Security System and Method Using Mobile-Telephone Technology

ABSTRACT

Disclosed is a security and alarm system. When sensors detect something of note, they alert a master unit which in turn captures pertinent information (e.g., an image or sound) and places a mobile-telephone call to deliver the alert and the captured information. The recipient of the call (for example, an owner of the system or a security service) evaluates the information and takes appropriate action such as alerting a local police department. Some embodiments offer two-way service: In addition to delivering alerts, the system responds to calls from an authorized user requesting current information. Two-way communications allow some embodiments to deliver “Breach of Peace” alerts to users. In one scenario, a public security service sends out a warning within a geographical area that the peace has been breached. The system receives the warning and alerts its user to the situation. The user then takes appropriate action.

CROSS-REFERENCE TO RELATED APPLICATION

This application claims priority to U.S. Provisional Patent Applications60/835,666, filed on Aug. 4, 2006, and 60/923,144, filed on Apr. 12,2007, which are incorporated herein by reference in their entireties.

FIELD OF THE INVENTION

The present invention is related generally to security systems, and,more particularly, to remote supervisory, control, and alarm systems.

BACKGROUND OF THE INVENTION

In the post-9/11 world, people are very focused on personal and propertysecurity. For commercial concerns, an up-to-date security system with aremote-monitoring service has long been considered to be a necessarycost of doing business. Closer to home, most car manufacturers now offeralarm systems, and sales of residential security systems are growingrapidly.

While an entry-level security system may only sound a siren or flash alight when an untoward condition is detected, more sophisticated (andmore expensive) systems respond by alerting a private security service.(As used in this patent application, “security services” include privatealarm-monitoring companies and public organizations such as the police,fire departments, and 911 call centers.) The private security serviceinvestigates the situation and, depending upon the results of theinvestigation, may in turn alert a public security service.

In a separate but related aspect of security, parents wish to monitorand possibly to control remotely the activities of their children toassure themselves that their children are neither walking into troublenor having trouble thrust upon them. Some parents, for example, givetheir children cellphones so that the parents can always contact thechildren and so that the children can call in case of an emergency. Thesecurity systems of some vehicles allow parents to limit the speed atwhich a child (or a parking valet) can operate the vehicle.

The spread of security systems, however, is limited because existingsystems are either very expensive to buy and to maintain (high-endsystems) or can be disabled by ingenious criminals (low-end systems).

BRIEF SUMMARY OF THE INVENTION

The above problems and shortcomings, and others, are addressed by thepresent invention, which can be understood by referring to thespecification, drawings, and claims. According to aspects of the presentinvention, mobile-telephone technology (e.g., cellular or satellite) isused to provide a reliable security and alarm system. In one embodiment,a vehicle security system includes built-in mobile-telephone technology.When sensors in the vehicle detect something of note, they alert amaster unit which in turn captures pertinent information and places acall to deliver the alert and the captured information. The recipient ofthe call evaluates the information and takes appropriate action.

Various embodiments of the present invention use different types ofalarm or status sensors. A typical domestic system detects unauthorizedentry, motion, or smoke. Industrial systems also detect harmful gassesand post alerts about needed maintenance. For monitoring the use of anautomobile, alerts include speed exceeding a set amount, status ofseatbelts, and geographical position of the automobile (as reported by aGPS receiver). In some applications, the system periodically reportsstatus even if nothing of note has been detected.

In a typical embodiment, a camera or microphone captures informationthat is transmitted along with the alert. For example, a camera (stillor video) scans the interior of a vehicle when the alarm systemtriggers. The image is then used to track down an unauthorized entrantto the vehicle.

In one aspect, the system delivers the alert to an authorized owner ofthe system. For example, the system calls a stored telephone number ortransmits a text message or image to the owner. The owner reviews theinformation and can inform the system if no further action is necessary.If the owner does not respond within a set period, then the system callsa security service. The security service reviews the information and, ifappropriate, calls a police or fire department.

Some initial implementations are expected to use an existing cellular orsatellite telephone as an add-on to an existing alarm system. Thetelephone is removably installed in a docking station that connects thetelephone both to the alarm detection subsystem and to local electricalpower. In preferred embodiments, the telephone technology is built-inand integrated with the alarm detection subsystem.

All embodiments, whether removable or integrated, contemplate the use ofa separate battery to thwart thieves from disabling communications. Formore security, the system can include a backup communications technologyin addition to a primary technology (e.g., a satellite link backing up acellular link).

Some embodiments offer two-way service. In addition to deliveringalerts, the system responds to calls from an authorized user. Forexample, the owner requests a status update or asks that a cameracapture and deliver a current view. Of course, privacy and securityconcerns dictate the wisdom of using authentication information,cryptology, or the like to secure communications in both directions.

Two-way communications allow some embodiments to deliver “Breach ofPeace” alerts to users. In one scenario, a public security service sendsout a warning within a geographical area that the peace has beenbreached (for example, a criminal has escaped, a terrorist attack iscontemplated, or a river is flooding). The system receives the warningand alerts its user to the situation. The user then takes appropriateaction.

BRIEF DESCRIPTION OF THE SEVERAL VIEWS OF THE DRAWINGS

While the appended claims set forth the features of the presentinvention with particularity, the invention, together with its objectsand advantages, may be best understood from the following detaileddescription taken in conjunction with the accompanying drawings ofwhich:

FIG. 1A is a block diagram of a security system installed in anautomobile according to one embodiment of the present invention;

FIG. 1B is a variant of FIG. 1A showing how the security system alsosupports parental monitoring;

FIG. 2 is a schematic depicting the hardware and software of oneembodiment of a security system;

FIG. 3 is a block diagram showing an exemplary installation of asecurity system in a building, either commercial or domestic;

FIG. 4 is a block diagram of an embodiment of the security system thatsupports health-care monitoring;

FIG. 5 is a flowchart showing an exemplary method for providing atwo-way security system; and

FIG. 6 is a flowchart showing a method for responding to a “Breach ofPeace” alert.

DETAILED DESCRIPTION OF THE INVENTION

Turning to the drawings, wherein like reference numerals refer to likeelements, the invention is illustrated as being implemented in asuitable environment. The following description is based on embodimentsof the invention and should not be taken as limiting the invention withregard to alternative embodiments that are not explicitly describedherein.

FIG. 1A presents a vehicle-security system as one exemplary embodimentof some aspects of the present invention. The security system integratedinto a vehicle 100 includes a master control unit 102. Connected to themaster control unit 102 are alarm and status sensors 104. Also connectedto the master control unit 102 are one or more information-capturedevices 106 and a mobile-telephone communications capability,illustrated in FIG. 1A by the antenna 108.

In the most basic mode of operation of the security system, when analarm sensor 104 “triggers” (e.g., a smoke detector detects smoke), itsends an alert signal to the master control unit 102. In a veryprimitive embodiment, the master control unit 102 is only informed thata sensor 104 has triggered, but in a preferred embodiment, the mastercontrol unit 102 is informed of the specific nature of the alert. If thetriggering sensor 104 is so equipped, it can provide a detailed analysisof the alert to the master control unit 102.

The master control unit 102 can choose to collect further informationthat may be of use in reporting and resolving the alert incident. If,for example, the alert indicates that someone has broken into thevehicle 100, then the master control unit 102 can ask a camera 106 totake a photograph of the driver's position in the vehicle 100.

The alert information and any further information provided by theinformation-capture devices 106 are then packaged and transmitted usingthe mobile-telephone capability 108. The master control unit 102 usesstored contact information to direct the transmission of the packagedalert. In FIG. 1A, a telephone call is placed over thecellular-telephone network 110 to a cellphone 112 owned by a registeredowner of the vehicle 100. The recipient cellphone 112 displays an alert114 to its owner.

Upon receiving the alert 114, the owner may simply acknowledge receiptin a communications back to the master control unit 102. In an emergencysituation, the owner may choose instead to forward the alert to aprivate or public security service equipped to respond to the situation.Any information provided by the information-capture devices 106 is sentalong to assist the security service.

The security system of FIG. 1A is compatible with any type of alarm orstatus sensor 104. Typical are sensors for motion, vibration, windowbreakage, smoke, fire, entry, power-interrupt to the master control unit102, low tire pressure, and even police radar. Also possible are aphysical location sensor (using a GPS receiver) and a maintenance-statusindicator alerting the owner that the vehicle 100 is due for scheduledor non-scheduled maintenance.

Similarly, the security system of FIG. 1A is compatible with any type ofinformation-capture device 106. Still and video cameras and microphonesare expected to be very common. Because a GPS device can be queried forgeographic location, it is clear that some devices can be considered tobe both sensors 104 and information-capture devices 106: The linebetween the two is easily blurred.

The communications between the security system and the end user can becarried, e.g., via a cellular-telephone call, over the Short-MessagingService, as a text message, or over a satellite link 116. For addedsecurity, if a first attempt to transmit the alert over the cellularnetwork 110 fails, then the security system can use the satellitenetwork 116 as a backup.

While FIG. 1A shows the alert first going to an owner's cellphone 112,the master control unit 102 can be flexibly programmed. It may, forexample, attempt to contact the owner's cellphone 112, but if the callis not answered (or if a text message is not acknowledged) in a setperiod of time, then a secondary entity, such as a private or publicsecurity service, can be notified. If the alert is not urgent (e.g.,maintenance should be performed in the next 1000 or so miles), then thealert can be sent to an e-mail address. As illustrated by this example,different actions can be taken for different alerts: An e-mail orvoice-mail suffices for some alerts, while a more urgent alert should bequickly escalated.

Privacy and message security are important considerations in any remotesecurity system. In some embodiments, and for at least some alerts, theholder of the cellphone 112 must authenticate himself before he can viewthe alert 114. Typical known authentication technologies that can beused are based on entering a PIN, on recognizing a voice or otherhuman-parametric data (e.g., a thumbprint), or on reading the owner'sRFID chip.

The security system of FIG. 1B is the same as that in FIG. 1A but isimplementing an additional “parental monitoring” application. In thisapplication, the owner has lent the vehicle 100 to someone else (e.g.,the owner's child or a parking valet.) Sensors detect information thatis not necessarily indicative of an emergency but that is nonetheless ofinterest to the owner. In the example illustrated in FIG. 1B, the ownerhas set a maximum permissible speed 120. When the speedometer 118registers that the vehicle 100 is exceeding that speed, the securitysystem sends an alert 122 to the owner. The “parent” could also bealerted, for example, if the seatbelts are not properly fastened or ifthe vehicle 100 departs from a permissible geographic area. Because themaster control unit 102 can discriminate among different alert types (asnoted above), it would presumably be programmed to never forward“parental monitoring” alerts 122 to a public or private securityservice. However, these alerts 122 may be recorded. This applicationalso has commercial uses: If the “parent” is a company that owns thevehicle 100 and “lends” it to its professional drivers, then the recordof these “parental monitoring” alerts 122 may be used to catch and toreprimand unsafe drivers or, more generously, to show that the companydeserves lower insurance rates.

FIG. 2 shows an exemplary hardware configuration for the presentinvention. An applications processor 200 directs most of the activitiesof the master control unit 102. It receives alerts from the sensors 104.The communications lines connecting the applications processor 200 andthe information-capture devices 106, 202, 204, and 206 are shown witharrows at both ends to illustrate that these devices, at least, receivecommands and return captured information. In addition, the mastercontrol unit 102 can direct output to some of these devices, such as thespeaker 202 and the screen display 206. (This capability is discussedbelow in reference to FIG. 5.)

The baseband processor 208 handles communications with the outsideworld. It supports one or more transceivers 212 (e.g., a cellulartransceiver and a satellite transceiver) each of which may require itsown antenna 214.

The RAM 210 stores configures information such as the primary and secondcontacts, specific configuration for different alert types (e.g., whichalerts are escalated to a security service), and authenticationinformation. As discussed above in reference to FIG. 1A, the recipientof an alert 114 may need to authenticate himself before he is allowed toview the alert 114. (As discussed below in reference to FIG. 5, thesecurity system may also receive commands whose sender must beauthenticated before the command is carried out.)

The technologies used to connect the components of the security systemare chosen to satisfy the requirements of their particular environment.Wired serial links and USB connections are rugged but are somewhatcumbersome to install. Radio (e.g., Bluetooth) or infrared links areoften practical and ease the addition of further sensors 104 andinformation-capture devices 106. It is preferred that the securitysystem supports the full capabilities of whatever link technologies areused, although tradeoffs between convenience and security should alwaysbe considered.

The emergency battery 218 is designed to run the security system forlong enough to transmit an alert if local power to the security systemis ever disabled. Time is of the essence here because the powerinterrupt may be caused by a knowledgeable intruder attempting tocircumvent the entire security system. Therefore, as soon as thepower-interrupt sensor mentioned above in reference to FIG. 1A triggers,the system immediately switches over to draw power from the emergencybattery 218. Useful information is captured as quickly as possible andthe alert is transmitted. The security system can be configured to takespecial action in this case as it might not have the luxury of firstcontacting the owner: It may need to contact a security serviceimmediately.

The master control unit 102 need not be all of a piece as shown in FIG.2. In some embodiments, the functional modules are distributed. Thismakes each piece very small and thus makes detecting and disabling thesecurity system very difficult.

The security system of the present invention can also be implemented inthe building 300 of FIG. 3. Whether commercial or domestic, the building300 contains rooms 302 and sensors 304 in at least some of the rooms302. Many of the sensors 304 are of the same type as discussed above inreference to the vehicle 100 of FIGS. 1A and 1B: detectors for smoke,fire, window-breakage, and entry. There may be additionalbuilding-specific sensors such as noxious gas detectors. The sensors 304are often combined with information-capture devices such as cameras andmicrophones. (An application of decibel sensors in the building 300 isdiscussed below in reference to FIG. 6.) Sensors and information-capturedevices 306 are also placed outside the building 300 to monitor itssurroundings. In a secure building environment, an entry sensor 308,such as an RFID reader, controls and records entrance. Of course, thesecurity system for the building 300 includes at least one mastercontrol unit 102 and the accompanying mobile-telephone communicationscapability 108. In a building environment, it is highly desirable thateach transmitted alert indicates the location of the specific sensorsand information-capture devices 304, 306 that provide the informationfor the alert. With this information, security services (e.g., firemen)responding to the alert can know exactly how to proceed without gropingaround blindly.

The scope of possible applications for the present invention isvirtually unlimited. One more example will suffice. In FIG. 4, a networkof tiny wires and sensors 402 are woven into a shirt 400. When the shirtis worn, the sensor network 402 reads the wearer's vital medicalinformation, such as pulse rate and blood pressure. The readings aretransmitted, for example by Bluetooth, to the master control unit 102and then transmitted to the contact configured for this type of alert.The master control unit 102 need not be dedicated to this oneapplication, but can work with input from the sensor network 402 just asit works with input from other sensors 104 and information-capturedevices 106. In some embodiments of the medical application illustratedin FIG. 4, alerts are sent to emergency medical personnel when thesensors 402 note that the readings are out of the range of safety.Medical information about the wearer, e.g., a list of allergies, can bestored in the RAM 210 of the master control unit 102 and sent along withthe alert. In a non-emergency scenario, readings can be periodicallytaken, transmitted, and recorded. The developing record is useful fordiagnosis and for medical studies.

FIG. 5 illustrates a feature that is useful in almost any scenario.Here, a registered contact, say the owner of the security system, ratherthan waiting for the system to send an alert, wishes to proactivelyquery the system for information. Going back to the scenario illustratedin FIG. 1A, the owner uses the cellphone 112 to call (or text message) arequest for information in step 500. Security is discussed above inreference to FIG. 1A, and it is at least as important here. Along withthe request, the user enters some authentication information. In step502, the request and the authentication information are sent to thesecurity system in the vehicle 100 by means of the cellular network 110.Upon receipt, the security system in step 504 attempts to verify theauthentication information. There are many known ways to do this(examples are given above in reference to FIG. 1A), most of them involvecomparing the sent authentication information with some informationpreviously stored in the security system's RAM 210. If the receivedauthentication information is successfully verified in step 506, thenthe requested information is gathered from the appropriateinformation-capture devices 106. For example, the owner may wish to viewthe inside of the vehicle 100 and asks that the camera 106 take and senda photograph. Note that the response need not be a one-time message:Upon request, the security system can set up a periodic or continualmonitoring channel back to the requester. For example, a securityofficer may investigate a darkened building by requesting that amicrophone transmit the sounds it is picking up. In any case, therequested information is transmitted to the authenticated requester (orto another contact) in step 508. If the authentication informationcannot be verified, then the request is denied in step 510.

The system's ability to respond to a remote request opens otherpossibilities. The remote user can configure one of theinformation-capture devices 106, for example by moving thepoint-of-focus of a camera. Also, the remote user can send informationto be displayed by the security system. This possibility was hinted atin the discussion accompanying FIG. 2. In the case of the vehicle 100,the remote owner may wish to speak to the driver or may display awarning or status update on a screen in the dashboard.

A final feature of some embodiments of the present invention isillustrated by FIG. 6. First, some background: A “breach of peace” is analarming incident that involves all of the people in a given area. Forexample, nature can breach the peace by way of tornadoes, flooding, oreven unusually high pollen counts. A large fire in a forest preserve orin a built-up area also constitutes a breach of peace. An overturnedsemi-truck can breach the peace by blocking a significant highway.Referring back to FIG. 3, a terrorist gunman can breach the peace byattacking people in and around the building 300. In all of these cases,the forces of public security wish to inform local people so that theycan avoid or flee the affected area.

In FIG. 3, the sensors 304 can include “decibel sensors” that triggerwhen they hear an unusually loud and sharp noise (like a gunshot). Whenthe public security service analyses the alert carrying information fromthese sensors, it broadcasts a “breach of peace” alert to all people whomay be affected. (See step 600 of FIG. 6.) In one situation, thebuilding 300 is a school building, and the public security service has alist of contact information for all registered students and employees ofthe school. The “breach of peace” alert is sent to all of thesecontacts. (In some embodiments, the security system itself analyzes thedata provided by its sensors and itself sends out the “breach of peace”alert, also contacting a security service, of course.)

In step 602, at least some of the people receive the “breach of peace”alert. To avoid malicious use of this feature, the alert should includeauthenticity information. Because some people might not be affected bysome alert situations (e.g., they may not be sensitive to high pollencounts), the alert may be ignored by some recipients in step 604. If thealert is authentic, and if it applies to this particular person, thenthe recipient is informed in step 606. The recipient then takesappropriate action.

Note that as with other scenarios, the “breach of peace” alert cancontain detailed information from the sensors and information-capturedevices 304, 306. For example, the alert can describe the extent offlooding or give the exact locations of the sensors 304 that heard agunshot. As the incident progresses, this information can change, andupdates to the alert can be sent out in step 612. For example, theposition of a terrorist can be tracked by the decibel sensors or bycameras or microphones. With updated alert information, innocent peoplecan flee while security forces can gather quickly to the correctlocation to resolve the incident.

It is possible than some registered people will not receive a “breach ofpeace” alert directed to them. In order to deal with this possibility,recipients of the alert acknowledge their receipt in step 608. In step610, the security service may compare the acknowledgements to the listof registered people and attempt to use other means to find those notresponding. This ability is especially useful in fire and floodsituations where it has traditionally been very difficult to know wheneveryone is out of harm's way.

Because of the urgent response required by a “breach of peace” alert,users' cellphones (or whatever device they have to receive the alert)may be programmed to interrupt and to override other uses in order tomost quickly display the alert.

In view of the many possible embodiments to which the principles of thisinvention may be applied, it should be recognized that the embodimentsdescribed herein with respect to the drawing figures are meant to beillustrative only and should not be taken as limiting the scope of theinvention. For example, the invention may be used in other environmentsand may take advantage of communications and sensing technologies otherthan those illustrated. Therefore, the invention as described hereincontemplates all such embodiments as may come within the scope of thefollowing claims and equivalents thereof.

1. An integrated alarm detection and reporting system, the systemcomprising: an alarm detection module, the alarm detection modulecomprising at least one status sensor, the alarm detection moduleconfigured for sending an alert of a first type to a communicationsmodule; an information-capture module; and the communications modulecommunicatively coupled to the alarm detection module, thecommunications module configured for receiving the alert of a first typefrom the alarm detection module, for receiving information captured bythe information-capture module, and for transmitting an alert of asecond type and the captured information.
 2. The integrated alarmdetection and reporting system of claim 1 wherein the at least onestatus sensor is selected from the group consisting of: a motiondetector, a breakage detector, a vibration detector, a smoke detector, afire detector, a gas detector, an entry detector, a power-interruptdetector, a vehicle-speed detector, a seatbelt-status detector, aphysical-location sensor, a radar detector, a decibel sensor, amedical-information sensor, and a maintenance-status sensor.
 3. Theintegrated alarm detection and reporting system of claim 1 wherein theinformation-capture module comprises an element selected from the groupconsisting of: a still camera, a video camera, a microphone, and aphysical-location sensor.
 4. The integrated alarm detection andreporting system of claim 1 wherein the transmitting of the alert of asecond type and the captured information comprises communicating over amobile-telephone network.
 5. The integrated alarm detection andreporting system of claim 4 wherein communicating over amobile-telephone network comprises communicating to a telephone numberof a registered owner of the alarm detection and reporting system. 6.The integrated alarm detection and reporting system of claim 5 whereincommunicating over a mobile-telephone network further comprisescommunicating to an alarm support service; and wherein the alarm supportservice is configured for receiving from the communications module thealarm of the second type and the captured information, for recording thealarm of the second type and the captured information, and for notifyingsomeone of the alert of the second type.
 7. The integrated alarmdetection and reporting system of claim 6 further comprising: waitingfor a response from the registered owner; attempting to authenticate theresponse; and only communicating to the alarm support service if nosuccessfully authenticated response is received in a set period of time.8. The integrated alarm detection and reporting system of claim 7wherein attempting to authenticate the response comprises reviewingauthentication information selected from the set consisting of: anaccess code, voice-recognition data, an RFID code, and human-parametricdata.
 9. The integrated alarm detection and reporting system of claim 6wherein the alarm support service is further configured for notifyingsomeone selected from the group consisting of: the registered owner ofthe integrated alarm detection and reporting system, a private securityservice, and a public security service.
 10. The integrated alarmdetection and reporting system of claim 1 wherein the communicationsmodule is further configured for: receiving a request to captureinformation; directing the information-capture module to capture therequested information; and transmitting the requested information. 11.The integrated alarm detection and reporting system of claim 10 whereinthe communications module is further configured for: receivingauthentication information; attempting to verify the receivedauthentication information; and responding to the request only if theauthentication information is successfully verified.
 12. The integratedalarm detection and reporting system of claim 1 wherein thecommunications module is further configured for: receiving a “Breach ofPeace” alert; and communicating the “Breach of Peace” alert to a localuser.
 13. A master alarm unit configured for use with an alarm system,the master alarm unit comprising: a first communications port forreceiving an alert of a first type; a second communications port forcommunicating with an information-capture module; and atransmitter/receiver configured for transmitting over a mobile-telephonenetwork an alert of a second type and information received over thesecond communications port.
 14. The master alarm unit of claim 13wherein the first and the second communications ports are selected fromthe group consisting of: a wired serial port, a radio port, a Bluetoothport, a USB port, and an infrared port.
 15. The master alarm unit ofclaim 13 wherein the transmitter/receiver is selected from the groupconsisting of: a radio transmitter/receiver, a cellulartransmitter/receiver, a satellite transmitter/receiver, and a GSMtransmitter/receiver.
 16. The master alarm unit of claim 13 furtherconfigured for removable placement in a docking station, wherein thefirst and the second communications ports connect to the docking stationwhen the master alarm unit is docked.
 17. The master alarm unit of claim13 further configured for permanent installation, wherein the masteralarm unit further comprises a connection for an emergency battery. 18.The master alarm unit of claim 13 further configured for: receiving arequest to capture information; issuing a command over the secondcommunications port to capture the requested information; receiving thecaptured information over the second communications port; andtransmitting the captured information.
 19. The master alarm unit ofclaim 18 further configured for: receiving authentication information;attempting to verify the received authentication information; andresponding to the request only if the authentication information issuccessfully verified.
 20. The master alarm unit of claim 13 whereintransmitting over a mobile-telephone network comprises: transmitting toa telephone number of a registered owner of the master alarm unit;waiting for a response from the registered owner; attempting toauthenticate the response; and communicating to an alarm support serviceif no successfully authenticated response is received in a set period oftime.
 21. The master alarm unit of claim 20 wherein attempting toauthenticate the response comprises reviewing authentication informationselected from the set consisting of: an access code, voice-recognitiondata, an RFID code, and human-parametric data.
 22. The master alarm unitof claim 13 further configured for receiving a “Breach of Peace” alertand for communicating the “Breach of Peace” alert to a local user.
 23. Amethod of operation of a master alarm unit configured for use with analarm system, the method comprising: receiving an alert of a first type;in response to receiving the alert of a first type, capturinginformation; and via a mobile-telephone network, transmitting an alarmof a second type and the captured information.
 24. The method ofoperation of a master alarm unit of claim 23 wherein transmitting analarm of a second type comprises: transmitting to a telephone number ofa registered owner of the master alarm unit; waiting for a response fromthe registered owner; attempting to authenticate the response; andcommunicating to an alarm support service if no successfullyauthenticated response is received in a set period of time.
 25. Themethod of operation of a master alarm unit of claim 23 furthercomprising: receiving a request to capture information; capturing therequested information; and transmitting the captured information. 26.The method of operation of a master alarm unit of claim 25 furthercomprising: receiving authentication information; attempting to verifythe received authentication information; and responding to the requestonly if the authentication information is successfully verified.
 27. Themethod of operation of a master alarm unit of claim 23 furthercomprising: receiving a request to configure an information-capturemodule; and issuing a configuration command to an information-capturemodule.
 28. The method of operation of a master alarm unit of claim 23further comprising: repeatedly capturing an image and transmitting thecaptured images.
 29. The method of operation of a master alarm unit ofclaim 23 further comprising: continually capturing video images andtransmitting the captured video images.
 30. The method of operation of amaster alarm unit of claim 23 further comprising: receiving a “Breach ofPeace” alert; and communicating the “Breach of Peace” alert to a localuser.
 31. A computer-readable medium containing computer-readableinstructions for performing a method of operation of a master alarm unitconfigured for use with an alarm system, the method comprising:receiving an alert of a first type; in response to receiving the alertof a first type, capturing an image; and via a mobile-telephone network,transmitting an alarm of a second type and the captured information.