Methods, Systems, and Products for Security Services

ABSTRACT

A sensor associated with a security system determines an electrically open circuit. An identifier identifies the open circuit, which may then be used to retrieve video data trained to a surveillance area associated with the sensor.

CROSS-REFERENCE TO RELATED APPLICATIONS

This application is a continuation of U.S. application Ser. No.15/081,982 filed Mar. 28, 2016 and since issued as U.S. Pat. No. ______,which is a continuation of U.S. application Ser. No. 13/293,213 filedNov. 10, 2011 and since issued as U.S. Pat. No. 9,396,634, with bothapplications incorporated herein by reference in their entireties.

BACKGROUND

Exemplary embodiments generally relate to communications and, moreparticularly, to alarm systems and to sensing conditions.

Security systems are common in homes and businesses. Security systemsalert occupants to intrusions. Security systems, though, may also warnof fire, water, and harmful gases.

BRIEF DESCRIPTION OF THE SEVERAL VIEWS OF THE DRAWINGS

These and other features, aspects, and advantages of the exemplaryembodiments are better understood when the following DetailedDescription is read with reference to the accompanying drawings,wherein:

FIG. 1 is a simplified schematic illustrating an environment in whichexemplary embodiments may be implemented;

FIG. 2 is a detailed schematic illustrating a security system, accordingto exemplary embodiments;

FIG. 3 is a detailed schematic illustrating receipt of an alarm message,according to exemplary embodiments;

FIG. 4 is a detailed schematic illustrating a verification call,according to exemplary embodiments;

FIGS. 5-6 are schematics illustrating cordless voice and telephonycapabilities, according to exemplary embodiments;

FIGS. 7-8 are schematics illustrating remote verification, according toexemplary embodiments;

FIGS. 9-10 are schematics further illustrating the security system,according to exemplary embodiments;

FIGS. 11-14 are schematics illustrating an alarm sensor, according toexemplary embodiments;

FIGS. 15-18 are schematics illustrating a takeover module, according toexemplary embodiments;

FIGS. 19-21 are schematics illustrating video data, according toexemplary embodiments;

FIGS. 22-24 are schematics illustrating a powerline-to-Ethernet adapter,according to exemplary embodiments;

FIG. 25 is a schematic illustrating an external antenna, according toexemplary embodiments;

FIG. 26 is a schematic illustrating payment for emergency summons,according to exemplary embodiments;

FIG. 27 is a schematic illustrating an access portal, according toexemplary embodiments;

FIG. 28 is a schematic further illustrating the takeover module,according to exemplary embodiments;

FIGS. 29-36 are schematics further illustrating an alarm controller,according to exemplary embodiments;

FIGS. 37-42 are schematics further illustrating verification of alarms,according to exemplary embodiments;

FIGS. 43-44 are more schematics illustrating security services,according to exemplary embodiments; and

FIG. 45 is a block diagram illustrating a processor-controlled device,according to exemplary embodiments.

DETAILED DESCRIPTION

The exemplary embodiments will now be described more fully hereinafterwith reference to the accompanying drawings. The exemplary embodimentsmay, however, be embodied in many different forms and should not beconstrued as limited to the embodiments set forth herein. Theseembodiments are provided so that this disclosure will be thorough andcomplete and will fully convey the exemplary embodiments to those ofordinary skill in the art. Moreover, all statements herein recitingembodiments, as well as specific examples thereof, are intended toencompass both structural and functional equivalents thereof.Additionally, it is intended that such equivalents include bothcurrently known equivalents as well as equivalents developed in thefuture (i.e., any elements developed that perform the same function,regardless of structure).

Thus, for example, it will be appreciated by those of ordinary skill inthe art that the diagrams, schematics, illustrations, and the likerepresent conceptual views or processes illustrating the exemplaryembodiments. The functions of the various elements shown in the figuresmay be provided through the use of dedicated hardware as well ashardware capable of executing associated software. Those of ordinaryskill in the art further understand that the exemplary hardware,software, processes, methods, and/or operating systems described hereinare for illustrative purposes and, thus, are not intended to be limitedto any particular named manufacturer.

As used herein, the singular forms “a,” “an,” and “the” are intended toinclude the plural forms as well, unless expressly stated otherwise. Itwill be further understood that the terms “includes,” “comprises,”“including,” and/or “comprising,” when used in this specification,specify the presence of stated features, integers, steps, operations,elements, and/or components, but do not preclude the presence oraddition of one or more other features, integers, steps, operations,elements, components, and/or groups thereof. It will be understood thatwhen an element is referred to as being “connected” or “coupled” toanother element, it can be directly connected or coupled to the otherelement or intervening elements may be present. Furthermore, “connected”or “coupled” as used herein may include wirelessly connected or coupled.As used herein, the term “and/or” includes any and all combinations ofone or more of the associated listed items.

It will also be understood that, although the terms first, second, etc.may be used herein to describe various elements, these elements shouldnot be limited by these terms. These terms are only used to distinguishone element from another. For example, a first device could be termed asecond device, and, similarly, a second device could be termed a firstdevice without departing from the teachings of the disclosure.

FIG. 1 is a simplified schematic illustrating an environment in whichexemplary embodiments may be implemented. A security system 100communicates with a central monitoring station 102 using a private datanetwork 104. The security system 100 has an alarm controller 106 thatreceives information from one or more alarm sensors 108. As those ofordinary skill in the art understand, the alarm sensors 108 monitor forheat, smoke, motion, gases, sound, or any other physical or logicalparameter that may indicate a security event. The alarm controller 106may also interface with one or more cameras 110 that capture video dataand microphones 112 that capture audio data. The cameras 110 andmicrophones 112 may constantly capture video and audio that isautomatically stored in a local mass storage device 114.

The security system 100 may wirelessly communicate with the private datanetwork 104. The private data network 104, for example, may have anaccess point name (or “APN”) 120 that identifies a wireless Internetprotocol packet data network that will be used to establish a wirelesscellular network connection 124 between the alarm controller 106 and theprivate data network 104. The security system 100 has a wirelesstransceiver 122 that uses the access point name 120 to communicate withthe private data network 104. The security system 100, for example, maysend and receive packets of data using a wireless carrier's 3G/LTE/4Gcellular network. The security system 100 may connect using a generalpacket radio service (GPRS), enhanced data rates for global evolution(EDGE), a universal mobile telecommunications service (UMTS), and/or ahigh speed packet access (HSPA). The wireless transceiver 122, however,may additionally or alternatively utilize any portion of theelectromagnetic spectrum and/or any communications standard orspecification (such as WI-FI®, BLUETOOTH®, or WI-MAX®). The access pointname 120 is a protocol that describes a configurable network identifierwhen connecting to the private data network 104. The access point name120 determines what type of network connection should be created, whatInternet protocol address(es) should be assigned to the security system100 (e.g., the wireless transceiver 122), and what security methodsshould be used. The access point name 120 may identify the Internetprotocol packet data network and the type of service that is provided bythe wireless Internet protocol packet data network.

The security system 100 provides security services. The security system100 monitors the inputs, status, or state of the alarm sensors 108, thecameras 110, and/or the microphones 112. When the security system 100detects an alarm condition 126, the security system 100 generates analarm message 128. The alarm message 128 is wirelessly sent to theaccess point name 120 and routed through the private data network 104 tothe central monitoring station 102. The alarm message 128, for example,may be received at a centralized alarm receiver server 130 and routed toa central monitoring station (“CMS”) server 132. The central monitoringstation server 132 may query an account database 134 to discoverdetailed customer information (as later paragraphs will explain). Thecentral monitoring station server 132 may then assign a human orcomputerized agent 136.

The agent 136 may first verify the alarm condition 126. As the readermay understand, a high percentage of alarms are “false.” That is, alarmsare often inadvertently triggered, such as when an owner of a home opensa door and accidentally triggers the alarm. If the central monitoringstation server 132 were to immediately summon emergency services, andthe alarm is false, then local police and fire departments have wastedtime and resources. Some municipalities may even impose fees for anunnecessary dispatch. One of the primary functions of the agent 136,then, is to first ascertain a true emergency before summoning emergencyservices.

The security system 100 may thus have two-way interactive voicecapabilities. The agent 136, for example, may establish a Voice-overInternet protocol (“VoIP”) call 140 with the security system 100. Theagent 136, for example, may call a number assigned to the securitysystem 100 and directly speak with an occupant of a home or business (aslater paragraphs will explain). The Voice-over Internet protocol call140 may also use the access point name 120 associated with the private,wireless cellular network connection 124 with the wireless transceiver122. The Voice-over Internet protocol call 140 may alternatively routeover a wireline broadband connection to the alarm controller 106. Theagent 136 may additionally or alternatively call a designated number(such as a mobile phone) when alarms are detected. The agent 136 mayalso retrieve audio and/or video data from the camera 110 and/or themicrophone 112 (again, as later paragraphs will explain). The audioand/or video data may be live, real-time data captured by the cameras110 and/or the microphones 112, but archived audio/video data may alsobe retrieved. The agent may thus speak with an occupant, and view theaudio and/or video data, to determine if the alarm condition 126represents a true emergency. If the alarm is a legitimate securityconcern, then the agent 136 may notify local emergency services.

FIG. 2 is a more detailed schematic illustrating the security system100, according to exemplary embodiments. The alarm controller 106 has aprocessor 150 (e.g., “μP”), application specific integrated circuit(ASIC), or other component that executes a client-side securityapplication 152 stored in a memory 154. The client-side securityapplication 152 monitors the inputs, status, or state of the alarmsensors 108, the cameras 110, and/or the microphones 112. Theclient-side security application 152 may instruct any of the cameras 110and/or the microphones 112 to capture audio and/or video data. When theclient-side security application 152 detects the alarm condition 126,the client-side security application 152 instructs the processor 150 toretrieve an IP emergency alarm address (“IPEAA”) 156 from the memory124. The IP emergency alarm address 156 is a network communicationsaddress at which the centralized alarm receiver server 130 receivespacketized alarm messages from customers/subscribers of an alarmmonitoring service. The IP emergency alarm address 156 may be preloadedinto the memory 124, and the IP emergency alarm address 156 may bechanged after a software update to the client-side security application152.

The client-side security application 152 generates the alarm message128. The alarm message 128 includes data that identifies a networkaddress associated with the alarm controller 106. The alarm message 128may also include data that describes the alarm condition 126, such as analarm code associated with the sensor 108. The alarm message 128 mayalso include information describing the customer, such as a customeraccount code, physical street address, or other customer identifier.Whatever data is included in the alarm message 128, the data ispacketized according to a packet protocol. The alarm message 128 mayalso be encrypted to ensure privacy. Once the alarm message 128 isformatted and ready, the processor 150 commands the wireless transceiver122 to wirelessly send the alarm message 128.

The alarm message 128 routes through the private data network 104. Thealarm message 128 is sent to the access point name 120 associated withthe private, wireless cellular network connection 124 to the privatedata network 104. Packet headers are added or modified to route thealarm message 128 through the private data network 104 to the IPemergency alarm address 156 associated with the centralized alarmreceiver server 130. Because the private data network 104 is controlledand/or operated by a single carrier, the alarm message 128 is secure andnever encounters a publicly-available network segment.

The alarm message 128 may be encrypted and/or packetized using anypacket protocol. As those of ordinary skill in the art understand, thealarm message 128 may be packetized (or “framed”) for routing throughthe private data network 104. Information is grouped into packetsaccording to a packet protocol. As those of ordinary skill in the artalso understand, there are many packet protocols. Some of the morewell-known packet protocols include TCP/IP, IPX/SPX, AppleTalk, and SNA.Some standards organizations, such as the I.E.E.E., issue standards forpacketizing data. The private data network 104 may even utilize “mixed”protocols, where a translator determines the particular packet protocoland the appropriate destination for each packet. Because the basics ofpacketizing and packet protocols are well-known, this disclosure willnot further explain the packetizing of the alarm message 128.

FIG. 3 is a more detailed schematic illustrating receipt of the alarmmessage 128, according to exemplary embodiments. As the above paragraphsexplained, the alarm message 128 wirelessly routes from the alarmcontroller 106, through the private data network 104, and to thecentralized alarm receiver server 130. The centralized alarm receiverserver 130 may then route the alarm message 128 to the centralmonitoring station (“CMS”) server 132. The central monitoring stationserver 132 has a processor 170 (e.g., “μP”), application specificintegrated circuit (ASIC), or other component that executes aserver-side security application 172 stored in a memory 174. Theserver-side security application 172 and the client-side securityapplication 152 cooperate in a client-server environment to notify ofalarms from the security system 100.

When the central monitoring station server 132 receives the alarmmessage 128, the server-side security application 172 obtains any dataassociated with the alarm message 128. The server-side securityapplication 172, for example, may obtain the customer account codecontained in the alarm message 128 to retrieve customer accountinformation from the account database 134. The server-side securityapplication 172 may then pass the alarm condition 126 and any accountinformation on to the agent 136. The server-side security application172 may also retrieve a static, dynamic, and/or private network address176 associated with the alarm controller 106. The network address 176uniquely identifies the alarm controller 106 that generated the alarmmessage 128. The network address 176 may be retrieved from the accountdatabase 134, or the network address 176 may be extracted from one ormore header portions and/or payload portions of the packetized alarmmessage 128. However the network address 176 is obtained, theserver-side security application 172 knows the identity of the alarmcontroller 106 detecting the alarm condition 126. The server-sidesecurity application 172 may then assign the human or computerized agent136.

FIG. 4 is a detailed schematic illustrating a verification call,according to exemplary embodiments. Here the agent 136 directly callsthe alarm controller 106 to verify the alarm. Because the unique networkaddress 176 of the alarm controller 106 has been obtained from the alarmmessage 128, the agent 136 may establish communication directly with thealarm controller 106. The agent 136, for example, may establish theVoice-over Internet Protocol call 140 to the alarm controller 106. Thealarm controller 106 has a Man-Machine Interface, such as a speaker 180,a microphone 182, and/or a keypad 184. The server-side securityapplication 172 may also have a VoIP module 190 for conducting two-wayvoice communication. The agent 136 may thus call the alarm controller106 to verify the alarm condition 126. The agent's speech may be outputfrom the speaker 180, and the occupant may speak into the microphone182. The Voice-over Internet Protocol call 140 is thus enabled betweenthe agent 136 and the occupant at the alarm controller 106. The agent136 may require that the occupant authenticate himself/herself, such asby entering a code or password on the keypad 184. The occupant, however,may alternately speak a phrase to verify identity and/or the alarmcondition 126. If the occupant verifies the alarm condition 126, thenthe agent 136 may summon emergency services.

FIGS. 5-6 are schematics illustrating cordless voice and telephonycapabilities, according to exemplary embodiments. Here, when the agent136 calls the alarm controller 106 to verify the alarm condition 126,the call may be broadcast to one or more portable units 200 (such ascordless telephony handsets). The alarm controller 106 may thus havecordless voice and telephone capability to remotely communicate with theportable unit 200. As FIG. 5 illustrates, the alarm controller 106 mayinterface with a base station 202 that wirelessly communicates with eachportable unit 200. Each portable unit 200, for example, may be atelephony speakerphone handset that is installed throughout the home orbusiness. The client-side security application 152 may further havecode, programming, or instructions that cause the alarm controller 106to establish wireless telephony communication with the portable unit200. The base station 202 and the portable unit 200, for example, maycommunicate according to the Digital Enhanced CordlessTelecommunications (or “DECT”) standard for cordless telephony and voicemonitors. When the agent 126 calls the alarm controller 106, the VoIPmodule 190 may cause the alarm controller 106 to enter an off-hook modeof operation and automatically answer the Voice-over Internet Protocolcall 140. The base station 202 may thus broadcast the Voice-overInternet Protocol call 140 to the one or more portable units 200 (i.e.,speakerphone handsets) to provide two-way interactive voicecommunication. An occupant and the agent 126 may conduct a two-way voiceconversation to access the emergency. Because the base station 202 mayautomatically answer the Voice-over Internet Protocol call 140, anyoccupants need not find the portable unit 200 and physically answer thecall. The occupant need only speak to verify the emergency. Theautomatic answering feature also enables the agent to listen to what isoccurring in the residence. If an occupant fails to speak and verify,the agent 126 may simply listen to ambient sounds for verification.

FIG. 6 illustrates an alternate routing of the Voice-over InternetProtocol call 140. Here the Voice-over Internet Protocol call 140 mayroute over a public data network 204 (such as the publically-availableInternet). When the agent 136 calls the unique network address 176 ofthe alarm controller 106, the Voice-over Internet Protocol call 140 mayroute over a wireline broadband connection 206 between the public datanetwork 204 and a gateway/modem device 208. Here, then, the Voice-overInternet Protocol call 140 may not wirelessly communicate over acarrier's 3G/LTE/4G network (as FIGS. 1-5 illustrated). Still, though,the VoIP module 190 may automatically answer the Voice-over InternetProtocol call 140 and broadcast the call to the portable units 200.

FIG. 7 is a schematic illustrating remote verification, according toexemplary embodiments. If the Voice-over Internet Protocol call 140 tothe alarm controller 106 is unsuccessful, remote verification may beauthorized. Here the server-side security application 172 may attempt tonotify one or more other addresses when the alarm condition 126 isdetected. As FIG. 7 illustrates, the server-side security application172 may query for one or more notification addresses 220. Eachnotification address 220 is any communications address which is notifiedof alarms detected by the alarm controller 106. The server-side securityapplication 172 may query a notification table 222 for the notificationaddress(es) 220. FIG. 7 illustrates the notification table 222 stored inthe central monitoring station (“CMS”) server 132, but the notificationtable 222 may be remotely located and accessed from any location ordevice in the data network 104 and/or in the public data network 204.The notification table 222 associates some customer information 224 tothe notification addresses 220. The customer information 224 may be anyinformation that uniquely identifies the customer, such as a customercode, physical address, name, or even the network address 176 assignedto the alarm controller 106. Once the customer information 224 isobtained from the account database 134, the server-side securityapplication 172 queries the notification table 222 for the customerinformation 224. The notification table 222 returns the notificationaddress(es) 220 approved for remote notification. Each notificationaddress 220 may be a telephone number, email address, other InternetProtocol address, or any other communications address to whichnotifications are sent. Indeed, multiple notification addresses 220 maybe associated to the customer information 224. Exemplary embodiments maythus retrieve a list 225 of notification addresses. Each entry in thelist 225 of notification addresses may be a telephone number, InternetProtocol address, email address, and/or any other communicationsaddress.

An alarm notification 226 is then sent. The server-side securityapplication 172 causes the central monitoring station server 132 toformat the alarm notification 226 and to send the alarm notification 226to each entry in the list 225 of notification addresses. The alarmnotification 226 may be an electronic message, such as a text message oremail message. The alarm notification 226, however, may also be ananalog telephone call or a Voice-over Internet Protocol call.Regardless, the alarm notification 226 may include informationdescribing the alarm condition 126 (such as the alarm sensor 108, aphysical street address of the alarm controller 106, and/or any otherinformation). The alarm notification 226 routes through the data network104 and/or the public data network 204 to a third party communicationsdevice 228 associated with one of the notification addresses 220. If thealarm notification 226 involves analog telephony, the alarm notification226 may also route along some portion of a public-switched telephonynetwork. The server-side security application 172 may thus notifyfriends, neighbors, a spouse, children, and any communications addressesin the list 224 of notification addresses.

FIG. 8 is another schematic illustrating remote verification, accordingto exemplary embodiments. Here the alarm controller 106 itself maynotify others when alarms are detected. When the alarm controller 106detects the alarm condition 126, the client-side security application152 may access the notification address 220 that is approved for remotenotification. FIG. 8 illustrates the notification address 220 as beinglocally stored in the alarm controller 106, perhaps associated with aprofile 240 of the occupant or home/business. If multiple notificationaddresses 220 are approved for remote notification, then the list ofnotification addresses (illustrated as reference numeral 224 in FIG. 7)may be retrieved. The client-side security application 152 formats thealarm notification 226 and sends the alarm notification 226 to eachnotification address 220 approved for remote notification. The alarmnotification 226 may again include any information describing the alarmcondition 126, the alarm sensor 108, and/or the physical street address.

FIGS. 9-10 are schematics further illustrating the security system 100,according to exemplary embodiments. Here the residential or businesssecurity system 100 need not include a broadband modem. That is, thealarm controller 106 may simply plug-in, or interface to, an existingcable, digital subscriber line (DSL), or other gateway/modem device 208.FIG. 9, for example, illustrates a cable (e.g., CAT 5, 6, or 7)interconnecting a port of the occupant's existing gateway/modem device208 to the alarm controller 106. FIG. 10 illustrates an alternativepowerline interface 250 (such as HOMEPLUG®) that allows the occupant'sexisting gateway/modem device 208 to interface with the alarm controller106. Exemplary embodiments thus allow the alarm controller 106 to bedeployed in any home or business, regardless of the gateway/modem device208 (e.g., ADSL, VDSL, GPON, and bring-your-own broadband).

FIGS. 11-14 are schematics illustrating the alarm sensor 108, accordingto exemplary embodiments. Here each alarm sensor 108 may have a wirelessinterface 260 to the alarm controller 106. Conventional security systemsuse wired sensors to detect security events. Wired sensors, though, aredifficult to install after a home or business has been constructed.Exemplary embodiments may thus utilize the wireless interface 260 foreasier and cheaper installations.

FIG. 11 is a block diagram of the alarm sensor 108. The alarm sensor 108has a parameter detector 262 that detects or senses some physical orlogical parameter (such as temperature, smoke, motion, or sound). Asensor processor 264 commands the wireless interface 260 to wirelesslysend or broadcast sensor data 266. The sensor data 266 is wirelesslyreceived by the alarm controller 106. The wireless transceiver 122 inthe alarm controller 106, for example, may wirelessly receive the sensordata 266 sent from the alarm sensor 108. The client-side securityapplication 152 obtains the sensor data 266 and compares the sensor datato one or more rules 268 and threshold values 270 stored in the alarmcontroller 106. If the sensor data 266 indicates a security event, thealarm condition 126 is determined and the alarm message 128 is sent tothe central monitoring station 102 (as earlier paragraphs explained).While the alarm sensor 108 may have an alternating current (AC) powersource 272, a battery 274 may be included.

FIG. 12 further illustrates the wireless interface 260. Here thewireless interface 260 may only have one-way transmission capability topreserve battery life. That is, the alarm sensor 108 may only send thesensor data 266 to the alarm controller 106. A sensor transmitter 280may thus lack capability to receive data or information to conserve thelife of the battery 274. Because the alarm sensor 108 may only transmitthe sensor data 266, electrical power from the battery 274 is notconsumed for wireless reception. Even though the sensor transmitter 280may utilize any portion of the electromagnetic spectrum, exemplaryembodiments may utilize a proprietary portion (such as 433 MHz) of theelectromagnetic spectrum. The sensor processor 264 executes a sensorprogram 282 stored in memory 284 of the alarm sensor 108. The sensorprogram 282 causes the sensor processor 264 to only broadcast the sensordata 266 during an alarm. Even though the alarm sensor 108 maycontinuously, periodically, or randomly monitor or measure the sensordata 266, the alarm sensor 108 may only transmit the sensor data 266that equals or exceeds some threshold value 286. The sensor transmitter280 may thus only consume electrical power from the battery 274 when thesensor data 266 necessitates.

FIG. 13 further illustrates the wireless interface 260. Here the alarmsensor 108 may broadcast its health and identity. That is, the sensorprogram 282 may randomly or periodically execute a diagnostic routine290, such as every seventy (70) minutes. The sensor transmitter 280 maythen wirelessly send a diagnostic result 292, along with a sensoridentifier 294 associated with the alarm sensor 108. The sensoridentifier 294 may be any alphanumeric combination that uniquelyidentifies the alarm sensor 108 from other alarm sensors. When the alarmcontroller 106 receives the diagnostic result 292 and the sensoridentifier 294, the client-side security application 152 may compare thediagnostic result 292 to a diagnostic range 296 of values. If thediagnostic result 292 satisfies the diagnostic range 296 of values, thenthe alarm sensor 108 is assumed to be properly functioning. If thediagnostic result 292 fails to satisfy the diagnostic range 296 ofvalues, then a fault 298 may be assumed and the alarm controller 106 mayflag and/or display an error 300 associated with the sensor identifier294.

The one-way wireless interface 260 may be best suited to magneticsensors. As those of ordinary skill in the art have known, many securitysystems utilize magnetic sensors for doors and windows. When a door orwindow opens, a magnet (not shown) pulls away from a metal strip orcontact. As the magnet pulls away, the magnet electromagneticallydecouples, thus opening like a switch in a circuit. The alarm sensor 108thus simply detects low or no current, voltage, or continuity as thedoor or window opens. The sensor program 282 may thus cause the sensorprocessor 264 and the sensor transmitter 280 to broadcast the sensordata 266 (e.g., low or no current, voltage, or continuity) only when themagnet pulls away from the door or window. The one-way transmissioncapability of the wireless interface 260 may thus be effectively usedfor windows and doors, where the life of the battery 274 may be extendedthree to five years.

FIG. 14 illustrates two-way capability. Here the wireless interface 260may both send and receive, thus bi-directionally communicating with thealarm controller 106. FIG. 14, for example, illustrates aninitialization of the alarm sensor 108. The alarm sensor 108 mayresponse to a command 310 sent in a message 312 from the alarmcontroller 106. The command 310 may instruct the alarm sensor 108 toturn on, to awaken, or to respond. The message 312 may also include asensor address 314, thus permitting different alarm sensors 108 to beindividually addressed and activated/deactivated. When the alarm sensor108 receives the message 312, the alarm sensor 108 executes the command310, as instructed by the alarm controller 106. The alarm sensor 108 mayrespond by sending the sensor data 266 to the alarm controller 106. Thealarm sensor 108 may also broadcast its diagnostic result 292 and thesensor identifier 294 to indicate its health and identity (as the aboveparagraph explained). When the alarm sensor 108 has two-way capability,the sensor transmitter 280 may again utilize any portion of theelectromagnetic spectrum, such as the 900 MHz spectrum. This two-waycapability consumes more electrical power from the battery 274, so thetwo-way capability may be reserved for keypads and for sensors that areeasily accessed.

FIGS. 15-17 are schematics illustrating a takeover module 320, accordingto exemplary embodiments. The takeover module 320 allows exemplaryembodiments to be retrofitted to one or more existing wired sensors 322and/or wire contacts 324. As earlier paragraphs explained, conventionalsecurity systems have long used the wired contacts 322 and sensors 324to detect security events. Because these existing wired contacts 322 andsensors 324 may still adequately function for basic security services,some customers may not want to incur added costs to tear-out aged, butfunctioning, components. The takeover module 320 thus allows the alarmcontroller 106 to interface with existing wired keypads, sirens, andsensors in older installations. An existing controller may be removed,and the existing alarm zones, or circuits 326, may be interfaced to thealarm controller 106. The takeover module 320 thus permits oldersecurity systems to be up-fitted without incurring substantialinstallation costs.

As FIG. 16 illustrates, the takeover module 320 has one or more terminalstrips 330 of pairs 332 of terminals. An existing pair 334 of wires fromthe existing window contact 324 is connected to a first pair 336 ofterminals in the takeover module 320. A second existing pair 338 ofwires from the existing sensor 322 is connected to a second pair 340 ofterminals. If multiple circuits serve multiple existing securitycomponents, then each corresponding pair of wires is connected to adifferent pair 332 of terminals in the takeover module 320. A differentpair 332 of terminals, in other words, is connected to each two-wirepair in a security circuit 326. The takeover module 320 may also have asocket 350 for connection to an existing keypad 352. The takeover module320 applies an electrical current to each pair 332 of terminals. Theelectrical current flows through the existing circuits 326 and returnsback to each respective pair 332 of terminals in the takeover module320. As earlier paragraphs explained, when a window or door is opened,the corresponding wired component (e.g., the existing sensor 322 or theexisting window contact 324) creates an open-circuit condition. When thecircuit 326 opens, the takeover module 320 detects no current betweenthe corresponding pair 332 of terminals. The takeover module 320 thusreports an open-circuit condition 354 to the alarm controller 106, alongwith a terminal identifier 356 associated with the open circuit.

As FIG. 17 illustrates, exemplary embodiments may thus detect intrusionevents. When an open circuit is detected, the alarm controller 106receives the open-circuit condition 354 and the terminal identifier 356.The client-side security application 152 may then query an intrusiondatabase 360. FIG. 17 illustrates the intrusion database 360 stored inthe memory 154 of the alarm controller 106, but the intrusion database360 may be stored in the takeover module 320 or remotely accessed fromthe data network (illustrated as reference numeral 104 in FIG. 1).Regardless, the intrusion database 360 is illustrated as a table 362that maps, relates, or associates terminal identifiers 356 to circuitdescriptors 364. Each circuit descriptor 364 may be a textualdescription of an existing sensor circuit (illustrated as referencenumeral 326 in FIGS. 15 & 16). The intrusion database 360 thus providesa simple description of a possible intrusion event, such as “masterbedroom window open” or “garage door open.” The client-side securityapplication 152 queries the intrusion database 360 for the terminalidentifier 356 associated with the open-circuit condition 354 detectedby the takeover module 320. The client-side security application 152retrieves the corresponding circuit descriptor 364 and sends the alarmmessage 128 to the central alarm receiver 130 (as earlier paragraphsexplained). The alarm message 128 may thus include a textual descriptionof the security event (such as “glass breakage in garage” or “kitchendoor open”). Should the central monitoring station server 132 send thealarm notification (illustrated as reference numeral 226 in FIGS. 7-8)for remote notification, the alarm notification 226 may, likewise,include the textual description of the security event.

FIG. 18 is a block diagram of the takeover module 320, according toexemplary embodiments. The takeover module 320 has a voltage source 370that applies a voltage V_(O) (illustrated as reference numeral 372) to avoltage strip 374. Each pair 332 of terminals in the takeover module 320has one terminal electrically connected to the voltage strip 374 and asecond terminal electrically connected to electrical ground 376. Thevoltage V_(O), for example, is applied to a first terminal 378 in thepair 332 of terminals, while a second terminal 380 is connected toelectrical ground 376. Because the existing wires 334 and the existingwired contact 324 electrically resemble a resistance 382 (as may theexisting wires 338 and sensor 322 illustrated in FIG. 16), electricalcurrent I_(O) (illustrated as reference numeral 384) flows from thefirst terminal 378 (to which the voltage V_(O) is applied), through theexisting wires 334 and the existing contact 324, and to the secondterminal 380 connected to electrical ground 376. Each pair 332 ofterminals in the takeover module 320 may have a current sensor 386 thatmeasures the electrical current I_(O) flowing from the first terminal378 to the second terminal 380.

The takeover module 320 may be processor controlled. A takeoverprocessor 400 may receive a current measurement 402 from each currentsensor 386. The takeover processor 400 may execute a current application404 stored in memory 406. The current application 404 is software codeor instructions that cause the takeover processor 400 to evaluate or tocompare the current measurement 402 in each circuit 326 to a thresholdcurrent value 408. When the current measurement 402 across any pair 332of terminals drops below the threshold current value 408, the takeoverprocessor 400 detects a possible intrusion event. The takeover processor400 flags the open-circuit condition 354 and obtains the terminalidentifier 356 of the open circuit from the corresponding current sensor386. The takeover processor 400 sends the open-circuit condition 354 tothe alarm controller 106 (perhaps as a message), along with the terminalidentifier 356 of the open circuit. When the alarm controller 106receives the open-circuit condition 354, the client-side securityapplication 152 may query the intrusion database 360 for the terminalidentifier 356 of the open circuit. The client-side security application152 may then send the alarm message 128 to the central alarm receiver130 (as earlier paragraphs explained).

FIGS. 19-21 are schematics illustrating video data, according toexemplary embodiments. Because there may be multiple cameras(illustrated as reference numeral 110 in FIG. 1) installed in a home orbusiness, exemplary embodiments may obtain video data 420 of thepossible intrusion (detected by the takeover module 320, as explainedabove). Here exemplary embodiments may select the video data 420 thatcorresponds to the terminal identifier 356. As FIG. 19 illustrates, theintrusion database 360 may also associate a camera 110 to the circuitdescriptor 364. The intrusion database 360 may be configured to relatedifferent cameras and/or camera views to terminal identifier 356. Camera#1, for example, may be trained or aimed on the kitchen door, whilecamera #2 captures a front entry door. Cameras may be installedthroughout a home or business to provide views of many windows, doors,and other locations. If a camera is motorized to pan and/or to zoom,then the camera may also have multiple orientations for multiple views.The intrusion database 360 may thus store relationships that bestcapture the video data 420 of the terminal identifier 356 associatedwith the open circuit. When the client-side security application 152receives the terminal identifier 356 associated with the open circuit,the client-side security application 152 may thus select only the mostrelevant video data 420. When the client-side security application 152queries the intrusion database 360 for the terminal identifier 356, theclient-side security application 152 may also retrieve a camera address422. Because there may be multiple cameras throughout a home orbusiness, each camera may be uniquely identified by the camera address422 (such as a public or private Internet protocol address). Each camerais likely trained or aimed to capture video of different portions of thehome or business. The client-side security application 152 thusretrieves the camera address 422 that is associated with the terminalidentifier 356. Once the camera address 422 is known, exemplaryembodiments may obtain the video data 420 to further verify theintrusion.

FIG. 20 illustrates the video data 420. The agent 136 at the centralmonitoring station 102 may send a video request 430 instructing thealarm controller 106 to retrieve and send the video data 420 captured bythe camera 110 associated with the terminal identifier 356. When thealarm controller 106 receives the video request 430, the client-sidesecurity application 152 retrieves live and/or archived video data 420associated with the corresponding camera address 422. The alarmcontroller 106 sends the relevant video data 420 to some network address(such as the agent's computer terminal 432). The agent 136 may thus viewthe video data 420 to help verify the intrusion.

The video data 420, however, may be automatically sent. When thetakeover module 320 detects the open-circuit condition 354, theclient-side security application 152 may be programmed or configured toautomatically sent the video data 420. This automatic response may bedesired when bandwidth is not a concern, such as holidays or hours whenthe data network 104 is uncongested. The client-side securityapplication 152 may thus automatically retrieve and send the video data420 whenever the open-circuit condition 354 is received from thetakeover module 320. When the open-circuit condition 354 is detected,the client-side security application 152 may automatically query for thecamera address 422 associated with the terminal identifier 356. Theclient-side security application 152 retrieves the video data 420 fromthe camera 110 at the camera address 422. The client-side securityapplication 152 may then send the video data 420 with the alarm message128 and/or with the alarm notification 226.

The agent 136 (at the agent's computer terminal 430) may request videofrom any camera 110. As the agent 136 attempts to verify the alarm, theagent may select any of the cameras 110 in the home or business andreceive streaming video data 420. The agent's computer terminal 430 mayeven display information indicating the camera, camera zone, and/or thealarm condition 126. The agent's computer terminal 430 may also displaya graphical user interface that permits the agent 136 to access the livevideo data 420 from any camera 110 in the home or business. Under mostcircumstances the agent 136 will receive and view the live video data420 from one camera 110 at a time. If bandwidth permits, though, theagent may select and view live video data 420 from multiple cameras 110at one time. The live video data 420 will not create congestion in theprivate data network 104, so the only congestion may occur in thecustomer's access network. For example, if a customer has a wirelinebroadband ADSL service with 1.5 Mbps downstream and 256 Kbps upstream,the upstream bandwidth could be limiting.

Any video data, from any camera 110, is also available. As the agentattempts to verify the alarm, the agent 136 may want video data 420 fromother cameras in the home or business. The agent's computer terminal 430need only send the video request 430 and specify output from aparticular camera. The client-side security application 152 retrievesand sends the live video data 420 associated with the requested cameranumber.

Some cameras, though, may be off limits to the agent. Even though thecustomer may have multiple cameras, the customer may not want the agentto have access to all cameras. That is, there may be some camera outputsthat are “off limits” and not accessible. A bedroom security camera, forexample, may be configured as “private,” not shared, and perhaps notarchived. Permissions may thus be established for each camera. Thecustomer may thus establish a policy to manage which camera outputs areavailable to the central monitoring station during an alarm condition.The client-side security application 152 may be configured to permit, ordeny, remote access to any output of any camera 110 according to userand/or the user's location. If a user has acceptable authenticationcredentials (e.g., username and password), but an unacceptable location(such as GPS coordinates), then the client-side security application 152may deny access to video and any other feature. Some camera output maybe associated with public permissions, while other camera output may beassociated with specific authentication credentials.

FIG. 21 illustrates remote notification of the video data 420. Earlierparagraphs explained how the alarm notification 226 may remotely notifyfriends, family members, or others of security events detected by thealarm controller 106. When the alarm notification 226 is sent to one ormore of the notification addresses 220, the alarm notification 226 mayinclude at least a portion of the video data 420. When the alarmnotification 226 is received, the recipient may immediately read thetextual description of the open circuit (“basement window open”) andview the video data 420 captured by a camera. The recipient may thusimmediately verify the intrusion event. If bandwidth, packet delay, orother network factor is a concern, the alarm notification 226 may onlyinclude a website link to the video data 420.

FIGS. 22-24 are schematics illustrating a powerline-to-Ethernet adapter450, according to exemplary embodiments. Here the existing electricalwiring in a home or business is used to convey ETHERNET® signals fromthe alarm sensors 108. FIG. 22 illustrates the basic concept of an AC/DCpower adapter 452 with an integrated ETHERNET® adapter 454. The AC/DCpower adapter 452 may have a standard two-prong or three-prong male plugfor insertion into a standard female electrical outlet 456. The AC/DCpower adapter 452 receives alternating electrical voltage and currentand converts to direct current (DC) electrical power. The ETHERNET®adapter 454 outputs ETHERNET® signals 458 (or “frames”). Here, though,both DC electrical power 466 and the ETHERNET® signals 458 are conveyedby one or more wires in a cable 460. DC voltage and current are alsooutput to two or more other wires in the cable 460. A six-wire cable460, for example, may convey the ETHERNET® signals 458 on four (4) ofthe six wires, while direct current electrical power is conveyed over aremaining two wires of the six wires. As FIG. 22 also illustrates, afemale connector 462 allows the cable 460 to mate with thepowerline-to-Ethernet adapter 450. The female connector 462, forexample, may be an RJ-56 modular jack, thus allowing a male RJ-56 plug464 of an end of the cable 460 to insert into the female connector 462.The AC/DC power adapter 452 outputs the DC power 466 to at least two (2)terminals in the female connector 462, while the ETHERNET® adapter 454outputs the ETHERNET® signals 458 to other terminals in the femaleconnector 462. Both the ETHERNET® signals 458 and DC power 466 areconveyed by the cable 460 from the powerline-to-Ethernet adapter 450 tothe alarm sensor 108. FIG. 22 illustrates the alarm sensor 108 as anInternet Protocol digital camera 110 that captures the video data(illustrated as reference numeral 420 in FIGS. 19-21). FIG. 22, though,may be utilized for any sensor 108. The sensor 108 also has acorresponding RJ-56 female modular jack 468 that accepts a male RJ-56plug 470 of an opposite end of the cable 460. The RJ-56 female modularjack 468 thus receives both the ETHERNET® signals 458 and the DCelectrical power 466 conveyed by the wires in the cable 460. The twowires conveying the DC power 466 are connected to terminals andcircuitry that electrically powers the Internet Protocol digital camera110, while the wires delivering the ETHERNET® signals 458 are connectedto terminals and an ETHERNET® interface 472.

FIG. 23 further illustrates the powerline-to-Ethernet adapter 450. Theexisting electrical wiring 480 provides AC electrical power to theelectrical outlets 456 throughout the home or business. The customer'sgateway/modem 208 may have a conventional male plug 482 that insertsinto a first receptacle of the electrical outlet 456 to receive ACelectrical power. The powerline-to-Ethernet adapter 450 may also pluginto a second receptacle of the electrical outlet 456. The ETHERNET®signals 458 are conventionally conveyed over a conventional cable 484 tothe customer's gateway/modem 208, while AC electrical power is suppliedover a conventional electrical cord to the gateway/modem 208. Here,then, the customer's gateway/modem 208 may be conventionally installedto receive both the ETHERNET® signals 458 and AC electrical power fromthe electrical outlet 456.

FIGS. 23 and 24, though, further illustrate the powerline-to-Ethernetadapter 450. The powerline-to-Ethernet adapter 450 may be utilized byeither the alarm controller 106 and/or the alarm sensor 108 (such as theInternet Protocol digital camera 110). The powerline-to-Ethernet adapter450, for example, may provide both the ETHERNET® signals 458 and the DCelectrical power 466 to the alarm controller 106. Anotherpowerline-to-Ethernet adapter 450 may provide both the ETHERNET® signals458 and the DC electrical power 466 to the Internet Protocol digitalcamera 110. Some wires in the cable 460 convey the DC electrical power466, while other wires in the cable 460 convey the ETHERNET® signals 458(as the above paragraphs explained).

Exemplary embodiments may thus utilize any of the HOMEPLUG®specifications. HOMEPLUG® is one common power line communicationsspecification for networking over existing home electrical wiring.Because the HOMEPLUG® specifications are known, no detailed explanationis necessary.

FIG. 25 is a schematic illustrating an external antenna 490, accordingto exemplary embodiments. As earlier paragraphs explained, the home orbusiness security system 100 sends and receives using the access pointname 120 associated with the private, wireless cellular networkconnection 124 to the private data network 104. Sometimes, though, thealarm controller 106 is installed, mounted, or located in an area of thehome or business that lacks adequate wireless reception or coverage. Abasement or closet, for example, may have inadequate signal strength toreliably communicate. The security system 100, then, may interface withthe external antenna 490. The external antenna 490 may be mounted in anattic or on a roof to improve wireless reception to the private datanetwork 104. A coaxial cable 492 may connect the external antenna 490 tothe wireless transceiver 122 and/or to the alarm controller 106.

FIG. 26 is a schematic illustrating payment for emergency summons,according to exemplary embodiments. As this disclosure has explained,one of the primary functions of the agent 136 is to verify alarms trulyare emergency situations. Because most alarms are inadvertentlytriggered, local police and fire departments waste time and resourcesresponding to false alarms. Some municipalities impose fees for eachunnecessary dispatch. The agent 136, then, first tries to ascertain atrue emergency exists before summoning emergency services. The agent 136may call the alarm controller 106 to speak with an occupant, and thecentral monitoring station (“CMS”) server 132 may send the alarmnotification 226 to friends, family members, and any other authorizednetwork address 220 (as earlier paragraphs explained).

Sometimes, though, verification is unsuccessful. The agent 136 may callthe alarm controller 106, but no occupant answers. Even though the alarmnotification 226 is sent to friends and family, no response may bereceived. In these situations, then, the agent 136 may immediatelysummons emergency services. If the alarm turns out to be a trueemergency, then the customer has benefited from the emergency service.If, however, the alarm is false, then emergency personnel have beenunnecessarily summoned and financial charges may be imposed.

FIG. 26 thus illustrates a payment scheme. When the alarm is false, anelectronic debit 502 is sent. FIG. 26 illustrates a municipality server500 sending the electronic debit 502 to the central monitoring stationserver 132 in the central monitoring station 102. The electronic debit502, though, may optionally be generated by the central monitoringstation server 132. The electronic debit 502 may thus be imposed by amunicipal government and/or by the server-side security application 172.Regardless, the electronic debit 502 may include the customerinformation 224 (e.g. name, address, and/or other identifier) associatedwith a subscriber to emergency services. The server-side securityapplication 172 queries the account database 134 for the customerinformation 224, and the subscriber database 506 returns accountinformation 508 associated with the customer information 224. Theaccount information 508 may be an account number of a savings orchecking account. The account information 508 may additionally oralternatively be a credit card number. Regardless, when the alarm isfalse, the subscriber has pre-approved debits from, or charges to, theaccount information 508 for fees imposed for false summons.

FIG. 27 is a schematic illustrating an access portal 510, according toexemplary embodiments. All communication with the alarm controller 106may require authentication in the access portal 510. Authentication maybe accomplished by providing a valid user name and password. Allcommunication towards the security system 100 may pass through theaccess portal 510 and then communicate over a secure socket layer (SSL)connection to a customer's home or business. When the customer is awayand wishes to access the video data 420 (from any cameras 110), thecustomer may first authenticate to the access portal 510. If thecustomer successfully authenticates, the customer's request flows overthe secure socket layer (SSL) connection. Likewise, when the agent 126in the central monitoring center 102 wants to access the camera 110 inthe home, the agent 126 may first be authenticated by the access portal510. The access portal 510 may thus provide a much higher level ofsecurity compared to having authentication occur in the alarm controller106.

FIG. 28 is a schematic further illustrating the takeover module 320,according to exemplary embodiments. The takeover module 320 allowsexemplary embodiments to be retrofitted to one or more existing wiredsensors and/or wire contacts. As earlier paragraphs explained,conventional security systems have long used wired contacts and sensorsto detect security events. Because these existing wired components maystill adequately function for basic security services, the takeovermodule 320 provides an interface to existing wired keypads, sirens, andsensors in older installations. An existing controller may be removed,and the existing circuits may be interfaced to the takeover module 320.The takeover module 320 thus permits older security systems to beup-fitted without incurring substantial installation costs.

Exemplary embodiments thus describe professionally-monitored securityservices. The alarm controller 106 may have many standard and optionalmodules, such as:

-   -   3G Cellular Data Module (GPRS, EDGE, UMTS and HSPA+SMS);    -   24 Hour Battery Backup (Standard)    -   433/900 MHz Proprietary Wireless Transceiver Module;    -   DECT Base Station Module;    -   Takeover Module (Wired Window/Door Contacts, Keypad and Siren        Interface); and    -   Internal/External Hard Drive.        The alarm controller 106 may be wall mounted in a closet,        utility room or basement and preferably adjacent to an AC power        outlet. An external cabinet may be molded from plastic for        rugged, yet durable, use. The cabinet may be equipped with a        securely latched main cabinet door and may be equipped with a        backup battery compartment that the customer can access to        replace the battery without opening the main cabinet door. The        cabinet will support the remote installation of the external        3G/LTE/4G Cellular Data Antenna 490 when there is insufficient        signal strength at the location of the cabinet. The cabinet will        be equipped with a tamper switch that triggers an alarm if        someone attempts to remove the cabinet from the wall when the        system is armed or when the main door or battery compartment        door is opened.

FIGS. 29-33 are schematics further illustrating the alarm controller106, according to exemplary embodiments. FIG. 30 illustrates exteriorfeatures of the alarm controller 106, while FIG. 31 illustrates interiorcomponents of the alarm controller 106. FIG. 32 illustrates a logicaltable of indicators that are visible on a front of the security cabinet,while FIG. 33 lists external sensors, contacts, and other components.

FIGS. 34-36 are schematics further illustrating the alarm controller106, according to exemplary embodiments. FIG. 34 illustrates thewireless transceiver 122, while FIG. 35 further illustrates the battery274. FIG. 36 illustrates an optional hard drive.

The alarm controller 106 is installed and placed in a “wireless/wireddevice discovery” mode. The wired and wireless sensors 108 to bediscovered, such as window contacts, door contacts, motion detectors,keypads, sirens, smoke/CO detectors and IP cameras, are each placed inthe “discoverable” mode. The alarm controller 106 causes the wirelesstransceiver 122 to broadcast a device discovery request. Each sensor 108receives the device discovery request and responds. As each sensor 108is discovered, the sensor 108 is registered with the alarm controller106. After all of the wireless and wired sensors 108 have beendiscovered, the alarm controller 106 is taken out of the “wireless/wireddevice discovery” mode. After device discovery has been completed, acomplete record of all of the registered devices is stored in the memoryof the alarm controller 106, and a copy of the record is automaticallysent to a central repository (such as the central monitoring stationserver 132) and stored with the customer's account.

FIGS. 37-42 are schematics further illustrating verification of alarms,according to exemplary embodiments. FIG. 37 illustrates a routing schemefor the Voice-over Internet Protocol call 140 to the alarm controller106. FIG. 38 illustrates the base station 202 and the portable units200. FIG. 39 illustrates communications paths available to the alarmcontroller 106, while FIG. 40 illustrates a table of operating modes andcommunications paths. FIG. 41 is a detailed schematic of the wirelesscellular network connection 124, while FIG. 42 illustrates alarmhandling and reporting.

FIGS. 43-44 are more schematics illustrating security services,according to exemplary embodiments. FIG. 43 illustrates remote access,while FIG. 44 illustrates a general network architecture.

Exemplary embodiments may be applied regardless of networkingenvironment. The private data network 104 may be a cable networkoperating in the radio-frequency domain and/or the Internet Protocol(IP) domain. The data network 104 may include coaxial cables, copperwires, fiber optic lines, and/or hybrid-coaxial lines. The data network104 may also include wireless portions utilizing any portion of theelectromagnetic spectrum and any signaling standard, as previousparagraphs explained. The concepts described herein may be applied toany wireless/wireline communications network, regardless of physicalcomponentry, physical configuration, or communications standard(s).

FIG. 45 is a schematic illustrating still more exemplary embodiments.FIG. 45 is a generic block diagram illustrating the client-side securityapplication 152 and/or the server-side security application 172 mayoperate within a processor-controlled device 600. The client-sidesecurity application 152 and/or the server-side security application 172may be stored in a memory subsystem of the processor-controlled device600. One or more processors communicate with the memory subsystem andexecute the client-side security application 152 and/or the server-sidesecurity application 172. Because the processor-controlled device 600illustrated in FIG. 45 is well-known to those of ordinary skill in theart, no detailed explanation is needed.

Exemplary embodiments may be physically embodied on or in acomputer-readable storage medium. This computer-readable medium mayinclude a hard drive, USB drive, CD-ROM, DVD, tape, cassette, floppydisk, memory card, and large-capacity disks. This computer-readablemedium, or media, could be distributed to end-subscribers, licensees,and assignees. A computer program product comprises a computer readablemedium storing processor-executable instructions for alerting of alarmsfrom security systems.

While the exemplary embodiments have been described with respect tovarious features, aspects, and embodiments, those skilled and unskilledin the art will recognize the exemplary embodiments are not so limited.Other variations, modifications, and alternative embodiments may be madewithout departing from the spirit and scope of the exemplaryembodiments.

1. A system, comprising: a hardware processor; and a memory device, thememory device storing instructions, the instructions when executedcausing the hardware processor to perform operations, the operationscomprising: receiving a message specifying an open circuit detected by acomponent of a security system; identifying a camera that is associatedwith the open circuit; retrieving video data of the open circuitgenerated by the camera; and sending the video data to a destination toalert of the open circuit.
 2. The system of claim 1, wherein theoperations further comprise querying the camera to retrieve the videodata.
 3. The system of claim 1, wherein the operations further compriseinstructing the camera to generate the video data.
 4. The system ofclaim 1, wherein the operations further comprise determining an addressassociated with the camera.
 5. The system of claim 1, wherein theoperations further comprise determining a destination address associatedwith the destination.
 6. The system of claim 1, wherein the operationsfurther comprise determining an alarm condition based on the opencircuit.
 7. The system of claim 1, wherein the operations furthercomprise determining an alarm condition based on the video data.
 8. Amethod of video surveillance, comprising: receiving, by a controllerassociated with a security system, a message specifying an open circuit;identifying, by the controller, a camera that is associated with theopen circuit; retrieving, by the controller, video data of the opencircuit generated by the camera; and sending, by the controller, thevideo data to a destination to alert of the open circuit.
 9. The methodof claim 9, further comprising querying the camera to retrieve the videodata.
 10. The method of claim 9, further comprising instructing thecamera to generate the video data.
 11. The method of claim 9, furthercomprising determining an address associated with the camera.
 12. Themethod of claim 9, further comprising determining a destination addressassociated with the destination.
 13. The method of claim 9, furthercomprising determining an alarm condition based on the open circuit. 14.The method of claim 9, further comprising determining an alarm conditionbased on the video data.
 15. A memory device storing instructions thatwhen executed cause a hardware processor to perform operations, theoperations comprising: receiving a message specifying an open circuitdetected by a component of a security system; identifying a camera thatis associated with the open circuit; retrieving video data of the opencircuit generated by the camera; and sending the video data to adestination to alert of the open circuit.
 16. The memory device of claim15, wherein the operations further comprise querying the camera toretrieve the video data.
 17. The memory device of claim 15, wherein theoperations further comprise instructing the camera to generate the videodata.
 18. The memory device of claim 15, wherein the operations furthercomprise determining an address associated with the camera.
 19. Thememory device of claim 15, wherein the operations further comprisedetermining a destination address associated with the destination. 20.The memory device of claim 15, wherein the operations further comprisedetermining an alarm condition based on the open circuit.