission. In response to the transmission, the timing module34 begins monitoring the duration of time between the transmission ofthe signal 24 a from the transmission module 33 to the user, and thereturn of an alarm verification signal 24 b from the user device 25. Thetiming module 34 can be implemented at least in part as software, andcan include either integral time-keeping components, or can track timeaccording to a timing system maintained by a third party (e.g., TheNational Institute of Standards and Technology).

The transmitted signal 24 a can take the form of any of a plurality ofavailable communication methods, including but not limited to networkmessages, email, SMS messaging, MMS messaging, text-to-speechcommunication or another as known or may be provided in the art.Further, the signal can be transmitted by or as any one of GSM cellphone signal, GPRS, WiMax network or another communication format orinfrastructure, as are known or may be provided in the art.

When the user device transmits a verification signal 24 b, and providedthe user device is within reception range, the verification signal isreceived at a Verification Signal Receiving Module 35 (VSR module) ofthe server portion 30. The verification signal 24 b, which typicallywill not include image data, but will include data corresponding to atleast a portion of the unique identifying data associated with signal 24a, is then conveyed from the VSR module 35 to a VerificationConfirmation Module 36 (VC module). The VC module recognizes the uniqueidentifying data, and instructs the timing module 34 to cease monitoringthe elapsed time since transmission of signal 24 a.

The VC module then identifies data associated with the verificationsignal 24 b to determine a user specified alarm status. If the userspecified a status verifying that the alarm is valid, then the VC module36 will notify a Host 38 of the server portion 30 to report an alarm toa public and/or private Emergency Response Service 27 (see FIG. 2) viaan Alarm Transmitter 37. However, if the user specified a statusverifying that the alarm is invalid (e.g., a false alarm), then the VCmodule will notify the host 38 of the server portion that the alarm isinvalid, and therefore does not warrant contacting the emergencyresponse service 27. It is contemplated that in embodiments, rather thancontacting an established Emergency Response Service or agency, someother third party (e.g. a neighbor, a friend, and employee) is contactedby the Alarm Transmitter 37. However, for simplicity of description andwithout intending any narrowing by the term, the various embodiments arebroadly referred to herein as an Emergency Response Service 27.

The alarm transmitter 27 can be a telephone, a radio system, a networkmessage connection, an internet connection, or nearly any other deviceor system permissible and capable within a particular area forcontacting emergency response organizations. Generally, local and/orstate laws may require that any call to public emergency responseservices via the 9-1-1 system must be made by a human, and not automatedto operate without human intervention. Therefore, the host 38 istypically human. However, embodiments of the invention are not solimited, and could provide for an automated alarm transmission to, forexample a privately contracted security company or a neighbor near themonitored premise 20. Therefore in embodiments, the host 38 can be adecision-making module capable of evaluating input data and executing anaction based upon predetermined contact parameters and/or instructions,or the VC module 36 can itself cause the alarm transmitter 37 totransmit an alarm to the emergency response service 27. In situationsnot directly involving a human host, the host 38 may be embodied atleast partially as software capable of evaluating data input from averification signal 24 b, determining an appropriate response accordingto predetermined instructions, and as output, affecting the appropriateresponse, such as causing an alarm transmitter 37 to transmit a validalarm.

In general, an alarm transmitted from the server portion 30 to aemergency response service 27 is transmitted according to a set ofpredetermined contact parameters (e.g., radio frequency, telephonenumber, email address) and/or other instructions. Such parameters and/orinstructions provide that the relevant and/or necessary information isconveyed to the appropriate services 27 (e.g., closest to the monitoredpremise 20, appropriate to the type of alarm event) and/or consolidateddispatch center to respond to the alarm event, and may also includeadditional content and value.

According to an embodiment, the server portion 30 may not receive averification signal from the user for an extended period of time. Forexample, the user may be out of signal transmission range, or the user'sdevice may be malfunctioning, deactivated, or left behind by the user.In such situations, the timing module 34 can, as part of theconfiguration parameters associated with a user, determine theexpiration of an allotted duration of time without receipt of averification signal 24 b. Upon such expiration, the timing module 34notifies the VC module 30 of the expiration, and conveys to the VCmodule 30 data associated with the unacknowledged signal 24 a (includingthe user identification data).

The VC module 30 then retrieves instructions and/or other configurationparameters from the data storage module 29. Typically, the VC module 30notifies the host 38 which then contacts the premises via a transmissionmeans. For example, the VC module 30 will, in an embodiment, cause atelephone call to be placed to the premises 20. If the telephone call isnot answered by the premises 20, or alternatively, if the call isanswered but the answering party fails to correctly provide and/orauthenticate a pre-configured password or some other security code, theVC module 30 of the server portion 30 will notify the host 38 thatconditions exist for transmitting an alarm signal to an emergencyresponse service 27 via the alarm transmitter 37. Alternatively, a usercan provide predetermined instructions directing the server portion 30to transmit an alarm signal to an emergency response service 27 withoutfirst attempting to contact the premises 20.

According to an alternative embodiment, the server portion 30 includesan Image Data Analysis Module 39 (analysis module). A server portion 30including this module allows a user to specify conditions fortransmitting a valid alarm based upon characteristics of a capturedimage. For example, an alarm event detection signal is received at theDSR 31 and is conveyed to the routing module 32. The routing module 32recognizes configuration data associated with the signal, checks thedata storage module 29 for instructions relating to user and/or premisesidentifying data associated with the signal, and in accordance withpredetermined instructions, conveys the signal to the analysis module 39rather than (or in addition to) the transmission module 33.

The analysis module 39 includes, in embodiments, video analytics means(e.g., image analysis software) configured to analyze data in the signalcorresponding to captured image data (e.g., static images, video).Further, the analysis module 39 is configured to discriminate based atleast in part on the content of image data and predeterminedconfiguration parameters. If the video analytics means identify imagedata representing a human presence and/or other behavior, and if soindicated according to predetermined alarm parameters, the analysismodule 39 conveys a signal to the VC module 36 confirming a valid alarm.Therefore, the VC module 36 will notify the host 38, and a valid alarmsignal is transmitted to an emergency response service 27.

Alternatively, if no images corresponding to predetermined alarmtriggers are identified in the image data of the signal, the analysismodule 39 can either convey a signal to the VC module 36 confirming aninvalid alarm, or can return the signal to the routing module 32 withassociated data indicating an inconclusive video analysis. In the lattersituation, if instructions in the data storage module 29 so indicate,the VC module 32 will then convey the signal to the transmission module33 for transmission to the user for verification.

Therefore, in an embodiment including an image data analysis module 39,an additional level of automation and image-based alarm verification isprovided to help reduce the number of false alarms, while stillproviding the option for subjective user review. Such embodimentsconstitute an intelligent burglar alarm system embodiment of aremotely-verified alarm system.

It is noted that several of the modules included in the server portion30 are configured for processing data associated with a signal and/oraccessing and acting upon predetermined instructions. Although thedescription above indicates that instructions are generally stored inand accessed at a data storage module 29 (a central data storage meansin embodiments), other embodiments include dedicated data storage meansassociated with one or more of the modules of the server portion X. Suchdedicated data storage means will typically, but not exclusively,constitute a sub-portion of a particular module, and may storeinstructions particular to the operations of that module. Likewise, adedicated storage means can be shared by two or more modules, althoughbeing an integral part of one module, or even existing as a separatestorage module in addition of storage module 29. In embodiments, storagemodule 29 can be designated for image data storage only, while one ormore other data storage modules of the server portion 30 are designatedfor retaining instructions and other information. Therefore, a serverportion 30 can include more than one storage means and/or more than onestorage module, and each of a plurality of data storage means and/ormodules can be designated to fulfill either redundant and/or differentpurposes relative to at least another data storage means and/or module.

Each module in the server portion generally includes structuralelements, such as electronic components, configured and coupled withand/or relative to each other so as to meet the functional purpose(s) ofthe module. Further, each module is configured and coupled with and/orrelative to at least another module of the server portion so as to meetthe functional purposes of the server portion 30. While a server portion30 can be embodied as a single device, such as a web server, theembodiments are not so limited. For example, a storage module 29 cancomprise a device separate from but communicatively coupled with one ormore other devices, with the plurality of devices comprising the serverportion 30. Likewise, as mentioned, the server portion need not becomprised entirely as devices, but can include a human element as, forexample a host 38.

The operations of the server portion modules, however, generally operateat least in part based upon pre-determined instructions provided by auser. Instructions are predetermined, throughout this description,inasmuch as they are provided at least in part by the user at a timeprior to the operation of the module upon a particular signal. Inembodiments, a signal arriving at a module from another module, apremises, or a user device, for example, may include associatedinstructions. Here too, although the instructions arrive at the moduleat the same time as a signal, they were provided by the user at or priorto the time the signal was transmitted to the module and so arepredetermined instructions.

One or more of the modules of the server portion 30 also processsignals, which can include any action taken upon or in response to asignal beyond simply conveying the signal through the module unchanged.Therefore, at least one module of a server portion 30, according toembodiments, also includes logic capability, and/or comprises a softwarecomponent. Indeed, a module may be entirely or substantially configuredas software embodied in a tangible medium and configured to be executedby a computing device. As a result of such execution, the software cancause, for example, a transmitting module 33 or alarm module 37 totransmit a signal.

Although numerous modules are described herein as comprising a serverportion 30 of an alarm system, it is also anticipated that any two ormore modules can be embodied as a single integrated module configured toperform the described functions of the integrated modules. Further, theserver portion can be embodied as several physically distinct butfunctionally and communicatively coupled devices. Therefore, the term“server” used herein can refer to a single computing device embodyingpart or all of the server portion, or can refer to the server portion 30generally.

End-User Device Portion of Alarm System

Turning again to FIG. 2, and as noted above, the server 22 is typicallybut not exclusively coupled in communication with an end-user (user)device 25. The conveying means 24 will generally, but not exclusively,include wired and/or wireless communication network infrastructureincluding public and/or private receivers, transmitters, signalboosters, relays, and/or other wired and/or wireless signal conveyanceinfrastructure (e.g., hardware, facilities, devices). Indeed, suchinfrastructure can comprise all or part of any of the wired and/orwireless signal pathways set forth in this description.

A user device can include, but certainly is not limited to, any portableelectronic device such as a mobile telephone, a web-enabled personaldigital assistant (PDA), a relatively stationary and/or mobile computer(e.g., desktop, notebook, tablet, palmtop), or an electroniccommunications device integrated within an automobile. In general, auser device is any electronic device(s) capable, either individually orwhen combined, of receiving a signal including data corresponding to atleast one image, displaying the image to the user, and transmitting asignal including a remotely-verified response to an alarm event.

As with the server 22 and server portion 30, while the end user device25 typically (but not exclusively) comprises a unitary device, it may bemore clearly understood as a collection of structurally-embodiedfunctional modules, collectively referred to as an “end-user deviceportion”.

FIG. 4 depicts an embodiment of a user device portion 40 of an alarmsystem including numerous structural and functional modules, althoughmore or fewer modules may exist in alternate embodiments having greateror lesser levels of integration. An alarm detection signal 24 atransmitted from the server portion 30 is received at a Detection SignalReceiving Module 41 (DSR). The DSR 41 is typically, but not exclusively,embodied as a wired or wireless network connection, of which many formsare known in the art and can be used according to embodiments. Forexample, the DSR 41 can be internal or external to the device, can befixed or extensible (e.g., a telescoping antenna structure), and can beconfigured for efficiently receiving one or more of various signalformats that may be transmitted from the server portion 30. A DSR 41 canalso include electronic, optical, and/or optoelectronic componentsconfigured for receiving, amplifying, converting, transforming, orotherwise acquiring a transmitted signal. Therefore, the embodiments ofa wired or wireless network connection as conceived herein are expansiverather than limited.

Once received at the DSR 41, the signal 24 a is conveyed to a SignalProcessing Module 42, where the signal or some part thereof is read,modified, interpreted, separated, or otherwise operated upon. Theprocessing module 42 typically includes a processing means, such as amicroprocessor device, a graphics generator, and/or another integratedcircuit device. Further, a processing module 42 can include or becoupled in communication with a data storage means, such as a hard discdrive, a memory chip or chip device (e.g., dual in-line memory module,or DIMM), or a removable memory card of any known format (e.g., compactflash), although the embodiments are not so limited. In embodiments, thememory means includes instructions which, when operated upon by theprocessing module 42, recognize data in the signal and cause the deviceto notify the user of the alarm.

Notification can include the device emitting an audible signal that theuser can perceive, or can include a substantially silent signal, such asdisplaying a message indicating receipt of an alarm, or causing avibration generating device within the user device 40 to generate auser-perceptible vibration. In those devices including multiple possiblenotification modes, the user is able to select from the available modes.

The processing module 42 also identifies image data in a received signal24 a, and stores the data in the user device portion 40 for later accessand viewing by the user. For example, the image data can be included ina file attached to an email message, or accessible via an included link,or otherwise associated with the signal. Alternatively, the processingmodule 42 will convey the image data, whether altered or unaltered, toan Image Data Display Module 43 (display) capable of converting theimage data into an image that is viewable by the user.

According to an alternative embodiment, the signal 24 a can include alink or other information enabling and/or directing the end user toaccess a hosted website to obtain image data and alarm conditioninformation. Likewise, the user device may include a data storage meanscontaining pre-determined contact information for contacting a hostedweb-site or another image data-storage and transmission service and/ordevice. When accessing the hosted website, the user can view storedimages at or accessible through the website. Alternatively, the user canaccess the SSMG 4 via the website and view real-time images from one ormore of the cameras 2 monitoring the premises 20. The hosted websitedescribed herein will typically, but not exclusively, be located at theserver portion 30.

The display 43 can include processing means to convert and otherwisemodify image data into a viewable form independently from the processingmodule 42, or can simply receive and display image data as a viewableimage without otherwise transforming the data. The display 43 can alsoshare processing means with the processing module 42, the DSR 41, orboth.

A display 43 generally also comprises any of a number of image displaymeans. For example, a display 43 can include an LCD display, a plasmadisplay, or a CRT display. In general, a display 43 is virtually anyimage display technology currently known or reasonably contemplated thatcan be integrated into a portable user device 40, or with which aportable user device 40 can be operatively coupled. In the lattersituation, a display 43 of a user device 40 need not be permanentlycoupled with the user device 40, but can exist separately and beconsidered a part of the user device 40 when coupled thereto.

A user device 40 further includes an Alarm Verification Module 44. Theverification module 44 provides a means for a user to control how animage is displayed, whether the image is a static image, a full-motionvideo image, or some other form. Control parameters can include start,stop, advance, reverse, zoom, contrast, color, tone, or other suchuseful playback and/or image modification capabilities as would beunderstood by those having skill in the art. Further, the verificationmodule 44 provides a means for the user to indicate the status and/ordisposition of an alarm signal. For example, if the user determines thatthe image depicts conditions requiring an emergency response (e.g.,unauthorized intrusion, fire, medical emergency), the user can indicatethat the alarm is valid, and select an appropriate response method viathe verification module 44. Conversely, if the image depicts conditionsrequiring no response, the user can indicate that the alarm signal isinvalid, and that no response or a lesser response is appropriate.

The verification module 44 includes, in embodiments, processing means,which can be dedicated or can be shared with one or more of the othermodules. The verification module 44 can also be coupled with datastorage means and can access and operate upon data and/or instructionsstored therein. Therefore, the verification module 44 can present agraphic user interface (GUI) at the display 43, visually providing aclear and user-friendly interface for selecting an alarm status, forcontrolling the display of an image, or for selecting and/or alteringany other configuration parameter.

For example, a user can, by interacting with a GUI, respond to an alarmnotification by causing an image to appear on the display 43. Uponviewing the image, the user can, again using the GUI, select to respondto the alarm, whereupon the GUI changes to present a set of options tothe user. The user can then select an option (e.g., “Alarm Valid”),causing another GUI to appear and provide options for an appropriateresponse (e.g., “Contact 9-1-1”). Lastly, another GUI can appear, andthe user can select an option causing the device to transmit a signal 24b including the user-selected alarm verification status to the serverportion 30. While the embodiment described above includes varioususer-input methods implemented as GUIs, the embodiments are not solimited, nor are the format or content of the described GUIs. AGUI-implemented alarm validation interface can be as simple as one ormore icons presented at the display of the device that the user selectsto indicate an alarm validation status.

In an alternate embodiment, the user device 40 includes a user inputmodule 45 such as a key pad, a touch screen, a touch-sensitive pad, oranother input modes and/or device as known to those skilled in the art.Therefore, the input module 45 can include a physical input device, orcan alternatively include a GUI as described above with regard to theverification module 44. The input module 45 and the verification module44 can also functionally interact. For example, when a user inputs aresponse using a key pad in response to a message presented via a GUI,the user's response causes the GUI to change and present a new set ofoptions to the user, the new options based at least in part on whichoption the user selected.

User input module 45 can be a part of another device, (e.g. a cellphone, a PDA, a computer). The user input module 45, in embodiments,also includes processing means as described relative to other of themodules, and/or is coupled in communication with data storage means toaccess and operate upon, or in response to, stored instructions.

Upon user selection of an alarm verification status, a VerificationSignal Transmission Module 46 (VST) of the user device 40 transmits asignal 24 b to the server portion 30 including at least data indicatingthe user selected verification status. The VST 46 includes a signaltransmitter, which can transmit via one of a wireless or a wire-conveyedsignal. Further, the transmission module 46 includes, in embodiments,processing means as described relative to other embodiments, and/or iscoupled in communication with data storage means, for accessing storedsignal relevant data and/or for acting upon or according to storedinstructions. For example, acting according to transmission parameterinstructions can cause the transmission module 46 to convert anelectronic digital signal into an optical signal for transmission via anoptical signal conveying means (e.g. optical fiber).

The transmission means, technology, and/or message format (collectively“format”) of the transmitted verification signal 24 b can be the same asthat of the detection signal 24 a, or it can be different according toalternative embodiments. For example, a signal format can includemessages sent via email, IP, web-link, SMS messaging, MMS messaging, orvoice activated or touch-tone dialing. Therefore, the VST 46 isconfigured to transmit a signal according to a particular transmissionformat as described above, or can be configured to transmit via morethan one format. Generally, the VST 46 transmits in a format which canbe received and properly (e.g., correctly, effectively) interpreted atthe server portion. The transmitted verification signal 24 b willgenerally also include data identifying the user and/or will include allor some portion of a unique signal identifying code transmitted from theserver portion 30 to the user device 40. In embodiments, the user may berequired to enter a password or other unique identification code whenresponding to an alarm. In such embodiments, the password or other codeis included in the transmitted verification signal 24 b to notify theserver portion 30 that the user is authorized to respond relative to thealarm.

According to embodiments, the user can also, via the user device 40,initiate a transmission to the server portion 30 and/or the premisesportion 15. For example, the user may wish to view the status of aportion of the monitored premises. Therefore, the user can interactivelytransmit commands to the premises portion 15 causing one or more camerasto capture images, and/or causing the SSMG 4 to transmit images to theuser device 25 for viewing at the display module 43. Such images can becaptured and stored for later viewing, or can be viewed in substantiallyreal time, subject only to signal transmission and/or processinglatencies. Alternatively, the user may wish to alter configurationparameters and/or alter the operational status of the alarm system.Therefore, the user initiates via the user device 25 either a one-waytransmission or an interactive session with the premises portion 15,sending data including commands to affect such alterations, and perhapsreceive confirmation data in return. Likewise, the user can remotelyalter configuration parameters stored at the server portion 30 in asimilar fashion. In either situation, the user can transmit a passwordand/or unique identification code to confirm that the user is authorizedto affect the indicated actions.

Emergency Response Service Portion

Referring again to FIG. 2, and as also described above regarding theserver portion 30 of FIG. 3, upon receiving verification of a validalarm from a user, or alternatively upon expiration of a pre-determinedduration of time without receiving a response from the user, the serverportion 30 transmits a signal to an emergency response service 27. Aswith other transmitted signals according to embodiments of theinvention, the signal can be transmitted either wirelessly or by a wire26, and can utilize any of numerous transmission formats and/orcommunication means. Additionally, such transmission means may includevoice communications as a viable method in embodiments. The emergencyresponse service 27 will also possess signal receiving means, such asweb-enabled devices, mobile computers with wireless capabilities,servers, or means capable of receiving and processing an alarm signal.Additionally, such receiving means may include voice communications.

The transmitted signal can include a pre-configured message, configuredfor example at least in part by the end user, the server portion 30(e.g., a host 38), or the emergency response service 27. The message caninclude information to direct a particular response, to identify thelocation of the monitored premises, to indicate the nature of thedetected alarm and/or emergency, and/or other information useful to anemergency response service to affect a rapid and appropriate response(e.g., sending the fire department in response to a fire).

In addition to transmitting a signal including a message, the serverportion 30 will also, in embodiments, transmit as part of the initialsignal and/or as a separate signal, data corresponding to capturedimages. At the emergency response service 27, a responder can, in anembodiment, view the images at a display device, and can thereforebetter understand the nature of the alarm condition. For example, if theimages depict an armed intruder, the responder at the emergency responseservice can dispatch a SWAT team to the monitored premises, and canfurther cause evacuation of the surrounding area. Further, because theemergency response service can include, in embodiments, mobile emergencyresponse service vehicles and/or personnel, the server portion cantransmit validated alarm signals and images directly to mobileresponders. This capability provides unique capabilities forefficiently, appropriately, and effectively responding to an alarm at amonitored premises, and managing such response.

A user, while transmitting signals including instructions to cause thepremises portion 15 to capture and transmit real-time images, canfurther cause the real-time images to be transmitted through the serverportion 30 to the emergency response service 27. This provides real-timeimage-based monitoring of the monitored premises 20 by the emergencyresponse service 27 before, during, and/or after a response to an alarm.

Alarm System Data Flow

FIGS. 5 and 6 provide an overview of data flow pathways in the premisesportion and the extended alarm system, respectively, that occur inembodiments of the invention. Although not every function or embodimentinvolves signals traversing every possible data flow pathway, thepathways are depicted in a relatively consolidated form for simplicity.

With reference to FIG. 5, signals transmitted from a camera 2 to SSMG 4follow pathway 51 a. These signals typically include captured images.Conversely, signals from the SSMG 4 to a camera 2 traverse pathway 51 b,and may include instructions for controlling a camera.

The SSMG 4 may then transmit a signal to, for example a router 6 alongpathway 52 a for subsequent transmission by, for example router 6 to aserver 22 (see FIG. 2). Signals received from a server portion 30 and/ora user device 25 will traverse pathway 52 b, in embodiments, from therouter 6 to the SSMG 4. In embodiments wherein the router 6 isintegrated within the SSMG 4, these pathways likewise occur internallywithin the SSMG 4.

Pathway 53 a from the SSMG 4 to the local computer 9 can convey datacorresponding to images for storage at a storage means of the localcomputer 9. Pathway 53 b 4 typically conveys one or more storedconfiguration parameters from the local computer 9 to the SSMG, amongother data types.

Pathway 54 a conveys, among other things, images from the SSMG 4 to adata storage means 12, while pathway 54 b conveys data from the storagemeans 12 back to the SSMG 4, such as to provide the user the ability toreview stored images.

Pathways 55 a and 55 b convey data between the router 6 and the localcomputer 9, and as described above relative to the SSMG 4, when router 6is integrated within the local computer 9, or the SSMG 4 itself,according to an embodiment, pathways 55 a and 55 b exist within thelocal computer 9, or alternatively are integrated within the SSMG 4.Each of pathways 55 a and 55 b can typically, but not exclusively,convey transmission parameters and/or images, but are not so limited.

Pathway 56 a conveys a signal from a portable, wireless signaltransmitter 11 to the SSMG 4, such as to alter an alarm systemactivation status. A signal conveyed from SSMG 4 to the portabletransmitter 11 along pathway 56 b can confirm an activation status ofthe alarm system, and through a logic circuit and/or device within thetransmitter 11, cause an LED on the transmitter 11 to illuminate.

The depicted pathways of the premises portion 15 in FIG. 5 are not,however, exclusive, and additional and/or alternate pathways areincluded within the scope of the invention according to alternateembodiments. Such embodiments may include integration of elements withinthe premises portion. For example, the local computer 9 and the SSMG 4may be integrated in an embodiment, and the signal pathways 53 a and 53b may take place entirely within the integrated device. Further,depending upon the configuration of the integrated device, pathways 53 aand 53 b may not exist in a separate and significant form. Otherelements and/or devices within the premises portion 15 may likewise beintegrated, or additional elements may indicate the presence ofadditional pathways. For example, an added peripheral device (e.g.,printer) could be coupled in communication with data storage means 12,and signal pathways would exist between them for conveying data forstorage and/or retrieval, according to an embodiment. Therefore, thesignal pathways depicted in FIG. 5 are for illustrative purposes, andare not intended to limit the scope of embodiments of the invention.

Turning now to FIG. 6 depicting the signal pathways of the inventedalarm system beyond the premises portion, signal pathway 61 conveyssignals from the monitored premises 20 (and premises portion 15) to acentral server 22, for example in response to an intrusion detection,and pathway 62 conveys signals from the server 22 to the premises 20,such as when the end user wishes to control a camera 2 to obtain areal-time image.

Pathways 63 and 64 convey signals between the server 22 and an end userdevice 25, such as detection signal 24 a and verification signal 24 b,respectively.

Pathway 65 conveys signals from the server 22 to the emergency responseservice 27, as when reporting a verified valid alarm. Pathway 66, in anembodiment, conveys a confirmation signal from the emergency responseservice 27 to the server 22, confirming that the alarm signal has beenreceived.

These signal pathways described herein are not exclusive, nor are thetypes of data, signals or transmission means provided above indescribing exemplary embodiments.

An Exemplary Alarm Method Embodiment

With reference to FIG. 7, a simplified description of an embodiment ofthe invented alarm system method is provided below for additionalclarity, from the perspective of an end user employing the alarm system.

At 71, the alarm system captures image data and transmits a first signalto the SSMG. The SSMG receives the first signal, and transmits a secondsignal to a server portion, at 72, and then at 73, the server portionreceives the second signal, and transmits a third signal to a device ofthe end user. The end user device receives the third signal, and at 74,the user views image data of the third signal at a display of the enduser device. At 75, the end user inputs validation data (e.g., “ValidAlarm”, “Invalid Alarm”), and transmits a fourth signal from the enduser device to the server portion. The server portion, at 76, receivesthe fourth signal, and if the fourth signal includes data indicatingthat the alarm is valid, the server portion transmits an alarm signal toan emergency response service. At one or more of the operations depictedat 72, 73, and/or 74, image data is stored, as shown at 77.

Associated with one or more of the operations of the embodiment depictedin FIG. 7, as well as other embodiments, signals are transmitted,modified, augmented, processed, and otherwise handled according toconfiguration parameters, at least a subset of which, and generally mostof which, are predetermined, for example by the end user. Otherconfiguration parameters are determined relatively contemporaneouslywith the receipt or transmission of signals, as determined by dataassociated with the signal and/or other predetermined configurationsparameters.

Alternative Embodiments

An end user device 25 is typically maintained in the possession of theend user, and therefore it is the end user who receives and verifies thevalidity of detected alarm events. However, there may also arise any ofa wide variety of situations when, for example, the end user is unableto receive transmitted signals from the server portion 30 (e.g., out oftransmission range) or it is otherwise inconvenient or impossible forthe user to receive and/or verify alarm events. Therefore, the user candesignate an alternate trusted entity to receive and verify detectedalarm events, and the trusted entity will be considered a user accordingto the embodiments described and contemplated herein. For example, atrusted entity can be a friend, a family member, an agent or employee,or a commercial service, although the embodiments are not so limited,and can include nearly anyone designated by the user and/or anotherauthorized entity.

Further, a user device 25 includes whatever device a user employs tocarry out the functions of a user device 25 as described above. Inasmuchas a user (or a trusted entity as user), while being remote from amonitored premises 20 and a server 22, may be connected with the server22 by a wired connection, signals 24 a and 24 b can be exchanged with(e.g., transmitted to, received from) the trusted entity's user device25 by wire (as broadly described above). Likewise, the user device 25 isnot limited to being a portable, wireless device (e.g., PDA, mobiletelephone), but can also be a personal or desktop computer or any otherdevice operably coupled, whether persistently or intermittently, incommunication with a server 22 or with at least one module of serverportion 30.

An alarm system can include more than one level of user permissions(e.g., authority, access, control), and a trusted entity may not begiven all the same levels of control of an alarm system permitted to anend user. For example, the trusted entity may not, according to a levelof authority granted by the end user, be able to alter some or all ofthe configuration parameters of an alarm system, such as alteringpasswords or accessing stored image data. Therefore, while providing aproxy “end user” to verify the validity of detected alarms, an end usercan retain control over at least some aspects of system configurationand/or function.

In various embodiments, signals transmitted between a premises portion15, a server portion 30, an end user device 15, and an emergencyresponse service 27, each of which is broadly described herein, can beconveyed according to any one of or combination of communicationstructures. For example, and as described, any of the signals describedherein can be transmitted either wirelessly or by a wired connectionaccording to embodiments, and no limitation to either one or the otheris intended herein. Therefore, symbols used in the figures to representsignal conveying means 21 and 24 in FIG. 2, for example, are notintended to limit either signal conveying means as being wire orwireless. The depicted symbols could just as easily and accurately betransposed in the figures to represent alternative contemplatedembodiments.

Examples of wireless communication structures can include commercialcellular telephone networks, Wi-Fi and/or WiMAX networks, satellitecommunication networks, publicly available radio frequencies, orproprietary (e.g., military, industrial) wireless communicationnetworks, although the embodiments are not so limited. Likewise, wiredcommunication structures can include fiber optic networks, cable (e.g.,cable television and broadband) networks, telephone networks (e.g., PSTNand DSL), and others capable of carrying a communication signal.

Any one or more of the signals transmitted within embodiments of thesystem, whether by wireless or wired transmission means, can betransmitted in a secured manner, by use of, for example, data and/orsignal encryption, frequency modulation, coded ciphers, or any othermethod and/or means available for use with public and/or private signaltransmission devices, networks, protocols, or communication formats.

In light of the described embodiments provided above, a person havingordinary skill in the art will recognize numerous advantages provided byembodiments of an automated, remotely-verified alarm system withintrusion and video surveillance, and digital video recording.

The present invention, according to one or more embodiments, provides aself-monitored alarm verification solution for visually identifying theroot cause of alarm events, relatively directly and immediately, whileutilizing modern high-speed Internet, phone networks, or privatenetworks and web-enabled devices for self-monitoring. It also provides aself-monitored alarm verification solution that will visually record analarm event at a premise location utilizing any combination of a camera(PIRCam) or separate PIR or other sensor and separate camera, ormotion-sensing camera to make available images of the alarm events to bevalidated remotely by the end-user.

The described system includes an alternate power source in case aprimary power source is interrupted, and also includes alternate powersources for remotely located image capture devices providing a highdegree of flexibility in their placement and configuration. Embodimentsinclude either and/or both of wired or wireless signal transmission, andare modular enough and simply enough to use that they can be installedeither by a professional installer or by an end user and/or premiseowner.

Embodiments of the system capture and temporarily store alarm eventimages, and also securely transmit said images to an off-site locationwhere they can be retrieved and viewed by an end user utilizing anyweb-enabled device. Further, embodiments of the invented system enabletremendous variability and flexibility to utilize communication,transmission, and data formats, devices, and/or modes, as would be mostuseful, reliable, affordable, and available in the situation of eachparticular end user. For example, the described system can interfacewith and communicate over any public network, Internet, phone network,or private network, although other networks may also be alternativelyutilized.

The system can be enabled (“armed”) and disabled (“disarmed”) remotelyor within the premise via either the use of the SSMG, a local PCconnected to the SSMG or by a wireless transmitter key fob thatcommunicates with the SSMG, or by a remotely located user device. Also,the system can include a local PC at the premise or located remotely,that configures the SSMG and central server configuration parameters.Such parameters can include communication method selections, alarm eventthresholds, and contact information for the end user and/or lawenforcement agencies, although the embodiments are not so limited.

Software on the central server can also generate a plurality ofcommunication methods including email, web-site hosting, SMS messaging,MMS messaging, network protocols, and/or text-to-speech communication.Therefore, the central server can utilize a plurality of communicationmethods with both the end-user's premise, the end-user's remote device,and law-enforcement agencies.

Through the use of secure communication, directly conveyed from apremises to a central server and then to an end user, the system enablesan alarm verification method providing both relative immediacy andprivacy. The delays and involvement typical of a third party alarmmonitoring service are eliminated in embodiments, and the likelihood offalse alarms is greatly reduced.

Other advantages are enabled by the tremendous flexibility andmodularity of the described alarm system to render virtually innumerableembodiments. Accordingly, although the system is depicted and embodiedin only a limited number of forms in the accompanying drawings, thedrawings are illustrative only, and changes can be readily made by onehaving ordinary skill in the art according to the descriptions providedabove.

It will be understood that the present invention is not limited to themethod or detail of construction, fabrication, material, application oruse described and illustrated herein. Indeed, any suitable variation offabrication, use, or application is contemplated as an alternativeembodiment, and thus is within the spirit and scope, of the invention.

It is further intended that any other embodiments of the presentinvention that result from any changes in application or method of useor operation, configuration, method of manufacture, shape, size, ormaterial, which are not specified within the detailed writtendescription or illustrations contained herein yet would be understood byone skilled in the art, are within the scope of the present invention.

Finally, those of skill in the art will appreciate that the inventedmethod, system and apparatus described and illustrated herein may beimplemented in software, firmware or hardware, or any suitablecombination thereof. Preferably, the method system and apparatus areimplemented in a combination of the three, for purposes of low cost andflexibility. Thus, those of skill in the art will appreciate thatembodiments of the methods and system of the invention may beimplemented by a computer or microprocessor process in whichinstructions are executed, the instructions being stored for executionon a computer-readable medium and being executed by any suitableinstruction processor.

Accordingly, while the present invention has been shown and describedwith reference to the foregoing embodiments of the invented apparatus,it will be apparent to those skilled in the art that other changes inform and detail may be made therein without departing from the spiritand scope of the invention as defined in the appended claims.

1. An automated detection and alarm verification method comprising: capturing at least one image in response to a detection event at a monitored premise; transmitting a first data signal including the image to a local signal processing device; transmitting a second signal including at least a portion of the image from the signal processing device to a remote server according to at least a first set of predetermined parameters; and transmitting a third signal including at least a portion of the image from the server to a user device.
 2. The automated detection and alarm verification method of claim 1, further comprising: displaying at least a portion of the image at a display means of the user device; inputting a verification status by a user using an input means of the user device; and transmitting a fourth signal including the verification status from the user device to the server.
 3. The automated detection and alarm verification method of claim 1, wherein the server transmits an alarm signal to at least one of a public or private emergency response service, the alarm signal including a detection event validity indication, in response to either, (1) failing within a predetermined period of time to receive a fourth signal from the user device in response to the third signal, or (2) upon receiving a fourth signal from the user device wherein the fourth signal includes an indicator that the detection event is valid.
 4. The automated detection and alarm verification method of claim 1, further comprising: controlling at least one of an operational function and an operational status of the signal processing device by at least a first set of parameters pre-set by a user using at least one selected from the group including the user device, a local computing device, the server, and an input means of the signal processing device.
 5. The automated detection and alarm verification method of claim 1, further comprising: making a digital video recording of the image by one of the local signal processing device or a local computing device.
 6. The automated detection and alarm verification method of claim 1, further comprising: altering the operational status of the signal processing device by a portable, wireless, signal transmitting device.
 7. The automated detection and alarm verification method of claim 2, wherein inputting a verification status includes subjectively determining the validity of a detection event based at least in part upon the content of the image, and indicating the validity determination via the user device.
 8. The automated detection and alarm verification method of claim 1, further comprising: storing the captured image by a storage means of one or more of the signal processing device, the computing device, the server, and the user device.
 9. The automated detection and alarm verification method of claim 3, wherein one or more of the second signal, the third signal, the fourth signal and the alarm signal is transmitted at least in part via one of a public network or a private network, and further comprises an SMS message, an MMS message, an email message, an internet message, or a telephone message.
 10. The automated detection and alarm verification method of claim 1, further comprising: remotely controlling an image capture means of the premise using a user device, and viewing substantially real-time images at a display means of the device.
 11. An automated detection and alarm verification system comprising: at least one image capture means configured to detect an alarm event, to capture image data and to transmit a first signal including at least the image data; a local signal processing means configured to receive the first signal and to transmit a second signal including at least the image data according to a first set of transmission parameters; a remote server portion configured to receive the second signal and to transmit at least a third signal according to a second set of transmission parameters and including at least the image data; and a user device configured to receive at least the third signal and to transmit at least a fourth signal, and including a display means to visually display at least a portion of the image data as a viewable image.
 12. The automated detection and alarm verification system of claim 11, further comprising: a signal receiving means of at least one of a public or private emergency response service, the signal receiving means configured to receive at least an alarm signal from the server.
 13. The automated detection and alarm verification system of claim 11, wherein the image capture means comprises a camera having capabilities for capturing image data selected from the group including motion video images, still images, color images, black and white images, and thermal contrast images.
 14. The automated detection and alarm verification system of claim 11, wherein the image capture means is coupled with a sensor configured to detect an alarm event selected from the group including motion, sound, interruption of an optical beam, interruption of an electrical circuit, completion of an electrical circuit, a transient thermal differential, and an application of force.
 15. The automated detection and alarm verification system of claim 11, further comprising: a computing means configured to at least one of receive, process, store, and convey to the signal processing means at least a first set of configuration parameters.
 16. The automated detection and alarm verification system of claim 11, wherein at least one selected from the group including the local signal processing means, the server portion, the user device, and a data input means comprises a data storage means configured to allow storage and retrieval of the image data.
 17. The automated detection and alarm verification system of claim 11, wherein at least one of the signal processing means or the computing means further comprises a digital video recording device.
 18. The automated detection and alarm verification system of claim 11, further comprising: a portable, wireless signal transmitting means wirelessly coupled in communication with the signal processing means, and configured to transmit a signal capable of remotely altering an activation status of the system.
 19. The automated detection and alarm verification system of claim 11, wherein the user device further comprises a user input means configured to allow a user to input a user-selected control parameter for transmission as a portion of the fourth signal.
 20. The automated detection and alarm verification system of claim 11, wherein the remote server portion includes an image data analysis module configured to discriminate a valid alarm event based at least in part on the content of the image data, and further configured to cause the server portion to transmit an alarm signal to an emergency response service based upon the valid alarm event and at least a third set of transmission parameters.
 21. The automated detection and alarm verification system of claim 11, further comprising: at least one alternative power supply configured to provide power to at least a portion of the alarm system upon interruption of a primary power supply. 