REMOTE CONTROL OF A SECURITY SYSTEM USING TELEPHONE DEVICE
First Claim
1. A method of remotely managing at least one security system associated with a subscriber account comprising the steps of:
- a) receiving a telephone call from a telephone device;
b) authenticating a caller based on information entered by a caller;
c) retrieving a status for each of said at least one security system based upon said authenticating;
d) relaying said status for each of said at least one security system to the telephone device;
e) receiving a control instruction and control passcode from the telephone device for a selected one of said at least one security system;
f) transmitting the control instruction and control passcode to the selected security system; and
g) executing the control instruction.
4 Assignments
0 Petitions
Accused Products
Abstract
System and method for remotely controlling at least one local security system from a telephone device. The system includes a reception section for receiving a telephone call, a decoding section for decoding input from a caller and a controller for receiving the information and authenticating the caller based upon the detected information. The system also includes a voice server controlled by the controller for interfacing between the system and the caller. The voice server prompts the caller for information used to authenticate the caller, reports a status of each local security system and prompts the caller to select a particular local security system to control. Furthermore, the system includes a central database that contains subscriber information separated into subscriber records. The subscriber record includes at least one subscriber identifier authorized to control each local security system. The control instruction is transmitted to a selected local security system by a transmission section.
-
Citations
27 Claims
-
1. A method of remotely managing at least one security system associated with a subscriber account comprising the steps of:
-
a) receiving a telephone call from a telephone device; b) authenticating a caller based on information entered by a caller; c) retrieving a status for each of said at least one security system based upon said authenticating; d) relaying said status for each of said at least one security system to the telephone device; e) receiving a control instruction and control passcode from the telephone device for a selected one of said at least one security system; f) transmitting the control instruction and control passcode to the selected security system; and g) executing the control instruction. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 23, 24, 25, 26, 27)
-
-
17. A network operation center (NOC) comprising:
-
a reception section for receiving a telephone call from a caller, said caller intending to control at least one security system associated with a subscriber account; a decoding section for decoding input from a caller using a telephone device; a controller for receiving the decoded information and authenticating the caller based upon the detected information; a voice server controlled by the controller for interfacing between the NOC and the caller, the voice server prompting the caller for information used to authenticate the caller, reporting a status of each of said at least one security system and prompting the caller to select a particular security system to control and input a control instruction; a central database including subscriber information separated into subscriber records, the subscriber records including at least one subscriber identifier authorized to control each of said at least one security system, the subscriber record also including the status of each of said at least one security system, the voice server and control section are adopted to access the subscriber information from the central database; and a transmission section for transmitting a control instruction to a selected security system. - View Dependent Claims (18, 19, 20, 21, 22)
-
Specification