Integrated security and communications system with secure communications link
DCFirst Claim
1. A security system for monitoring user premises, said system comprising:
- at least one sensor;
at least one alarm output device;
at least one user control interface; and
a system controller connected to said sensor, said output device and said user control interface;
wherein;
at least one of said at least one user control interface is located at the user premises and is further connected to an external data network for at least one of (a) sending, and (b) receiving, data; and
said at least one user control interface allows a user at the user premises to interact with said system controller and said data.
5 Assignments
Litigations
0 Petitions
Reexaminations
Accused Products
Abstract
An integrated security and communications system combines a security system to either or both of a telephone system interface and a data interface. Users have access to voice-mail or other PBX-type telephone functions, many or all of which can be accessed not only at telephone sets, but also at keypads of the security system. Data functions such as electronic mail and possible partial or full World Wide Web access may also be provided at the keypads, as well as at connected personal computers or computer terminals. The system keypads may be enhanced to better accommodate some of the added functions. A central communications station could be used to maintain secure, shared private key encrypted communications with each premises system, using a redirector arrangement or relay to allow each premises system to communicate securely with a central monitoring station and with other systems. The secure communications system could be used without a security system to allow secure computer-to-computer communications.
246 Citations
117 Claims
-
1. A security system for monitoring user premises, said system comprising:
-
at least one sensor;
at least one alarm output device;
at least one user control interface; and
a system controller connected to said sensor, said output device and said user control interface;
wherein;
at least one of said at least one user control interface is located at the user premises and is further connected to an external data network for at least one of (a) sending, and (b) receiving, data; and
said at least one user control interface allows a user at the user premises to interact with said system controller and said data. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 29, 30, 31, 32, 33, 34, 35, 36, 37, 38, 39, 40, 41, 91)
-
2. The security system of claim 1 wherein said data comprise electronic mail.
-
3. The security system of claim 1 wherein said at least one user control interface:
-
is used by a user to enter commands affecting a state of said system, said system, when said state indicates that said system is active; and
monitors said at least one sensor and outputs an alarm on said alarm output device when said at least one sensor indicates that an alarm condition exists.
-
-
4. The security system of claim 3 wherein:
-
said data comprise electronic mail; and
access to said electronic mail is restricted based on said state of said system.
-
-
5. The security system of claim 4 wherein said electronic mail is accessible when said state is consistent with presence of an authorized user on said premises.
-
6. The security system of claim 5 having a plurality of authorized users, and having an authorization unit for uniquely identifying each of at least one of said authorized users, wherein:
-
a particular authorized user initiates said state consistent with presence of an authorized user by activating said authorization unit using an indicium unique to said particular authorized user; and
said user control interface presents for access at said user control interface only electronic mail addressed to said particular authorized user.
-
-
7. The security system of claim 6 wherein:
-
said user control interface comprises a keypad;
said indicium comprises a respective passcode unique to each said at least one authorized user; and
said activating of said authorization unit comprises entry of said passcode at said keypad.
-
-
8. The security system of claim 6 wherein:
-
said user control interface comprises a receiver;
said indicium comprises a respective transmitter uniquely coded to each of said at least one authorized user; and
said activating of said authorization unit comprises activation of said coded transmitter in communication range of said receiver.
-
-
9. The security system of claim 8 wherein said receiver and said coded transmitter are wireless.
-
10. The security system of claim 6 wherein:
-
said user control interface comprises a token reader;
said indicium comprises a token uniquely coded to each of said at least one authorized user; and
said activating of said authorization unit comprises presentation of said coded token to said reader.
-
-
11. The security system of claim 5 having a plurality of authorized users, and having an authorization unit for uniquely identifying each of at least one of said authorized users, wherein:
-
a particular authorized user initiates said state consistent with presence of an authorized user by activating said authorization unit using an indicium unique to said particular authorized user; and
said user control interface presents access at said user control interface to electronic mail message sending from said particular authorized user.
-
-
12. The security system of claim 11 wherein:
-
said user control interface comprises a keypad;
said indicium comprises a respective passcode unique to each of said at least one authorized user; and
said activation of said authorization unit indicium comprises entry of said passcode at said keypad.
-
-
13. The security system of claim 11 wherein:
-
said user control interface comprises a receiver;
said indicium comprises a respective transmitter uniquely coded to each of said at least one authorized user; and
said activation of said authorization unit comprises activation of said coded transmitter in communication range of said receiver.
-
-
14. The security system of claim 13 wherein said receiver and said coded transmitter are wireless.
-
15. The security system of claim 11 wherein:
-
said user control interface comprises a token reader;
said indicium comprises a respective token uniquely coded to each of said at least one authorized user; and
said activation of said authorization unit comprises presentation of said coded token to said reader.
-
-
16. The security system of claim 1 wherein:
-
said data comprise electronic mail;
said system has at least one authorized user, and has an authorization unit for uniquely identifying each of at least one of said authorized users; and
when one of said at least one authorized user enters a security system command at said user control interface by activating said authorization unit using an indicium unique to said one of said at least one authorized user, said user control interface sends an electronic mail message to a predetermined recipient advising of said entry of said command by said user.
-
-
17. The security system of claim 16 wherein:
-
said user control interface comprises a keypad;
said indicium comprises a respective passcode unique to each of said at least one authorized user; and
said activation of said authorization unit comprises entry of said passcode at said keypad.
-
-
18. The security system of claim 16 wherein:
-
said user control interface comprises a receiver;
said indicium comprises a respective transmitter uniquely coded for each of said at least one authorized user; and
said activation of said authorization unit comprises activation of said coded transmitter in communication range of said receiver.
-
-
19. The security system of claim 18 wherein said receiver and said coded transmitter are wireless.
-
20. The security system of claim 16 wherein:
-
said user control interface comprises a token reader;
said indicium comprises a token uniquely coded to each of said at least one authorized user; and
said activation of said authorization unit comprises presentation of said coded token to said reader.
-
-
21. The security system of claim 1 wherein:
-
said external data network is the Internet;
said data comprise World Wide Web pages;
said system has at least one authorized user, and has an authorization unit for uniquely identifying each of at least one of said authorized users; and
when one of said at least one authorized user enters a security system command at said user control interface by activating said authorization unit using an indicium unique to said one of said at least one authorized user, said system retrieves a World Wide Web page directed to said one of said at least one authorized user and displays said World Wide Web page at said user control interface.
-
-
22. The security system of claim 21 wherein:
-
said user control interface comprises a keypad;
said indicium comprises a respective passcode unique to each of said at least one authorized user; and
said activation of said authorization unit comprises entry of said passcode at said keypad.
-
-
23. The security system of claim 21 wherein:
-
said user control interface comprises a receiver;
said indicium comprises a respective transmitter uniquely coded for each of said at least one authorized user; and
said activation of said authorization unit comprises activation of said coded transmitter in communication range of said receiver.
-
-
24. The security system of claim 23 wherein said receiver and said coded transmitter are wireless.
-
25. The security system of claim 23 wherein:
-
said respective transmitter is encoded with multiple codes;
said activation of said authorization unit comprises activation of a selected one of said multiple codes by said one of said at least one authorized user; and
said system retrieves a different World Wide Web page based on which of said multiple codes has been selected.
-
-
26. The security system of claim 21 wherein:
-
said user control interface comprises a token reader;
said indicium comprises a respective token uniquely coded for each of said at least one authorized user; and
said activation of said authorization unit comprises presentation of said coded token to said reader.
-
-
27. The security system of claim 1 wherein:
-
said system has at least one authorized user, and has an authorization unit for uniquely identifying each of at least one of said authorized users;
one of said at least one authorized user activates said authorization unit using an indicium unique to said one of said at least one authorized user;
said external data network is the Internet; and
said activation of said authorization unit logs said one of said at least one authorized user onto the Internet at said user control interface.
-
-
28. The security system of claim 1 wherein:
-
said system has at least one authorized user, and has an authorization unit for uniquely identifying each of at least one of said authorized users;
one of said at least one authorized user enters a security system command at said user control interface by activating said authorization unit using an indicium unique to said one of said at least one authorized user;
said one of said at least one user uses said external data network to access a financial institution to perform a financial transaction;
said indicium is registered with said financial institution as an identifier of said one of said at least one authorized user; and
said indicium is sent to said financial institution as part of said financial transaction.
-
-
29. The security system of claim 1 wherein functions of said system are remotely accessible via said external data network.
-
30. The security system of claim 1 wherein:
-
said system transmits security data signals to a central communication station via said external data network and an alternate channel and awaits acknowledgment thereof; and
when said acknowledgment arrives from a first one of said external data network and said alternate channel, said system terminates transmission of said security data on a second one of said external data network and said alternate channel.
-
-
31. The security system of claim 30 wherein:
-
one of said external data network and said alternate channel normally operates faster than another of said external data network and said alternate channel; and
said system begins transmission of said security data signals on said one of said external data network and said alternate channel before beginning transmission of said security data signals on said another of said external data network and said alternate channel.
-
-
32. The security system of claim 30 further comprising a firewall between said user control interface and said external data network;
- wherein;
said firewall allows only communication originating at said system and prevents communication originating on said external data network; and
to receive said acknowledgment from said central communication station, said system initiates communication with said external data network so that said firewall allows said communication, said initiated communication including a query to said external data network for said acknowledgment to be communicated from said central communication station to said system.
- wherein;
-
33. The security system of claim 32 wherein said query to said external network comprises a query to said central communication station.
-
34. The security system of claim 30 wherein said alternate channel is said telephone line.
-
35. The security system of claim 30 wherein:
-
said system transmits security data signals to a central communication station via a plurality of channels; and
when said acknowledgment arrives from a first one of said plurality of channels, said system terminates transmission of said security data on each other one of said plurality of channels.
-
-
36. The security system of claim 35 wherein:
-
one of said plurality of channels normally operates faster than others of said plurality of channels; and
said system begins transmission of said security data signals on said one of said plurality of channels before beginning transmission of said security data signals on said others of said plurality of channels.
-
-
37. The security system of claim 1 wherein said system accepts commands from a user via said external data network.
-
38. The security system of claim 37 further comprising a firewall between said user control interface and said external data network;
- wherein;
said firewall allows only communication originating at said system and prevents communication originating on said external data network; and
to receive said commands from said user, said system initiates communication with said external data network so that said firewall allows said communication, said initiated communication including a query to said external data network for commands issued by said user to be communicated from said external data network to said system.
- wherein;
-
39. The security system of claim 1 wherein said system sends security data signals to predetermined recipients via said external data network.
-
40. The security system of claim 1 comprising more than one of said user control interface, each said user control interface functioning as an independent terminal of said external data network.
-
41. The security system of claim 1 further comprising a firewall between said user control interface and said external data network;
- wherein;
said firewall allows only communication originating at said system and prevents communication originating on said external data network; and
to receive data, said system initiates communication with said external data network so that said firewall allows said communication, said initiated communication including a query to said external data network for data sought to be communicated from said external data network to said system.
- wherein;
-
91. The security system of claim 11 wherein:
-
said user control interface means comprises means for reading a token;
said indicium comprises a respective token uniquely coded to each of said at least one authorized user; and
said activation of said means for authorizing comprises presentation of said coded token to said means for reading.
-
-
2. The security system of claim 1 wherein said data comprise electronic mail.
-
-
42. A security method for monitoring user premises, said method comprising:
-
providing at least one sensor;
providing at least one alarm output device;
providing at least one user control interface at the user premises;
providing a system controller connected to said sensor, said output device and said user control interface;
wherein;
at least one of said at least one user control interface is further connected to an external data network for at least one of (a) sending, and (b) receiving, data; and
said at least one user control interface allows a user at the user premises to interact with said system controller and said data. - View Dependent Claims (43, 44, 45, 46, 47, 49, 50, 51, 52, 53, 54, 55, 56, 57, 58, 59, 60, 61, 62, 63, 64, 65, 66, 67, 68, 69, 70, 71, 72, 73, 74, 75, 76)
-
43. The security method of claim 42 wherein said data comprise electronic mail.
-
44. The security method of claim 42 wherein:
-
said at least one user control interface is used by a user to enter commands affecting a state of said system;
said method further comprising;
when said state indicates that said system is active, monitoring said at least one sensor and outputting an alarm on said alarm output device when said at least one sensor indicates that an alarm condition exists.
-
-
45. The security method of claim 44 wherein:
-
said data comprise electronic mail; and
access to said electronic mail is restricted based on said state of said system.
-
-
46. The security method of claim 45 wherein said electronic mail is accessible when said state is consistent with presence of an authorized user on said premises.
-
47. The security method of claim 46 wherein:
-
there are a plurality of authorized users, said system having an authorization unit for uniquely identifying each of at least one of said authorized users; and
a particular authorized user initiates said state consistent with presence of an authorized user by activating said authorization unit using an indicium unique to said particular authorized user;
said method further comprising;
presenting, for access at said user control interface, only electronic mail addressed to said particular authorized user.
-
-
49. The security method of claim 47 wherein:
-
said user control interface comprises a receiver; and
said indicium comprises a respective transmitter uniquely coded to each of said at least one authorized user;
said method further comprising;
activating said authorization unit by activating said coded transmitter in communication range of said receiver.
-
-
50. The security method of claim 47 wherein:
-
said user control interface comprises a token reader; and
said indicium comprises a token uniquely coded to each of said at least one authorized user;
said method further comprising;
activating said authorization unit by presenting said coded token to said reader.
-
-
51. The security method of claim 46 wherein:
-
said system has a plurality of authorized users, and has an authorization unit for uniquely identifying each of at least one of said authorized users; and
a particular authorized user initiates said state consistent with presence of an authorized user by activating said authorization unit using an indicium unique to said particular authorized user;
said method further comprising;
presenting access at said user control interface to electronic mail message sending from said particular authorized user.
-
-
52. The security method of claim 51 further comprising:
-
providing a keypad at said user control interface;
wherein;
said indicium comprises a respective passcode unique to each of said at least one authorized user; and
said activation of said authorization unit indicium comprises entry of said passcode at said keypad.
-
-
53. The security method of claim 51 further comprising:
-
providing a receiver at said user control interface;
wherein;
said indicium comprises a respective transmitter uniquely coded to each of said at least one authorized user; and
said activation of said authorization unit comprises activation of said coded transmitter in communication range of said receiver.
-
-
54. The security method of claim 51 wherein:
-
said user control interface comprises a token reader; and
said indicium comprises a respective token uniquely coded to each of said at least one authorized user;
said method further comprising;
activating said authorization unit by presenting said coded token to said reader.
-
-
55. The security method of claim 42 wherein:
-
said data comprise electronic mail; and
said system has at least one authorized user, and has an authorization unit for uniquely identifying each of at least one of said authorized users;
said method further comprising, when one of said at least one authorized user enters a security system command at said user control interface by activating said authorization unit using an indicium unique to said one of said at least one authorized user;
sending an electronic mail message to a predetermined recipient advising of said entry of said command by said user.
-
-
56. The security method of claim 55 further comprising:
-
providing a keypad at said user control interface;
wherein;
said indicium comprises a respective passcode unique to each of said at least one authorized user; and
said activation of said authorization unit comprises entry of said passcode at said keypad.
-
-
57. The security method of claim 55 wherein:
-
said user control interface comprises a receiver; and
said indicium comprises a respective transmitter uniquely coded for each of said at least one authorized user;
said method further comprising;
activating said authorization unit by activating said coded transmitter in communication range of said receiver.
-
-
58. The security method of claim 55 wherein:
-
said user control interface comprises a token reader; and
said indicium comprises a token uniquely coded to each of said at least one authorized user;
said method further comprising;
activating said authorization unit by presenting said coded token to said reader.
-
-
59. The security method of claim 42 wherein:
-
said external data network is the Internet;
said data comprise World Wide Web pages;
said system has at least one authorized user, and has an authorization unit for uniquely identifying each of at least one of said authorized users;
said method further comprising, when one of said at least one authorized user enters a security system command at said user control interface by activating said authorization unit using an indicium unique to said one of said at least one authorized user;
retrieving a World Wide Web page directed to said one of said at least one authorized user and displaying said World Wide Web page at said user control interface.
-
-
60. The security method of claim 59 further comprising:
-
providing a keypad at said user control interface;
wherein;
said indicium comprises a respective passcode unique to each of said at least one authorized user; and
said activation of said authorization unit comprises entry of said passcode at said keypad.
-
-
61. The security method of claim 59 wherein:
-
said user control interface comprises a receiver; and
said indicium comprises a respective transmitter uniquely coded for each of said at least one authorized user;
said method further comprising;
activating said authorization unit by activating said coded transmitter in communication range of said receiver.
-
-
62. The security method of claim 61 wherein:
-
said respective transmitter is encoded with multiple codes; and
said activation of said authorization unit comprises activation of a selected one of said multiple codes by said one of said at least one authorized user;
said method further comprising;
retrieving a different World Wide Web page based on which of said multiple codes has been selected.
-
-
63. The security method of claim 59 wherein:
-
said user control interface comprises a token reader; and
said indicium comprises a respective token uniquely coded for each of said at least one authorized user;
said method further comprising;
activating said authorization unit by presenting said coded token to said reader.
-
-
64. The security method of claim 42 wherein:
-
said system has at least one authorized user, and has an authorization unit for uniquely identifying each of at least one of said authorized users;
one of said at least one authorized user activates said authorization unit using an indicium unique to said one of said at least one authorized user; and
said external data network is the Internet;
said method further comprising;
on said activation of said authorization unit, logging said one of said at least one authorized user onto the Internet at said user control interface.
-
-
65. The security method of claim 42 wherein:
-
said system has at least one authorized user, and has an authorization unit for uniquely identifying each of at least one of said authorized users;
one of said at least one authorized user enters a security system command at said user control interface by activating said authorization unit using an indicium unique to said one of said at least one authorized user;
said one of said at least one user uses said external data network to access a financial institution to perform a financial transaction; and
said indicium is registered with said financial institution as an identifier of said one of said at least one authorized user;
said method further comprising;
sending said indicium to said financial institution as part of said financial transaction.
-
-
66. The security method of claim 42 further comprising:
-
transmitting security data signals to a central communication station via said external data network and an alternate channel and awaiting acknowledgment thereof; and
when said acknowledgment arrives from a first one of said external data network and said alternate channel, terminating transmission of said security data on a second one of said external data network and said alternate channel.
-
-
67. The security method of claim 66 wherein:
-
one of said external data network and said alternate channel normally operates faster than another of said external data network and said alternate channel; and
transmitting of said security data signals to said central communication station via said one of said external data network and said alternate channel begins before transmitting of said security data signals to said central communication station via said another of said external data network and said alternate channel.
-
-
68. The security method of claim 66 wherein:
-
there is a firewall between said user control interface and said external data network, said firewall allowing only communication originating at said system and preventing communication originating on said external data network;
said method further comprising;
to receive said acknowledgment from said central communication station, initiating communication with said external data network so that said firewall allows said communication, said initiated communication including a query to said external data network for said acknowledgment to be communicated from said central communication station to said system.
-
-
69. The security method of claim 68 wherein said query to said external network comprises a query to said central communication station.
-
70. The security method of claim 66 wherein said alternate channel is said telephone line.
-
71. The security method of claim 42 further comprising:
-
transmitting security data signals to a central communication station via a plurality of channels; and
when said acknowledgment arrives from a first one of said plurality of channels, terminating transmission of said security data on each other one of said plurality of channels.
-
-
72. The security method of claim 71 wherein:
-
one of said plurality of channels normally operates faster than others of said plurality of channels; and
transmitting of said security data signals to said central communication station via said one of said plurality of channels begins before transmitting of said security data signals to said central communication station via said others of said plurality of channels.
-
-
73. The security method of claim 42 further comprising accepting commands from a user via said external data network.
-
74. The security method of claim 73 wherein:
-
there is a firewall between said user control interface and said external data network, said firewall allowing only communication originating at said system and preventing communication originating on said external data network;
said method further comprising;
to receive said commands from said user, initiating communication with said external data network so that said firewall allows said communication, said initiated communication including a query to said external data network for commands issued by said user to be communicated from said external data network to said system.
-
-
75. The security method of claim 42 further comprising sending security data signals to predetermined recipients via said external data network.
-
76. The security method of claim 42 wherein:
-
there is a firewall between said user control interface and said external data network, said firewall allowing only communication originating at said system and preventing communication originating on said external data network;
said method further comprising;
to receive data, initiating communication with said external data network so that said firewall allows said communication, said initiated communication including a query to said external data network for data sought to be communicated from said external data network to said system.
-
-
43. The security method of claim 42 wherein said data comprise electronic mail.
-
-
48. The security method of claim further comprising:
-
providing a keypad at said user control interface;
wherein;
said indicium comprises a respective passcode unique to each said at least one authorized user; and
said activating of said authorization unit comprises entry of said passcode at said keypad.
-
-
77. A security system for monitoring user premises, said system comprising:
-
at least one means for sensing;
at least one means for outputting an alarm;
at least one user control interface means; and
a system controller means connected to said means for sensing, said means for outputting an alarm and said user control interface means;
wherein;
at least one of said at least one user control interface means is located at the user premises and is further connected to an external data network for at least one of (a) sending, and (b) receiving, data and wherein said at least one user control interface allows a user at the user premises to interact with said system controller and said data. - View Dependent Claims (78, 79, 80, 81, 82, 83, 84, 85, 86, 87, 88, 89, 90, 92, 93, 94, 95, 96, 97, 98, 99, 100, 101, 102, 103, 104, 105, 106, 107, 108, 109, 110, 111, 112, 113, 114, 115, 116, 117)
-
78. The security system of claim 77 wherein said data comprise electronic mail.
-
79. The security system of claim 77 wherein:
-
said at least one user control interface means is used by a user to enter commands affecting a state of said system; and
said system, when said state indicates that said system is active, monitors said at least one means for sensing and outputs an alarm on said means for outputting an alarm when said at least one means for sensing indicates that an alarm condition exists.
-
-
80. The security system of claim 79 wherein:
-
said data comprise electronic mail; and
access to said electronic mail is restricted based on said state of said system.
-
-
81. The security system of claim 80 wherein said electronic mail is accessible when said state is consistent with presence of an authorized user on said premises.
-
82. The security system of claim 81 having a plurality of authorized users, and having means for authorizing for uniquely identifying each of at least one of said authorized users, wherein:
-
a particular authorized user initiates said state consistent with presence of an authorized user by activating said authorization unit using an indicium unique to said particular authorized user; and
said user control interface means presents for access at said user control interface means only electronic mail addressed to said particular authorized user.
-
-
83. The security system of claim 82 wherein:
-
said user control interface means comprises keypad means;
said indicium comprises a respective passcode unique to each said at least one authorized user; and
said activating of said means for authorizing comprises entry of said passcode at said keypad means.
-
-
84. The security system of claim 82 wherein:
-
said user control interface means comprises means for receiving;
said indicium comprises a respective means for transmitting uniquely coded to each of said at least one authorized user; and
said activating of said means for authorizing comprises activation of said coded means for transmitting in communication range of said means for receiving.
-
-
85. The security system of claim 84 wherein said means for receiving and said coded means for transmitting are wireless.
-
86. The security system of claim 82 wherein:
-
said user control interface means comprises means for reading a token;
said indicium comprises a. token uniquely coded to each of said at least one authorized user; and
said activating of said means for authorizing comprises presentation of said coded token to said means for reading.
-
-
87. The security system of claim 81 having a plurality of authorized users, and having a means for authorizing f or uniquely identifying each of at least one of said authorized users, wherein:
-
a particular authorized user initiates said state consistent with presence of an authorized user by activating said means for authorizing using an indicium unique to said particular authorized user; and
said user control interface means presents access at said user control interface means to electronic mail message sending from said particular authorized user.
-
-
88. The security system of claim 87 wherein:
-
said user control interface means comprises keypad means;
said indicium comprises a respective passcode unique to each of said at least one authorized user; and
said activation of said means for authorizing indicium comprises entry of said passcode at said keypad means.
-
-
89. The security system of claim 87 wherein:
-
said user control interface means comprises means for receiving;
said indicium comprises a respective means for transmitting uniquely coded to each of said at least one authorized user; and
said activation of said means for authorizing unit comprises activation of said coded means for transmitting in communication range of said means for receiving.
-
-
90. The security system of claim 89 wherein said means for receiving and said coded means for transmitting are wireless.
-
92. The security system of claim 77 wherein:
-
said data comprise electronic mail;
said system has at least one authorized user, and has a means for authorizing for uniquely identifying each of at least one of said authorized users; and
when one of said at least one authorized user enters a security system command at said user control interface means by activating said means for authorizing using an indicium unique to said one of said at least one authorized user, said user control interface sends an electronic mail message to a predetermined recipient advising of said entry of said command by said user.
-
-
93. The security system of claim 92 wherein:
-
said user control interface means comprises keypad means;
said indicium comprises a respective passcode unique to each of said at least one authorized user; and
said activation of said means for authorizing comprises entry of said passcode at said keypad means.
-
-
94. The security system of claim 92 wherein:
-
said user control interface means comprises a means for receiving;
said indicium comprises a respective means for transmitting uniquely coded for each of said at least one authorized user; and
said activation of said means for authorizing comprises activation of said coded means for transmitting in communication range of said means for receiving.
-
-
95. The security system of claim 94 wherein said means for receiving and said coded means for transmitting are wireless.
-
96. The security system of claim 92 wherein:
-
said user control interface means comprises means for reading a token;
said indicium comprises a token uniquely coded to each of said at least one authorized user; and
said activation of said means for authorizing comprises presentation of said coded token to said means for reading.
-
-
97. The security system of claim 77 wherein:
-
said external data network is the Internet;
said data comprise World Wide Web pages;
said system has at least one authorized user, and has a means for authorizing for uniquely identifying each of at least one of said authorized users; and
when one of said at least one authorized user enters a security system command at said user control interface means by activating said means for authorizing using an indicium unique to said one of said at least one authorized user, said system retrieves a World Wide Web page directed to said one of said at least one authorized user and displays said World Wide Web page at said user control interface.
-
-
98. The security system of claim 97 wherein:
-
said user control interface means comprises keypad means;
said indicium comprises a respective passcode unique to each of said at least one authorized user; and
said activation of said means for authorizing comprises entry of said passcode at said keypad means.
-
-
99. The security system of claim 97 wherein:
-
said user control interface means comprises means for receiving;
said indicium comprises a respective means for transmitting uniquely coded for each of said at least one authorized user; and
said activation of said means for authorizing comprises activation of said coded means for transmitting in communication range of said means for receiving.
-
-
100. The security system of claim 99 wherein said means for receiving and said coded means for transmitting are wireless.
-
101. The security system of claim 99 wherein:
-
said respective means for transmitting is encoded with multiple codes;
said activation of said means for authorizing comprises activation of a selected one of said multiple codes by said one of said at least one authorized user; and
said system retrieves a different World Wide Web page based on which of said multiple codes has been selected.
-
-
102. The security system of claim 97 wherein:
-
said user control interface means comprises means for reading a token;
said indicium comprises a respective token uniquely coded for each of said at least one authorized user; and
said activation of said means for authorizing comprises presentation of said coded token to said means for reading.
-
-
103. The security system of claim 77 wherein:
-
said system has at least one authorized user, and has a means for authorizing for uniquely identifying each of at least one of said authorized users;
one of said at least one authorized user activates said means for authorizing using an indicium unique to said one of said at least one authorized user;
said external data network is the Internet; and
said activation of said means for authorizing logs said one of said at least one authorized user onto the Internet at said user control interface means.
-
-
104. The security system of claim 77 wherein:
-
said system has at least one authorized user, and has a means for authorizing for uniquely identifying each of at least one of said authorized users;
one of said at least one authorized user enters a security system command at said user control interface means by activating said means for authorizing using an indicium unique to said one of said at least one authorized user;
said one of said at least one user uses said external data network to access a financial institution to perform a financial transaction;
said indicium is registered with said financial institution as an identifier of said one of said at least one authorized user; and
said indicium is sent to said financial institution as part of said financial transaction.
-
-
105. The security system of claim 77 wherein functions of said system are remotely accessible via said external data network.
-
106. The security system of claim 77 wherein:
-
said system transmits security data signals to a central communication station via said external data network and an alternate channel and awaits acknowledgment thereof; and
when said acknowledgment arrives from a first one of said external data network and said alternate channel, said system terminates transmission of said security data on a second one of said external data network and said alternate channel.
-
-
107. The security system of claim 106 wherein:
-
one of said external data network and said alternate channel normally operates faster than another of said external data network and said alternate channel; and
said system begins transmission of said security data signals on said one of said external data network and said alternate channel before beginning transmission of said security data signals on said another of said external data network and said alternate channel.
-
-
108. The security system of claim 106 further comprising firewall means between said user control interface means and said external data network;
- wherein;
said firewall means allows only communication originating at said system and prevents communication originating on said external data network; and
to receive said acknowledgment from said central communication station, said system initiates communication with said external data network so that said firewall means allows said communication, said initiated communication including a query to said external data network for said acknowledgment to be communicated from said central communication station to said system.
- wherein;
-
109. The security system of claim 108 wherein said query to said external network comprises a query to said central communication station.
-
110. The security system of claim 106 wherein said alternate channel is said telephone line.
-
111. The security system of claim 77 wherein:
-
said system transmits security data signals to a central communication station via a plurality of channels; and
when said acknowledgment arrives from a first one of said plurality of channels, said system terminates transmission of said security data on each other one of said plurality of channels.
-
-
112. The security system of claim 111 wherein:
-
one of said plurality of channels normally operates faster than others of said plurality of channels; and
said system begins transmission of said security data signals on said one of said plurality of channels before beginning transmission of said security data signals on said others of said plurality of channels.
-
-
113. The security system of claim 77 wherein said system accepts commands from a user via said external data network.
-
114. The security system of claim 113 further comprising firewall means between said user control interface means and said external data network;
- wherein;
said firewall means allows only communication originating at said system and prevents communication originating on said external data network; and
to receive said commands from said user, said system initiates communication with said external data network so that said firewall means allows said communication, said initiated communication including a query to said external data network for commands issued by said user to be communicated from said external data network to said system.
- wherein;
-
115. The security system of claim 77 wherein said system sends security data signals to predetermined recipients via said external data network.
-
116. The security system of claim 77 comprising more than one of said user control interface means, each said user control interface means functioning as an independent terminal of said external data network.
-
117. The security system of claim 77 further comprising firewall means between said user control interface means and said external data network;
- wherein;
said firewall means allows only communication originating at said system and prevents communication originating on said external data network; and
to receive data, said system initiates communication with said external data network so that said firewall means allows said communication, said initiated communication including a query to said external data network for data sought to be communicated from said external data network to said system.
- wherein;
-
78. The security system of claim 77 wherein said data comprise electronic mail.
-
Specification
- Resources
-
Current AssigneeAdemco Inc. (Resideo Technologies, Inc.)
-
Original AssigneePittway Corporation (Honeywell International Inc.)
-
InventorsSimon, Scott H., Beach, Christopher E., Simon, Theodore, Winick, Steven
-
Primary Examiner(s)WOO, STELLA L
-
Application NumberUS09/805,864Publication NumberTime in Patent Office1,610 DaysField of Search379/37, 379/38, 379/39, 379/40, 379/45, 379/93.24, 379/90.01, 379/106.01US Class Current379/39CPC Class CodesG08B 25/008 Alarm setting and unsetting...H04M 11/04 with alarm systems, e.g. fi...