Interactive control of alarm systems by telephone interface using an intermediate gateway

ABSTRACT

An interface for interactive control of alarm systems using an intermediate gateway. A request for access to an account for interactive alarm system control is received from a remote device by an intermediate gateway. The request for access from the remote device is authenticated by the intermediate gateway based on an authentication parameter. After authenticating, the intermediate gateway identifies an alarm system and attributes of the alarm system associated with the request for access. Here, for example, the intermediate gateway identifies the operating characteristics for remote access to the alarm system. Further, the interactive gateway may receive a prompt from the remote device. Based on the prompt, the intermediate gateway may communicate with the alarm system according to its identified attributes and in response to the prompt, to query or update at least one setting of the alarm system.

CROSS-REFERENCE TO RELATED APPLICATION

This application is a continuation of U.S. patent application Ser. No.13/456,662, filed Apr. 26, 2012, which claims the benefit of U.S.Provisional Application No. 61/479,605, filed Apr. 27, 2011. The entirecontents of U.S. patent application Ser. No. 13/456,662 and U.S.Provisional Patent Application No. 61/479,605 are hereby incorporatedherein by reference.

TECHNICAL FIELD

The present invention generally relates to a system, apparatus, andmethod for interactive control of alarm systems using an intermediategateway and, particularly, to interactive control of alarm systems usingan intermediate gateway that provides a common interface between variousremote devices and alarm systems.

BACKGROUND

Various alarm systems have been manufactured and placed into service atmany locations for some time. Other than detecting fire and break-inevents, many alarm systems include additional functionalities. Forexample, some alarm systems include remote access features, permittingadditional flexibility in operation. These alarm systems that includeremote access features generally permit a user to establish a connectionto the alarm system over a telephone line, enter a password or PINnumber to gain access to the settings and status of the alarm system,and accept commands to change settings of the alarm system.

However, the remote access protocols and procedures vary from alarmsystem to alarm system, especially for alarm systems manufactured bydifferent manufacturers. Thus, the method for establishing a remoteaccess connection to one alarm system may not be useful for establishinga remote access connection to another alarm system. These differencesgenerally inhibit the adoption and use of remote access, because noremote access standard protocol is available.

Additionally, the protocols and procedures for establishing a remoteaccess connection to an alarm system and instructing the alarm system toupdate settings and provide status information may appear relativelycumbersome and/or difficult for users. For example, the procedure mayinclude several steps that must be performed in a certain order, requirecertain communications equipment such as modems, and require theknowledge of particular access and command codes. These requirementsalso generally inhibit the adoption and use of remote access, becausethe protocols and procedures for establishing remote access may appearrelatively difficult or confusing to users.

The embodiments described herein are directed to addressing the problemsdiscussed above by providing a common interface between various remotedevices and alarm systems.

SUMMARY OF THE INVENTION

In certain exemplary embodiments, methods for interactive control ofalarm systems are described. The methods may include receiving a requestfor access to an account for interactive alarm system control from aremote device. The remote device may include a smart-phone, computer,tablet computing device, or any other computing device, for example.After receiving the request for access, the methods described herein mayfurther include authenticating the request for access from the remotedevice based on an authentication parameter. In various embodiments, theauthentication parameter may include information uniquely identifyingand associating a user with an account for interactive control of analarm system.

After authenticating, the methods described herein may further includeidentifying an alarm system and attributes of the alarm systemassociated with the request for access. Here, for example, theintermediate gateway identifies the operating characteristics for remoteaccess to the alarm system. In other aspects, the methods may includereceiving a prompt from the remote device. Based on the prompt, themethods may further include communicating with the alarm systemaccording to its identified attributes and in response to the prompt, toquery or update at least one setting of the alarm system.

In other aspects and embodiments, the methods described herein mayinclude establishing an account for interactive alarm system control.For example, establishing an account for interactive alarm systemcontrol may include receiving a model identifier of the alarm system. Incertain aspects, the identifier of the alarm system is used to determinethe operating characteristics of the alarm system for remote access,with reference to one or more databases. The methods for establishing anaccount for interactive alarm system control may further includeretrieving operating characteristics of the alarm system based on themodel identifier of the alarm system, and associating the operatingcharacteristics of the alarm system to the account for interactive alarmsystem control. In further aspects, the methods may include receiving acommunications address and an access code of the alarm system andassociating the communications address and the access code of the alarmsystem to the account for interactive alarm system control.

In still other embodiments, a gateway for interactive control of alarmsystems is described. In certain exemplary embodiments, the gatewayincludes a communications module and at least one processor. Thecommunications module may be configured to receive, from a remotedevice, a request for access to an account for interactive alarm systemcontrol. Further, the communications module may further receive a promptassociated with an alarm system, wherein the prompt includes one of aquery and a command.

In certain other aspects, the processor may be configured toauthenticate the request for access from the remote device based on anauthentication parameter. After the authentication, the processor may befurther configured to identify the alarm system and attributes of thealarm system associated with the request for access. Here, for example,the intermediate gateway identifies the operating characteristics forremote access to the alarm system. In still other aspects of thegateway, the processor of the gateway may be further configured todirect the communications module to communicate with the alarm systemaccording to the identified attributes of the alarm system and inresponse to the prompt, to query or update at least one setting of thealarm system

These and other aspects, objects, features, and embodiments will becomeapparent to a person of ordinary skill in the art upon consideration ofthe following detailed description of illustrative embodimentsexemplifying the best mode as presently perceived.

BRIEF DESCRIPTION OF THE DRAWINGS

For a more complete understanding of the invention and the advantagesthereof, reference is now made to the following description, inconjunction with the accompanying figures briefly described as follows:

FIG. 1 illustrates a representative example of remote devicesinterfacing with an alarm system;

FIG. 2 illustrates an example embodiment of a system for interactivecontrol of an alarm system;

FIG. 3A illustrates an example embodiment of a method for interactivecontrol of an alarm system;

FIG. 3B further illustrates an example embodiment of a method forinteractive control of an alarm system;

FIG. 4 illustrates an example embodiment of a method for establishing anaccount for interactive alarm system control; and

FIG. 5 illustrates a general purpose computer according to certainaspects of the embodiments described herein.

The figures illustrate only exemplary embodiments and are therefore notto be considered limiting of scope, as other equally effectiveembodiments are within the scope and spirit of this disclosure.

DETAILED DESCRIPTION

In the following paragraphs, the present invention will be described infurther detail by way of example with reference to the attacheddrawings. In the description, well known components, methods, and/orprocessing techniques are omitted or briefly described so as not toobscure the invention. As used herein, the “present invention” refers toany one of the embodiments of the invention described herein and anyequivalents. Furthermore, reference to various feature(s) of the“present invention” is not to suggest that all embodiments must includethe referenced feature(s).

Among embodiments, some aspects of the present invention may beimplemented by a computer program executed by one or more processors, asdescribed and illustrated. As would be apparent to one having ordinaryskill in the art, the present invention may be implemented, at least inpart, by computer-readable instructions in various forms, and thepresent invention is not intended to be limited to a particular set orsequence of instructions executed by the processor.

Turning now to the drawings, in which like numerals indicate like, butnot necessarily the same, elements throughout, exemplary embodiments ofthe invention are described in detail. FIG. 1 illustrates arepresentative example of remote devices 110 interfacing with an alarmsystem 100. In FIG. 1, each of the remote devices 110 are able tocommunicate with the alarm system 100 via a communications network suchas the public switched telephone network (PSTN) 130 or the packet-baseddata network 140, for example. As illustrated, the remote devices 110may include a conventional telephone 112, a cellular or wirelesstelephone 114, or a computer 116, for example, among other devices.

The alarm system 100 includes an alarm subsystem 102, an alarm panel104, and a communications module 106. The alarm subsystem 102 includesone or more sensors for detecting various types of alarm events and oneor more sirens, among other components, for example. The alarm panel 104comprises a display illustrating a current status of the alarm system100 and a keypad including buttons and/or other controls to configurethe alarm system 100, for example. Among other aspects, thecommunications module 106 is configured to accept an incoming call overthe PSTN 130 and allow the entry of a personal identification number(PIN) or other access code to gain entry to the settings of the alarmsystem 100. In this context, when the alarm system 100 is connected tothe PSTN to receive calls at a particular telephone number, a user maydial the telephone number via the PSTN 130 using the telephone 112 andbe connected to the alarm system 100. In turn, the communication module106 is configured to answer the call and, based on the entry ofidentification information such as a PIN, permit access to certainsettings of the alarm system 100.

Alternatively, a user may dial the telephone number of the alarm system100 using the cellular or wireless telephone 114 via the wireless tower118 and the PSTN 130 and be connected to the alarm system 100. In turn,the communication module 106 is configured to answer the call and permitaccess to certain settings of the alarm system 100 based on the entry ofidentification information. In other cases, the telephone 112 may beinterfaced with the data network 140 by the telephone adapters 152 and154, to permit the telephone 112 to communicate with the alarm system100 via the data network 140. Generally, the telephone adapters 152 and154 include circuitry and associated firmware and/or software forinterfacing a standard analog voice-band telephone with a VoIP network.In other words, the telephone adapters 152 and 154, in certain aspects,provide an interface similar to that of the PSTN for both the telephone112 and the alarm system 100, allowing the telephone 112 and thecommunications module 106 to be communicatively coupled over thepacket-based data network 140.

It is noted that the communications module 106, in various embodiments,may be configured to receive commands according to dual-tonemulti-frequency (DTMF) tones generated based on a user's keystrokes on adial pad of the telephone 112 or the cellular phone 114. Alternatively,the communications module 106 may be configured to receive commandsaccording to modulated tones generated and communicated using a modem.For example, the communications module 106 may be configured toestablish a connection using a standard modulation protocol of a modemsuch as the Bell 103 or 212A standards, or the V.21, V.22, V.23, V.29,V.32, V.32bis, V.34, or later standards or equivalents known in the art.Particularly, in situations where the communications module 106 isconfigured to receive commands according to modulation tones generatedby a modem, the computer 116 includes a modem for establishing aconnection to the alarm system 106 via the PSTN 130 and generating andcommunicating the tones.

Thus, a person with the proper access rights may call the alarm system100 and update its settings or query its status, for flexible operationof the alarm system 100 from remote locations. However, because alarmsystems similar to the alarm system 100 have been manufactured byvarious different manufacturers over many years, the protocols,procedures, sequences, commands, and settings for remote access to thealarm systems may differ among manufacturers and even among variousdifferent models of alarm systems from the same manufacturer. Further,certain protocols and connection requirements may be difficult for usersto understand or remember. In other words, although an alarm system maypermit remote access to settings and status information, it may bedifficult for a user to remember the method of accessing, updating, andquerying the alarm system. For example, the alarm system 100 may requirea different sequence of DTMF tones for each of the following commands:arm, disarm, abort, and cancel. Further, the alarm system 100 mayrequire those commands be entered at a particular time or according to aparticular sequence. Thus, it may be difficult for a user to rememberevery sequence of commands for updating the settings of an alarm system.As such, users may be less likely to use the remote access features ofthe alarm system 100, especially if they perceive the features to bedifficult or confusing to use.

In the context of the discussion above, new ways to remotely access thealarm system 100, especially those that leverage emerging technologies,would be desirable. For example, as new communications technologies suchas cellular telephones that offer full-featured web browsers becomerelatively widespread, users may expect new systems for remote access toalarm system 100.

Turning to FIG. 2, a system 20 for interactive control of an alarmsystem according to an exemplary embodiment is described. Asillustrated, the system 20 includes one or more remote devices 210, anintermediate processing gateway (IPG) 220, and an alarm system 200. Theremote devices 210 and the IPG 220 are communicatively coupled via thedata network 240. The IPG 220 and the alarm system 200 arecommunicatively coupled via the PSTN 230 in one embodiment. In analternative embodiment, the IPG 220 is communicatively coupled to thealarm system 200 via a combination of the data network 240 and atelephone adapter 252. When used in combination with the telephoneadapter 252, the data network 240 provides a communications path betweenthe IPG 220 and the alarm system 200 that appears as, at least to thealarm system 200, a connection over the PSTN.

In FIG. 2, a cellular phone 214 and a computer 216 are provided asexamples of the remote devices 210. It is noted that the cellular phone214 may comprise any type of cellular phone including a “smart-phone”that receives and transmits data over the packet-based data network 240via the wireless or cellular tower 218. In certain aspects, the cellularphone 214 may permit users to access websites, e-mail, and otherservices over the packet-based data network 240. The computer 216 maycomprise any type of computing device such as a desktop computer, alaptop computer, a tablet computer, or any other computing devicesuitable for communicating data over the packet-based data network 240.As generally used herein, a “remote device” comprises any computingdevice capable of providing access to websites, e-mail, and otherservices over the packet-based data network 240, without limitation.

Among various embodiments, the data network 240 comprises a packet-basedprivate, public, or combination of private and public networksincluding, for example, the Internet. In certain embodiments, the datanetwork 240 includes elements of wireless networks, such as the wirelessor cellular tower 218. The PSTN 230 generally comprises the publicswitched telephone network, as understood by those having skill in theart.

The alarm system 200 comprises an alarm subsystem 202, an alarm panel204, and a communications module 206. The alarm subsystem 202 includesone or more sensors for detecting various types of alarm events, such asfire, burglary, or medical emergency. As a non-limiting example subsetof sensors for detecting fires and burglaries, the alarm subsystem 202may include wired and/or wireless magnetic window and door sensors,glass-break sensors, infra-red sensors, motion sensors, smoke detectors,and carbon monoxide sensors. The alarm subsystem 202 may furthercomprise one or more sirens, speakers, and microphones for sounding analarm, capturing sounds within a premises at which the alarm system 200is installed, and amplifying a voice of an agent as described in furtherdetail below.

The alarm panel 204 comprises a display illustrating a current status ofthe alarm system 200 and a keypad including buttons and/or othercontrols to configure the alarm system 200, for example. A user of thealarm system 200 is able to determine a current status of the alarmsystem 200 by viewing the display of the alarm panel 204. The user isalso able to call for fire, police, and medical emergency personnelusing the keypad of the alarm panel 204. The alarm system 200 furthercomprises other wiring and associated circuitry necessary for alarmsystems as understood by those having ordinary skill in the art. Invarious embodiments and implementations of the system 20, the alarmsystem 200 may be installed at any location including a home or officebuilding.

The communications module 206 comprises circuitry and associatedfirmware and/or software for establishing data and/or voice channelswith other communications modules via the PSTN 230. Although thecommunications module 206 is illustrated in FIG. 2 as beingcommunicatively coupled to both the PSTN 230 and the data network 240(via the intermediate telephone adapter 252), in practice, thecommunications module 206 would generally be coupled to one of the PSTN230 or the data network 240 alternatively.

In various embodiments, the communications module 206 comprisescircuitry and associated firmware and/or software layers for a PSTNinterface to establish communications via the PSTN 230 using one or moreindustry standard protocols. In embodiments where the alarm system 200establishes communications over the data network 240, the telephoneadapter 252 is provided as an interface to the data network 240 thatmimics, in certain aspects, the PSTN 230, as discussed in further detailbelow. In operational aspects, the communications module 206 isconfigured to establish data and/or voice channels using one or moreindustry standard communications protocols and communications links. Thecommunications module 206 may be configured to communicate over the PSTN230 using various signaling techniques and protocols such as DTMF ormodulated data signaling, for example. In certain embodiments, thecommunications module 206 may be configured to communicate using astandard modulation protocol of a modem such as the Bell 103 or 212Astandards, or the V.21, V.22, V.23, V.29, V.32, V.32bis, V.34, or laterstandards or equivalents known in the art.

In operational aspects of the alarm system 200, the alarm system 200 isconfigured to detect an alarm event using one or more of the sensors ofthe alarm subsystem 202 or the alarm panel 204, and communicateassociated alarm event data to a central alarm monitoring system orservice. In one embodiment, the alarm system 200 may communicate alarmevent data to the central alarm monitoring system or service in thealarm industry standard Contact ID format.

According to additional “remote access” operational aspects, the alarmsystem 200 is further configured to answer a call received over the PSTN230 or the data network 240 and, based on the entry of identification orsecurity information, permit access to certain settings of the alarmsystem 200, as described in further detail below.

In embodiments where the alarm system 200 is installed to establishcommunications over the data network 240, the telephone adapter 252 isprovided as an interface to the data network 240. As such, in certainembodiments, the telephone adapter 252 comprises circuitry andassociated firmware and/or software configured to interface standardtelephone calls over VoIP networks. For example, the telephone adapter252 may include a packet-based data port, such as an RJ45 Ethernet port,and a voice-band telephone port, such as an RJ11 telephone port, forexample. The RJ11 telephone port provides a port for communicativelycoupling the telephone adapter 252 and the alarm system 200. The RJ45telephone port provides a port for communicatively coupling thetelephone adapter 252 to the data network 240. In other embodiments, thetelephone adapter 252 may include other ports necessary forcommunicatively coupling the alarm system 200 and the data network 240.In embodiments where the telephone adapter 252 is installed within ahome or office building along with the alarm system 200, the telephoneadapter 252 may be connected to the data network 240 via one or moreintermediate network modems, routers, and switches, as would beunderstood in the art. Among other aspects, the telephone adapter 252 isconfigured to open a communications channel between the alarm system 200and the IPG 220 based on a call initiated by the IPG 220, as discussedin further detail below.

Turning to the IPG 220, IPG 220 includes, but is not limited to, acommunications module 222, a processor 223, a memory 226, and dialers227, 228, and 229. The communications module 222 is configured tocommunicate with the remote devices 210 and the alarm system 200 via thedata network 240. When communicating with the alarm system 200 via thedata network 240, the communications module 222 may rely on thetelephone adapter 252 as noted above. In certain embodiments, thedialers 227, 228, and 229 include circuitry and associated firmwareand/or software to communicate with the alarm system 200 via the PSTNusing one or more of DTMF tones and modulated signaling of a Bell 103 or212A standard modem. In various embodiments, the IPG 220 may includeadditional or fewer dialers.

The processor 223 comprises a general purpose processor that directs andcoordinates the operations and functions of the IPG 220, as described infurther detail below. As such, the processor 223 may direct andcoordinate the actions and processes of the communications module 222and the dialers 227, 228, and 229, among other components of the IPG220, for example. In certain embodiments, the processor 223 may executeprogram instructions stored on the memory 226, directing the processor223 to perform certain processes described in further detail below. Thememory 226 comprises one or more computer-readable storage devices thatstore computer-executable program code as well as data related to alarmsystems, interactive alarm system control accounts, and other associateddata. Among the other associated data, the memory 226 may store dataassociated with the hardware and software configuration of the alarmsystem 200 and various other alarm systems, including manufacturer makesand models and remote access protocol information, for example.

In overall operation of the system 20, a remote device 210 communicateswith the IPG 220 to access an account for interactive alarm systemcontrol. Particularly, using a remote device 210, a user is able tointerface with the IPG 220 and establish an account for interactivecontrol of an alarm system such as the alarm system 200. In thiscontext, the IPG 220 establishes and provides accounts for interactivealarm system control for various different alarm systems and users. Eachof the users may interface with IPG 220 using any remote device 210, andthe IPG 220 provides a generally common interface for remote access toalarm systems, for relatively simple and flexible access to the settingsand/or status of the alarm systems.

To provide an interface for access to an account for interactive alarmsystem control, the processor 223 includes an engine 224 and a host 225.The engine 224 is configured to dynamically generate one or moreelectronic documents for rendering by a remote device 210, based upon arequest for access to an account for interactive alarm system control.For example, in certain embodiments and aspects, when a user accesses anaccount for interactive control of the alarm system 200 using a remotedevice 210, the engine 224 dynamically generates a web page or similardocument representative of certain operating characteristics andsettings of the alarm system 200, for a rendering by the remote device.Further, based on prompts, queries, and commands entered by the user atthe remote device 210 and communications between the IPG 220 and thealarm system 200, the engine 224 dynamically updates the web page forrendering by the remote device 210. The host 225 is configured to servethe pages generated by the engine 224 to the remote device 210. It isnoted that the pages generated by the engine 224 conform to a commoninterface, even for alarm systems that adhere to different operatingcharacteristics for remote access. Further it is noted that the pagesgenerated by the engine 224 generally include simple instructions andlayouts to aide users in determining the available commands and settingsavailable to any given alarm system for remote access. In this manner,the user is able to remotely access the alarm system 200 to update itssettings and query its status, using a relatively simple, intuitive, andunderstandable interface. In one example embodiment, the IPG 220 may beaccessed by any remote device 210 using a standard hypertext transferprotocol browser, as understood in the art.

When establishing an account for interactive alarm system control, theprocessor 223 is configured to query a user for authenticationinformation such as a user name and password to uniquely identify theuser for access to the account. Thus, when connecting to the IPG 220 andproviding a request for access to the account, the IPG 220 mayauthenticate the request for access from the remote device 210 based onthe authentication parameters determined during the establishment of theaccount. The authentication parameters thus serve to uniquely identify auser with his account. Further, when establishing the account forinteractive alarm system control, the processor 223 is configured toquery a user for a model number or other identifier of an alarm systemto be associated with the account. For example, when establishing anaccount for interactive alarm system control for the alarm system 200, auser may provide the IPG 220 with an identifying model number, serialnumber, or other manufacturer model number of the alarm system 200, forexample. Any information used to particularly identify the model of thealarm system 200 maybe provided by the user. In certain embodiments, theIPG 220 may provide the user with a list of alarm systems, so that theuser's device may be selected among a list of known supported alarmsystems.

After obtaining the information that uniquely identifies the alarmsystem 200, the intermediate processing gateway 220 accesses the memory226 to ascertain the characteristics and attributes of the alarm system200. For example, the characteristics and attributes may include themeans and protocols relied upon by the alarm system 200 for remoteaccess. In other words, via access to a database of known alarm systemsstored in the memory 226, the IPG 220 ascertains whether the alarmsystem 200 is remotely accessed using DTMF tones or modulated signalingof a Bell 103 or 212A standard modem. Because alarm systems manufacturedby different manufacturers are generally remotely accessed usingdifferent command sets and/or sequences and timings of commands, the IPG220 ascertains the particular operating characteristics for remoteaccess to any identified alarm system via access to the memory 226.

In certain embodiments, the IPG 220 may access a third-party memory 260to access operating characteristics of alarm systems not stored in thememory 226. In exemplary embodiments, the IPG 220 is able to retrievethe operating characteristics of any known alarm system via access toone or more databases among the memory 226 and/or the third-party memory260. Once the operating characteristics of the alarm system 200 havebeen retrieved from the memory 226, the operating characteristics areassociated to the account for interactive alarm system control. Whenestablishing the accounts for interactive alarm system control, the IPG220 may be further configured to receive a communications address andaccess code of the alarm system 200. Particularly, the IPG 220 may querythe user for a communications address, such as a telephone number, atwhich the alarm system 200 maybe called to remotely access the alarmsystem 200. Additionally, IPG 220 may query the user for an access code,PIN, or other information required to access the alarm system 200. Inturn, the IPG 220 is configured to associate the communications addressand the access code of the alarm system 200 to the account forinteractive alarm system control.

Incorporating the operating characteristics, the communications address,and access code of the alarm system 200, the IPG 220 creates a newaccount for interactive alarm system control for the alarm system 200.Further, as noted above, using the operating characteristics,communications address, and/or access code of the alarm system 200, IPG220 is configured to determine the appropriate manner in which toremotely access the alarm system 200. For example, based upon theidentified operating characteristics of the alarm system 200, the IPG220 is configured to determine whether remote access to the alarm system200 is achieved by DTMF tones or modulated signaling of a Bell 103 or212A standard modem, as discussed above. Further, in certaincircumstances, the IPG 220 is able to identify whether the alarm system200 is remotely accessed via the PSTN 230 or via the data network 240and the telephone adapter 252. These characteristics for remote accessare attributed to the account for interactive alarm system control andare relied upon by the IPG 220 when the user later contacts the IPG 220for access to the account.

It is noted that the user that establishes the account does not need tobe aware of any unique characteristics of the alarm system 200, such theoperating characteristics for remote access to the alarm system 200.Instead, the user is able to establish the account for interactive alarmsystem control with only identifying information that uniquelyidentifies the alarm system 200. In turn, the IPG 220 stores, in thememory 226, the operating characteristics for various different types ofalarms systems and retrieves the operating characteristics of the alarmsystem identified by the user for association with the account forinteractive alarm system control, when account is established.

After an account for interactive alarm system control is established bythe IPG 220, the user may use any remote device 210 to communicate withthe IPG 220 and send a request for access to the account. Upon thereceipt of a request for access to an account for interactive controlfrom a user of a remote device 210, the host 225 of the IPG 220 isconfigured to serve a web page, electronic document, text message,interactive voice response message, or other similar means to the remotedevice 210. The remote device 210 is configured to render the page anddisplay an interface to the user requesting access. For example, upon aninitial request for access, the host 225 may serve a page with fieldsrequesting a user name and password for access to an account. Uponproviding the user name and password, for example, or otherauthentication parameters from the remote device 210, the information iscommunicated or submitted to the IPG 220 for authentication. In turn,the IPG 220 is configured to determine whether authentication parametersare valid for the user and/or the account of the user. If not, theengine 224 and the host 225 generate and serve to the remote device 210a page indicating that the authentication parameters are invalid.Alternatively, if the authentication parameters are valid for an accountfor alarm system control, the engine 224 and the host 225 generate andserve to the remote device 210 a page providing further access to theaccount. In this manner, the IPG 220 authenticates the request foraccess from the remote device 210 based on the received authenticationparameters.

While the remote devices 210 may interface and communicate with the IPG220 using a standard hypertext transfer protocol browser in certainaspects and embodiments, the remote devices 210 may further interfaceand communicate with the IPG 220 using text messages or an interactivevoice response system. For example, the IPG 220 may be configured torely on text messaging or interactive voice response systems to receiverequests for interactive alarm system control. As other examples, theIPG 220 may query an alarm system for its current state and send thecurrent state to a remote device 210 via text message. Additionally, theIPG 220 may forward a confirmation of an update of certain settings ofthe alarm system to a remote device 210 via text message.

After authenticating the request for access, the engine 224 and host 225are configured to generate and service additional pages to the remotedevice 210 for rendering. The pages may provide an overall interface forthe account for interactive alarm system control. Using the interface,the user is able to identify the system status of the alarm system 200,for example, and other aspects of the current operating characteristicsof the alarm system 200. In certain aspects, according to the pagesrendered from the IPG 220, the user is able to identify whether thealarm system 200 is currently armed or disarmed, has triggered into analarm condition, or has encountered an error condition.

Using various entry fields and/or buttons provided on the pages renderedfrom IPG 220, as would be understood by one having ordinary skill in theart, a user may submit one or more prompts or instructions to the IPG220 for remote access and control of the alarm system 200.

For example, the user may submit a prompt for a query of the currentstatus of the alarm system 200 to the IPG 220. In turn, the IPG 220 isconfigured to receive the prompt, determine the appropriate remoteaccess and/or control command for a status query based on the operatingcharacteristics of the alarm system 200, and communicate with the alarmsystem 200 to query the alarm system 200 for its current status. Basedon the appropriate query to the alarm system 200 from the IPG 220, thealarm system 200 provides IPG 220 with its current status. Afterreceiving this current status information from the alarm system 200, theengine 224 and the host 225 are configured to parse the current statusinformation, generate an updated page based on the information, andserve the updated page to the remote device 210 for rendering. Thus, theremote device 210 is able to render the updated page to provide the userwith the status of the alarm system 200.

It should be appreciated that, based on the interface provided by theIPG 220, the user of the account for interactive alarm system control ofthe alarm system 200 does not need to understand the particularoperating characteristics or parameters of the alarm system 200.Instead, the user is able to easily view and understand the displayrendered based on the pages generated and served by the IPG 220. Incertain aspects, the IPG 220 may provide a similar interface format foreach account for interactive alarm system control, regardless of thetype of alarm system associated with the account. For example, a usermay establish and access multiple accounts for interactive alarm systemcontrol associated with different alarm systems, each being associatedwith different types of alarm systems (i.e., different manufacturers,models, etc.). However, each account for interactive alarm systemcontrol, when accessed by the user, may display a similar interfacelayout including a helpful description of available options, entryfields, and buttons for remote access, regardless of the fact that theoperating characteristics for remote access are different for differenttypes of alarm systems.

In other aspects, the user of the account for interactive alarm systemcontrol may use the remote device 210 to submit a command to control orupdate the current settings or status of the alarm system 200. Forexample, using the interface for interactive alarm system controlprovided by the IPG 220, the user may press one or more buttons, entercommands into one or more fields, or select one or more options to senda command to the alarm system 200 via the IPG 220. In turn, the IPG 220is configured to receive the command, determine the appropriate remoteaccess and/or control instructions for the command based on theoperating characteristics of the alarm system 200, and communicates withthe alarm system 200 to instruct the alarm system 200 to perform thecommand. For example, depending upon the available remote accesscommands, the instructions may include an instruction to arm, disarm,bypass a zone, un-bypass a zone, abort, or cancel, among others, forexample. Based on the command, the alarm system 200 is configured toremotely update at least one of its settings.

In certain aspects and embodiments, after the alarm system 200 remotelyupdates its settings, a confirmation of the updated settings iscommunicated by the alarm system 200 to the IPG 220. After receivingthis confirmation from the alarm system 200, the engine 224 and the host225 are configured to parse the confirmation, generate an updated pagebased on the confirmation, and serve the updated page to the remotedevice 210 for rendering. Thus, the remote device 210 is able to renderthe updated page to provide the user with an indication that thesettings of the alarm system 200 have been updated.

In view of the description above, it should become apparent that theinterfaces provided by the IPG 220 provide users with a simple means toremotely access and interact with alarm systems without the necessity tounderstand the nuances of the operating characteristics of the systems.Further, the interfaces provided by the IPG 220 provide flexibility inthat they may be accessed by various types of remote devices 210 atvarious locations. It is additionally noted that, rather than beingrequired to understand and adhere to the remote access protocols of analarm system, a user of an account for remote access provided by the IPG220 is able to query the status of the alarm system with a minimalnumber of steps. Similarly, the user is able to update settings of thealarm system with a minimal number of steps. For example, rather thancalling the alarm system, hanging up after one ring, waiting tenseconds, calling the alarm system again, waiting for the alarm system toanswer, waiting for a modem connection to be established or waiting foranother audible prompt, entering an access code, listening for promptsand/or tones that designate an appropriate timing for commandsubmission, submitting a command, and waiting for a confirmation of anupdate of settings associated with the command, using the IPG 220, auser can simply access his account for interactive remote access andpress a button for submitting the command. In turn, the IPG 220 performsall the necessary steps and generates an updated interface or otherresponse for the user, indicating that the command was received by thealarm system and that the alarm system updated its settings.

Also, the IPG 220 is configured to generate and update user interfacesquickly. Especially for alarm systems that rely on modulated signalingof a Bell 103 or 212A standard modem for remote access, communicationsbetween the IPG 220 and the alarm systems may require merely a coupleseconds after call answer. As opposed to alarm systems configured toallow remote access using DTMF tones generated based on a user'skeystrokes on a dial pad, alarm systems that rely on modulated signalingof a Bell 103 or 212A standard modem, for example, cannot be accessedwith only a standard telephone handset, wired or wireless. For thesetypes of alarm systems, the IPG 220 provides users with a simple meansto remotely access and interact with the systems which may not otherwisebe readily available. Moreover, in certain exemplary aspects, the IPG220 is configured to establish a communications channel with an alarmsystem via a PSTN interface of the alarm system rather than via a datainterface of the alarm system. That is, the IPG 220, using one of thedialers 227, 228, and 229, is configured to communicate with an alarmsystem over a standard PSTN connection. Because more alarm systems exist(especially legacy alarm system) with PSTN interfaces rather than datainterfaces, the IPG 220 is able to communicate with a greater number andwider array of different alarm systems.

Before turning to the process flow diagrams of FIGS. 3A, 3B, and 4, itis noted that the present invention may be practiced using analternative order of the steps illustrated in FIGS. 3A, 3B, and 4. Thatis, the process flows illustrated in FIGS. 3A, 3B, and 4 are provided asexamples only, and the present invention may be practiced using processflows that differ from those illustrated. Additionally, it is noted thatnot all steps are required in every embodiment. In other words, one ormore of the steps may be omitted or replaced, without departing from thespirit and scope of the invention. In alternative embodiments, steps maybe performed in different orders, in parallel with one another, oromitted entirely, and/or certain additional steps may be performedwithout departing from the scope and spirit of the invention.

Turning to FIG. 3A, an exemplary embodiment of a method 300 forinteractive control of an alarm system is described. Although the method300 is generally described with reference to the system 20 and the IPG220, other systems and similar processing gateways and/or computingdevices may be used to perform the process flow illustrated according tothe method 300. Beginning at step 310, the method 300 includes receivinga request for access to an account for interactive alarm system controlfrom a remote device. With reference to the system 20 of FIG. 2, therequest for access may be received by one of the remote devices 214 or216, for example. Proceeding to step 312, the method 300 furtherincludes authenticating a request for access from the remote devicebased on an authentication parameter. For example, as discussed above,before the IPG 220 provides access to the account for interactive alarmsystem control, a user is generally required to provide anauthentication parameter, which may include a username and a password,to the IPG 220 for authentication of the user and the request foraccess. The IPG 220, after receiving the authentication parameter fromthe user, is configured to authenticate the request for access based onthe parameter.

After authenticating at step 312, the process proceeds to step 314,which includes identifying an alarm system and attributes of the alarmsystem associated with the request for access. For example, the IPG 220may identify the alarm system 200 as being associated with the requestfor access based on the authentication parameter. Additionally, similarto the attributes of the alarm system 200, the operating characteristicsof the alarm system are identified at step 314. As noted above, thealarm system 200 and operating characteristics of the alarm system 200were associated with the account for interactive control when theaccount was established. In certain exemplary embodiments, thisinformation is stored in the memory 226 for retrieval when a request foraccess is received.

Proceeding to step 316, the method 300 further includes receiving aprompt associated with the alarm system from the remote device, theprompt comprising one of a query and a command. For example, after auser is provided access to the account for interactive alarm systemcontrol, the user is able to send prompts to query or command the alarmsystem. Further, at step 318, the method 300 includes determiningwhether the prompt received from the remote device is a query or acommand. As discussed above, when receiving a prompt for control, theIPG 220 is configured to receive the prompt, determine the appropriateremote access query or instruction command for the prompt based on theoperating characteristics of the alarm system, and communicate with thealarm system to instruct the alarm system to perform the query orcommand. Thus, as part of the determination as to the appropriate query,instruction, or command for the alarm system based on a received prompt,at step 318, the IPG 220 determines whether the received prompt is aquery or a command, so that, the appropriate query, instruction, orcommand may be determined based on the operating characteristics of thealarm system.

Referring now to FIG. 3B, when the prompt comprises a query, the method300 proceeds to step 320, which includes identifying a current state ofthe alarm system. For example, with reference again to FIG. 2, the IPG220 may communicate with the alarm system 200 via the PSTN interfacecommunications module 206 of the alarm system to query the alarm system200 for its current status. A part of this query, the IPG 220 may firstprovide an access code to the alarm system 200, to gain access to theremote access features of the alarm system 200. As noted above, theaccess code may be retrieved and stored in association with the accountfor remote access when the account is established. At step 322, themethod 300 includes forwarding the current status of the alarm system tothe remote device. Here, after receiving a query for the current statusof the alarm system 200, the alarm system 200 may provide its currentstatus to the IPG 220. In turn, the engine 224 and the host 225 of theIPG 220 are configured to parse the current status information, generatean updated page based on the information, and serve the updated page tothe remote device 210 for rendering.

Proceeding to step 328, the method 300 further includes determiningwhether a new prompt is received. In this step, for example, the IPG 220awaits for any further communications from the remote devices 210 and,particularly, awaits for any further queries or commands from the remotedevices 210. If a new prompt is received at step 328, the method 300proceeds back to step 318 where it is determined whether the prompt is aquery or a command.

Alternatively, when it is determined at step 318 that a received promptis a command, the process proceeds to step 324, illustrated in FIG. 3B,which includes updating the settings of the alarm system based on thecommand. At step 326, the method 300 includes forwarding a confirmationof the update to the remote device. With reference to the system 20 asan example, after determining that a received prompt is a command atstep 318, at step 324, the IPG 220 determines the appropriate remoteaccess and/or control instructions for the command based on theoperating characteristics of the alarm system 200, and communicates withthe alarm system 200 via a PSTN interface of the alarm system toinstruct the alarm system 200 to perform the command. A part of thisinstruction, the IPG 220 may first provide an access code to the alarmsystem 200, to gain access to the remote access features of the alarmsystem 200. As noted above, the access code may be retrieved and storedin association with the account for remote access when the account isestablished.

If, at step 328, it is determined that no new prompt has been received,the process proceeds to step 330, which includes determining whethercommunications with the remote device have been idle for greater than apredetermined time. That is, in certain embodiments, after a request foraccess to an account for remote access has been received andauthenticated, the authentication remains active for a predeterminedamount of time. During this predetermined amount of time, the IPG 220awaits for prompts for remote access. However, if the predetermined timelapses or, for example, if a connection to a remote device thatrequested access to the account is lost, the authentication isconsidered by the IPG 220 to be revoked until another authenticationoccurs. Thus, if a remote device is inactive on an account for greaterthan a predetermined time, the process proceeds to step 332, where themethod 300 ends.

Turning to FIG. 4, an example embodiment of a method 400 forestablishing an account for interactive alarm system control isdescribed. At step 402, the method 400 includes establishingauthentication parameters for the account. In other words, as oneexample of authentication parameters, a user provides a username and apassword. These parameters are associated with the account and storedfor future reference. At step 404, the method 400 includes receiving amodel identifier of the alarm system. As noted above, the modelidentifier may be an identifying model number, serial number, or othermanufacturer model number that identifies an alarm system to beassociated with the account. After the model of the alarm system isidentified, the method 400 proceeds to step 406, which includesretrieving operating characteristics of the identified alarm systembased on the model identifier of the alarm system received at step 404.

At step 408, the method 400 includes associating the operatingcharacteristics of the alarm system to the account for interactive alarmsystem control. Proceeding to step 410, the method 400 includesreceiving a communications address and an access code of the alarmsystem, and, at step 412, associating the communications address and theaccess code of the alarm system to the account for interactive alarmsystem control. Particularly, the communications address may comprise atelephone number at which the alarm system may be contacted, and theaccess code may comprise a PIN number that must be provided to the alarmsystem to gain access to its status and settings.

Turning to FIG. 5, an example hardware diagram of a general purposecomputer 500 is described. The IPG 220 may be implemented, in part,using one or more elements of the general purpose computer 500. Thecomputer 500 includes a processor 510, a Random Access Memory(“RAM”)/Read Only Memory (“ROM”) 520, a memory device 530, a PSTNinterface 540, a network interface 550, and an Input Output (“I/O”)interface 560. The elements of the computer 500 are communicativelycoupled via a bus 502.

The processor 510 comprises any well known general purpose arithmeticprocessor or Application Specific Integrated Circuit (“ASIC”). TheRAM/ROM 520 comprises any well known random access or read only memorydevice that stores computer-readable instructions to be executed by theprocessor 510. The memory device 530 stores computer-readableinstructions thereon that, when executed by the processor 510, directthe processor 510 to execute various aspects of the present inventiondescribed herein. When the processor 510 comprises an ASIC, theprocesses described herein may be executed by the ASIC according to anembedded circuitry design of the ASIC, by firmware of the ASIC, or bothan embedded circuitry design and firmware of the ASIC. As a non-limitingexample group, the memory device 530 comprises one or more of an opticaldisc, a magnetic disc, a semiconductor memory (i.e., a flash basedmemory), a magnetic tape memory, a removable memory, combinationsthereof, or any other known memory means for storing computer-readableinstructions. The PSTN interface 540 and the network interface 550comprise hardware interfaces to communicate over the PSTN and datanetworks, respectively. The I/O interface 560 comprises device input andoutput interfaces such as keyboard, pointing device, display,communication, and other interfaces. The bus 502 electrically andcommunicatively couples the processor 510, the RAM/ROM 520, the memorydevice 530, the PSTN interface 540, the network interface 550, and theI/O interface 560, so that data and instructions may be communicatedamong them. In operation, the processor 510 is configured to retrievecomputer-readable instructions stored on the memory device 540, theRAM/ROM 520, or another storage means, and copy the computer-readableinstructions to the RAM/ROM 520 for execution. The processor 510 isfurther configured to execute the computer-readable instructions toimplement various aspects and features of the present invention. Forexample, the processor 510 may be adapted and configured to execute theprocesses described above with reference to FIGS. 3A, 3B, and 4,including the processes described as being performed according to theconfiguration of the IPG 220.

Although embodiments have been described herein in detail, thedescriptions are by way of example. The features of the embodimentsdescribed herein are representative and, in alternative embodiments,certain features and elements may be added or omitted. Additionally,modifications to aspects of the embodiments described herein may be madeby those skilled in the art without departing from the spirit and scopeof the present invention defined in the following claims, the scope ofwhich are to be accorded the broadest interpretation so as to encompassmodifications and equivalent structures.

1. A method comprising the steps of: providing, at a gateway, aplurality of communication systems that use different protocols forremote control of a plurality of security systems served by the gateway;establishing a first communication channel between the gateway and acomputer device seeking remote control of a target security system inthe plurality of security systems; selecting, at the gateway, acommunication system in the plurality of communication systems based ondata about the target security system retrieved from a database; andusing the selected communication system to establish a secondcommunication channel between the gateway and the target securitysystem, so that the computer device can remotely control the targetsecurity system via the first and second communication channels.
 2. Themethod of claim 1, wherein the plurality of communication systemscomprise a plurality of dial-up modems configured for establishinganalog connections between the gateway and security systems that utilizemodem connections for remote control.
 3. The method of claim 1, whereinthe plurality of communication systems comprise an analog switchingcomponent configured for establishing analog switched connectionsbetween the gateway and security systems that utilize DTMF tones forremote control.
 4. The method of claim 1, wherein the plurality ofcommunication systems comprise an Internet connection configured forestablishing VoIP sessions between the gateway and security systems thatutilize VoIP communication for remote control.
 5. The method of claim 1,wherein the plurality of communication systems comprise: a firstcommunication system that comprises a dial-up modem configured forestablishing an analog connection between the gateway and a securitysystem that utilizes a modem connection for remote control; a secondcommunication system that comprises an analog switching componentconfigured for establishing an analog switched connection between thegateway and a security system that utilizes DTMF tones for remotecontrol; and a third communication system that comprises an Internetconnection configured for establishing a VoIP session between thegateway and a security system that utilizes VoIP communication forremote control.
 6. The method of claim 1, wherein the computing devicecomprises a browser-based user interface to the target security system.7. The method of claim 1, wherein the computing device comprises asmart-phone.
 8. The method of claim 1, wherein the first communicationchannel is one of a plurality of first communication channels betweenthe gateway and a respective plurality of computer devices, and whereinthe plurality of first communication devices comprise IP datacommunication connections over at least one wireless network.
 9. Agateway, comprising: a plurality of communication systems that usedifferent protocols for remote control of a plurality of securitysystems; an interface to a wireless network for establishing a firstcommunication channel with a computer device seeking remote control of atarget security system for the plurality of security systems; and amemory storage device storing instructions for execution by the gatewayto perform the steps of: selecting a communication system in theplurality of communication systems based on data about the targetsecurity system retrieved from a database; and using the selectedcommunication system to establish a second communication channel betweenthe gateway and the target security system, for remote control by thecomputer device using the first and second communication channels. 10.The gateway of claim 9, wherein the selected communication systemcomprises a dial-up modem configured for establishing an analogconnection between the gateway and the target security system.
 11. Thegateway of claim 9, wherein the selected communication system comprisesan analog switching component.
 12. The gateway of claim 9, wherein theselected communication system comprises an Internet connection interfaceconfigured for establishing a VoIP session between the gateway and thetarget security system.
 13. The gateway of claim 12, wherein the targetsecurity system utilizes a VoIP adapter for upgrading from analogcommunication to VoIP communication.
 14. A gateway comprising: adatabase storing remote control parameters for a plurality of securitysystems that are remote with respect to the gateway; an interface forcommunication between the gateway and a plurality of computer devicesthat are associated with the plurality of remote security systems, thatare remote with respect to the gateway, and that are remote with respectto the plurality of security systems; dial-up modems configured forestablishing analog connections between the gateway and security systemsthat utilize modem connections for remote control; an analog switchingfunction configured for establishing analog switched connections betweenthe gateway and security systems that utilize DTMF tones for remotecontrol; an Internet connection configured for establishing VoIPsessions between the gateway and security systems that utilize VoIPcommunication for remote control; and a memory storage device storinginstructions for execution by the gateway to select the Internetconnection, the analog switching function, or at least one of thedial-up modems based on the stored remote control specifications, toestablish a remote control connection between one of the computerdevices and one of the security systems.
 15. The gateway of claim 14,wherein the remote control connection between the one of the computerdevices and the one of the security systems comprises a communicationpath that extends through the gateway.
 16. The gateway of claim 14,wherein the plurality of computing devices comprise a plurality ofsmart-phones, and wherein at least one of the security systems thatutilize VoIP communication for remote control utilizes a VoIP adapterfor upgrading from analog communication to VoIP communication.
 17. Thegateway of claim 14, wherein the interface for communication between thegateway and the plurality of remote security systems is configured toestablish an IP data communication connection over a wireless network.18. The gateway of claim 14, wherein the interface for communicationbetween the gateway and the plurality of computer devices comprises anInternet connection.
 19. The gateway of claim 14, wherein the analogconnections between the gateway and security systems that utilize modemconnections for remote control comprise the PSTN, and wherein at leastone of the dial-up modems is configured for Bell 103 modem modulation.20. The gateway of claim 1, wherein the analog switched connectionsbetween the gateway and security systems that utilize DTMF tones forremote control comprise the PSTN.