Premises Management Systems

ABSTRACT

A method is disclosed for remote monitoring of a premises, comprising the steps of operatively coupling a geographically remote client to a security system server which is capable of authenticating a user of the remote client, operatively coupling the remote client to a security gateway which is capable of managing the monitoring of the premises, activating a signal at the premises for notifying an occupant at the premises that remote monitoring is occurring, and transferring information between the security gateway and the remote client. The transfer of information between the security gateway and the remote client is controlled by the user of the remote client. The security gateway may be operably coupled to at least one camera at the premises and to at least one audio station at the premises.

CROSS REFERENCE TO RELATED APPLICATIONS

This application is continuation of U.S. patent application Ser. No.15/391,565, filed Dec. 27, 2016, which is a continuation of U.S. patentapplication Ser. No. 14/583,482, filed Dec. 26, 2014, now U.S. Pat. No.9,600,945, which is a continuation of U.S. patent application Ser. No.13/401,474 filed Feb. 21, 2012, now U.S. Pat. No. 8,953,749, which is acontinuation of U.S. patent application Ser. No. 11/929,179 filed Oct.30, 2007, now U.S. Pat. No. 8,144,836, which is a continuation of U.S.patent application Ser. No. 10/607,008, filed Jun. 26, 2003, now U.S.Pat. No. 7,409,045, which is a divisional of U.S. patent applicationSer. No. 10/061,959, filed Feb. 1, 2002, now U.S. Pat. No. 6,658,091,all of which are assigned to the Assignee of the present application andhereby incorporated by reference as if reproduced in their entirety.Accordingly, priority is claimed back to the above-listed patents andapplications.

TECHNICAL FIELD

The present invention relates generally to the field of securitysystems. More particularly, the present invention relates to a systemand method for the remote monitoring of a premises from a location otherthan the premises.

BACKGROUND

Conventional security systems typically protect a building usingmake/break contacts strategically placed at doors, windows, and otherpotential entry points and motion sensors in strategic areas inside thebuilding. Other devices include glass breakage detectors, panic ormedical alert buttons, temperature and flood sensors, smoke detectors,and P.I.R. (passive infra red) sensors, a type of motion sensor thatsenses heat differences caused by animate objects such as humans oranimals. Also used are vibration sensors which, when placed upon awindow for example, detect when the window is broken, and radiofrequency (rf), radar, and microwave sensors, as well as laser sensing.When the system is on and a sensor is tripped, a signal is sent througha wire, or using radio frequencies (on wireless systems), to a maincontroller which sounds a siren and dials out via telephone, an IPconnection, or cellular service to the monitoring station whenever analarm condition occurs.

One technological approach to determining whether or not an alarmcondition exists is through the use of separate audio monitors operatingin concert with separate alarm sensors. U.S. Pat. Nos. 4,591,834 and4,918,717 are directed to such systems. For example, U.S. Pat. No.4,591,834 refers to the use of miniature, low-frequency dynamicmicrophones. Alarm activities noted at the microphones are verified viaa separate network of discriminator sensors which comprise geophones.Signal processing techniques are utilized to distinguish alarm activity.Intrusion and discriminator sensors are arranged in known patternscomprised of multiple sensors of each type. U.S. Pat. No. 4,918,717refers to a system wherein a number of microphones are distributed abouta secured premises in relation to other intrusion sensors. Upondetection of an intrusion alarm, the microphones can be manually enabledone at a time from the central station to allow an operator to listen toaudio activity in proximity to the sensor alarm.

Another approach is the use of video images to monitor a location. Inmany prior art devices, however, the video images may not be received bythe monitoring party until several moments have passed after therecorded event has actually taken place, likely causing any response tobe late and less effective.

Another disadvantage with existing security systems is that after aperson has left the premises, he or she may not be certain that he orshe remembered to activate or arm the security system. In prior artsystems, it has been necessary to return to the premises to arm thesecurity system or ask someone else to check on the premises and reportback to the person. Returning to the premises is time-consuming andinconvenient, and may not be possible if the person is traveling or isotherwise unable to return to the premises.

In addition, the owner of a premises may desire to monitor the premisesor communicate with an occupant of the premises, whether or not an alarmhas been triggered. One approach for remote monitoring or remotecommunication involves the use of web cams. A disadvantage to using webcams is that they fail to address privacy concerns by failing to informor notify the occupant of the premises that remote surveillance isoccurring. Instead, the attraction of web cams to consumers is theability to spy on a location without individuals knowing the web cam istransmitting images of the premises.

Furthermore, the owner of the premises may desire to modify aspects ofthe security system while he or she is away from the premises. In manyprior art systems, the owner is unable to modify certain aspects of thesecurity system. Instead, the security system must be reconfigured by arepresentative of the security system manufacturer or a complex processusing the keypad with limited user interface. It is therefore desirablefor a user at a remote location to be capable of arming and disarmingthe security system, changing aspects of the security system, andgenerally having access to control the monitoring of the premises fromthe remote location.

Prior art systems generally do not provide for two-way audiocommunication. Two-way audio capabilities enable owners of the premisesand monitoring personnel to communicate with individuals present at thepremises, providing an extra means for determining the status of thepremises (such as determining if an alarm event is actually occurring)and, in the case of a remote user communicating with the premises, theopportunity to maintain a sense of control of the premises (such ascommunicating with a child at the premises).

Prior art systems generally do not provide for hands-free communicationby occupants of the premises with a remote user. In cases in which theoccurrence of an alarm event has resulted in an occupant being injuredor otherwise unable to operate the security system, the only option wasto wait for someone to check on the premises and notify the properauthorities. Furthermore, prior art systems generally do not transmitimages or sound during non-alarm periods. It is therefore desirable toprovide a security system capable of transmitting images and soundduring non-alarm time periods, and to further provide a way forindividuals at a monitored location to communicate with users accessingthe security system from a remote location, and without the need foracknowledging the remote user in order to communicate.

There is a desire to balance security, privacy, and convenienceconcerns, particularly with residential security systems. Many prior artsecurity systems sacrifice security and lack convenience for the sake ofprivacy. It is therefore desirable to provide a security system thatprovides security of the premises, is configurable to address privacyconcerns of the occupants, and is convenient for the users of thesecurity system to access the system remotely.

SUMMARY

From the foregoing, it can be appreciated that a need has arisen for asecurity system and method that overcomes the limitations of the priorart. It is desirable that such a security system provide the convenienceof remote monitoring of a premises by a remote user, whilesimultaneously addressing privacy concerns by providing a notificationsignal to alert occupants of the premises that remote monitoring isoccurring. It is further desirable that such a system use availableinfrastructure and protocols and overcome the limitations ofconventional methods.

Accordingly, the present invention provides a method for remotemonitoring of a premises, comprising the steps of operatively coupling ageographically remote client to a security system server which iscapable of authenticating a user of the remote client, operativelycoupling the remote client to a security gateway which is capable ofmanaging the monitoring of the premises, activating a signal at thepremises for notifying an occupant at the premises that remotemonitoring is occurring, and transferring information between thesecurity gateway and the remote client. The transfer of informationbetween the security gateway and the remote client is controlled by theuser of the remote client. The security gateway may be operably coupledto at least one camera and to at least one audio station.

The notification signal may comprise an audible signal or a visiblesignal or both. An audible notification signal may comprise a sounduniquely associated with the remote user, and can comprise speech, whichmay identify the remote user. A visible notification signal may comprisea depiction of the remote user, or a graphical image, or an alphanumericmessage, which may identify the remote user, and which may betransmitted to a keypad at the premises. The visible notification signalmay be transmitted to a display device, such as a television. Thevisible notification signal may further comprise an activation signalfor a light source at the premises, such as a light emitting diode(LED). The LED may be located on a camera or on a keypad, for example.

In accordance with one embodiment, the inventive method may furthercomprise steps for verifying the identification of the remote user,transmitting an access token from the security system server to theremote client, providing the security gateway with information about theremote user and the access token and disabling communication between thesecurity system server and the remote client. The access token may beadapted to allow the remote client to access the security gateway basedon the user's permission profile, which is created by a GeneralAdministrator of the security gateway. The access token may expire at adesignated time and date, or after a designated length of time haselapsed, or after a designated number of accesses has occurred, or uponaccess being removed by a General Administrator. The access token mayallow access to specific features of the security gateway in accordancewith the user's permission profile.

In another embodiment, the inventive method may further provide acontroller capable of performing one or more building automation controlfunctions, which may include without limitation controlling airconditioning systems at the premises, doors at the premises, lightingdevices at the premises, irrigation systems at the premises, orelectrical appliances at the premises.

In yet another embodiment, the inventive method may provide forstreaming data in substantially real-time from the security gateway tothe remote client. In still another embodiment, the inventive method mayprovide for substantially real-time audio communication or videocommunication, or both, between the remote client and the securitygateway.

The inventive method may also provide for continuously caching audio andvideo data. Furthermore, the method of the present invention may providefor recording audio and video data during a particular time period. Theparticular time period may comprise intervals according to apre-determined schedule, or may be determined upon demand of anadministrator of said security gateway. The particular time period maybegin prior to triggering of an alarm, or prior to triggering of asensor.

The present invention further provides a system for remote monitoring ofa premises by a geographically remote user, comprising a security systemserver capable of authenticating the user, a security gateway capable ofmanaging the monitoring of the premises, one or more cameras, and one ormore audio stations, wherein the security gateway provides anaudiovisual signal at the premises for notifying an occupant at thepremises that remote monitoring is occurring. The inventive system mayfurther comprise a controller capable of performing building automationcontrol functions. The system may also provide for streaming data insubstantially real-time from said security gateway to said remoteclient. The system may further provide for substantially real-timesynchronized audio and video communication between said remote clientand said security gateway.

The present invention can be also used in many different verticalsegments within the security industry. In this present invention, theaudio and video digitization and processing including compression iscentralized at the security gateway. As processors become less expensiveand more efficient, these functions can be done at the individual cameraor at the audio station. The security gateway may then act as a centralcommunications and controller for the cameras, audio stations andvarious other sensors.

The present invention provides the advantage of using the securitysystem as a platform for two-way audio and video communication. Bymaking communication between a remote user and the premises veryconvenient, the present invention allows the owner of the premises to beproactive in monitoring the premises by allowing remote viewing as wellas communicating with individuals at the premises.

BRIEF DESCRIPTION OF THE DRAWINGS

The following drawings form part of the present specification and areincluded to further demonstrate certain aspects of the presentinvention. The invention may be better understood by reference to one ormore of these drawings in combination with the detailed description ofspecific embodiments presented herein.

It is to be noted, however, that the appended drawings illustrate onlyexemplary embodiments of the invention and are therefore not to beconsidered limiting of its scope, for the invention may admit to otherequally effective embodiments. In addition, although the Figures maydepict embodiments wherein each of the components represent differentdevices or locations, they can be combined into a single device orlocation. In addition, a single component may be comprised of acombination of components.

FIG. 1 is a block diagram of a security system according to oneembodiment of the disclosed system and method.

FIG. 2 is a block diagram of a security system according to analternative embodiment of the disclosed system and method.

FIG. 3 is a block diagram of a security gateway according to oneembodiment of the disclosed system and method.

FIG. 4 is a more detailed block diagram of a security system accordingto one embodiment of the disclosed system and method.

FIG. 5 is a process flow diagram depicting the process flow for a remoteuser at a remote location accessing a security system according to oneembodiment of the disclosed system and method.

DETAILED DESCRIPTION OF ILLUSTRATIVE EMBODIMENTS

The present invention addresses several shortcomings of the prior art byproviding a security system and framework that is configured to deliverreal-time information, including audiovisual information about alarmconditions and/or personal conditions to remote users. As a furtheradvantage, the framework may be easily adapted for use in otherapplications that incorporate real-time information and video delivery.

The term “security system” is used in this document to mean a system formonitoring a premises, e.g., for the purpose of discouraging andresponding to burglaries, fires, and other emergency situations. Such asecurity system is well-suited for residential homes, but may also finduse with schools, nursing homes, hospitals, businesses or any otherlocation in which real-time information may be useful in obtainingadequate response upon the occurrence of alarm conditions. Byintegrating broadband features, including audiovisual capabilities, webaccess and wireless capabilities, and video and voice over IP protocols,embodiments of the present invention provide audiovisual alarmverification, 24-hour monitoring capabilities, and a secure web sitewith remote access features and security-focused content.

The term “lifestyle monitoring” is used in this document to meanaudiovisual monitoring and communicating on demand during non-alarmsituations. The term “audiovisual” is used in this document to meanaudio or video or both. An example of a non-alarm situation is when aparent checks on latch-key children or a caregiver checks on an elderlyperson. Embodiments of the present invention may be used to give peaceof mind to the owner of the premises while he or she is away from thepremises. Embodiments of the present invention may also be used toproactively respond to situations before they become emergencies.

The term “remote user” is used in this document to mean any individuallocated at any location other than the premises or the centralmonitoring station. A remote user may include the owner of the premises,when the owner is not physically located at the premises. A remote usermay also include a guest user, such as an individual whom the owner hasgiven permission to access certain aspects of the security system.Because monitoring personnel at a central monitoring station do not haveaccess to the security system except during alarm events, they are notconsidered remote users as they are described in this document.

For purposes of the present invention, the term “premises” refers toreal property, including one or more structures thereupon and theirsurroundings. For the purposes of the present invention, a premisespreferably comprises a residential housing, but it will be appreciatedby one skilled in the art that a premises may also comprise commercialfacilities, educational facilities, and the like.

Further, the term “a” is generally used in the present disclosure tomean one or more. Still further, the terms “coupled” and “operativelycoupled” mean connected in such a way that data may be transmitted orreceived. It is understood that “coupled” and “operatively coupled” donot require a direct connection, a wired connection, or even a permanentconnection. It is sufficient for purposes of the present invention thatthe connection(s) be established for transmitting and receivinginformation.

In the present disclosure, the term “high-speed” or “high-bandwidth”generally means capable of providing sufficient bandwidth for data to betransmitted in real-time, i.e., with substantially no latency. In oneembodiment, high-speed connections are those capable of transmitting atspeeds of at least 128 Kbps. High-speed connections include but are notlimited to cable modem connections, xDSL connections, and high-speedwireless connection.

The term “non-alarm event” is used in this document to describe an eventthat occurs at the premises which does not constitute an alarm event. Anon-alarm event is designated by the triggering of a sensor. Forexample, a motion sensor located near the front door may detect thepresence of a person approaching the front door. This person may be, forexample, a delivery person dropping off a package for the resident andwould not constitute an alarm event. This non-alarm event, however, maybe used by the owner of the premises to analyze the security systemeffectiveness (such as determining the capability of the front doorcamera to capture images in case of an alarm event), for lifestylepurposes (such as how often people approach the front door), or toprovide monitoring personnel with a general time frame associated withan alarm event.

The term “remote client” is used in this document to mean anyprocessor-based device capable of connecting to a network. For example,a remote client may comprise a personal computer, a PDA, or a mobilephone.

Referring now to the drawings, FIG. 1 depicts a block diagram of anexemplary security system 100 according to one embodiment of the presentinvention. Security system 100 comprises a security gateway 115, whichis typically located, but is not required to be located, at premises110. Security system 100 further comprises a monitoring client 133operatively coupled to security gateway 115 through a network 120.Security system 100 further comprises a security system server 131operatively coupled to security gateway 115 through network 120.

In general, network 120 may be a public network or private network, asingle network or a combination of several networks. In mostembodiments, network 120 may be, but is not required to be, an EP-basednetwork. In some embodiments it may be desirable for all or a portion ofnetwork 120 to include publicly available networks, such as theInternet, to avoid the need for installing, purchasing, or leasingadditional infrastructure. However, in some systems, e.g., those thatuse high-bandwidth transmissions, it may be desirable to includededicated high-bandwidth connections including, without limitation,leased lines, frame relay networks, and ATM networks, within network120. Further, in some systems it may be desirable to use a network 120with quality of service guarantees given the real-time nature of theinformation that is transmitted.

Generally, security gateway 115 is a processor-based device operable tomonitor premises 110 by capturing and recording audiovisual informationrelating to the premises during pre-alarm, and post-alarm periods, aswell as during non-alarm events. Security gateway 115 also detects andrelays alarm conditions at premises 110 and captures informationrelating to such alarm conditions. Upon triggering of an alarm, securitygateway 115 sends cached, stored, and live information from pre-event,pre-alarm, and post-alarm segments to security system server 131 forverification and response.

Security gateway 115 may, but is not required to be, located at premises110. Some or all components of security gateway 115 may be locatedremotely, but remain operatively coupled to security sensors 105, audiostations 107, and video cameras 112 which are located at premises 110.In accordance with a preferred embodiment of the present invention,premises 110 comprises a building such as a residential home.Advantageously, the present invention provides for sensors 105, audiostations 107 and video cameras 112 to be located indoors as well asoutdoors. For example, sensors 105, audio stations 107 and video cameras112 may be located in certain rooms or zones within the building onpremises 110, as well as outside the doors of the building.

Monitoring client 133 generally comprises a software program that may beused to display some or all of the information provided by securitygateway 115. Monitoring client 133 may be a stand-alone program orintegrated into one or more existing software programs. One or moreoperators may then use this information to evaluate whether the alarmcondition corresponds to an actual alarm condition and then takeadditional action, if desired, such as alerting the appropriateauthorities.

Security system 100 generally includes one or more sensors 105 coupledto security gateway 115 for the purpose of detecting certain events. Oneskilled in the art will appreciate that security system 100 is notlimited to any specific type or model of sensor 105. A variety ofsensors 105 may be used, depending on the desired type and level ofprotection. Examples include, without limitation, magnetic contactswitches, audio sensors, infrared sensors, motion detectors, firealarms, panic buttons, and carbon monoxide sensors. Sensors 105 may bewired directly into an alarm control panel built into security gateway115, or they may be wirelessly connected. The type of sensors 105 to beused depends on the specific application for which security system 100is designed. In some embodiments, multiple sensors 105 may be used. Insuch embodiments, security gateway 115 may consider data from all, some,or one of sensors 105 in the detection of alarm conditions.Additionally, security system 100 can store multiple video eventstriggered by sensors 105, or at scheduled times.

Security system 100 also includes one or more cameras 112 and audiostations 107 operable to capture video data and audio data,respectively, from premises 110. Cameras 112 may be, but are notrequired to be, 360-degree cameras or panoramic cameras. Audio stations107 may include microphones and speakers and are capable of providingtwo-way communication as well as emitting a signal for alertingoccupants of the premises that communication is occurring.

In addition, security gateway 115 may be configured to create anassociation between one or more sensors 105 and an associated camera 112or audio station 107. Whether or not separate sensors 105 are present,security gateway 115 may capture video or audio or both from cameras 112and audio stations 107 to assist in the determination of whether analarm condition exists and 204 thereby whether to generate and send analarm signal to the security system server 131. Cameras 112 and audiostations 107 continuously transmit audiovisual data to security gateway115 for caching (i.e., temporarily storing), recording (i.e., storingfor a long term), or streaming to a remote user 152 or security systemserver 131. In some embodiments, sensors 105, such as motion detectors,infra-red sensors and audio sensors, may be replaced by an intelligentalarm module that is able to detect motion or intrusion by analyzing thevideo data or audio data or both generated from cameras 112 and audiostations 107.

In some embodiments, the segment of audiovisual data may be compressedusing one or more of any number compression techniques known by one ofskill in the art. For example, this may involve the use of videocompression algorithms such as Motion Pictures Expert Group (MPEG).Further, the resolution or color depth of the video may be reduced tolessen the amount of bandwidth required for transmission. In oneembodiment, alarm video can be transmitted at least 3 frames per second.In addition, the alarm video may have an end resolution (i.e., afterinterpolation and/or image enhancement, etc.) of 320 pixels by 240pixels or higher, and optionally may be transmitted in color. It isnoted that the present invention is not limited to any particular audio,video, or communications standards. The present invention mayincorporate any such standards, including, without limitation: H.323,Adaptive Differential Pulse-Code Modulation (ADPCM), H.263, MPEG, UserDatagram Protocol (UDP), and Transmission Control Protocol/InternetProtocol (TCP/IP).

A disadvantage with intrusion systems in the prior art, including videosurveillance systems, is that they provide very little or no informationleading up to the alarm event. Prior art systems are typicallyconfigured to record audiovisual information only after an alarm istriggered. The only information that a monitoring agent typicallyreceives is specific to that information about how an alarm event wasdefined which usually includes the time, type and location of sensorthat was triggered. This limited information does not adequately helpthe monitoring agent verify the event. Even in video surveillancesystems, the monitoring agent typically only views live camera(s)associated with that alarm sensor, which may not be adequate. A typicalprior art intrusion system protects the perimeter of a residence orfacility, and alarm events are only declared when the perimeter sensors,such as window or door contact switches, or internal sensors, such asmotion sensors, are triggered.

The present invention, however, provides for continuous caching ofaudiovisual data while the security system 100 is armed. Furthermore, ifthe security system 100 is armed and one of the sensors 105 istriggered, the segment of cached audiovisual data immediately prior to,during, and immediately following the triggering of the sensor 105 isstored in memory, preferably located in the security gateway 115 forprivacy reasons, or in another storage device that is operativelycoupled to the security gateway 115 via a network. For example, when aparticular sensor 105 is triggered, cached audiovisual data from thecamera 112 and audio station 107 associated with that sensor 105,beginning several seconds prior to the triggering of the sensor 105 andending several seconds after the triggering of the sensor 105, may bestored in the memory. In addition, audiovisual data may be also bestored in memory at scheduled times. The General Administrator may viewthe stored data and may archive it if desired. If the system alarm istriggered, then the monitoring client 133 may access the stored data.The length and number of stored segments can be adjusted depending uponthe capacity of the memory.

Furthermore, information from cameras 112 that are placed outside thefacility of premises 110 is used in the verification of alarms. Forexample, in one implementation, a front door camera records “events” fora fixed duration of time, such as ten seconds. The events are defined bya motion sensor being triggered. In one implementation, the securitygateway stores approximately twenty of these non-alarm events. However,this event is not an alarm event but a non-alarm event. If the alarmsystem is triggered, the monitoring agent can in substantially real timeaccess the various non-alarm audiovisual events. The non-alarminformation is used by the monitoring agent to provide contextualinformation surrounding an actual alarm event.

An advantage of continuously caching audiovisual data and storing thecached data before and after a particular sensor 105 is triggered, eventhough an alarm has not been triggered, is allowing the ability tocapture important information leading up to an intrusion or other alarmevent. The stored data can provide context to audiovisual datasurrounding the triggering of an alarm and can thus be used to verifywhether an alarm is an actual emergency situation or a false alarm. Forexample, a potential intruder may walk around the premises 110 prior tobreaking in, in order to look for a point of entry. The cached datasurrounding the triggering of the sensors 105 provide the monitoringclient 133, and ultimately law enforcement, with more information aboutthe intruder than may be available if the camera 112 only beganrecording after the alarm was triggered. A monitoring agent reviewingthis information, within minutes of the alarm triggering, will be ableto review the stored non-alarm audiovisual events and make averification decision. For example, if the non-alarm informationincludes several events illustrating strange behavior by someone thatdoes not look like the owner or occupant or authorized guest of premises110, this is likely to be an actual alarm event. Non-alarm informationis recorded even when the intruder is leaving the premises 110. Forexample, a front door camera may record the intruder leaving thepremises 110 and getting into his getaway car, further providingevidence for verification and possibly prosecution. In all recordedevents, both non-alarm and alarm, the security gateway 115 records asegment of audiovisual information prior to a sensor 105 beingtriggered. In one implementation, the length of this pre-event recordingis five seconds. It will be appreciated by those of skill in the artthat the length of recording may be customized in accordance with therequirements and specifications of the particular security gateway 115and the preferences of the owner of the premises 110. This function isenabled by the continuous caching of pre-event information in thesecurity gateway 115.

A further advantage to continuously caching audiovisual data and storingthe cached data before and after a particular sensor 105 is triggered isthe added convenience and peace of mind of the owner of the premises.For example, the owner of the premises 110 may view the stored dataremotely in order to verify whether a false alarm has occurred, or tocheck to see if the owner's child has come home from school safely.

The present invention provides for access to security gateway 115 andsecurity system server 131 by remote user 152 using a remote client 155which is located at a remote location 150. Remote user 152 may be theGeneral Administrator, i.e., a person (typically the owner of premises110) having full access to security gateway 115, including withoutlimitation having the following capabilities: accessing all zones;arming and disarming security system 100; reviewing logs of alarm eventsand non-alarm events; accessing account information such as the billingaddress, phone number, and contact persons; renaming a sensor;performing maintenance on the system such as checking battery levels;creating guest accounts for other remote users 152, including definingaccess permissions for the guest user and creating a username andpassword for the guest user; and adjusting controls on the securitysystem 100, such as the gain control for the microphones, the volumecontrols for the speakers, and the time limit for caching information.Alternatively, remote user 152 may be a guest user, i.e., a user whosepermissions and access are controlled by the General Administrator. Thefeatures of the security system that a guest user may access are definedand modified according to the General Administrator's preferences.Additional information regarding general system administrative functionsand user permissions can be found in U.S. Pat. Nos. 5,689,708;5,694,595; and 5,696,898, the contents of which are incorporated byreference herein.

Remote client 155 is operatively coupled to security gateway 115 andsecurity system server 131. Remote user 152 is authenticated by securitysystem server 131. In a preferred embodiment, remote users 152 areidentified by a user name and password. It will be appreciated by thoseskilled in the art, however, that the present invention contemplates theuse of many authentication techniques, including without limitation,physical possession of a key, user name and password, smartcards, andbiometrics. For example, the system could recognize the remote user's152 facial features, signature, voice or fingerprint and disarm thesystem without a Personal Identification Number (PIN) code. Additionalinformation regarding the use of biometrics may be found in U.S. Pat.No. 5,526,428, the contents of which are incorporated herein byreference.

Remote client 155 may connect to security system server 131 and securitygateway 115 (after authentication) via network 120. In one particularembodiment, remote client 155 includes a web-browser-based video clientfor accessing audio and video data. Typically, the web-based videoclient is a web browser or a plug-in for a web browser. Afterauthentication, security system server 131 may be configured to create adata connection between remote client 155 and security gateway 115 suchthat communications between remote client 155 and security gateway 115bypass security system server 131. Advantageously, this avoids networkbottlenecks at the security system server 131, particularly whentransmitting large amounts of data such as during the transmission ofstreaming audiovisual data.

In one embodiment, once authenticated, remote user 152 may performlifestyle monitoring from remote location 150 through security gateway115. The remote monitoring feature allows remote user 152 at remotelocation 150 to view all or only selected portions of the video imagesfrom video cameras 112, and to hear all or only selected portions ofaudio data from audio stations 107. Depending on the access permissionsassigned to remote user 152, remote user 152 may further have thecapability to accomplish the following: arm and disarm the system 100;configure the security system 100 to monitor different zones; review andchange account information; and participate in lifestyle communicationswith occupants at premises 110. In addition, remote user 152 may be ableto configure the quality of the audiovisual data for remote monitoring.Depending on the bandwidth of the connection, the informationtransmitted to remote client 155 may be of a lower quality than thattransmitted to security system server 131 for verification of alarmsignals. For example, in one embodiment, the video transmitted to remoteclient 155 may have a lower frame rate, lower resolution, and/or lowercolor depth.

Security gateway 115 may be configured to limit the transmission of alldata (heartbeat, control, video, and audio) to a configurable ceilingrelating to the remote client 155 access. Advantageously, this mayprovide the necessary amount of bandwidth to deliver the requestedservices, but prevents one user from creating a network bottleneck byrequesting too much data at once. In one embodiment, a 128 kbpstransmission ceiling is imposed. Access by web based client 155 tosecurity gateway 115 may be preempted whenever an alarm condition occursso that monitoring personnel have full control over cameras 112 andaudio stations 107 to respond to the alarm condition.

The present invention also provides for lifestyle monitoring by a guestuser. Access permission for each remote user 152 is defined by theGeneral Administrator. Access may be limited to certain time intervals(such as only at certain times during the day), a certain interval oftime (such as beginning Friday and ending Sunday), or for a certainnumber of times (such as three times a day or three times with noexpiration date). Access may also be limited to certain cameras 112 oraudio stations 107, etc.

When a guest user performs lifestyle monitoring, the guest user willhave limited access to security system 100. Thus, guest users may nothave full access to all cameras 112 and all audio stations 107 at alltimes. For example, remote user 152 may be able to access video from acamera 112 in a kitchen twenty-four hours a day, but may never be ableto monitor audio or video from a bedroom. As another example, remoteuser 152 may be given permission to view video from several cameras 112on a particular day, but only on that particular day. Remote user 152may also be given permission to only access certain audio stations 107.

Although remote users 152 may be given unlimited access to a part or allof the security system 100, such access does not necessarily give theremote users 152 the capability or authorization to change the securitysettings. Therefore, remote user 152 can access at least a portion ofsecurity system 100 without accidentally or intentionally disarmingparts or all of the system. Furthermore, remote user's 152 accessprivileges to security system 100 may be withdrawn or rescinded at anytime by the General Administrator.

An advantage to allowing remote user 152 to access certain cameras 112and audio stations 107 is that a lifestyle communication between theremote user 152 and one or more occupants of premises 110 can take placewithout requiring the occupants to do anything to acknowledge remoteuser 152 and start a communication session. Unlike prior art videotelephony systems, the system in accordance with the present inventionis particularly advantageous in situations in which an occupant atpremises 110 is unable to physically respond, for example, a person withcertain disabilities. Such a system is further advantageous in othersettings in which a person at premises 110 is unwilling to participatein lifestyle communication, such as an unruly child. Thus, the presentinvention provides for lifestyle communication without requiring anoccupant of the premises 110 to walk to a keypad or other device toacknowledge remote user 152 and start a communication session.

In one embodiment of the present invention, security gateway 115 maycomprise a controller capable of performing one or more buildingautomation control functions. Such functions may include withoutlimitation controlling air conditioning systems, doors, lightingdevices, irrigation systems, and electrical appliances at the premises.Building and home automation is described in more detail in U.S. Pat.Nos. 5,510,975; 5,572,438; 5,621,662; and 5,706,191, the contents ofwhich are incorporated herein by reference.

Reference is now made to FIG. 2, which depicts a block diagram of thesystem 100 of FIG. 1, according to an alternative embodiment of thepresent invention. As shown, security gateway 115 is operatively coupledto data center 132 through network 120, which is, in turn, operativelycoupled to a monitoring client 133 through network 134.

Data center 132 stores customer information including billinginformation and security system settings, and is generally configured toautomate certain aspects of security system 100. Data center 132receives audio and video from security gateway 115 and sends it inreal-time to monitoring client 133. Data center 132 authenticates remoteuser 152 of remote client 155, recognizes multiple alarm notifications,and monitors the various components of security gateway 115.Technology-intensive equipment including the security system server 131may be kept in the data center 132 where physical access may be strictlycontrolled. Advantageously, in this configuration, non-technicalpersonnel may be kept away from the sophisticated and expensiveequipment in the data center 132, and the non-security-related personnelwould not have direct access to view sensitive alarm notifications andvideos. Any alarm notification and audiovisual information sent bysecurity gateway 115 is transmitted to the security system server 131 atthe data center 132. The security system server 131 logs the alarmnotification and retrieves information about the customer, which mayinclude, without limitation, any prior alarm notifications or events.The security system server 131 also transmits the alarm notification andaudiovisual information, along with any additional information, to oneor more monitoring clients 133, where such information and video may bedisplayed for a monitoring operator to determine if an alarm conditionexists.

In the illustrative embodiment, communications among security gateway115, data center 132, and monitoring client 133 may occur through publicand/or private networks. In particular, security gateway 115 is coupledto data center 132, which is coupled to monitoring clients 133 throughnetwork 134. Although network 134 is logically depicted as a singlenetwork, it will be appreciated by one skilled in the art that network134 may comprise a plurality of data networks that may or may not behomogeneous. In one embodiment, at least some of the monitoring clients133 may be coupled to the security system server 131 through theInternet. In other embodiments, monitoring clients 133 may be coupled tothe security system server 131 through dedicated connections such as aframe relay connection or ATM connection. Advantageously, maintainingdedicated lines between security gateway 115 and security system server131 and between security system server 131 and monitoring client 133provides a secure connection from security gateway 115 to monitoringclient 133 that may have dedicated bandwidth and/or low latency. Network134 includes all such networks and connections. In another embodiment,not shown, data center 132 may be coupled to monitoring clients 133through network 120.

Reference is now made to FIG. 3, which illustrates an exemplaryembodiment of the security gateway 115 of FIG. 1 for use in monitoringthe premises 110. As shown in FIG. 3, security gateway 115 may includean alarm control panel 310, a video module 320, a user interface 350, acommunications interface 340, and an audio module 330. As shown in FIG.3, the components of security gateway 115 are configured to communicatewith one another through system bus 305. In other embodiments, some orall of the components may be directly connected or otherwise operativelycoupled to one another.

Alarm control panel 310 interfaces with one or more sensors 105, whichmay be wired or wireless. In some embodiments, it may include aninterface to the Public Switched Telephone Network (PSTN) or a cellularnetwork. However, as shown, the interface to the PSTN may be containedin the communications interface 340 instead of the alarm control panel310. The alarm control panel 310 is preferably capable of operation inisolation as per UL requirements for residential fire applications andresidential burglary operations. Alarm control panel 310 is furthercapable of continuing to operate in the traditional manner regardless ofthe state of the video subsystem.

Alarm control panel 310 may be configured to communicate with the othercomponents of the security system to monitor their operational state.Information that the alarm control panel 310 may receive includes, butis not limited to, whether security gateway 115 can communicate with thesecurity system server through the communications interface 340,information about AC power failure, trouble by zone, fire trouble,telephone line trouble, low battery, bell output trouble, loss ofinternal clock, tamper by zone, fail to communicate, module fault,camera trouble, and intercom trouble. The detected operational failureof any component in security gateway 115 may be indicated by acommunications loss between components and a concurrent alarm conditionreported by alarm control panel 310 and displayed for the user on userinterface 350 or announced through audio module 330. In addition, anydetected operation failures may be communicated to the security systemserver 131 through communications interface 340. Alarm control panel 310may also be configured to record alarm conditions and associated data inmemory. The security system server 131 may also be configured to recordalarm conditions and associated data in addition to or in lieu of alarmcontrol panel 310 doing so. In some embodiments, alarm control panel 310supports dialup access by authorized users to remotely configure thesystem. However, the preferred mode of configuration is through anInternet web site. In other embodiments, other components of securitygateway 115 may be configured to perform this function. For example, inone embodiment, video module 320 records alarm conditions and theassociated data.

Video module 320 may perform many functions including but not limited toanalyzing data from one or more of the sensors 105 or cameras 112 todetermine whether an alarm condition exists; accessing data stored inmemory; generating alarm video to transmit to security system server 131in response to detection of an alarm condition; and communicating withsecurity system server 131 and remote client 155 through communicationsinterface 340. In addition, video module 320 may buffer video fromcameras 112 in memory. Then based on predefined criteria, older videothat is not considered essential to any alarm signals may be discarded.Video module 320 may also be configured to record video, or potionsthereof, on a predetermined basis, which may correspond, for example, tothe requirements of the customer. Non-alarm video may be stored forlater retrieval by the customer. In one embodiment, the customer orremote user at remote location 150 may be able to adjust thepredetermined basis including, without limitation, adjusting therecording times, duration, and total length of the recordings. In someembodiments, non-alarm video may also be sent to the security systemserver 131 for storage. Video module 320 is also capable of streaminglive audio and video from the residence during alarm conditions,pre-alarm events, post-alarm events, and non-alarm events, as well asfor lifestyle monitoring. If a camera 112 is analog, video module 320may digitize the video before transmitting it. When security system 100is armed, audio and video data are constantly being stored in the videomodule's memory for potential use as pre-event media. In one particularembodiment, video module 320 contains sufficient memory to store sixtyseconds of pre-alarm video and audio from each camera 112 and microphone334 at audio station 107 in RAM and up to several hours of audio/videocontent (per camera 112 and audio station 107) on disk. When an alarmcondition occurs, this cached data may be stored more permanently. TheGeneral Administrator of a security system 100 may delete recordedinformation, archive non-alarm information, and adjust the cache length.A guest user may only make such changes if the General Administrator hasassigned such permissions and access to the guest user.

Audio module 330 controls audio stations 107, which typically include anaudio transmitter, such as one or more speakers 338, and an audioreceiver, such as one or more microphones 334. In a typicalconfiguration, several microphones 334 and speakers 338 would be locatedthroughout premises 110. The audio signals detected by microphone(s) 334are recorded through audio module 330. Audio module 330 may record theaudio or it may transmit the audio to video module 320 for storage.Audio module 330 may be capable of selecting an individual audio input334 or any combination of audio inputs 334. Further, audio module 330may play back audio signals through speaker(s) 338. Audio module 330 mayprovide gain control for microphones 334 and volume control for speakers338 in audio station 332.

Communications interface 340 may serve as the gateway between securitygateway 115 and one or more communications networks such as a HybridFiber Coaxial Network (HFC) plant, PSTN 145, WAN, LAN, and wirelessnetworks. Communications interface 340 may comprise software andhardware including, but not limited to a network interface card. In someembodiments, communications interface 340 may be physically separatefrom the other components of security gateway 115. Regardless of itsform, communications interface 340 assists in the communication of datato and from security gateway 115 and security system server 131.

In addition, security gateway 115 may include a web-enabled userinterface 350. User interface 350 may further include a display device,such as a computer screen, television or keypad, for displayinginformation to the user. Such information may include, withoutlimitation, the current system status, whether an alarm condition hasbeen detected, and whether any components have failed. In addition,other non-system-related information such as the time, date, weatherforecasts, and news bulletins may be displayed. In the illustrativeembodiment, user interface 350 is operatively coupled to a keypad 357. Auser could thereby activate or deactivate the security system byentering a predetermined code on keypad 357. It will be understood withthe benefit of this disclosure by those of skill in the art that othertypes of user interfaces 350 may be used with this invention. Forexample, security gateway 115 may be activated or deactivated with aremote portable transmitter 355. Wireless remote 355 communicates withuser interface 350 via wireless receiver 352. Additional receivers maybe used with the present invention to pick up weak signals. Securitygateway 115 is further capable of responding to wireless remotes 355 forchanging alarm states of the security system. Each wireless remote 355may comprise, for example, a key fob, which may be identified tosecurity gateway 115 as a unique user.

In some embodiments of the present invention, two-way audiocommunications may be initiated between a remote user 152 and thepremises 110 through audio module 330. The monitoring station personnelcannot initiate lifestyle functions. To address privacy concerns,monitoring personnel have access to the security system components onlyduring alarm events. Advantageously, the two-way audio communicationallows the remote user 152 to interact with a person at the premiseswithout the need for the person at the premises to acknowledgecommunications channels.

In order to address privacy concerns, in accordance with a preferredembodiment of the present invention, an audio or visual indicator may beincluded to notify occupants at the premises that they are under remotesurveillance. While streaming live media for lifestyle monitoring or anyother remote connection is made with the security system 100, securitygateway 115 activates a notification signal such as an audible orvisible “splash tone” on a frequent basis. For purposes of the presentinvention, the term “splash tone” is used broadly to mean an audio cueor visual cue, or both, to indicate to one or more persons at thepremises that remote surveillance and monitoring of the premises 110 isoccurring.

The notification signal may include a unique tone, bell, or othermanufactured sound. The notification signal may be a unique tone whichrepeats periodically. The notification signal may also include audiblesignals such as speech and other messages that announce the identity ofthe remote user 152. The notification signal may further comprise aunique message when remote monitoring begins, such as “[Grannie] hasestablished a connection.” The notification signal may further comprisea signal to indicate when remote surveillance has ended, such as“[Grannie] has disconnected.”

The notification signal may also include a visual cue, such as an LEDlocated a keypad or on the appropriate camera(s) 112. The notificationsignal may also include visual data for indicating the identity of theremote user 152. For example, a graphical image, a depiction of theuser, or an alphanumeric message may be used to identify the remote user152. Therefore, the notification signal may be unique depending on theidentity of the remote user 152.

In one embodiment, the security system may include one or more “smartcameras” that have much of the functionality of the Video Module 320built in. Specifically, these smart cameras may be operable to performvideo capture, compression and storage and to communicate with thesecurity gateway using a home area network, e.g., a wireless standardsuch as the home networking standard 802.11b, or power-line. In essence,the smart camera would function as a network appliance that is able toreceive instructions from the security gateway to control the session,FPS (frames per second), quality, bandwidth, support other supervisedcommunication from the gateway, and to transmit video and otherinformation to the security gateway. Preferably, transmission betweenthe camera and security gateway 115 should be secure and reliable, eventaking into account the relatively noisy household environment.Optionally, the smart camera is operable to detect motion in therecorded image and send an event signal to the security gateway. Thecamera may integrate other sensor functionality such as audiodiscrimination and analysis and motion detection.

Reference is now made to FIG. 4, which depicts a more detailedillustration of the various components of the security system server 131of FIG. 1 and a central monitoring station 136, according to oneembodiment of the present invention. These components may be softwareprograms executable on processor-based devices operable to communicatewith one another through LAN 405 and LAN 445, respectively. In oneparticular embodiment, these components are processor-based devicesoperating under the Microsoft® Windows NT™ operating system. However, itis understood that the present invention is not limited to theillustrated configuration.

For example, the components may be implemented as software running onone or more computing devices. Alternatively, the components may beimplemented in several devices that may be directly connected viacommunications interfaces (e.g., serial, parallel, IEEE 1394, IR, RF orUSB).

Central monitoring station (CMS) 136 is a facility operatively coupledto data center 132 and security gateway 115. Any alarm notification andaudiovisual information sent by the security gateway 115 is transmittedto central monitoring station to determine if an alarm condition exists.If an alarm condition exists, CMS 136 personnel can contact theappropriate authorities, etc. In this configuration, a concentration oftrained personnel handle systems located throughout the country. In mostembodiments, the communication channel between the data center 132 andcentral monitoring station 136 is secure, and accordingly, anunencrypted protocol may be used. In one particular embodiment, anunencrypted ASCII protocol over a TCP/IP connection may be used. Inconfigurations where the connection between the security system server131 and monitoring client(s) 133 is not secure, it may be desirable touse an encrypted protocol.

Monitoring client 133 resides in central monitoring station 136 and isoperable to display video and images transmitted from security gateway115 in real-time, as well as provide two-way communication betweenmonitoring client 133 and security gateway 115. In the presentdisclosure, the term “real-time” is intended to generally mean that nosubstantive time period elapses between the captured audiovisual dataand the receipt of audiovisual data corresponding to the event bymonitoring client 133.

As shown, security system server 131 may comprise alarm receiver 410,media handler 415, automation system server 420, web interface 432,application server 434, database server 436, and massaging interface438.

Alarm receiver 410 receives the alarm notification and associatedinformation from security gateway 115. The alarm event is then loggedand recorded by automation system server 420. Alarm events can also bereported by security gateway 115 to alarm receiver 440 via acommunications network such as PSTN 145. Alarm receiver 440 posts thealarm condition to automation system server 420. Monitoring client 133retrieves audio and video data from media handler 415. In one particularembodiment, the monitoring client 133 retrieves the audio and video datafrom media handler 415 using Microsoft® ActiveX. In other embodiments,other media handling/communications protocols may be used, including,without limitation, custom protocols. The communications protocol isused to transmit audio and video content from media handler 415, submitcontrol messages (for selecting cameras, microphones, and speakersduring live feeds), and support Voice Over IP (VOIP), streaming audio,and video services between the residence and monitoring client 133during an alarm condition.

Automation system server 420 is generally configured to store customerdata, for example contact information, billing information, passwords,as well as alarm history. Alternatively, some or all of this informationmay be stored in monitoring client 133 or at another remote site. Sincethis data is usually low bandwidth, dedicated bandwidth may not benecessary. However, it may be desirable for security purposes for it toremain in data center 132. Automation system server 420 may also serveas a workflow system for operators responding to alarm conditions, aswell as a log of all monitoring activity. In an exemplary embodiment,automation system server 420 is a database application based on, forexample Microsoft SQL Server 7, running under Windows NT. CMS personnelmay interface with automation system server 420 over the network via aclient application, which may be built into monitoring client 133.

Media handler 415 is generally operable to provide several functions.For example, media handler 415 receives and stores video and audio dataassociated with alarm conditions from security gateway 115 and relaysalarm condition data, for example audio and video, to monitoring client133. Media handler 415 may also be responsible for keeping track of thenetwork addresses for all the security gateways 115 that are attached.For example, media handler 415 relays alarm conditions reported viaTCP/IP from security gateway 115 to automation system server 420. Mediahandler 415 may also provide access to audio and video associated withalarm conditions to authorized personnel for a predetermined time periodafter an alarm condition is detected. Additionally, media handler 415may relay control and configuration data destined for security gateways115. This data may originate either from an operator (located at centralmonitoring station 136) through monitoring client 133 or from remoteuser 152 at remote location 150.

The communications protocol between monitoring client 133 and mediahandler 415 may be proprietary and/or may use standard protocols. Thecommunications protocol between security gateway 115 and media handler415 may provide secondary pathways for transmitting alarm notifications,relays configuration information to security gateway 115 (includingcontrol messages for arming and disarming partitions, bypassing zones,and selecting cameras 112 and audio stations 107 for live feeds),uploading pre-event and relevant non-alarm audio and video to mediahandler 415 during an alarm condition, transmitting live video and audioduring an alarm condition, supporting voice over IP (VOIP) servicesbetween the residence and monitoring client 133 during an alarmcondition, and performing software updates.

Web interface 432 provides authorized remote users 152 with the abilityto view and edit account information, arm and disarm security system100, and view and hear live and recorded media from premises 110, allthrough a network-based interface. In many embodiments, thisnetwork-based interface is an Internet web site, or a portion of a website. After the remote user 152 is authenticated, application server 434provides and/or facilitates the features available to remote client 155through web interface 432. The particular features that are madeavailable are a design decision that may vary based upon severalfactors, which may include, without limitation, the permissions of theremote user 152 and the type of premises that is monitored.

Massaging interface 438 may also provide for transmission of a messageto remote client 155 by page, phone, e-mail, interactive voice response,short message service, or other massaging tool. Such a message willserve to notify multiple contacts on the alarm contact list when analarm event has taken place or is taking place.

In one embodiment, a three-tier architecture may be used to provide suchan interface. The first tier may consist of web servers running InternetInformation Server (IIS) on Windows NT™, which is responsible for staticweb content such as images. Requests for dynamic content may beforwarded to application server 434. Application server 434 generallyprovides or facilitates all of the functionality that is accessible toremote clients 155. The third tier is a database tier that may beprovided by automation system server 420. Data storage may be, forexample, a billing database. Authorized users may receive informationfrom the database regarding their account by accessing database server436. Application server 434 may access automation system server 420 toobtain account information and issue commands ultimately destined forsecurity gateway 115.

After remote client 152 is authenticated, application server 434 may beconfigured to allow remote client 152 to view audiovisual content fromsecurity gateway 115, communicate with automation system server 420 toaccess customer data, and access features of the security system 100. Inone embodiment, such features may include, without limitation, arming ordisarming security system 100; adjusting sensitivities of sensors 105(if present); adjusting alarm condition detection sensitivity; remotemonitoring; adjusting camera 112 settings and audio station 107settings; adjusting settings for lights, HVAC (heating, ventilation, andair conditioning) systems, irrigation systems and other environmentalcontrols; and reviewing alarms and recordings. In particular,application server 434 may allow remote user 152 to access mediadirectly from security gateway 115. In one embodiment, a live feed fromthe premises is available with the ability to select among cameras 112and microphones 334. In some embodiments, only video from certainspecified cameras is accessible for remote clients. In some embodiments,application server 434 may be configured to allow remote user 152 toinitiate a two-way audio connection with the security gateway 115 sothat the remote user 152 can communicate through the audio stations 332via speaker(s) 338 and microphone(s) 334 attached to security gateway115. Communication between application server 434 and automation systemserver 420 may take the form of calls to stored procedures defined inthe master database maintained by automation system server 420.

Access to web interface 432 requires successful authentication using anytechnique discussed above, such as entering a username and password.Preferably, all account-specific web content, including the loginrequest, employs the secure HTTP protocol. In one embodiment, eachcustomer may be assigned a General Administrator (GA) account. GAaccounts have full access to their respective associated securitygateway 115. The GA account can also create a number of guest user(“remote user” 152) accounts that have limited access (as discussedabove) to their respective associated security gateway 115. Typically,all account information is stored through automation system server 420,including usernames and passwords. Web interface 432 retrieves accountdata from automation system server 420 for display via the Web, by meansof one or more stored procedures. The GA can modify a subset of thisaccount data and update the corresponding entries in automation systemserver 420.

Referring now to FIG. 5, a process flow diagram is shown illustratingthe process for remote monitoring of a premises by a remote user using aremote client located at a remote location using a security system suchas the security system 100 of FIGS. 1-2. In particular, remote users mayaccess features of a security gateway such as the security gateway 110of FIG. 3. These features include without limitation viewing and editingaccount information, arming and disarming the security system, andaccessing live and recorded audiovisual data from the premises.

In step 500, the remote user connects to a security system server. In anexemplary embodiment, the remote user may connect to the security systemserver using a web browser such as Netscape Navigator or Microsoft™Internet Explorer. In other embodiments, the remote user may connect tothe security system server via an interactive television platform havinga friendly and easy-to-navigate user interface.

In step 510, the remote user provides the security system server withinformation for authentication. The type of information used forauthentication may take many forms. For example, in one embodiment, amedia handler associated with the security system server may requiresome sort of a username and password combination. Further, it is to beunderstood by the disclosure of one of skill in the art that any otherprocedure suitable for authenticating the identity of the remote usermay be used, such as by validating the remote user's biometric data.

The security system server verifies the authentication information instep 520. If the information is not authenticated, then the remote useris denied access to the features of the security gateway, and processflow ends in step 590. Precautions against unauthorized access may beimplemented, including, but not limited to, logging incidents of accessattempts, with emphasis on denied access.

In step 530, the security system server determines if the remote userhas the necessary permissions to access the security gateway. Necessarypermissions may include access to a particular camera or a particularaudio station located at the premises, access during a particular timeperiod, access to audio and or video information, and access to changepasswords, settings and/or activate and deactivate the security system.If the remote user does not have the necessary permissions, the remoteuser is denied access to the security system, and process flow ends instep 590.

If the remote user has the necessary permissions, in step 540, thesecurity system server provides the remote client and the securitygateway with an access token. The access token will typically comprisethe identity of the remote user, the identity of security gateway to beaccessed, the access permissions to be granted for the access token, andthe desired lifespan of the token, as well as a digital signature of thesecurity system server. It is noted that in accordance with the presentinvention, the remote user is only allowed access to those featurescorresponding to the permissions associated with the remote user'spermissions profile. For instance, the remote user may only havepermission to access a camera in a baby's nursery, and may lack accessto the other cameras in the premises. Alternatively, if the remote useris the General Administrator of the security gateway, then he or she hasfull access to the security gateway features.

The remote client then connects directly to the security gateway andprovides the security gateway with the access token in step 550. It isnoted that the term “connects directly” means that communicationsbetween the remote client and security gateway do not pass throughsecurity system server. The security gateway inspects the access tokenreceived from the remote client and compares it to the access tokenreceived by the security gateway in step 560. If the access tokens donot match, then the remote user at the remote client is denied access tothe security gateway, and process flow ends in step 590.

If the access tokens match in step 565, then the remote user may accessfeatures of the security gateway in step 570 in accordance with theuser's permissions profile. During access by the remote user of thesecurity system cameras or audio stations at the premises, the securitygateway activates a notification signal comprising an audiovisual cue atthe premises in step 575, indicating to occupants of the premises thatremote monitoring is occurring. For example, an LED on a camera at thepremises may be activated while the remote user is accessing thatcamera. In another example, an audible tone may be activated while theremote user is accessing an audio station at the premises. The remoteuser will continue to be able to access designated security gatewayfeatures until the remote user logs out according to step 580 or theaccess token expires according to step 585.

In some embodiments, the security system server may assign a lifespan tothe access token. In such cases, after a pre-specified time or event,the access token expires and the remote user may not access the securitygateway after the expiration of the access token. In order to access tothe features of the security gateway after expiration of the accesstoken, the remote user must reconnect to the security system server andprovide valid authentication information.

Accordingly, the remote user may then connect directly to securitygateway to perform remote monitoring through security gateway, check thesystem status, initiate a two-way audio conference, and/or any otherfeatures made available by security gateway and falling within theremote user's permissions. In some embodiments, only remote monitoringand two-way audio conferencing is made available through securitygateway. In these embodiments, all non-media features are providedthrough security system server.

The remote monitoring feature allows remote user to view all or portionsof the video signal from video cameras and to hear all or portions audioinformation from audio stations. Depending on the bandwidth of theconnection, the video may be of a lower quality than that transmitted tocentral monitoring station for verification of alarm signals in order tosave bandwidth. For example, in one embodiment, the video transmitted toremote user may have a lower frame rate, lower resolution, and/or lowercolor depth. Depending on the remote user's permissions and the remoteclient's capabilities, the remote user may be able to configure thequality of the video for remote monitoring.

In addition, depending on the remote user's level of permissions, theremote user may access remote features of the security gateway directlyto reconfigure the security system. Once authenticated, the remote usermay reconfigure some or all of the features of the security gateway.These features may include, without limitation, arming or disarming thesecurity system; adjusting sensitivities of sensors (if present);adjusting alarm condition detection sensitivity; remote monitoring;adjusting camera and audio station settings; and reviewing alarms andrecordings. Camera settings may include without limitation pan, tilt,focus, brightness, contrast and zoom.

The present invention also overcomes similar problems with personalemergency response systems (PERS) and telemedicine, includingtelehealth. The monitoring clients in these applications can now use thevideo and alarm to better diagnose the problem. In many ways, alarmsfrom health sensors, emergency panic buttons and the like are similar toalarm sensors in terms of generating false and unwanted alarms. Thissystem also enables health care givers and concerned family members touse the remote client feature for increased peace of mind.

The foregoing examples are included to demonstrate embodiments of theinvention. It should be appreciated by those of skill in the art thatthe techniques disclosed in the examples which follow representtechniques discovered by the inventor to function well in the practiceof the invention, and thus can be considered to constitute preferredmodes for its practice. However, those of skill in the art should, inlight of the present disclosure, appreciate that many changes can bemade in the specific embodiments which are disclosed and still obtain alike or similar result without departing from the spirit and scope ofthe invention.

While various embodiments in accordance with the principles disclosedherein have been shown and described above, modifications thereof may bemade by one skilled in the art without departing from the spirit and theteachings of the disclosure. The embodiments described herein arerepresentative only and are not intended to be limiting. Manyvariations, combinations, and modifications are possible and are withinthe scope of the disclosure. Accordingly, the scope of protection is notlimited by the description set out above, but is defined by the claimswhich follow, that scope including all equivalents of the subject matterof the claims. Furthermore, any advantages and features described abovemay relate to specific embodiments, but shall not limit the applicationof such issued claims to processes and structures accomplishing any orall of the above advantages or having any or all of the above features.

Additionally, the section headings used herein are provided forconsistency with the suggestions under 37 C.F.R. 1.77 or to otherwiseprovide organizational cues. These headings shall not limit orcharacterize the invention(s) set out in any claims that may issue fromthis disclosure. Specifically and by way of example, although theheadings refer to a “Field of the Invention,” the claims should not belimited by the language chosen under this heading to describe theso-called field. Further, a description of a technology in the“Background” is not to be construed as an admission that certaintechnology is prior art to any invention(s) in this disclosure. Neitheris the “Summary” to be considered as a limiting characterization of theinvention(s) set forth in issued claims. Furthermore, any reference inthis disclosure to “invention” in the singular should not be used toargue that there is only a single point of novelty in this disclosure.Multiple inventions may be set forth according to the limitations of themultiple claims issuing from this disclosure, and such claimsaccordingly define the invention(s), and their equivalents, that areprotected thereby. The term “comprising” as used herein is to beconstrued broadly to mean including but not limited to, and inaccordance with its typical usage in the patent context, is indicativeof inclusion rather than limitation (such that other elements may alsobe present). In all instances, the scope of the claims shall beconsidered on their own merits in light of this disclosure, but shouldnot be constrained by the headings set forth herein.

1. A method comprising: determining, by a first computing device locatedat a premises and based on data from a sensor located at the premises,an alarm event; determining premises device data, associated with atleast one of a camera device or an audio device located at the premises,from before the alarm event; and sending, to a second computing devicelocated external to the premises, at least one indication indicating thealarm event and the premises device data.
 2. The method of claim 1,comprising determining premises device data, associated with at leastone of the camera device or the audio device, from after the alarmevent; wherein the sending the indication of the alarm event and thepremises device data comprises sending the data from the sensor, thepremises device data from prior to the alarm event, and the premisesdevice data from after the alarm event.
 3. The method of claim 1,wherein the indication of the alarm event comprises an indication of atleast one of a time of the alarm event, a location of the alarm event,or a type of the sensor.
 4. The method of claim 1, wherein the sendingthe indication of the alarm event and the premises device data comprisesat least one of: sending the premises device data for verification ofthe alarm event; causing output of the premises device data to a user;or causing the premises device data to be stored.
 5. The method of claim1, wherein the second computing device comprises at least one of a userdevice or a monitoring agent device.
 6. The method of claim 1, whereinthe sensor comprises a motion sensor.
 7. The method of claim 1, whereinthe premises device data from prior to the alarm event comprises datacached to the first computing device based on an arming of a systemlocated at the premises.
 8. The method of claim 1, wherein the premisesdevice data from prior to the alarm event comprises premises device dataassociated with a predetermined time prior to a time associated with thealarm event.
 9. The method of claim 1, comprising determining the atleast one of the camera device or the audio device based on the at leastone of the camera device or the audio device being at a locationassociated with the alarm event.
 10. A first computing device located ata premises comprising: one or more processors; and memory storinginstructions that, when executed by the one or more processors, causethe device to: determine, based on data from a sensor located at thepremises, an alarm event; determine premises device data, associatedwith at least one of a camera device or an audio device located at thepremises, from before the alarm event; and send, to a second computingdevice located external to the premises, at least one indicationindicating the alarm event and the premises device data.
 11. The firstcomputing device of claim 10, wherein the instructions, when executed,further cause the first computing device to determine premises devicedata, associated with at least one of the camera device or the audiodevice, from after the alarm event; wherein the instructions that causethe first computing device to send the indication of the alarm event andthe premises device data cause the first computing device to send thedata from the sensor, the premises device data from prior to the alarmevent, and the premises device data from after the alarm event.
 12. Thefirst computing device of claim 10, wherein the indication of the alarmevent comprises an indication of at least one of a time of the alarmevent, a location of the alarm event, or a type of the sensor.
 13. Thefirst computing device of claim 10, wherein the instructions that, whenexecuted, cause the first computing device to send the indication of thealarm event and the premises device data cause the first computingdevice to at least one of: send the premises device data forverification of the alarm event; cause output of the premises devicedata to a user; or cause the premises device data to be stored.
 14. Thefirst computing device of claim 10, wherein the second computing devicecomprises at least one of a user device or a monitoring agent device.15. The first computing device of claim 10, wherein the sensor comprisesa motion sensor.
 16. The first computing device of claim 10, wherein thepremises device data from prior to the alarm event comprises data cachedto the first computing device based on an arming of a system located atthe premises.
 17. The first computing device of claim 10, wherein thepremises device data from prior to the alarm event comprises premisesdevice data associated with a predetermined time prior to a timeassociated with the alarm event.
 18. The first computing device of claim10, wherein the instructions, when executed, further cause the firstcomputing device to determine the at least one of the camera device orthe audio device based on the at least one of the camera device or theaudio device being at a location associated with the alarm event.
 19. Anon-transitory computer-readable medium storing instructions that, whenexecuted, cause: determining, by a first computing device located at apremises and based on data from a sensor located at the premises, analarm event; determining premises device data, associated with at leastone of a camera device or an audio device located at the premises, frombefore the alarm event; and sending, to a second computing devicelocated external to the premises, at least one indication indicating thealarm event and the premises device data.
 20. The non-transitorycomputer-readable medium of claim 19, wherein the instructions, whenexecuted, further cause determining premises device data, associatedwith at least one of the camera device or the audio device, from afterthe alarm event; wherein the sending the indication of the alarm eventand the premises device data comprises sending the data from the sensor,the premises device data from prior to the alarm event, and the premisesdevice data from after the alarm event.