Method of providing alarm based wireless security monitoring
First Claim
1. A method of providing alarm based security monitoring, said method comprising the steps of:
- obtaining a wireless transmitting, portable alarm system;
contacting a security monitoring company to procure security monitoring service;
providing said security monitoring company with subscription information to activate said security monitoring service;
transporting said portable alarm system to a space to be protected; and
connecting said portable alarm system to an appropriate power source;
wherein substantially no other steps are required to have a functioning, monitored alarm system.
1 Assignment
0 Petitions
Accused Products
Abstract
A method of providing simple, low-cost and effective alarm system protection. The method is especially useful in locations where the installation of a conventional, hard-wired alarm system would be impossible or economically impractical. The method utilizes a portable alarm system which incorporates wireless technology along with wireless transmission service, therefore providing the ability to protect virtually anything, anywhere, at any time. The present invention also provides for both automated and manned monitoring of the alarm location by a security monitoring company, which may be contacted at any time, from any location, at a single phone number or internet address, for example. The method of the present invention also utilizes a method of call retainment and multiple redundancy to ensure that any calls placed by the portable alarm system are received by the security monitoring company. Additionally, the present invention contemplates a method by which false alarms after initial set up of the alarm system may be reduced, and also a method which allows the user of the alarm system to abort known false alarms by contacting the security monitoring company.
111 Citations
70 Claims
-
1. A method of providing alarm based security monitoring, said method comprising the steps of:
-
obtaining a wireless transmitting, portable alarm system;
contacting a security monitoring company to procure security monitoring service;
providing said security monitoring company with subscription information to activate said security monitoring service;
transporting said portable alarm system to a space to be protected; and
connecting said portable alarm system to an appropriate power source;
wherein substantially no other steps are required to have a functioning, monitored alarm system. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14)
-
-
15. A method of providing alarm based security monitoring, said method comprising the steps of:
-
obtaining a wireless transmitting, portable alarm system, said portable alarm system having an alarm module and at least one mountable sensor;
transporting said portable alarm system into a space to be protected;
mounting said at least one remote sensor on at least one entry point into said space to be protected;
connecting said alarm module to an appropriate power source;
contacting a security monitoring company to procure security monitoring service; and
confirming initiation of said security monitoring service, wherein substantially no other steps are required to have a functioning, monitored alarm system. - View Dependent Claims (16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26)
-
-
27. A method of providing alarm based security monitoring, said method comprising the steps of:
-
obtaining a wireless portable alarm system capable of wireless transmission, said portable alarm system having a self-contained alarm module and at least one remote, wireless sensor;
supplying a provider of said portable alarm system with subscription information from a user of said portable alarm system, said provider thereafter contacting a security monitoring company and using said subscription information to establish security monitoring service for the benefit of said user;
transporting said portable alarm system to a space to be protected;
mounting said at least one sensor on at least one entry point into said space to be protected;
connecting said alarm module to an appropriate power source; and
confirming initiation of said security monitoring service, wherein substantially no other steps are required to have a functioning, monitored alarm system. - View Dependent Claims (28, 29, 30, 31, 32, 33, 34, 35, 36)
-
-
37. A method of providing alarm based security monitoring, said method comprising the steps of:
-
transmission of a signal from a portable alarm system in response to a security breach;
receipt of said signal by a gateway;
retention of said signal by said gateway; and
transmission of said signal by said gateway to a first security monitoring company facility;
wherein said gateway is adapted to retransmit said signal to said first security monitoring company facility if said gateway does not receive confirmation of signal receipt from said first security monitoring company facility, and wherein said gateway is further adapted to transmit said signal to an alternate security monitoring company facility after a predetermined number of unsuccessful attempts to transmit said signal to said first security monitoring company facility. - View Dependent Claims (38, 39, 40, 41, 42, 43, 44, 45)
-
-
46. A method of providing alarm based security monitoring, said method comprising the steps of:
-
transmission of a signal from a portable alarm system in response to a security breach;
receipt of said signal by a gateway;
identification by said gateway of said portable alarm system as the origin of said signal;
retention of said signal by said gateway based on said identification;
transmission of said signal by said gateway to a first security monitoring company facility;
retransmission of said signal to said first security monitoring company facility if said gateway does not receive confirmation of signal receipt from said first security monitoring company facility; and
transmission of said signal to an alternate security monitoring company facility after a predetermined number of unsuccessful attempts to transmit said signal to said first security monitoring company facility. - View Dependent Claims (47, 48, 49, 50, 51, 52, 53)
-
-
54. A method of providing alarm based security monitoring, said method comprising the steps of:
-
providing an alarm system, said alarm system comprising;
an enclosure;
a microprocessor secured within said enclosure;
a motion sensor in electrical communication with said microprocessor; and
a wireless communication device secured within said enclosure and in electrical communication with said microprocessor;
detecting a security breach via said motion sensor;
transmitting a wireless alarm signal from said wireless communication device to a remote location in response to detection of a security breach by said motion sensor; and
causing some action to occur in response to the receipt of said alarm signal at said remote location. - View Dependent Claims (55, 56, 57, 58, 59, 60, 61, 62, 63, 64, 65, 66, 67, 68, 69, 70)
-
Specification