US20210158684A1 - Systems and methods for activating monitoring of a security system by a central monitoring station - Google Patents

Systems and methods for activating monitoring of a security system by a central monitoring station Download PDF

Info

Publication number
US20210158684A1
US20210158684A1 US16/690,880 US201916690880A US2021158684A1 US 20210158684 A1 US20210158684 A1 US 20210158684A1 US 201916690880 A US201916690880 A US 201916690880A US 2021158684 A1 US2021158684 A1 US 2021158684A1
Authority
US
United States
Prior art keywords
communication path
control panel
monitoring station
central monitoring
alarm signal
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
US16/690,880
Other versions
US11024151B1 (en
Inventor
Philip Ferro
Jaimohan Ramachandran
Brian Kearns
Brett VANDENBUSSCHE
William R. Blum
Chandra Sekhar Ramamoorthi
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Ademco Inc
Original Assignee
Ademco Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Ademco Inc filed Critical Ademco Inc
Priority to US16/690,880 priority Critical patent/US11024151B1/en
Assigned to ADEMCO INC. reassignment ADEMCO INC. ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: FERRO, Philip, VANDENBUSSCHE, Brett, RAMACHANDRAN, JAIMOHAN, BLUM, WILLIAM R., KEARNS, BRIAN, RAMAMOORTHI, CHANDRA SEKHAR
Publication of US20210158684A1 publication Critical patent/US20210158684A1/en
Application granted granted Critical
Publication of US11024151B1 publication Critical patent/US11024151B1/en
Assigned to JPMORGAN CHASE BANK, N.A., AS ADMINISTRATIVE AGENT reassignment JPMORGAN CHASE BANK, N.A., AS ADMINISTRATIVE AGENT SECURITY INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: ADEMCO INC., BRK BRANDS, INC.
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/46Multiprogramming arrangements
    • G06F9/50Allocation of resources, e.g. of the central processing unit [CPU]
    • G06F9/5061Partitioning or combining of resources
    • G06F9/5072Grid computing
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/23Updating
    • G06F16/2379Updates performed during online database operations; commit processing
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/46Multiprogramming arrangements
    • G06F9/54Interprogram communication
    • G06F9/547Remote procedure calls [RPC]; Web services
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B25/00Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems
    • G08B25/004Alarm propagated along alternative communication path or using alternative communication medium according to a hierarchy of available ways to communicate, e.g. if Wi-Fi not available use GSM
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B29/00Checking or monitoring of signalling or alarm systems; Prevention or correction of operating errors, e.g. preventing unauthorised operation
    • G08B29/02Monitoring continuously signalling or alarm systems
    • G08B29/06Monitoring of the line circuits, e.g. signalling of line faults
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B29/00Checking or monitoring of signalling or alarm systems; Prevention or correction of operating errors, e.g. preventing unauthorised operation
    • G08B29/12Checking intermittently signalling or alarm systems
    • G08B29/123Checking intermittently signalling or alarm systems of line circuits

Definitions

  • the present invention relates generally to security systems. More particularly, the present invention relates to systems and methods for activating monitoring of a security system by a central monitoring station.
  • Known security systems can be configured to send alarm signals to a central monitoring station with assistance from a third party dealer and installer.
  • known security systems require the third party dealer and installer to establish a connection to the central monitoring station through a complex set up process that validates communication paths from sensors to control panels of the security systems and from the control panels to the central monitoring station.
  • known security systems cannot set up the connection to the central monitoring station without the third party dealer and installer.
  • FIG. 1 is a block diagram of a system in accordance with disclosed embodiments
  • FIG. 2 is a flow diagram of a method in accordance with disclosed embodiments.
  • FIG. 3 is a flow diagram of a method in accordance with disclosed embodiments.
  • Embodiments disclosed herein can include systems and methods for activating monitoring of a security system by a central monitoring station.
  • such systems and methods can separately validate a first communication path between a sensor of the security system and a control panel of the security system and a second communication path between the control panel and the central monitoring station.
  • decoupling validation of the first communication path and the second communication path in this manner can allow the security system to be initially set up to operate without monitoring by the central monitoring station and enable such monitoring at a later time.
  • the first communication path can include a local communication path within a secured area monitored by the security system and can include any known wired or wireless communication medium, such as Ethernet, Wi-Fi, Bluetooth, copper wire, etc.
  • the second communication path can include a remote communication path that originates inside of the secured area and extends outside of the secured area and can include any known wired or wireless communication medium, such as the Internet, a phone network, a cellular network, an SMS network, email, etc.
  • the control panel can validate operation of the sensor and the first communication path and, responsive thereto, generate a database entry that documents that the first communication path is valid and that the second communication path is unverified.
  • the control panel can validate the operation of the sensor and the first communication path responsive to receiving a sensor signal indicating that the sensor is tripped, for example, as part of setting up the security system.
  • the database entry can also include fields of identifying information, including, for example, an account number of the security system, a device key for the security system, an ID of the sensor, and a description of the sensor.
  • control panel can save the database entry in a database synchronized with a server, which, in some embodiments, can include a remote server, such as a cloud server. Additionally or alternatively, in some embodiments, the control panel can save the database entry in a memory of the control panel.
  • the control panel can simulate receipt of an alarm signal from the sensor and, responsive thereto, forward a simulated version of the alarm signal to the central monitoring station via the second communication path.
  • the control panel can simulate the receipt of the alarm signal by transmitting simulation instructions to the sensor and, responsive thereto, receiving the alarm signal from the sensor.
  • the API call can include an input parameter identifying the security system, including, but not limited to a location of the security system, the database entry, the sensor, or the control panel.
  • the cloud server or the control panel can provide formatting information for the API call to the central monitoring station, and in some embodiments, the API call can enable the central monitoring station to have limited access to the cloud server and/or the control panel.
  • control panel receives the API call directly from the central monitoring station
  • cloud server receives the API call from the central monitoring station
  • the central monitoring station can include a permanent facility and/or a mobile facility or device.
  • the cloud server can use the input parameter to identify the database entry and determine a status of the first communication path and the second communication path as identified in the database entry. Responsive to the cloud server determining that the database entry identifies the first communication path as valid and the second communication path as unverified, the cloud server can transmit an instruction signal to the control panel directing the control panel to simulate the receipt of the alarm signal from the sensor, and responsive to receiving the instruction signal, the control panel can simulate the receipt of the alarm signal.
  • the cloud server can transmit the instruction signal to the control panel to re-verify the second communication path.
  • the API call can include reverification instructions for such reverification, for example, when the second communication path has been disrupted.
  • the control panel can use the input parameter to retrieve the database entry and determine the status of the first communication path and the second communication path as identified in the database entry. Responsive to the control panel determining that the database entry identifies the first communication path as valid and the second communication path as unverified, the control panel can simulate the receipt of the alarm signal. Additionally or alternatively, responsive to the control panel determining that the database entry identifies the first communication path as valid and the second communication path as verified, the control panel can simulate the receipt of the alarm signal to re-verify the second communication path.
  • the API call can include the reverification instructions for such reverification, for example, when the second communication path has been disrupted.
  • the cloud server or the control panel can receive a confirmation signal from the central monitoring station indicating that the second communication path is valid and that the central monitoring station is ready to receive the alarm signal at future times to notify the control panel of the same.
  • the cloud server can forward the confirmation signal to the control panel.
  • the central monitoring station can confirm that the second communication path is valid and transmit the confirmation signal to the control panel, which, responsive thereto, can update the database entry to document that the second communication path is valid.
  • the control panel can forward the confirmation signal to the cloud server for updating the database entry.
  • the control panel can update the database entry in the memory to document that the second communication path is valid.
  • the central monitoring station can confirm that the second communication path is valid and transmit the confirmation signal to the cloud server, which, responsive thereto, can update the database entry to document that the second communication path is valid.
  • the cloud server can forward the confirmation signal to the control panel for updating the database entry.
  • control panel or the cloud server when the control panel or the cloud server fails to receive the confirmation signal from the cloud server or the central monitoring station within a predetermined period of time, the control panel or the cloud server can resend the simulated version of the alarm signal to the central monitoring station. However, if such a failure continues after a predetermined number of attempts to verify the second communication path, then the control panel and/or the cloud server can transmit a failure signal to a user device associated with the security system and/or to the control panel.
  • Notifying the control panel that the central monitoring station is ready to receive the alarm signal at future times can enable the control panel to report the receipt of the alarm signal to the central monitoring station when the alarm signal is not simulated.
  • the control panel can forward the real, non-simulated version the alarm signal to the central monitoring station via the second communication path.
  • the control panel can refrain from forwarding the real, non-simulated version of the alarm signal to the central monitoring station.
  • control panel can determine that the alarm signal is the real, non-simulated version of the alarm signal when the control panel receives the alarm signal from the sensor without receiving the instruction signal from the cloud server or the API call from the central monitoring station within a predetermined period of time prior thereto.
  • the control panel when the control panel receives the real, non-simulated version of the alarm signal, the control panel can retrieve and consult the database entry to determine whether to forward the real, non-simulated version of the alarm signal to the central monitoring station. For example, when the database entry indicates that the second communication path is valid, the control panel can forward the real, non-simulated version of the alarm signal to the central monitoring station via the second communication path. However, when the database entry indicates that the second communication path is unverified, the control panel can refrain from forwarding the real, non-simulated version of the alarm signal to the central monitoring station.
  • the control panel when the control panel refrains from forwarding the real, non-simulated version of the alarm signal to the central monitoring station, the control panel can initiate other security actions to protect a premises in which the security system is installed. For example, in some embodiments, the control panel can trigger local alert indicators, such as sirens or flashing lights, to deter a potential intruder and/or to alert neighbors about the potential intruder or other security breach that triggered the real, non-simulated version of the alarm signal. Additionally or alternatively, in some embodiments, the control panel can transmit an alert signal to the user device to notify a user about the potential intruder or other security breach that triggered the real, non-simulated version of the alarm signal.
  • local alert indicators such as sirens or flashing lights
  • the user device Upon receipt of the alert signal, the user device can monitor the premises and be used to determine whether the real, non-simulated alarm signal is valid and whether to alert local authorities without use of the central monitoring station. That is, when the control panel refrains from forwarding the real, non-simulated version of the alarm signal to the central monitoring station because the second communication path is unverified, the real, non-simulated version of the alarm signal can be processed locally without monitoring by the central station.
  • each of the sensor, the control panel, and the cloud server as disclosed herein can include a respective transceiver and a respective memory, each of which can be in communication with respective control circuitry, one or more respective programmable processors, and respective executable control software as would be understood by one of ordinary skill in the art.
  • the respective control software of each of the sensor, the control panel, and the cloud server can be stored on a respective transitory or non-transitory computer readable medium, including, but not limited to local computer memory, RAM, optical storage media, magnetic storage media, flash memory, and the like, and some or all of the respective control circuitry, the one or more respective programmable processors, and the respective control software of each of the sensor, the control panel, and the cloud server can execute and control at least some of the methods described herein.
  • FIG. 1 is a block diagram of a system 20 according to disclosed embodiments.
  • the system 20 can include a cloud server 22 , a security system 24 that monitors a secured area SA, and a central monitoring station 26 .
  • the security system 24 can include a control panel 28 and a sensor 30 , and in some embodiments, the control panel 28 can include a programmable processor 32 and a transceiver 34 for communicating with the sensor 30 , the cloud server 22 , and the central monitoring station 26 .
  • FIG. 2 is a flow diagram of a method 100 according to disclosed embodiments.
  • the method 100 can include the cloud server 22 receiving an API call from the central monitoring station 26 , as in 102 , wherein the API call can include an input parameter identifying the security system 24 .
  • the method 100 can include the cloud server 22 using the input parameter to identify a database entry associated with the security system 24 , as in 104 , and responsive to identifying the database entry, determining a status of a first communication path between the sensor 30 and the control panel 28 and a second communication path between the control panel 28 and the central monitoring station 26 as identified in the database entry, as in 106 .
  • the method 100 can include the cloud server 22 transmitting an instruction signal to the control panel 28 directing the control panel 28 to simulate receipt of an alarm signal from the sensor 30 , as in 108 . Responsive thereto, the control panel 28 can simulate the receipt of the alarm signal from the sensor 30 and forward a simulated version of the alarm signal to the central monitoring station 26 via the second communication path. Then, the method 100 can include the cloud server 22 receiving a confirmation signal from the central monitoring station 26 indicating that the second communication path is valid, as in 110 , and responsive thereto, updating the database entry to document that the second communication path is valid, as in 112 .
  • FIG. 3 is a flow diagram of a method 200 according to disclosed embodiments.
  • the method 200 can include the control panel 28 validating operation of the sensor 30 and the first communication path, as in 202 , and responsive thereto, generating the database entry, as in 204 .
  • the method 200 can include the control panel 28 receiving the API call from the central monitoring station 26 either directly or via the cloud server 22 , as in 205 A, or receiving the instruction signal from the cloud server 22 , as in 205 B.
  • the method 200 can include the control panel 28 identifying the database entry, as in 206 , and responsive thereto, determining the status of the first communication path and the second communication path as identified in the database entry, as in 207 .
  • the control panel 28 determines that the database entry identifies the first communication path as valid and the second communication path as unverified, as in 208 , or responsive to receiving the instruction signal, as in 205 B, the method 200 can include the control panel 28 simulating the receipt of the alarm signal from the sensor 30 , as in 209 , and responsive thereto, forwarding the simulated version of the alarm signal to the central monitoring station 26 via the second communication path, as in 210 , to determine and document whether the second communication path is valid.

Landscapes

  • Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Databases & Information Systems (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Emergency Management (AREA)
  • Business, Economics & Management (AREA)
  • Data Mining & Analysis (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Health & Medical Sciences (AREA)
  • Mathematical Physics (AREA)
  • Alarm Systems (AREA)

Abstract

Systems and methods for activating monitoring of a security system by a central monitoring station are provided. In particular, such systems and methods can include validating a first communication path between a sensor of the security system and a control panel of the security system to allow the security system to be initially set up to operate without monitoring by the central monitoring station and separately validating a second communication path between the control panel and the central monitoring station in response to the control panel or a cloud server receiving an API call from the central monitoring station to enable such monitoring at a later time.

Description

    FIELD
  • The present invention relates generally to security systems. More particularly, the present invention relates to systems and methods for activating monitoring of a security system by a central monitoring station.
  • BACKGROUND
  • Known security systems can be configured to send alarm signals to a central monitoring station with assistance from a third party dealer and installer. In particular, known security systems require the third party dealer and installer to establish a connection to the central monitoring station through a complex set up process that validates communication paths from sensors to control panels of the security systems and from the control panels to the central monitoring station. However, known security systems cannot set up the connection to the central monitoring station without the third party dealer and installer.
  • The drawbacks described above create problems for modern security systems in which users set up and install these security systems themselves, without employing the third party dealer and installer. In particular, the users must contact and employ the third party dealer and installer for the sole purpose of setting up the connection to the central monitoring station. Advantageously, removing this step would allow for more cost-effective security system installations, updates, and periodic system checks.
  • In view of the above, there is a need and an opportunity for improved systems and methods.
  • BRIEF DESCRIPTION OF THE DRAWINGS
  • FIG. 1 is a block diagram of a system in accordance with disclosed embodiments;
  • FIG. 2 is a flow diagram of a method in accordance with disclosed embodiments; and
  • FIG. 3 is a flow diagram of a method in accordance with disclosed embodiments.
  • DETAILED DESCRIPTION
  • While this invention is susceptible of an embodiment in many different forms, specific embodiments thereof will be described herein in detail with the understanding that the present disclosure is to be considered as an exemplification of the principles of the invention. It is not intended to limit the invention to the specific illustrated embodiments.
  • Embodiments disclosed herein can include systems and methods for activating monitoring of a security system by a central monitoring station. In particular, such systems and methods can separately validate a first communication path between a sensor of the security system and a control panel of the security system and a second communication path between the control panel and the central monitoring station. Advantageously, decoupling validation of the first communication path and the second communication path in this manner can allow the security system to be initially set up to operate without monitoring by the central monitoring station and enable such monitoring at a later time.
  • In some embodiments, the first communication path can include a local communication path within a secured area monitored by the security system and can include any known wired or wireless communication medium, such as Ethernet, Wi-Fi, Bluetooth, copper wire, etc. Additionally or alternatively, in some embodiments, the second communication path can include a remote communication path that originates inside of the secured area and extends outside of the secured area and can include any known wired or wireless communication medium, such as the Internet, a phone network, a cellular network, an SMS network, email, etc.
  • In operation, the control panel can validate operation of the sensor and the first communication path and, responsive thereto, generate a database entry that documents that the first communication path is valid and that the second communication path is unverified. For example, in some embodiments, the control panel can validate the operation of the sensor and the first communication path responsive to receiving a sensor signal indicating that the sensor is tripped, for example, as part of setting up the security system. In some embodiments, the database entry can also include fields of identifying information, including, for example, an account number of the security system, a device key for the security system, an ID of the sensor, and a description of the sensor. Regardless, the control panel can save the database entry in a database synchronized with a server, which, in some embodiments, can include a remote server, such as a cloud server. Additionally or alternatively, in some embodiments, the control panel can save the database entry in a memory of the control panel.
  • After generating the database entry and responsive to the control panel or the cloud server receiving an API call from the central monitoring station, the control panel can simulate receipt of an alarm signal from the sensor and, responsive thereto, forward a simulated version of the alarm signal to the central monitoring station via the second communication path. In some embodiments, the control panel can simulate the receipt of the alarm signal by transmitting simulation instructions to the sensor and, responsive thereto, receiving the alarm signal from the sensor.
  • In some embodiments, the API call can include an input parameter identifying the security system, including, but not limited to a location of the security system, the database entry, the sensor, or the control panel. Furthermore, in some embodiments, the cloud server or the control panel can provide formatting information for the API call to the central monitoring station, and in some embodiments, the API call can enable the central monitoring station to have limited access to the cloud server and/or the control panel.
  • As described above, embodiments in which the control panel receives the API call directly from the central monitoring station are contemplated, and embodiments in which the cloud server receives the API call from the central monitoring station are contemplated. It is to be understood that the central monitoring station can include a permanent facility and/or a mobile facility or device.
  • For example, in embodiments in which the cloud server receives the API call from the central monitoring station, the cloud server can use the input parameter to identify the database entry and determine a status of the first communication path and the second communication path as identified in the database entry. Responsive to the cloud server determining that the database entry identifies the first communication path as valid and the second communication path as unverified, the cloud server can transmit an instruction signal to the control panel directing the control panel to simulate the receipt of the alarm signal from the sensor, and responsive to receiving the instruction signal, the control panel can simulate the receipt of the alarm signal. Additionally or alternatively, responsive to the cloud server determining that the database entry identifies the first communication path as valid and the second communication path as verified, the cloud server can transmit the instruction signal to the control panel to re-verify the second communication path. In some embodiments, the API call can include reverification instructions for such reverification, for example, when the second communication path has been disrupted.
  • In embodiments in which the control panel receives the API call directly from the central monitoring station, the control panel can use the input parameter to retrieve the database entry and determine the status of the first communication path and the second communication path as identified in the database entry. Responsive to the control panel determining that the database entry identifies the first communication path as valid and the second communication path as unverified, the control panel can simulate the receipt of the alarm signal. Additionally or alternatively, responsive to the control panel determining that the database entry identifies the first communication path as valid and the second communication path as verified, the control panel can simulate the receipt of the alarm signal to re-verify the second communication path. In some embodiments, the API call can include the reverification instructions for such reverification, for example, when the second communication path has been disrupted.
  • In some embodiments, after the control panel forwards the simulated version of the alarm signal to the central monitoring station, the cloud server or the control panel can receive a confirmation signal from the central monitoring station indicating that the second communication path is valid and that the central monitoring station is ready to receive the alarm signal at future times to notify the control panel of the same. When the cloud server receives the confirmation signal from the central monitoring station, the cloud server can forward the confirmation signal to the control panel.
  • For example, in some embodiments, responsive to the control panel forwarding the simulated version of the alarm signal to the central monitoring station, the central monitoring station can confirm that the second communication path is valid and transmit the confirmation signal to the control panel, which, responsive thereto, can update the database entry to document that the second communication path is valid. In embodiments in which the database entry is stored on the database synced with the cloud server, the control panel can forward the confirmation signal to the cloud server for updating the database entry. However, in embodiments in which the database entry is saved in the memory of the control panel, the control panel can update the database entry in the memory to document that the second communication path is valid.
  • Additionally or alternatively, responsive to the control panel forwarding the simulated version of the alarm signal to the central monitoring station, the central monitoring station can confirm that the second communication path is valid and transmit the confirmation signal to the cloud server, which, responsive thereto, can update the database entry to document that the second communication path is valid. In embodiments in which the database entry is saved in the memory of the control panel, the cloud server can forward the confirmation signal to the control panel for updating the database entry.
  • In some embodiments, when the control panel or the cloud server fails to receive the confirmation signal from the cloud server or the central monitoring station within a predetermined period of time, the control panel or the cloud server can resend the simulated version of the alarm signal to the central monitoring station. However, if such a failure continues after a predetermined number of attempts to verify the second communication path, then the control panel and/or the cloud server can transmit a failure signal to a user device associated with the security system and/or to the control panel.
  • Notifying the control panel that the central monitoring station is ready to receive the alarm signal at future times can enable the control panel to report the receipt of the alarm signal to the central monitoring station when the alarm signal is not simulated. For example, when the alarm signal is real and not simulated and the control panel receives the real, non-simulated version of the alarm signal from the sensor after receiving the confirmation signal, the control panel can forward the real, non-simulated version the alarm signal to the central monitoring station via the second communication path. However, when the control panel receives the real, non-simulated version of the alarm signal from the sensor before receiving the confirmation signal, the control panel can refrain from forwarding the real, non-simulated version of the alarm signal to the central monitoring station. In some embodiments, the control panel can determine that the alarm signal is the real, non-simulated version of the alarm signal when the control panel receives the alarm signal from the sensor without receiving the instruction signal from the cloud server or the API call from the central monitoring station within a predetermined period of time prior thereto.
  • In some embodiments, when the control panel receives the real, non-simulated version of the alarm signal, the control panel can retrieve and consult the database entry to determine whether to forward the real, non-simulated version of the alarm signal to the central monitoring station. For example, when the database entry indicates that the second communication path is valid, the control panel can forward the real, non-simulated version of the alarm signal to the central monitoring station via the second communication path. However, when the database entry indicates that the second communication path is unverified, the control panel can refrain from forwarding the real, non-simulated version of the alarm signal to the central monitoring station.
  • In any embodiment, when the control panel refrains from forwarding the real, non-simulated version of the alarm signal to the central monitoring station, the control panel can initiate other security actions to protect a premises in which the security system is installed. For example, in some embodiments, the control panel can trigger local alert indicators, such as sirens or flashing lights, to deter a potential intruder and/or to alert neighbors about the potential intruder or other security breach that triggered the real, non-simulated version of the alarm signal. Additionally or alternatively, in some embodiments, the control panel can transmit an alert signal to the user device to notify a user about the potential intruder or other security breach that triggered the real, non-simulated version of the alarm signal. Upon receipt of the alert signal, the user device can monitor the premises and be used to determine whether the real, non-simulated alarm signal is valid and whether to alert local authorities without use of the central monitoring station. That is, when the control panel refrains from forwarding the real, non-simulated version of the alarm signal to the central monitoring station because the second communication path is unverified, the real, non-simulated version of the alarm signal can be processed locally without monitoring by the central station.
  • It is to be understood that each of the sensor, the control panel, and the cloud server as disclosed herein can include a respective transceiver and a respective memory, each of which can be in communication with respective control circuitry, one or more respective programmable processors, and respective executable control software as would be understood by one of ordinary skill in the art. In some embodiments, the respective control software of each of the sensor, the control panel, and the cloud server can be stored on a respective transitory or non-transitory computer readable medium, including, but not limited to local computer memory, RAM, optical storage media, magnetic storage media, flash memory, and the like, and some or all of the respective control circuitry, the one or more respective programmable processors, and the respective control software of each of the sensor, the control panel, and the cloud server can execute and control at least some of the methods described herein.
  • FIG. 1 is a block diagram of a system 20 according to disclosed embodiments. As seen in FIG. 1, in some embodiments, the system 20 can include a cloud server 22, a security system 24 that monitors a secured area SA, and a central monitoring station 26. As also seen in FIG. 1, in some embodiments, the security system 24 can include a control panel 28 and a sensor 30, and in some embodiments, the control panel 28 can include a programmable processor 32 and a transceiver 34 for communicating with the sensor 30, the cloud server 22, and the central monitoring station 26.
  • FIG. 2 is a flow diagram of a method 100 according to disclosed embodiments. As seen in FIG. 2, in some embodiments, the method 100 can include the cloud server 22 receiving an API call from the central monitoring station 26, as in 102, wherein the API call can include an input parameter identifying the security system 24. Responsive to receiving the API call, the method 100 can include the cloud server 22 using the input parameter to identify a database entry associated with the security system 24, as in 104, and responsive to identifying the database entry, determining a status of a first communication path between the sensor 30 and the control panel 28 and a second communication path between the control panel 28 and the central monitoring station 26 as identified in the database entry, as in 106. When the cloud server 22 determines that the database entry identifies the first communication path as valid and the second communication path as unverified, the method 100 can include the cloud server 22 transmitting an instruction signal to the control panel 28 directing the control panel 28 to simulate receipt of an alarm signal from the sensor 30, as in 108. Responsive thereto, the control panel 28 can simulate the receipt of the alarm signal from the sensor 30 and forward a simulated version of the alarm signal to the central monitoring station 26 via the second communication path. Then, the method 100 can include the cloud server 22 receiving a confirmation signal from the central monitoring station 26 indicating that the second communication path is valid, as in 110, and responsive thereto, updating the database entry to document that the second communication path is valid, as in 112.
  • FIG. 3 is a flow diagram of a method 200 according to disclosed embodiments. As seen in FIG. 3, in some embodiments, the method 200 can include the control panel 28 validating operation of the sensor 30 and the first communication path, as in 202, and responsive thereto, generating the database entry, as in 204. Then, the method 200 can include the control panel 28 receiving the API call from the central monitoring station 26 either directly or via the cloud server 22, as in 205A, or receiving the instruction signal from the cloud server 22, as in 205B. Responsive to receiving the API call, the method 200 can include the control panel 28 identifying the database entry, as in 206, and responsive thereto, determining the status of the first communication path and the second communication path as identified in the database entry, as in 207. When the control panel 28 determines that the database entry identifies the first communication path as valid and the second communication path as unverified, as in 208, or responsive to receiving the instruction signal, as in 205B, the method 200 can include the control panel 28 simulating the receipt of the alarm signal from the sensor 30, as in 209, and responsive thereto, forwarding the simulated version of the alarm signal to the central monitoring station 26 via the second communication path, as in 210, to determine and document whether the second communication path is valid.
  • Although a few embodiments have been described in detail above, other modifications are possible. For example, the logic flows described above do not require the particular order described or sequential order to achieve desirable results. Other steps may be provided, steps may be eliminated from the described flows, and other components may be added to or removed from the described systems. Other embodiments may be within the scope of the invention.
  • From the foregoing, it will be observed that numerous variations and modifications may be effected without departing from the spirit and scope of the invention. It is to be understood that no limitation with respect to the specific system or method described herein is intended or should be inferred. It is, of course, intended to cover all such modifications as fall within the spirit and scope of the invention.

Claims (20)

1. A method of activating monitoring of a security system by a central monitoring station using a cloud server, the method comprising:
receiving at the cloud server a call from the central monitoring station, the call including an input parameter identifying the security system;
using the input parameter to identify a database entry associated with the security system;
determining a status of a first communication path between a sensor of the security system and a control panel of the security system and a second communication path between the control panel and the central monitoring station as identified in the database entry;
responsive to determining that the database entry identifies the first communication path as valid and the second communication path as unverified, transmitting an instruction signal from the cloud server to the control panel directing the control panel to simulate receipt of an alarm signal from the sensor;
receiving at the cloud server a confirmation signal from the central monitoring station, the confirmation signal indicating that the second communication path is valid; and
updating the database entry to document that the second communication path is valid.
2. The method of claim 1 further comprising:
receiving at the cloud server a request for the database entry from the control panel; and
forwarding the database entry from the cloud server to the control panel.
3. The method of claim 1 further comprising:
responsive to receiving the confirmation signal, transmitting a notification signal from the cloud server to the control panel indicating that the second communication path is valid and that the central monitoring station is ready to receive the alarm signal at future times.
4. The method of claim 1 wherein the input parameter includes information identifying the database entry, the sensor, or the control panel.
5. A method of activating monitoring of a security system by a central monitoring station using a control panel, the method comprising:
validating operation of a sensor of the security system and a first communication path between the control panel and the sensor;
generating a database entry documenting that the first communication path is valid and that a second communication path between the control panel and the central monitoring station is unverified;
responsive to the control panel receiving an instruction signal from the central monitoring station directly or via a cloud server, simulating at the control panel receipt of an alarm signal from the sensor; and
forwarding a simulated version of the alarm signal from the control panel to the central monitoring station via the second communication path to determine and document whether the second communication path is valid.
6. The method of claim 5 further comprising:
receiving at the control panel the alarm signal from the sensor;
responsive to receiving the alarm signal, retrieving the database entry;
when the database entry indicates that the second communication path is valid, forwarding a non-simulated version of the alarm signal from the control panel to the central monitoring station via the second communication path; and
when the database entry indicates that the second communication path is unverified, refraining from forwarding the non-simulated version of the alarm signal to the central monitoring station.
7. The method of claim 5 further comprising:
responsive to forwarding the simulated version of the alarm signal to the central monitoring station, receiving at the control panel a notification signal indicating that the second communication path is valid and that the central monitoring station is ready to receive the alarm signal at future times;
when the control panel receives the alarm signal from the sensor after receiving the notification signal, forwarding a non-simulated version of the alarm signal from the control panel to the central monitoring station via the second communication path; and
when the control panel receives the alarm signal from the sensor before receiving the notification signal, refraining from forwarding the non-simulated version of the alarm signal to the central monitoring station.
8. The method of claim 5 further comprising:
receiving at the control panel a sensor signal indicating that the sensor is tripped; and
responsive to the control panel receiving the sensor signal, validating the operation of the sensor and the first communication path.
9. The method of claim 5 further comprising:
saving the database entry in a database synchronized with the cloud server.
10. The method of claim 9 further comprising:
responsive to forwarding the simulated version of the alarm signal to the central monitoring station, receiving at the control panel a confirmation signal from the central monitoring station indicating that the second communication path is valid; and
forwarding the confirmation signal from the control panel to the cloud server for updating the database entry to document that the second communication path is valid.
11. The method of claim 5 further comprising:
saving the database entry in a memory of the control panel.
12. The method of claim 11 further comprising:
receiving a call in the instruction signal, the call including an input parameter identifying the database entry, the sensor, or the control panel;
using the input parameter to retrieve the database entry and determine a status of the first communication path and the second communication path as identified in the database entry;
responsive to determining that the database entry identifies the first communication path as valid and the second communication path as unverified, simulating the receipt of the alarm signal from the sensor;
receiving at the control panel a confirmation signal from the central monitoring station indicating that the second communication path is valid; and
updating the database entry to document that the second communication path is valid.
13. The method of claim 5 further comprising:
simulating the receipt of the alarm signal by transmitting simulation instructions from the control panel to the sensor and, responsive thereto, receiving the alarm signal at the control panel from the sensor.
14. A control panel of a security system comprising:
a transceiver; and
a programmable processor coupled to the transceiver,
wherein the programmable processor validates operation of a sensor of the security system and a first communication path between the transceiver and the sensor,
wherein, responsive to the programmable processor validating the operation of the sensor and the first communication path, the programmable processor generates a database entry that documents that the first communication path is valid and that a second communication path between the transceiver and a central monitoring station is unverified,
wherein, responsive to the transceiver receiving an instruction signal from the central monitoring station directly or via a cloud server, the programmable processor simulates receipt of an alarm signal from the sensor, and
wherein, responsive to simulating the receipt of the alarm signal, the programmable processor forwards a simulated version of the alarm signal to the central monitoring station via the second communication path to determine and document whether the second communication path is valid.
15. The control panel of claim 14 wherein, responsive to the transceiver receiving the alarm signal from the sensor, the programmable processor retrieves the database entry, wherein, when the database entry indicates that the second communication path is valid, the programmable processor forwards a non-simulated version of the alarm signal to the central monitoring station via the second communication path, and wherein, when the database entry indicates that the second communication path is unverified, the programmable processor refrains from forwarding the non-simulated version of the alarm signal to the central monitoring station.
16. The control panel of claim 14 wherein, responsive to the programmable processor forwarding the non-simulated version of the alarm signal to the central monitoring station, the transceiver receives a notification signal indicating that the second communication path is valid and that the central monitoring station is ready to receive the alarm signal at future times, wherein, when the transceiver receives the alarm signal from the sensor after receiving the notification signal, the programmable processor forwards a non-simulated version of the alarm signal to the central monitoring station via the second communication path, and wherein, when the transceiver receives the alarm signal from the sensor before receiving the notification signal, the programmable processor refrains from forwarding the non-simulated version of the alarm signal to the central monitoring station.
17. The control panel of claim 14 wherein, responsive to generating the database entry, the programmable processor saves the database entry in a database synchronized with the cloud server, wherein, responsive to the programmable processor forwarding the simulated version of the alarm signal to the central monitoring station, the transceiver receives a confirmation signal from the central monitoring station indicating that the second communication path is valid, and wherein, responsive to the transceiver receiving the confirmation signal, the programmable processor forwards the confirmation signal to the cloud server for updating the database entry to document that the second communication path is valid.
18. The control panel of claim 14 further comprising:
a memory,
wherein, responsive to generating the database entry, the programmable processor saves the database entry in the memory.
19. The control panel of claim 18 wherein the instruction signal includes a call and an input parameter identifying the database entry, the sensor, or the control panel, wherein, the programmable processor uses the input parameter to retrieve the database entry and determine a status of the first communication path and the second communication path as identified in the database entry, wherein, responsive to determining that the database entry identifies the first communication path as valid and the second communication path as unverified, the programmable processor simulates the receipt of the alarm signal from the sensor, wherein, responsive to the programmable processor forwarding the simulated version of the alarm signal to the central monitoring station, the transceiver receives a confirmation signal from the central monitoring station indicating that the second communication path is valid, and wherein, responsive to receiving the confirmation signal, the programmable processor updates the database entry to document that the second communication path is valid.
20. The control panel of claim 14 wherein the programmable processor simulates the receipt of the alarm signal from the sensor by transmitting simulation instructions to the sensor and, responsive thereto, receiving the alarm signal from the sensor.
US16/690,880 2019-11-21 2019-11-21 Systems and methods for activating monitoring of a security system by a central monitoring station Active US11024151B1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
US16/690,880 US11024151B1 (en) 2019-11-21 2019-11-21 Systems and methods for activating monitoring of a security system by a central monitoring station

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
US16/690,880 US11024151B1 (en) 2019-11-21 2019-11-21 Systems and methods for activating monitoring of a security system by a central monitoring station

Publications (2)

Publication Number Publication Date
US20210158684A1 true US20210158684A1 (en) 2021-05-27
US11024151B1 US11024151B1 (en) 2021-06-01

Family

ID=75974390

Family Applications (1)

Application Number Title Priority Date Filing Date
US16/690,880 Active US11024151B1 (en) 2019-11-21 2019-11-21 Systems and methods for activating monitoring of a security system by a central monitoring station

Country Status (1)

Country Link
US (1) US11024151B1 (en)

Family Cites Families (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6288639B1 (en) * 1995-08-17 2001-09-11 Pittway Corporation Low power installation of wireless security system devices
US20170070361A1 (en) 2008-08-11 2017-03-09 Ken Sundermeyer Data model for home automation
US8228182B2 (en) * 2009-06-11 2012-07-24 Simplexgrinnell Lp Self-testing notification appliance
EP2666152B1 (en) * 2011-03-25 2015-04-29 Siemens Schweiz AG Automatically locating fire alarms
US9390616B2 (en) 2013-10-03 2016-07-12 Tyco Safety Products Canada Ltd. Method and apparatus for determining maintenance needs and validating the installation of an alarm system
US9437100B2 (en) * 2013-11-02 2016-09-06 Jeffrey D. Zwirn Supervising alarm notification devices
US10002507B2 (en) 2015-08-05 2018-06-19 Securenet Technologies Integrated security network

Also Published As

Publication number Publication date
US11024151B1 (en) 2021-06-01

Similar Documents

Publication Publication Date Title
US11334335B1 (en) Software updates from a security control unit
CN103680083B (en) Event is notified
US10255773B2 (en) Security system providing a localized humanly-perceivable alert for identifying a facility to emergency personnel
CA2919254C (en) User management of a response to a system alarm event
US10319206B2 (en) Identifying persons of interest using mobile device information
US10854064B1 (en) Security system with earthquake detection
US10127797B2 (en) Alternative inexpensive cloud-based mass market alarm system with alarm monitoring and reporting
CN103365260A (en) Hands-free home automation application
CN109102686B (en) System and method for preventing false alarms during alarm sensitivity threshold changes in fire alarm systems
US11776387B2 (en) Systems and methods for building and using a false alarm predicting model to determine whether to alert a user and/or relevant authorities about an alarm signal from a security system
US20190073895A1 (en) Alarm system
US10320914B1 (en) Remote monitoring of activity triggered sensors and a customized updating application
US11024151B1 (en) Systems and methods for activating monitoring of a security system by a central monitoring station
US10726689B1 (en) Systems and methods for leveraging internet-of-things devices in security systems
US20180365973A1 (en) Systems and methods for testing a security system
US11109181B2 (en) System and method for tracking chemical applications and providing warnings regarding chemical exposure times
KR102090692B1 (en) Apparatus for sensing damages in doorlock and window

Legal Events

Date Code Title Description
AS Assignment

Owner name: ADEMCO INC., MINNESOTA

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:FERRO, PHILIP;RAMACHANDRAN, JAIMOHAN;KEARNS, BRIAN;AND OTHERS;SIGNING DATES FROM 20191106 TO 20191115;REEL/FRAME:051078/0754

FEPP Fee payment procedure

Free format text: ENTITY STATUS SET TO UNDISCOUNTED (ORIGINAL EVENT CODE: BIG.); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY

STCF Information on status: patent grant

Free format text: PATENTED CASE

AS Assignment

Owner name: JPMORGAN CHASE BANK, N.A., AS ADMINISTRATIVE AGENT, NEW YORK

Free format text: SECURITY INTEREST;ASSIGNORS:BRK BRANDS, INC.;ADEMCO INC.;REEL/FRAME:059571/0686

Effective date: 20220401