Communications – Jean-Paul Martin, Stephen Scott Trundle, David Saul Goldfarb, David James Hutz, Alarm com Inc

Abstract for “Alarm system that can be used with two-way voice”

“Techniques can be used to establish a two-way voice communications session with an alarm system. An alarm system can establish a two way voice communication session with an operator who is associated with a monitoring system that monitors alarm events. An alarm system may also establish a two way voice communication session with a notification receiver who is interested in receiving notifications related to alarm events.

Background for “Alarm system that can be used with two-way voice”

Many people have alarm systems installed in their homes or businesses to increase security. Alarm systems can include control panels that allow a person to manage the alarm system’s operation and monitor for security breaches. Alarm systems may emit an audible alarm if they detect a security breach. If the alarm system is monitored, the alarm service may transmit electronic data to alert them of the security breach.

“In one aspect, an alarm system and operator dealing with an alarm event are able to establish a voice communication session. A wireless communication module that is part of an alarm system receives alarm data and transmits it over a wireless channel to an operator. Alarm data is used to indicate the alarm event. Based on the alarm data received, an operator can handle the alarm event. Voice communication information associated to the wireless communication module in the alarm system can be accessed. An operator using the alarm device establishes a voice communication session over a wireless voice channel. This is independent from the wireless data channel. It is established between the operator and the wireless communication module in the alarm system.

“Implementations could include one or more the following features. A call may be received by the wireless communication unit over the wireless voice channel. The received call may identify a number associated to the wireless communication unit. This example shows that an operator who is handling the alarm may be identified using the identified number. A number associated with the operator’s communication device may also be accessed and the received call may then be routed to the operator’s communication device using the accessed number.

“In some cases, the phone number associated to the wireless communications module can be accessed and a call can be made over the wireless voice channel to the wireless communication modules. Other implementations may transmit confirmation information to the wireless communications module over the radio data channel to respond to alarm data. A call may also be made from the wireless communication unit over the wireless voice channel. In response to the confirmation information, the wireless communication module may place the call. These implementations allow access to a number associated the received call. An operator who is handling the alarm event can be identified using the identified number. The operator’s communication device may also be accessed. If the number is accessed, the operator can route the received call to that device.

Based on received alarm data, it might be possible to determine that an alarm system has a two-way speech feature. If the alarm system has the two-way voice feature, the processing of the alarm data received may be delayed for a predetermined time and monitored for any incoming calls during that time. The wireless communication module can receive a call over the wireless voice channel and monitor for incoming calls. A number associated with the call may also be identified. The received call could be associated with alarm data. An operator may be identified to handle the alarm event. The received call may be routed first to the identified operator and the alarm data to the second device.

The wireless communication module may receive a command to initiate a call. Operators may enter user input to initiate the voice call. The wireless voice channel may receive a call from the wireless communications module. In response to the request to initiate the call, the wireless communication module may place the call. An operator may be able to identify the number associated with the call. The operator’s communication device may have a number that can be accessed. If the number is accessed, the received call could be routed to the operator’s communication device.

“In some cases, the alarm system may include a two-way vocal feature. A command to initiate a call to the wireless communication module may be sent to it if the alarm system has the two-way feature. The wireless voice channel may allow the wireless communication module to receive a call. In response to the request to initiate the call, the wireless communication module may place the call and identify the number associated with it. The identified number may allow an operator to be identified. A number associated with the operator’s communication device may also be accessed. If the access number is known, the operator can route the received call to the device that was used by him.

An alarm system could be a security system that is installed in a building. A security system can be set up to detect alarm events based on signals from at least one sensor. The security system may establish a voice communication session to allow the operator to listen to an area of the building and to communicate with someone who is there.

“The described techniques can be implemented using hardware, a process or method, or software on a computer accessible medium. Details of any one or more implementations can be found in the accompanying drawings as well as the description. The description and drawings will also reveal other features.

“DESCRIPTION of Drawings”

“FIG. “FIG.

“FIG. “FIG.

“FIGS. “FIGS.

“FIG. “FIG.7” is a flowchart that illustrates a process to establish a voice communication session between an Alarm System and an Operator using Shelf and Slot numbers.

“FIG. “FIG.8 is a block diagram of a typical electronic system that establishes a voice communication session between an operator and alarm system.”

“FIG. “FIG. 9” is a flowchart that illustrates a process to establish a voice communication session between an alarm alarm system and an operator using shelf numbers and slot numbers.

“FIG. “FIG.

“FIG. “FIG. 11. This flow chart illustrates a process to establish a voice communication session between an alert system and a notification receiver.”

“FIG. “FIG.12 is a block diagram showing an example of an electronic device that can establish a voice communication session with an alarm system and a recipient of notification.”

“FIGS. 13-18 are flowcharts that illustrate examples of voice communication sessions between an alarm system (FIGS.) and a notification receiver (FIGS.

“Techniques can be used to establish a voice communication session between an alarm system and a central monitoring station. Two-way voice communication is provided in some cases between an alarm system, such as a security system in a residence, and a central monitoring station. These implementations allow the alarm system to transmit data via a wireless data channel, and establish a two way voice communication session over a separate wireless voice channel with the notification recipient or central monitoring station.

An alarm system, such as a security system that is installed in a residential or commercial building and includes one or more control panels, detects an alarm event, such as a security breach or emergency situation. One or more sensors may be included in the alarm system (e.g. contact sensors and motion sensors as well as temperature sensors and smoke sensors. The alarm system may detect an alarm event based upon a signal from one or more sensors. If the alarm system is set to alarm, it may respond to a signal from a sensor on a door leading to the building.

“In some cases, an alarm system can be set up for remote monitoring by a system (e.g. a central monitoring station or in combination with an intermediary server). These implementations allow the alarm system to transmit data to the monitor system when it detects an alarm event.

The wireless communication module in an alarm system could be used to transmit alarm data to the monitoring system. This includes data identifying the alarm, customer account numbers, information about the customer, alarm system type, alarm events, alarm triggers, and other information. The wireless communication module could be used to transmit alarm data via a wireless data channel. This includes Global System for Mobile Communications (GSM)/General Packet Radio Service(GPRS) data channel and Code Division Multiple Access data channel. It is possible that the wireless data channel can transmit voice communications and establish voice communication sessions. The wireless data channel can transmit alarm data with greater reliability, quality, speed, and security than transmissions over a wireless voice channel (e.g. a GSM voice channel or a cellular vocal channel). The alarm system owner may not have to maintain a telephone line (e.g., an ordinary telephone service (POTS), line) in order to transmit alarm data wirelessly. One example is that an alarm system can send alarm data to the monitoring systems over a GSM/GPRS data channel when it detects an intruder in a building. Alarm data can include information about an intruder detection and a customer account number.

“The monitoring system might receive alarm data via the wireless data channel, and allow an operator to manage the alarm event based upon the received alarm data. One example is that the monitoring system could be a standalone system. The central monitoring system, in this case, receives alarm data from the wireless communication module via the wireless data channel. It then queues the alarm data to be processed by the next operator.

“Another example is that the monitoring system could include a central monitoring station and an intermediary server. The intermediary alarm server could receive alarm data over wireless data channels and convert it or reformat it (e.g. convert alarm data into a digital dialer signal, or to a format accepted by the central station), before transmitting the alarm data back to the central station. The central monitoring station assigns an operator to handle alarm data. This operator can determine more information about the alarm, dispatch emergency services, and perform other services that could be helpful in handling the event. In the above example, an operator assigned at a central monitor station to handle alarm data transmitted via the GSM/GPRS data channels by the wireless communication module to respond to an alarm system detecting an intrusion may determine that the alarm is an intruder alarm based on alarm data and attempt further information. An operator may also determine the location of the building that is associated with an alarm system using the customer account number in alarm data. This will enable them to dispatch emergency services to the location.

In some cases, the monitoring system is linked to the alarm system in order to establish a two way voice communication session between the operator who handles the alarm at the central monitoring station. The alarm system and monitoring system could coordinate to establish a two way voice communication session over a wireless channel (e.g., GSM voice channel, or cellular voice channel). Implementations in which alarm data is transmitted over wireless data channels may require coordination between the monitoring and alarm systems to establish the two way voice communication session with a device associated the operator handling the alarm event at central station. This could be because the wireless voice channel differs from (e.g. separate, distinct, unrelated or decoupled). The wireless data channel. These implementations may provide high reliability for alarm data transmission and two-way voice communication services, without the need to maintain a POTS phone line. The alarm system and a central monitoring station that handles the intruder events may establish a two way voice communication session using a GSM voice channel. Two-way voice communication allows the operator to listen to the intruder’s event via a microphone built into the alarm system. The speaker in the alarm system can also be used to communicate with individuals nearby. The operator may be able to listen in on the intruder’s event and communicate with people proximate through the alarm system. This may allow him to determine if the event is real or false.

One example is that the central monitoring station could be set up to send a confirmation signal to alarm system upon receiving alarm data. The wireless communication module in alarm system may also be configured to make a voice call to central monitoring station after receiving confirmation. The confirmation signal could include the telephone number for the central monitoring station or the alarm system might access electronic storage to find the number to call after receiving the confirmation signal. The central monitoring station can be set up to route the wireless call to the operator who is handling the alarm data. This may include identifying the alarm system associated with the customer and the operator handling that alarm data. The central monitoring station might identify the phone number for the wireless voice call received from an alarm system by using automatic number identification (ANI), or dialed number identification service (DNIS) and determine a customer number. This will route the call to the operator who is handling the alarm event associated to the customer account number in order to establish a two way voice communication session.

“Another example is that the alarm system may wait for a predetermined time (e.g. fifteen seconds) before sending alarm data over wireless data channel. Then, it will place the voice call over wireless voice channel to the central monitoring station. An operator or system administrator may set the time or change it to control the alarm system. The predetermined time can be dynamically configured based on the current alarm system communications network operating conditions.

“Another example is that the central monitoring station may upon receiving alarm data determine if the alarm systems sending it has a 2-way voice feature and hold the alarm data until an alarm system receives a wireless voice. The condition on this determination is to route the alarm data and wireless voice calls received to an operator after receipt of the wireless voice. The voice call could be answered by the next operator, and the alarm data presented to the operator who answered it. Another example is that the central monitoring station could transmit to the alarm systems a command to activate the wireless communication system. This may allow the central monitoring stations to place a wireless voicecall to the central station, or access the phone number for wireless communication modules in the alarm and make a call to them.

“In some cases, technology that is used to perform two way voice services with alarm system over wired telephone lines (e.g. POTS phone lines), may be leveraged to provide wireless voice services. Central monitoring stations that are connected to alarm systems over POTS phone lines can route two-way voice call to the appropriate operator using a shelf/slot number associated to the physical phone line connection at their central monitoring station. Some central monitoring stations may assign shelf/slot number to extensions or identifiers of incoming wireless calls (e.g. private branch exchange extensions (PBX extensions)). In this way, shelf/slot numbers can be associated with incoming wireless calls. An intermediary alarm server may be assigned a set of shelf/slot number for wireless phone numbers by central monitoring stations. These implementations may include the provision of alarm data from an alarm system via a wireless data channel to a central station, and the establishment of a two way voice communication session over a wireless voice channel between the central station and alarm system. This is done by using the technology of the central station to provide two-way voice services to alarm systems over wired telephone lines. The intermediary alarm server may receive alarm data over a wireless data channel. The intermediary alarm server receives alarm data and assigns it a shelf/slot number. This number corresponds to the wireless phone numbers (e.g. PBX extensions) associated to the central monitoring station. The central monitoring station receives the signal from the intermediary alarm server. It generates a signal that allows identification of the alarm data as well as the assigned shelf/slot numbers. The central monitoring station receives the signal and associates the alarm data to the assigned shelf/slot. This means that calls to the assigned wireless number (e.g. PBX extension), will be routed to the operator who handles the alarm data. This technology is used for two-way voice communications sessions over wired lines (e.g. POTS phone lines). The telephone number associated to the assigned shelf/slot is also transmitted by the intermediary alarm server to the alarm system. The alarm system receives the telephone number and places a call to the associated phone number via wireless voice channel. The intermediary alarm server transmits the alarm data to central station in a way that allows identification of the assigned shelf/slot numbers. A wireless voice call is made from alarm system to the phone number associated with assigned shelf/slot numbers. This operator uses the same software to route the previously transmitted alarm data. These solutions may prove cost-effective as modifications to central monitoring stations technology and wireless communication module included in alarm system may not be necessary.

“In some cases, central monitoring stations may assign a number of PBX extension identifiers to an intermediary server. These implementations may see the intermediary alarm server coordinate the provision of alarm data from an alarm system via a wireless data channel to a central station and establish a two-way voice communication channel between the central station and alarm system using the PBX extensions identifiers. The intermediary alarm server may receive alarm data over a wireless data channel. The intermediary alarm server receives the alarm data and adds an available PBX Extension identifier from its pool. The intermediate alarm server generates a signal which identifies the alarm data and assigns PBX extension identifier to the central monitoring station. The central monitoring station receives the signal and associates alarm data with the assigned PBX Extension identifier. It then provides the operator with the assigned PBX Extension identifier. The telephone number associated to the assigned PBX Extension identifier is also transmitted by the intermediary alarm server. The alarm system receives the telephone number and places a call to the associated PBX extension identifier phone number. The alarm station will provide the assigned PBX Extension identifier along with alarm data to the operator. This allows the operator to answer the call from the alarm system to the phone number associated to the assigned PBX Extension identifier. They can also establish a two-way voice communication with the alarm system via the wireless voice channel.

In some cases, an alarm system can be set up to establish a two way voice communication session with a notification receiver (e.g. an owner of an alarm system), rather than an operator at a central station. A two-way voice communication session may be established with a notification receiver to enable them to monitor their building (e.g., residence) or to assist in responding to alarm system events that might not result in notification to an operator at the central monitoring station. An alarm system might detect the opening of a medicine cabinet. An alarm system might transmit event data to indicate that the medicine cabinets have been opened to an alarm server via a wireless data channel. The alarm server or alarm system may decide that the detection of the medicine cupboard opening is not sufficient to notify a central monitoring station, but that notification recipients should be notified. The alarm server will receive data from the alarm system indicating that the medicine cabinets have been opened. This event is identified by the alarm server. The alarm server can identify the recipient of the notification by identifying the owner of the alarm and the customer who sent the event data. Another example is that multiple recipients can be associated with an alarm and one notification recipient may be chosen. Depending on the type, several notification recipients could be selected. After identifying the recipient of the notification, the alarm server allows for two-way voice communication via a wireless voice channel with the alarm system as well as an electronic device associated to the recipient. A two-way voice communication session, for example, may be established between an alarm system and a cellular phone associated with the notification receiver. This example allows the notification recipient to communicate with people in the vicinity of the medicine cabinet to obtain more information. The notification receiver may, for example, establish a two way voice communication session with an alarm system to determine if the recipient’s grandmother opened her medicine cabinet and ask the grandmother if she has taken the right medication to prevent a medical emergency.

Implementations where an alarm system can transmit data over a wired data channel and establish two-way voice communication sessions with a central monitoring station, notification receiver or notification receiver over a wireless voice channels that are decoupled from the wireless channel may have benefits. A wireless voice channel is a communication medium that a carrier or service provider uses to transmit voice communications. A wireless data channel, on the other hand, may be used to transmit data communications by a carrier or service provider. A service provider may assign a frequency band within the GSM/GPRS spectrum to a wireless voice channel, and a different frequency band within the GSM/GPRS Spectrum for a wireless data channel. The wireless voice channel might be set up to receive voice calls. Therefore, voice data can be sent over the wireless channel using processing operations like digitization, compression and encoding. This will optimize voice communications via the wireless voice channel. Some implementations of processing data for transmission over wireless voice channels may involve sampling an analog waveform, and transmitting the sampled data over wireless voice channel. These implementations allow digital data to be transmitted (e.g. alarm data) over a wireless voice channel. The digital data is converted into an analog waveform and sampled before being sent over the wireless vocal channel. These implementations also allow for the sampling of data to be received over the wireless voice channel, and the analog waveform can then be reconstructed using the received data. The digital data, such as alarm data, is obtained by converting the analog waveform into digital format. Digital data transmitted over wireless voice channels may not be reliable and may lose its integrity.

A wireless data channel might be better suited for data transmission. The wireless data channel may have different processing requirements than the wireless voice channel. Processing data for transmission over wireless data channels may not involve sampling an analog waveform or transmitting sampled data. Instead, it may include transmitting a digital representation (e.g. alarm data) over wireless data channels. These implementations allow the direct representation of digital data to be received over the wireless channel. The digital data can be received without significant integrity problems or loss.

The wireless voice channel transmits data via substantial processing, which includes sampling an analog signal and requires more information per packet. Digital data, such as alarm data, may not be transmitted over the wireless channel as fast or accurately as over the wireless data channel. The wireless data channel doesn’t include significant voice processing, does not sample an analog waveform and may require more processing than voice communications over a wireless voice channel. The benefits of transmitting data over wireless channels and setting up a two-way voice communication channel over a wireless voice channel can be achieved.

“FIG. “FIG. A processor is generally described as performing the operations shown in flow chart 100. The processor can be integrated in electronic devices or systems that send and receive data over a network. The processor could be part of an alarm server, central monitoring station server or any other electronic device that monitors an alarm system. Another example is that process 100 can be executed by several processors in different electronic devices or systems.

“The processor receives alarm information transmitted by an alarm network over a wireless data channel when the alarm system detects an alarm event (110). The processor might receive alarm data from one or more electronic communications over a network, for example. Information associated with an alarm event may be included in the alarm data. The alarm data could include information that identifies the alarm system or user that detected the alarm event, as well as information that describes or identifies the alarm event. One implementation detects the opening of a door within a building monitored by the alarm system based on a signal sent from a contact sensor. This implementation may contain information that identifies the alarm system and the alarm user, as well as the building being monitored. Information about the type of alarm (e.g. security breach) and which door was opened by the alarm system may also be included in the alarm data.

“In some cases, the processor may receive the alarm data directly over a wireless data channel. The processor could be part of an electronic system that uses wireless data channels to exchange electronic communications. The processor could be part of an intermediary alarm server, which communicates with the alarm network and transmits information about detected alarm events to the central monitoring station via a communication medium other that a wireless data channel. The intermediary alarm server could receive alarm data from an alarm system via the wireless data channel, and transmit it to a monitoring station using a POTS telephone line.

“In some cases, the processor could be part of a monitoring station device that transmits data over a wireless data network. These examples show that the alarm system could transmit alarm data to the monitoring station directly over the wireless data channel.

“In further implementations the processor receives the alarm data from an alternative device to the alarm system using a communication medium that is not wireless. The alarm system could transmit alarm data over a wireless channel to an intermediary server. The intermediary alarm server might receive alarm data and forward it to another electronic device with the processor via a different communication medium than wireless data channels. The intermediary alarm server could receive alarm data via a wireless channel and forward it to another electronic device that has the processor. The processor then receives the alarm data originally transmitted by the alarm system over the wireless data channel and forwards it to a monitoring station that includes the processor. These implementations may allow a user to use an alternative alarm system, which does not require a POTS telephone connection with a monitoring station that has a POTS phone line. The intermediary alarm server can transform or convert alarm data received via the wireless data channel into a format that is suitable for transmission over a telephone line to the monitoring stations.

As mentioned above, an alarm system can transmit alarm data via a wireless data channel optimized for digital data transmission. It may also carry a direct representation (e.g. alarm data) of digital data. The alarm system could transmit alarm data via a GSM/GPRS channel. It may also transmit alarm data in IP packets using a wireless channel that can transport IP packets. Or, it may send the alarm data to a Short Message Service message (SMS) over a wireless channel that can transport SMS messages.

“The processor allows an operator to manage the alarm event based upon the received alarm data (120). The processor, for example, allows the provision of alarm data to an electronic device (e.g. a computer or terminal). An operator uses to manage alarm events. Based on alarm data, the electronic device can determine the alarm event information and display it to the operator. Information associated with an alarm event can include information about the type of alarm, the alarm system or building that caused it, the sensor that gave rise to it, and any other information related to the alarm. Based on this information, the operator can handle the alarm event. The operator might determine if the alarm is a true alarm or false alarm. In this case, the operator could dispatch emergency services to the building that was affected by the alarm.

“In cases where the processor is embedded in an electronic device or monitoring station, it may queue alarm data to be processed by the next available operator. The next operator can access the alarm data associated to the alarm event from a queue and process the alarm event based upon the alarm data. The monitoring station can process alarm events according to the order they occurred by queuing up alarm data. Another example is that the processor might assign an operator to handle an alarm event and transmit alarm data to an electronic device associated to the operator. The electronic device associated to the operator might determine alarm data from the alarm data, and display the information to the operator handling it to allow him to manage the alarm event.

“In cases where the processor is embedded in an electronic device of an intermediary alert server, the processor may forward alarm data to a monitoring system to allow an operator to manage the alarm event. These implementations may allow the intermediary alarm server to provide information to the service in order to permit the operator to manage the alarm event. The processor might determine the alarm event information based on alarm data and give the information to the monitoring services. Before forwarding the alarm data, or any other information determined from the alarm data, to the monitoring services, the processor may also format the data or convert it to a format that is used by them.

“The processor can access voice communication information associated to the alarm system (130). The processor can access the telephone number associated to a wireless communication module in the alarm system. The processor can access the telephone number either from electronic storage, or based on a call received by the wireless communication module.

The processor can use the accessed information to make a call to the wireless module in an implementation that accesses voice communication information from electronic memory. The processor might access the telephone number of the wireless communication system and display it to an operator. This will allow the operator to make a call to that wireless module. Another example is that the processor could access the telephone number to automatically make a call to the wireless communications module and connect it to an operator at the monitoring service. The processor might also use the information to identify the call made by the wireless communication module in the alarm system to the station. The processor might access the voice communication information associated to the alarm system in order to identify a call received by the wireless communication module. This will allow the processor to route the call to an operator who is handling the alarm event. The processor can access the voice communication information associated to the alarm system from electronic storage, and transmit it to another electronic device.

“In some implementations, the processor may access voice communication information based upon a call received by the wireless communication module. The processor may then use this information to route the call towards an operator who is handling the alarm event. The processor might receive, via a wireless voice channel a call from the wireless communication module in the alarm system. Based on the received call, the processor might identify the number or other information associated to the wireless communication module and route the call to the appropriate operator. The wireless communication module may be used to identify the number of the wireless caller’s phone using ANI, DNIS or similar methods.

“The processor establishes voice communication sessions between the operator handling the alarm and the alarm system via a wireless voice channel (140). The processor might establish a voice communication session, which may include exchanging cellular vocal communications over a wireless voice channel that can transport cellular voices. The two-way voice communication session could be intercom-like and include a session of voice communication with the alarm system. Two-way voice communication sessions may allow an operator to listen in to an area near the sensor that detected the alarm event. Or, the operator can communicate with someone who is located within the same area. The processor can facilitate the establishment of the voice communication session by placing a call from a communication device to an alarm system wireless communication module or by facilitating the placement of call from the alarm system wireless communication module to the operator.

“For example, the wireless communications module could place a call and route it to the operator after a predetermined time period. The alarm system could transmit the alarm data before placing the call. This is possible by waiting a predetermined time (e.g. fifteen seconds, forty-five second, etc.). The monitoring station or intermediary alarm server may be able to receive the alarm data before they can receive the call. The intermediary alarm server, or monitoring station, may receive the alarm data before receiving the call. This will ensure that the call can be handled as a two way voice call associated to an alarm event and that it is routed to the operator who is handling the alarm event. The wireless communication module can place the call directly at the operator’s electronic communication device or route it to another device.

In other cases, the wireless communication module in an alarm system might place a call after it has received confirmation that the alarm data transmitted by the system was received by an intermediary server or monitoring station. The confirmation could include voice communication information to the monitoring device (e.g. a telephone number for an operator handling the alarm event), or the alarm system might keep voice communication information to the monitoring stations (e.g. a general telephone number) in electronic storage. An intermediary alarm server might provide an alarm system with a telephone number that an operator at a monitoring site can call to initiate the voice communication session. An alarm system may keep a telephone number for a monitoring station, which it calls whenever an alarm triggers a monitoring procedure. These implementations allow the monitoring station to receive a call and analyze the properties (e.g. using ANI/DNIS), identify the operator who handled the alarm event that caused the call to be placed, and route it to the appropriate operator.

“The operator may also place a call to the wireless communication module within the alarm system from the communication device that is associated with him. The processor might, for example, respond to alarm data and access voice communication information for wireless communication module. It may then display the voice communication information. The operator could use voice communication information (e.g. a telephone number) in this example. To make a call to wireless communication module within the alarm system. The alarm system’s wireless communication module receives the call and establishes the voice communication session.

“In some cases, the processor may establish the voice communication session shortly after the alarm system detects an alarm event. The processor might establish the voice communication session within a few minutes after the alarm system detects an alarm event. It may also be established within a matter of minutes or less than fifteen seconds. It may be advantageous to establish the voice communication session as soon as the alarm system detects an alarm event. This will allow the operator to quickly determine if the alarm is a true alarm event. Also, it will enable them to provide immediate service in the case that people need assistance.

“The processor establishes the voice communications session over a wireless channel, as discussed above. A wireless voice channel is a communication medium that a carrier or service provider uses to transmit voice communications. The wireless voice channel can be used to transmit voice data. This may include operations such as compression, digitization, and encryption to improve voice communications over the wireless channel. Processing data for transmission over a wireless vocal channel may involve sampling an analog waveform, and transmitting the sampled data via the wireless voice channel. These implementations use sampled data to receive over the wireless voice channel. The analog waveform is then reconstructed using the received data. The wireless voice channel is distinct from the wireless data channel through which the processor received alarm data. The benefits of both voice and data transmission over wireless voice channels may be realized by receiving alarm data via the wireless data channel.

“FIG. “FIG. 2 shows an example of an electronic network 200 that can establish a voice communication session with an alarm system operator. The electronic system 200 comprises a network 205 and an alarm panel 220. A monitoring system 230 is also included. An alarm server 240 is also included. The network 205 allows communications between the alarm panel, monitoring system 230, alarm server 240, and the network 205.

“The network205 is designed to allow electronic communication between devices connected to it 205. The network 205 could be set up to allow electronic communication between the alarm panel, monitoring system, and alarm server 240. The network 205 could include, for instance, one or more Internet, Wide Area Networks, Local Area Networks, (LANs), analog and digital wired telephone networks (e.g., a Public Switch Telephone Network (PSTN), Integrated Services Digital Networks, (ISDN), a cellular system, and Digital Subscriber Lines (DSL), radio, television and cable, satellite or any other delivery and tunneling mechanism for data transport. Network 205 can include several networks or subnetworks. Each network may contain, for instance, a wired and wireless data pathway. The network 205 can include a circuit switched network, a packet switch data network, and any other network that is capable of carrying electronic communications (e.g. data or voice communications). The network 205 could include networks that are based on Internet protocol (IP), Asynchronous Transfer Mode (ATM), the PSTN or Frame Relay or other similar technologies. It may also support voice using VoIP or other voice communication protocols. One or more networks may be included in the network 205 that include wireless data channels as well as wireless voice channels.

“The alarm panel210 contains a controller, a wireless communication unit 214, a speaker, 216, and microphone 218. The controller 212 can be used to control the alarm system with alarm panel 210. The controller 212 could contain a processor or some other control circuitry that executes instructions to control operation of an alarm system. These examples show that the controller 212 can be programmed to receive input from sensors or detectors and control the operation of alarm system devices. The controller 212 could be used to control the operation of the wireless communication module 214, the speaker 226 and the microphone 218 in the alarm panel 210.

“The wireless communication module (214) is a device that allows wireless communication over the network. The wireless communication device 214 can be used to exchange data over both a wireless data channel or a wireless voice channel. The wireless communication module could transmit alarm data via a wireless data channel, and establish a two way voice communication session using a wireless voice channel. One or more GSM modules, a radio module, cellular transmission or any other type of module that can exchange communications in one the following formats: GSM, GPRS or CDMA, EDGE, EDGE, EGPRS or EV-DO, UMTS or IP.

The speaker 216 could include an electromechanical transmitter that converts electrical signals into sound. The controller 212 may send an electrical signal to the speaker 216 and the speaker 216 will produce an audible signal based on that signal. The controller 212 may send an electrical signal to the speaker, 212 in response to an alarm event. This will cause the speaker to emit an audible alarm sound. Another example is that the controller 212 might send a signal indicating a voice communication to speaker 216 in order to make the speaker produce an audible voice communication. The controller 212 could control the wireless communications module 214 to establish voice communication sessions over a wireless voice channel. It may also send an electrical signal to speaker 216 to trigger the speaker to output the audio of voice communications received by the wireless communication modules 214. Another example is that the wireless communication module might send an electrical signal to the speaker 216, which could be representative of a voice communications. Some implementations may place the speaker 216 in a different location than the alarm panel. This may allow the speaker to have a coverage area different from that of the alarm panel. These implementations may have multiple speakers in order to cover a greater area. For example, an alarm system could monitor an entire building or a large number of sensors.

“The microphone 218 could include an acoustic-to-electronic transducer, or sensor that converts sound to an electrical signal. The microphone 218 can sense sound, such as a person speaking near the microphone 218, and generate an electrical signal based upon the sound. The microphone 218 might sense sound in an area close to the microphone 218, and send a signal corresponding to that sound to controller 212. The wireless communication module 221 may send the signal to the wireless communications module 214 for a voice communication. This is a session that establishes wireless communication with another entity (e.g. a monitoring station). The microphone 218 can transmit the electrical signal to the wireless communication module 214, instead of sending it through the controller 212. Further implementations may place the microphone 218 in a different location than the alarm panel so that it covers a wider area than the alarm panel. These implementations may have multiple microphones in order to cover a greater area. For example, an entire building that the alarm system monitors or areas close to all sensors.

“The alarm system that includes alarm panel 210 also includes one or more sensors and detectors. The alarm system could include multiple sensors 220 or 222. Sensors 220 and 222, for example, could be motion sensors or contact sensors. They also can be temperature sensors, smoke detectors, carbon monoxide, panic buttons sensors, or other sensors that detect an environment or physical condition. The controller 212 communicates with the sensors 220, 222 via communication links 224 or 226. The communication links 226 and 224 may be wired or wireless data pathways that transmit signals from the sensors 222 and 220 to the controller 212. The sensors 220, 222 and 226 may transmit continuously sensed data to controller 212. They also transmit periodically sensed values from the controller 212, or send sensed information to the controller 221 in response to changes in a sensed value. The controller 212 can receive signals from sensors 220 and 222, and may detect an alarm event based upon the sensed values. The sensor 220 could be a contact sensor attached to a door. The communication link 224 may be wirelessly connected between the controller 212 and sensor 220. The sensor 220 might sense that the door is open (e.g., there is no connection between the contacts in the sensor), and wirelessly transmit data to the controller 212 via communication link 224. This indicates that the door was opened. Based on the data received from the sensor 220-222, the controller 212 determines whether an alarm event (e.g. the door opening) occurred using the communication link 224. Based on the signal from the sensor 220, the controller 212 controls the operation of the alarm system.

“The monitoring system230 is an electronic device (e.g. a host, server, etc.). The alarm monitoring service can be provided by exchanging communications over the network with the alarm panel 220 and alarm server 240. The monitoring system 230 can be used to monitor alarm events generated from the alarm panel. The monitoring system 230 could communicate with the wireless communication module214 in the alarm panel210 to receive alarm events. Monitoring system 230 can receive alarm events via wireless data communications sent over a wireless data channel.

“In some cases, the monitoring system may be set up to establish two-way voice communication sessions using the wireless communication module (214) included in the alarm panel. These implementations allow the monitoring system to establish voice communication sessions with the wireless communication module214 via a wireless voice channel. In response to alarm panel 210 data, the monitoring system 230 can establish a two way voice communication session with wireless communication module214. This will allow the alarm panel to know that an alarm event has taken place. The monitoring system 230 can establish a two-way voice communication with the wireless communication module 214. This will allow an operator to respond to an alarm by listening to the microphone 218 in an area that is covered and then providing voice communications to the speaker 216.

“The monitoring system230 comprises multiple terminals 232, 234, and 234. Operators may use the terminals 232 or 234 to process alarm events. Operators may use the terminals 234 and 232 to process alarm events. For example, the monitoring device 230 could route alarm data to these terminals. The terminals 232 or 234 can be general-purpose computers (e.g. desktop personal computers, workstations or laptop computers), that are designed to receive alarm data from the monitoring system 230. They also display information based on this data. In the above example, the controller may control the wireless communication unit 214 to transmit alarm data to the monitoring system. The alarm data may be received by the monitoring system 230 and sent to the terminal232 for processing by the operator associated with terminal 232. Operators may be able to see information associated with an alarm event from the terminal 232. This could include the name of the alarm user, address of the building being monitored, type of alarm, and so on. The operator can use the information to handle the alarm event. In this example, the monitoring device 230 could establish a voice communication session over wireless voice channels between the wireless communication module 214, the terminal 223, or another device associated to the operator via the terminal 223. The operator can establish a voice communication session to listen to the microphone 218 in an area that is covered and then speak to the people using the speaker 216. The operator can determine if the alarm is a true alarm or false alarm. In this way, he/she may also be able more effectively handle the alarm event if it is a real alarm.

“In some cases, terminals 232 or 234 could be mobile devices, or devices that are specifically designed to perform a function. FIG. FIG.

“The alarm server 244 is an electronic device (e.g. a host, server, etc.). The alarm server 240 is designed to provide alarm monitoring services through electronic communication with the alarm panel, 210 and monitoring system 230 via the network 205. The alarm server 240 can be used to monitor alarm events generated from the alarm panel. The alarm server 240 could exchange electronic communications with a wireless communication module (214) in the alarm panel 220 to receive alarm events. Alarm server 240 can receive alarm events via wireless data communications sent over a wireless data channel.

“In some cases, the alarm server 244 may route alarm data from the wireless communication module 214, to the monitoring system 220. The alarm server 240, for example, may transmit alarm data to the monitoring device 230 via the network 205. The alarm server 240 could transmit alarm data to the monitoring device 230 via a communication medium other than wireless data channels. The alarm server 240 might transmit alarm data from the wireless communication module214 to the monitoring system230 via a wired telephone line. Alarm server 240 can add information to the alarm data from the wireless communication modules 214. It may also convert or transform alarm data into a format that is used by the monitoring systems 230.

The alarm server 240 may also facilitate the establishment of a voice communication between the monitoring system (230) and the wireless communication module (214), which is part of the alarm panel 220. The alarm server 240, for example, may transmit telephone information to the monitoring device 230 or wireless communication module 214, which can be used in the establishment of a wireless voice communication session via a wireless channel. The monitoring system and wireless communication module may also receive confirmation signals from the alarm server 240 regarding receipt and transmission alarm data. Some implementations allow the alarm panel 220 and the monitoring system 220 to exchange communications directly, and the alarm server 244 is not required.

“FIG. 3. illustrates an example 300 process for setting up a voice communication session between an operator and alarm system. FIG. 2 contains a list of components that can be used to facilitate the process. 2 are referred to as performing the process 300. Similar methodologies can be used in other implementations, where different components define the system’s structure or the functionality is distributed among them.

“The alarm panel210 receives a signal (230) The controller 212 might receive a signal over the communication link 220. This signal could indicate an alarm event, security breach, or other information. The signal could be an indication that the contact sensor has been removed (e.g. that the door has been opened). Another example is that the sensor 220 could be a smoke detector. The signal may indicate smoke detection. Or, the sensor 220-a motion detector may indicate motion detection.

The alarm panel 210 detects an alarm event using the signal (304). The controller 212, for example, analyzes the signal from sensor 220 to determine if an alarm event occurred. The controller 212 might access a list of criteria that are used to detect alarm events, and compare the signal received to this set to determine if an alarm event occurred. The controller 212 might determine that an alarm event occurred when it receives the signal from sensor 220 if the alarm system is set to an armed status.

“Some implementations may require multiple signals from multiple sensor before detecting an alert event. Other factors, such time and date, may also be required. The controller 212 might detect an alarm event if a motion sensor is activated along with a contact sensor, glass breaker sensor, or both. The alarm system user may have a pet capable of activating the motion sensor. However, detection of the motion sensors alone should not trigger an alarm event. Another example is that the controller 212 might compare the signal to a date or time associated with the received signal when detecting an alarm event. The alarm panel 210 may only detect an alarm event if it is received at a specific date and/or hour.

The alarm panel 210 transmits alarm data to alarm server 240 (306) when it detects an alarm event. The wireless communication module 214, for example, may transmit alarm data via a wireless data channel to alarm server 240. The wireless communication module 214, in some cases, may transmit alarm data as IP packets via a wireless data channel that is configured to transport IP packets. Other implementations allow the wireless communication module to 214 to send the alarm data via SMS over a wireless channel that can transport SMS messages. The wireless communication module 214, which communicates directly with the monitoring device 230, may transmit alarm data directly to the monitoring device 230. In these cases, the alarm server 240 will not be required.

The alarm data contains sufficient information for the alarm server 244 to respond to the alarm event. The alarm data could include information such as the alarm panel number 210, user ID 210 or location of alarm panel 220. Alarm data may contain a customer account number that the alarm server 244 can access to customer information. The alarm data can also include information about the type of alarm (e.g. security breach, fire alarm), The type of services required (e.g. police services, fire service, etc. ), the type of services required (e.g. police, fire, etc.

“The wireless communication module 214 sends alarm data to the alarm server 240 (310). The alarm server 240, for example, receives alarm data via wireless data channel through a wireless communication interface. The alarm server 240 receives the alarm data and processes it to determine the alarm event information. The alarm server 244 extracts the account number from alarm data and retrieves the associated information from electronic storage. Alarm server 240 can access information about the location where the alarm system associated to the account number is protecting. It may also access information regarding the name and phone number of the user associated to the account number. The alarm server 240 could access information that identifies the monitoring device 230 as the one used by the customer for the account number. It may also have information about how to contact the monitoring service 230. The alarm server 244 may access the information to transmit alarm data to the monitoring systems 230.

The alarm server converts alarm data (310). Alarm server 240 can convert alarm data from one format to another format that is used by the monitoring systems 230. The alarm server 240 can also convert the protocol used for transmitting alarm data from a first communication protocol that was used by alarm panel 210 to another communication protocol that is used by monitoring system 230. One example is that the alarm server 240 may be able to receive alarm data in IP packets over a wireless data channel. It may also convert the alarm data into digital dialer signals for transmission over a POTS phone line. Another example is that the alarm server 244 may receive alarm data as an SMS message over a wireless channel. It may then convert the alarm data to IP packets for transmission over an IP network.

“In certain implementations, the alarm servers 240 may add information before transmitting alarm data to monitoring system 230. The alarm server may add customer information (e.g. the customer’s telephone number) to the alarm data. This information is required by the monitoring systems 230 to process the alarm data (e.g. an account number for monitoring system 230). The monitoring system 230 might not recognize the account number associated to alarm server 244, so the alarm server 220 may need to add additional data to alarm data in order to allow the monitoring system 233,230 to identify the customer associated to alarm panel 210.

“The alarm server 244 transmits alarm data to the monitoring device 230 (312). The alarm server 240, for example, forwards alarm data from the alarm panel 220 to the monitoring system 230. The alarm server 240 can either directly forward the alarm data received from the alarm panel 210 to the monitoring system 230. The alarm server 240 may transmit the alarm data to monitoring system 230 via a different communication medium than the one from which it received the alarm data. The alarm server 240 might receive alarm data from the wireless communication unit 214 in the alarm panel210 via a wireless data channel. It may also transmit alarm data to the monitoring systems over a POTS telephone number.

“The monitoring system230 receives alarm data (314), and assigns alarm data to the operator for processing (316). The monitoring system 230, for example, receives alarm data via the network 205 and sends it to the alarm server 244. It then processes the alarm data to allow an operator to respond to the alarm. The monitoring system may assign an operator to process an alarm event and send the alarm data to the terminal associated with that operator (e.g. terminal 232 or 234). Other implementations place the alarm data into a queue to be processed by the next available operator. The next operator then accesses the alarm information from the queue.

The monitoring system 230 can process alarm data to assign it for operator processing and extract the information needed by the operator in order to handle the alarm event. The monitoring system 230 may also access electronic storage that is associated with the monitoring systems to retrieve information an operator might need in handling an alarm event, such as name, address, telephone numbers, etc. The monitoring system 230 can assign priority to the processing of alarm data, and then place the alarm data into the processing queue based on that priority. The monitoring system 230 might assign a priority higher to a smoke alert event for a residence when people are sleeping there than to one for a commercial building when people are absent.

“The monitoring system230 transmits a confirmation signal indicating receipt of alarm data to alarm server 240 (318). The monitoring system 230, for example, transmits an electronic confirmation message to alarm server 240 via the network 205. The confirmation message could indicate that the monitoring systems 230 received the alarm data correctly and that the monitoring systems 230 are handling the alarm event.

“The confirmation message from the monitoring systems 230 (320) is received by the alarm server 240. The alarm server 240 may receive the confirmation message from monitoring system 230 via electronic communication over the network. 205 Alarm server 240 can process the confirmation message to verify that the monitoring system 220 received correct alarm data. The alarm server 240 might decide that an additional transmission of alarm data is not necessary because the monitoring system has confirmed receipt.

“The alarm server 244 transmits the confirmation message (322) to the alarm panel 220 (322). The alarm server 240, for example, forwards the confirmation message from the monitoring system to the alarm panel 220 via the network 205. The alarm server 240 can either directly forward the confirmation message received from the monitoring system 230 to the alarm panel 210 over the network 205. The alarm server 240 may transmit the confirmation message to alarm panel 210 via a different communication medium than the one from which it received the confirmation message. The alarm server 240 might receive the confirmation message over a POTS telephone line from the monitoring system, and transmit it to the wireless communication module (214) included in the alarm panel.

“The alarm panel210 receives the confirmation message (324), and makes a wireless voicecall to the monitoring system (230) (326). The wireless communication module 214 in the alarm panel210 receives the confirmation message via the network 205 and an electronic communication from alarm server 240. The confirmation message is received by the controller 212 in the alarm panel210. This allows the controller to access the telephone number for the monitoring system230. It can then place a wireless voicecall to the monitoring system230 telephone number using the wireless communication module 214. The alarm panel 210 may allow the controller 212 to access the telephone number of the monitoring system.

“In some cases, the wireless communication unit 214 in the alarm panel210 transmits the alarm data to the alarm server 244 over a different wireless voice channel than the wireless data channel with the wireless communication system 214. The wireless voice channel is designed for voice communication and transmits data via a wireless data channel.

Waiting for the confirmation message to indicate that the monitoring device 230 has received the alarm information before placing the wireless voice calls, may allow the establishment of a two way voice communication session to be coordinated with the transmission. This will ensure that the monitoring equipment 230 can appropriately handle the wireless voice calls. The wireless communication module 214, for example, may have placed the wireless call before the monitoring system 220 received the alarm data. In this case, the monitoring system 220 could handle the wireless call as an ordinary call, and not process it to establish a two way voice communication session. The alarm panel 210 can wait for a confirmation message to confirm that it has received the wireless voice calls. This will ensure that the monitoring system data is available to the alarm panel.

“The wireless voice call is received by the monitoring system 230 (328). The wireless voice call is received by the wireless communication modules 214 and transmitted to the monitoring systems 230 by a wireless service provider. The call may be received by the monitoring system 230 via a telephone exchange (e.g. a PBX or telephone switch).

“The monitoring system230 recognizes the alarm panel210 based upon the received call (330). The monitoring system 230, for example, can identify the call as coming from alarm panel 210 by referring to the telephone number that was associated with the call. The monitoring system 230 could identify the call as coming from the wireless communication module 214 in the alarm panel using ANI, DNIS or other similar techniques. The monitoring system 230 could identify a customer account number associated to the alarm panel 210 by searching for that customer account number in the ANI and DNIS information. You may also use other methods to identify the call as coming from the alarm panel.

“The monitoring system230 identifies which operator is handling alarm data for alarm panel 210 (332). The monitoring system 230 can determine that the call was received from the alarm panels 210 and identify the operator responsible for handling the alarm data from the alarm panel210. The monitoring system 230, for example, may identify a customer number associated with the received phone call based upon ANI or DNIS information. This will then identify the operator who is handling the alarm data associated to the customer account number.

“The monitoring system230 routes the call to the operator who handles the alarm data associated the alarm panel210 (334). The monitoring system 230 could access information about the operator who is responsible for the alarm data associated to the alarm panel 210. Based on this information, it may route the call towards a communication device that the operator uses. The monitoring system 230 could access the telephone number of the operator who is handling the alarm data to route the call. The operator can answer the phone call by routing it to his telephone number and establish a two way voice communication session with alarm panel 210. Two-way voice communication sessions may allow the operator to listen in to an area near the microphone 218 in alarm panel210 and to speak to people who are located in an area close to the speaker 216 in alarm panel210.

The operator can determine whether an alarm event associated to the alarm data is a true alarm or false alarm by using the two-way voice communications session. The operator might ask someone in the vicinity of speaker 216 for a secret number if they believe the alarm is false alarm. If the secret code is given, the operator will determine that the alarm is false alarm. The operator can also provide better emergency services by using two-way voice communication. The operator might be able, for example, to communicate with an incapacitated person in an area near the alarm panel 210 to send medical assistance. The incapacitated person might not have any other means of communication with the operator or emergency service (e.g., they could not answer a call or get up to place) so the operator may establish a two-way voice communication session.

“FIG. “FIG. FIG. 2 shows a list of components that are included in the process 400. 2 are referred to as performing the process 400. Similar methodologies can be used in other implementations, where different components define the structure or the functionality is distributed among the components.

“The alarm panel210 receives a signal (202) from the sensor 220- and detects an alarm event (404). The alarm panel 210, for example, receives a signal (402) from the sensor 220. It then detects an alarm event using the techniques described in FIG. 302 and 304. 3.”

“In response to an alarm event being detected, the alarm panel210 transmits alarm data (406) to the alarm server. The alarm panel 210, for example, transmits alarm data via the alarm server to 240. This is done using the techniques shown in FIG. 306, but with the exception of step 306 (see FIG. 3.”

“The alarm server 244 receives alarm data from wireless communication module 214, converts it (410) and transmits it to the monitoring system 231 (412). The alarm server 240, for example, receives alarm data from wireless communication module 214, converts it (410), and transmits the alarm to monitoring system 230. This is done using the steps 308, 312 and 312 in FIG. 3.”

“The monitoring system230 receives alarm data (414), and transmits a confirmation to the alarm server240 (416). The monitoring system 230, for example, receives alarm data and sends a confirmation message to the alarm server. 240. This is done using the techniques described in FIG. 314 and 318. 3.”

“The monitoring system230 determines that alarm panel 210 has an two-way voice feature (418). The monitoring system 230, for example, processes alarm data to determine if the alarm panel 210 that is associated with the alarm data has the two-way voice feature. Some implementations may contain information in the alarm data that indicates whether the alarm panel210 associated with the alarm system data has a 2-way voice feature. These implementations may include a code or part from an account number that indicates whether the alarm system 210 associated with the alarm data features a two way voice feature. The monitoring system 230 can determine if the alarm panel210 has a 2-way voice feature by extracting the code/part of the account number, and comparing it to other information. The monitoring system 230 can identify the alarm panel210 using alarm data. It may also have access to electronic storage that is associated with the monitoring device 230. This information will indicate whether the alarm panel features a two-way feature. The monitoring system 230 might access information to determine whether the model number of the alarm panel 210 has a two-way voice feature. Another example is that the monitoring system 230 could access customer information using the alarm panel 220 and determine if the customer has subscribed to monitoring services with a two-way voice feature.

The monitoring system 230 stores the alarm data (420) in response to the detection that the alarm panel210 has a two way voice feature. The monitoring system 230 could store the alarm data temporarily until it receives a call from alarm panel 210, or until a predetermined time has passed. The monitoring system 230 may not assign alarm data to operator processing until the alarm panel210 calls it. In this case, both the alarm data as well as the call from alarm panel210 can be routed to the operator simultaneously. After a predetermined time period, the monitoring system 230 will assign the alarm data to operator processing. This is in order that the alarm data can be processed without the use of two-way voice communications in the unlikely event that they are not established. The predetermined time period may be greater or smaller than the time required to receive a call from an alarm panel, or if there is an acceptable delay in responding.

“In some cases, the monitoring device 230 may start processing the alarm data and send an alarm server 240 or 210 a command. This indicates that the monitoring system is waiting for a call or make a call to the alarm panel. The monitoring system may issue a command to alarm panel 220 instructing it to stop trying to contact the monitoring system 233. The alarm panel 210 may then be called by the monitoring system 230.

“The alarm server 244 receives the confirmation from the monitoring system (422) and transmits it to the alarm panel 220 (424). The alarm server 240, for example, receives the confirmation from the monitoring system (230) and transmits it to the alarm panel (210) using the techniques described in FIG. 3.”

Summary for “Alarm system that can be used with two-way voice”

Many people have alarm systems installed in their homes or businesses to increase security. Alarm systems can include control panels that allow a person to manage the alarm system’s operation and monitor for security breaches. Alarm systems may emit an audible alarm if they detect a security breach. If the alarm system is monitored, the alarm service may transmit electronic data to alert them of the security breach.

“In one aspect, an alarm system and operator dealing with an alarm event are able to establish a voice communication session. A wireless communication module that is part of an alarm system receives alarm data and transmits it over a wireless channel to an operator. Alarm data is used to indicate the alarm event. Based on the alarm data received, an operator can handle the alarm event. Voice communication information associated to the wireless communication module in the alarm system can be accessed. An operator using the alarm device establishes a voice communication session over a wireless voice channel. This is independent from the wireless data channel. It is established between the operator and the wireless communication module in the alarm system.

“Implementations could include one or more the following features. A call may be received by the wireless communication unit over the wireless voice channel. The received call may identify a number associated to the wireless communication unit. This example shows that an operator who is handling the alarm may be identified using the identified number. A number associated with the operator’s communication device may also be accessed and the received call may then be routed to the operator’s communication device using the accessed number.

“In some cases, the phone number associated to the wireless communications module can be accessed and a call can be made over the wireless voice channel to the wireless communication modules. Other implementations may transmit confirmation information to the wireless communications module over the radio data channel to respond to alarm data. A call may also be made from the wireless communication unit over the wireless voice channel. In response to the confirmation information, the wireless communication module may place the call. These implementations allow access to a number associated the received call. An operator who is handling the alarm event can be identified using the identified number. The operator’s communication device may also be accessed. If the number is accessed, the operator can route the received call to that device.

Based on received alarm data, it might be possible to determine that an alarm system has a two-way speech feature. If the alarm system has the two-way voice feature, the processing of the alarm data received may be delayed for a predetermined time and monitored for any incoming calls during that time. The wireless communication module can receive a call over the wireless voice channel and monitor for incoming calls. A number associated with the call may also be identified. The received call could be associated with alarm data. An operator may be identified to handle the alarm event. The received call may be routed first to the identified operator and the alarm data to the second device.

The wireless communication module may receive a command to initiate a call. Operators may enter user input to initiate the voice call. The wireless voice channel may receive a call from the wireless communications module. In response to the request to initiate the call, the wireless communication module may place the call. An operator may be able to identify the number associated with the call. The operator’s communication device may have a number that can be accessed. If the number is accessed, the received call could be routed to the operator’s communication device.

“In some cases, the alarm system may include a two-way vocal feature. A command to initiate a call to the wireless communication module may be sent to it if the alarm system has the two-way feature. The wireless voice channel may allow the wireless communication module to receive a call. In response to the request to initiate the call, the wireless communication module may place the call and identify the number associated with it. The identified number may allow an operator to be identified. A number associated with the operator’s communication device may also be accessed. If the access number is known, the operator can route the received call to the device that was used by him.

An alarm system could be a security system that is installed in a building. A security system can be set up to detect alarm events based on signals from at least one sensor. The security system may establish a voice communication session to allow the operator to listen to an area of the building and to communicate with someone who is there.

“The described techniques can be implemented using hardware, a process or method, or software on a computer accessible medium. Details of any one or more implementations can be found in the accompanying drawings as well as the description. The description and drawings will also reveal other features.

“DESCRIPTION of Drawings”

“FIG. “FIG.

“FIG. “FIG.

“FIGS. “FIGS.

“FIG. “FIG.7” is a flowchart that illustrates a process to establish a voice communication session between an Alarm System and an Operator using Shelf and Slot numbers.

“FIG. “FIG.8 is a block diagram of a typical electronic system that establishes a voice communication session between an operator and alarm system.”

“FIG. “FIG. 9” is a flowchart that illustrates a process to establish a voice communication session between an alarm alarm system and an operator using shelf numbers and slot numbers.

“FIG. “FIG.

“FIG. “FIG. 11. This flow chart illustrates a process to establish a voice communication session between an alert system and a notification receiver.”

“FIG. “FIG.12 is a block diagram showing an example of an electronic device that can establish a voice communication session with an alarm system and a recipient of notification.”

“FIGS. 13-18 are flowcharts that illustrate examples of voice communication sessions between an alarm system (FIGS.) and a notification receiver (FIGS.

“Techniques can be used to establish a voice communication session between an alarm system and a central monitoring station. Two-way voice communication is provided in some cases between an alarm system, such as a security system in a residence, and a central monitoring station. These implementations allow the alarm system to transmit data via a wireless data channel, and establish a two way voice communication session over a separate wireless voice channel with the notification recipient or central monitoring station.

An alarm system, such as a security system that is installed in a residential or commercial building and includes one or more control panels, detects an alarm event, such as a security breach or emergency situation. One or more sensors may be included in the alarm system (e.g. contact sensors and motion sensors as well as temperature sensors and smoke sensors. The alarm system may detect an alarm event based upon a signal from one or more sensors. If the alarm system is set to alarm, it may respond to a signal from a sensor on a door leading to the building.

“In some cases, an alarm system can be set up for remote monitoring by a system (e.g. a central monitoring station or in combination with an intermediary server). These implementations allow the alarm system to transmit data to the monitor system when it detects an alarm event.

The wireless communication module in an alarm system could be used to transmit alarm data to the monitoring system. This includes data identifying the alarm, customer account numbers, information about the customer, alarm system type, alarm events, alarm triggers, and other information. The wireless communication module could be used to transmit alarm data via a wireless data channel. This includes Global System for Mobile Communications (GSM)/General Packet Radio Service(GPRS) data channel and Code Division Multiple Access data channel. It is possible that the wireless data channel can transmit voice communications and establish voice communication sessions. The wireless data channel can transmit alarm data with greater reliability, quality, speed, and security than transmissions over a wireless voice channel (e.g. a GSM voice channel or a cellular vocal channel). The alarm system owner may not have to maintain a telephone line (e.g., an ordinary telephone service (POTS), line) in order to transmit alarm data wirelessly. One example is that an alarm system can send alarm data to the monitoring systems over a GSM/GPRS data channel when it detects an intruder in a building. Alarm data can include information about an intruder detection and a customer account number.

“The monitoring system might receive alarm data via the wireless data channel, and allow an operator to manage the alarm event based upon the received alarm data. One example is that the monitoring system could be a standalone system. The central monitoring system, in this case, receives alarm data from the wireless communication module via the wireless data channel. It then queues the alarm data to be processed by the next operator.

“Another example is that the monitoring system could include a central monitoring station and an intermediary server. The intermediary alarm server could receive alarm data over wireless data channels and convert it or reformat it (e.g. convert alarm data into a digital dialer signal, or to a format accepted by the central station), before transmitting the alarm data back to the central station. The central monitoring station assigns an operator to handle alarm data. This operator can determine more information about the alarm, dispatch emergency services, and perform other services that could be helpful in handling the event. In the above example, an operator assigned at a central monitor station to handle alarm data transmitted via the GSM/GPRS data channels by the wireless communication module to respond to an alarm system detecting an intrusion may determine that the alarm is an intruder alarm based on alarm data and attempt further information. An operator may also determine the location of the building that is associated with an alarm system using the customer account number in alarm data. This will enable them to dispatch emergency services to the location.

In some cases, the monitoring system is linked to the alarm system in order to establish a two way voice communication session between the operator who handles the alarm at the central monitoring station. The alarm system and monitoring system could coordinate to establish a two way voice communication session over a wireless channel (e.g., GSM voice channel, or cellular voice channel). Implementations in which alarm data is transmitted over wireless data channels may require coordination between the monitoring and alarm systems to establish the two way voice communication session with a device associated the operator handling the alarm event at central station. This could be because the wireless voice channel differs from (e.g. separate, distinct, unrelated or decoupled). The wireless data channel. These implementations may provide high reliability for alarm data transmission and two-way voice communication services, without the need to maintain a POTS phone line. The alarm system and a central monitoring station that handles the intruder events may establish a two way voice communication session using a GSM voice channel. Two-way voice communication allows the operator to listen to the intruder’s event via a microphone built into the alarm system. The speaker in the alarm system can also be used to communicate with individuals nearby. The operator may be able to listen in on the intruder’s event and communicate with people proximate through the alarm system. This may allow him to determine if the event is real or false.

One example is that the central monitoring station could be set up to send a confirmation signal to alarm system upon receiving alarm data. The wireless communication module in alarm system may also be configured to make a voice call to central monitoring station after receiving confirmation. The confirmation signal could include the telephone number for the central monitoring station or the alarm system might access electronic storage to find the number to call after receiving the confirmation signal. The central monitoring station can be set up to route the wireless call to the operator who is handling the alarm data. This may include identifying the alarm system associated with the customer and the operator handling that alarm data. The central monitoring station might identify the phone number for the wireless voice call received from an alarm system by using automatic number identification (ANI), or dialed number identification service (DNIS) and determine a customer number. This will route the call to the operator who is handling the alarm event associated to the customer account number in order to establish a two way voice communication session.

“Another example is that the alarm system may wait for a predetermined time (e.g. fifteen seconds) before sending alarm data over wireless data channel. Then, it will place the voice call over wireless voice channel to the central monitoring station. An operator or system administrator may set the time or change it to control the alarm system. The predetermined time can be dynamically configured based on the current alarm system communications network operating conditions.

“Another example is that the central monitoring station may upon receiving alarm data determine if the alarm systems sending it has a 2-way voice feature and hold the alarm data until an alarm system receives a wireless voice. The condition on this determination is to route the alarm data and wireless voice calls received to an operator after receipt of the wireless voice. The voice call could be answered by the next operator, and the alarm data presented to the operator who answered it. Another example is that the central monitoring station could transmit to the alarm systems a command to activate the wireless communication system. This may allow the central monitoring stations to place a wireless voicecall to the central station, or access the phone number for wireless communication modules in the alarm and make a call to them.

“In some cases, technology that is used to perform two way voice services with alarm system over wired telephone lines (e.g. POTS phone lines), may be leveraged to provide wireless voice services. Central monitoring stations that are connected to alarm systems over POTS phone lines can route two-way voice call to the appropriate operator using a shelf/slot number associated to the physical phone line connection at their central monitoring station. Some central monitoring stations may assign shelf/slot number to extensions or identifiers of incoming wireless calls (e.g. private branch exchange extensions (PBX extensions)). In this way, shelf/slot numbers can be associated with incoming wireless calls. An intermediary alarm server may be assigned a set of shelf/slot number for wireless phone numbers by central monitoring stations. These implementations may include the provision of alarm data from an alarm system via a wireless data channel to a central station, and the establishment of a two way voice communication session over a wireless voice channel between the central station and alarm system. This is done by using the technology of the central station to provide two-way voice services to alarm systems over wired telephone lines. The intermediary alarm server may receive alarm data over a wireless data channel. The intermediary alarm server receives alarm data and assigns it a shelf/slot number. This number corresponds to the wireless phone numbers (e.g. PBX extensions) associated to the central monitoring station. The central monitoring station receives the signal from the intermediary alarm server. It generates a signal that allows identification of the alarm data as well as the assigned shelf/slot numbers. The central monitoring station receives the signal and associates the alarm data to the assigned shelf/slot. This means that calls to the assigned wireless number (e.g. PBX extension), will be routed to the operator who handles the alarm data. This technology is used for two-way voice communications sessions over wired lines (e.g. POTS phone lines). The telephone number associated to the assigned shelf/slot is also transmitted by the intermediary alarm server to the alarm system. The alarm system receives the telephone number and places a call to the associated phone number via wireless voice channel. The intermediary alarm server transmits the alarm data to central station in a way that allows identification of the assigned shelf/slot numbers. A wireless voice call is made from alarm system to the phone number associated with assigned shelf/slot numbers. This operator uses the same software to route the previously transmitted alarm data. These solutions may prove cost-effective as modifications to central monitoring stations technology and wireless communication module included in alarm system may not be necessary.

“In some cases, central monitoring stations may assign a number of PBX extension identifiers to an intermediary server. These implementations may see the intermediary alarm server coordinate the provision of alarm data from an alarm system via a wireless data channel to a central station and establish a two-way voice communication channel between the central station and alarm system using the PBX extensions identifiers. The intermediary alarm server may receive alarm data over a wireless data channel. The intermediary alarm server receives the alarm data and adds an available PBX Extension identifier from its pool. The intermediate alarm server generates a signal which identifies the alarm data and assigns PBX extension identifier to the central monitoring station. The central monitoring station receives the signal and associates alarm data with the assigned PBX Extension identifier. It then provides the operator with the assigned PBX Extension identifier. The telephone number associated to the assigned PBX Extension identifier is also transmitted by the intermediary alarm server. The alarm system receives the telephone number and places a call to the associated PBX extension identifier phone number. The alarm station will provide the assigned PBX Extension identifier along with alarm data to the operator. This allows the operator to answer the call from the alarm system to the phone number associated to the assigned PBX Extension identifier. They can also establish a two-way voice communication with the alarm system via the wireless voice channel.

In some cases, an alarm system can be set up to establish a two way voice communication session with a notification receiver (e.g. an owner of an alarm system), rather than an operator at a central station. A two-way voice communication session may be established with a notification receiver to enable them to monitor their building (e.g., residence) or to assist in responding to alarm system events that might not result in notification to an operator at the central monitoring station. An alarm system might detect the opening of a medicine cabinet. An alarm system might transmit event data to indicate that the medicine cabinets have been opened to an alarm server via a wireless data channel. The alarm server or alarm system may decide that the detection of the medicine cupboard opening is not sufficient to notify a central monitoring station, but that notification recipients should be notified. The alarm server will receive data from the alarm system indicating that the medicine cabinets have been opened. This event is identified by the alarm server. The alarm server can identify the recipient of the notification by identifying the owner of the alarm and the customer who sent the event data. Another example is that multiple recipients can be associated with an alarm and one notification recipient may be chosen. Depending on the type, several notification recipients could be selected. After identifying the recipient of the notification, the alarm server allows for two-way voice communication via a wireless voice channel with the alarm system as well as an electronic device associated to the recipient. A two-way voice communication session, for example, may be established between an alarm system and a cellular phone associated with the notification receiver. This example allows the notification recipient to communicate with people in the vicinity of the medicine cabinet to obtain more information. The notification receiver may, for example, establish a two way voice communication session with an alarm system to determine if the recipient’s grandmother opened her medicine cabinet and ask the grandmother if she has taken the right medication to prevent a medical emergency.

Implementations where an alarm system can transmit data over a wired data channel and establish two-way voice communication sessions with a central monitoring station, notification receiver or notification receiver over a wireless voice channels that are decoupled from the wireless channel may have benefits. A wireless voice channel is a communication medium that a carrier or service provider uses to transmit voice communications. A wireless data channel, on the other hand, may be used to transmit data communications by a carrier or service provider. A service provider may assign a frequency band within the GSM/GPRS spectrum to a wireless voice channel, and a different frequency band within the GSM/GPRS Spectrum for a wireless data channel. The wireless voice channel might be set up to receive voice calls. Therefore, voice data can be sent over the wireless channel using processing operations like digitization, compression and encoding. This will optimize voice communications via the wireless voice channel. Some implementations of processing data for transmission over wireless voice channels may involve sampling an analog waveform, and transmitting the sampled data over wireless voice channel. These implementations allow digital data to be transmitted (e.g. alarm data) over a wireless voice channel. The digital data is converted into an analog waveform and sampled before being sent over the wireless vocal channel. These implementations also allow for the sampling of data to be received over the wireless voice channel, and the analog waveform can then be reconstructed using the received data. The digital data, such as alarm data, is obtained by converting the analog waveform into digital format. Digital data transmitted over wireless voice channels may not be reliable and may lose its integrity.

A wireless data channel might be better suited for data transmission. The wireless data channel may have different processing requirements than the wireless voice channel. Processing data for transmission over wireless data channels may not involve sampling an analog waveform or transmitting sampled data. Instead, it may include transmitting a digital representation (e.g. alarm data) over wireless data channels. These implementations allow the direct representation of digital data to be received over the wireless channel. The digital data can be received without significant integrity problems or loss.

The wireless voice channel transmits data via substantial processing, which includes sampling an analog signal and requires more information per packet. Digital data, such as alarm data, may not be transmitted over the wireless channel as fast or accurately as over the wireless data channel. The wireless data channel doesn’t include significant voice processing, does not sample an analog waveform and may require more processing than voice communications over a wireless voice channel. The benefits of transmitting data over wireless channels and setting up a two-way voice communication channel over a wireless voice channel can be achieved.

“FIG. “FIG. A processor is generally described as performing the operations shown in flow chart 100. The processor can be integrated in electronic devices or systems that send and receive data over a network. The processor could be part of an alarm server, central monitoring station server or any other electronic device that monitors an alarm system. Another example is that process 100 can be executed by several processors in different electronic devices or systems.

“The processor receives alarm information transmitted by an alarm network over a wireless data channel when the alarm system detects an alarm event (110). The processor might receive alarm data from one or more electronic communications over a network, for example. Information associated with an alarm event may be included in the alarm data. The alarm data could include information that identifies the alarm system or user that detected the alarm event, as well as information that describes or identifies the alarm event. One implementation detects the opening of a door within a building monitored by the alarm system based on a signal sent from a contact sensor. This implementation may contain information that identifies the alarm system and the alarm user, as well as the building being monitored. Information about the type of alarm (e.g. security breach) and which door was opened by the alarm system may also be included in the alarm data.

“In some cases, the processor may receive the alarm data directly over a wireless data channel. The processor could be part of an electronic system that uses wireless data channels to exchange electronic communications. The processor could be part of an intermediary alarm server, which communicates with the alarm network and transmits information about detected alarm events to the central monitoring station via a communication medium other that a wireless data channel. The intermediary alarm server could receive alarm data from an alarm system via the wireless data channel, and transmit it to a monitoring station using a POTS telephone line.

“In some cases, the processor could be part of a monitoring station device that transmits data over a wireless data network. These examples show that the alarm system could transmit alarm data to the monitoring station directly over the wireless data channel.

“In further implementations the processor receives the alarm data from an alternative device to the alarm system using a communication medium that is not wireless. The alarm system could transmit alarm data over a wireless channel to an intermediary server. The intermediary alarm server might receive alarm data and forward it to another electronic device with the processor via a different communication medium than wireless data channels. The intermediary alarm server could receive alarm data via a wireless channel and forward it to another electronic device that has the processor. The processor then receives the alarm data originally transmitted by the alarm system over the wireless data channel and forwards it to a monitoring station that includes the processor. These implementations may allow a user to use an alternative alarm system, which does not require a POTS telephone connection with a monitoring station that has a POTS phone line. The intermediary alarm server can transform or convert alarm data received via the wireless data channel into a format that is suitable for transmission over a telephone line to the monitoring stations.

As mentioned above, an alarm system can transmit alarm data via a wireless data channel optimized for digital data transmission. It may also carry a direct representation (e.g. alarm data) of digital data. The alarm system could transmit alarm data via a GSM/GPRS channel. It may also transmit alarm data in IP packets using a wireless channel that can transport IP packets. Or, it may send the alarm data to a Short Message Service message (SMS) over a wireless channel that can transport SMS messages.

“The processor allows an operator to manage the alarm event based upon the received alarm data (120). The processor, for example, allows the provision of alarm data to an electronic device (e.g. a computer or terminal). An operator uses to manage alarm events. Based on alarm data, the electronic device can determine the alarm event information and display it to the operator. Information associated with an alarm event can include information about the type of alarm, the alarm system or building that caused it, the sensor that gave rise to it, and any other information related to the alarm. Based on this information, the operator can handle the alarm event. The operator might determine if the alarm is a true alarm or false alarm. In this case, the operator could dispatch emergency services to the building that was affected by the alarm.

“In cases where the processor is embedded in an electronic device or monitoring station, it may queue alarm data to be processed by the next available operator. The next operator can access the alarm data associated to the alarm event from a queue and process the alarm event based upon the alarm data. The monitoring station can process alarm events according to the order they occurred by queuing up alarm data. Another example is that the processor might assign an operator to handle an alarm event and transmit alarm data to an electronic device associated to the operator. The electronic device associated to the operator might determine alarm data from the alarm data, and display the information to the operator handling it to allow him to manage the alarm event.

“In cases where the processor is embedded in an electronic device of an intermediary alert server, the processor may forward alarm data to a monitoring system to allow an operator to manage the alarm event. These implementations may allow the intermediary alarm server to provide information to the service in order to permit the operator to manage the alarm event. The processor might determine the alarm event information based on alarm data and give the information to the monitoring services. Before forwarding the alarm data, or any other information determined from the alarm data, to the monitoring services, the processor may also format the data or convert it to a format that is used by them.

“The processor can access voice communication information associated to the alarm system (130). The processor can access the telephone number associated to a wireless communication module in the alarm system. The processor can access the telephone number either from electronic storage, or based on a call received by the wireless communication module.

The processor can use the accessed information to make a call to the wireless module in an implementation that accesses voice communication information from electronic memory. The processor might access the telephone number of the wireless communication system and display it to an operator. This will allow the operator to make a call to that wireless module. Another example is that the processor could access the telephone number to automatically make a call to the wireless communications module and connect it to an operator at the monitoring service. The processor might also use the information to identify the call made by the wireless communication module in the alarm system to the station. The processor might access the voice communication information associated to the alarm system in order to identify a call received by the wireless communication module. This will allow the processor to route the call to an operator who is handling the alarm event. The processor can access the voice communication information associated to the alarm system from electronic storage, and transmit it to another electronic device.

“In some implementations, the processor may access voice communication information based upon a call received by the wireless communication module. The processor may then use this information to route the call towards an operator who is handling the alarm event. The processor might receive, via a wireless voice channel a call from the wireless communication module in the alarm system. Based on the received call, the processor might identify the number or other information associated to the wireless communication module and route the call to the appropriate operator. The wireless communication module may be used to identify the number of the wireless caller’s phone using ANI, DNIS or similar methods.

“The processor establishes voice communication sessions between the operator handling the alarm and the alarm system via a wireless voice channel (140). The processor might establish a voice communication session, which may include exchanging cellular vocal communications over a wireless voice channel that can transport cellular voices. The two-way voice communication session could be intercom-like and include a session of voice communication with the alarm system. Two-way voice communication sessions may allow an operator to listen in to an area near the sensor that detected the alarm event. Or, the operator can communicate with someone who is located within the same area. The processor can facilitate the establishment of the voice communication session by placing a call from a communication device to an alarm system wireless communication module or by facilitating the placement of call from the alarm system wireless communication module to the operator.

“For example, the wireless communications module could place a call and route it to the operator after a predetermined time period. The alarm system could transmit the alarm data before placing the call. This is possible by waiting a predetermined time (e.g. fifteen seconds, forty-five second, etc.). The monitoring station or intermediary alarm server may be able to receive the alarm data before they can receive the call. The intermediary alarm server, or monitoring station, may receive the alarm data before receiving the call. This will ensure that the call can be handled as a two way voice call associated to an alarm event and that it is routed to the operator who is handling the alarm event. The wireless communication module can place the call directly at the operator’s electronic communication device or route it to another device.

In other cases, the wireless communication module in an alarm system might place a call after it has received confirmation that the alarm data transmitted by the system was received by an intermediary server or monitoring station. The confirmation could include voice communication information to the monitoring device (e.g. a telephone number for an operator handling the alarm event), or the alarm system might keep voice communication information to the monitoring stations (e.g. a general telephone number) in electronic storage. An intermediary alarm server might provide an alarm system with a telephone number that an operator at a monitoring site can call to initiate the voice communication session. An alarm system may keep a telephone number for a monitoring station, which it calls whenever an alarm triggers a monitoring procedure. These implementations allow the monitoring station to receive a call and analyze the properties (e.g. using ANI/DNIS), identify the operator who handled the alarm event that caused the call to be placed, and route it to the appropriate operator.

“The operator may also place a call to the wireless communication module within the alarm system from the communication device that is associated with him. The processor might, for example, respond to alarm data and access voice communication information for wireless communication module. It may then display the voice communication information. The operator could use voice communication information (e.g. a telephone number) in this example. To make a call to wireless communication module within the alarm system. The alarm system’s wireless communication module receives the call and establishes the voice communication session.

“In some cases, the processor may establish the voice communication session shortly after the alarm system detects an alarm event. The processor might establish the voice communication session within a few minutes after the alarm system detects an alarm event. It may also be established within a matter of minutes or less than fifteen seconds. It may be advantageous to establish the voice communication session as soon as the alarm system detects an alarm event. This will allow the operator to quickly determine if the alarm is a true alarm event. Also, it will enable them to provide immediate service in the case that people need assistance.

“The processor establishes the voice communications session over a wireless channel, as discussed above. A wireless voice channel is a communication medium that a carrier or service provider uses to transmit voice communications. The wireless voice channel can be used to transmit voice data. This may include operations such as compression, digitization, and encryption to improve voice communications over the wireless channel. Processing data for transmission over a wireless vocal channel may involve sampling an analog waveform, and transmitting the sampled data via the wireless voice channel. These implementations use sampled data to receive over the wireless voice channel. The analog waveform is then reconstructed using the received data. The wireless voice channel is distinct from the wireless data channel through which the processor received alarm data. The benefits of both voice and data transmission over wireless voice channels may be realized by receiving alarm data via the wireless data channel.

“FIG. “FIG. 2 shows an example of an electronic network 200 that can establish a voice communication session with an alarm system operator. The electronic system 200 comprises a network 205 and an alarm panel 220. A monitoring system 230 is also included. An alarm server 240 is also included. The network 205 allows communications between the alarm panel, monitoring system 230, alarm server 240, and the network 205.

“The network205 is designed to allow electronic communication between devices connected to it 205. The network 205 could be set up to allow electronic communication between the alarm panel, monitoring system, and alarm server 240. The network 205 could include, for instance, one or more Internet, Wide Area Networks, Local Area Networks, (LANs), analog and digital wired telephone networks (e.g., a Public Switch Telephone Network (PSTN), Integrated Services Digital Networks, (ISDN), a cellular system, and Digital Subscriber Lines (DSL), radio, television and cable, satellite or any other delivery and tunneling mechanism for data transport. Network 205 can include several networks or subnetworks. Each network may contain, for instance, a wired and wireless data pathway. The network 205 can include a circuit switched network, a packet switch data network, and any other network that is capable of carrying electronic communications (e.g. data or voice communications). The network 205 could include networks that are based on Internet protocol (IP), Asynchronous Transfer Mode (ATM), the PSTN or Frame Relay or other similar technologies. It may also support voice using VoIP or other voice communication protocols. One or more networks may be included in the network 205 that include wireless data channels as well as wireless voice channels.

“The alarm panel210 contains a controller, a wireless communication unit 214, a speaker, 216, and microphone 218. The controller 212 can be used to control the alarm system with alarm panel 210. The controller 212 could contain a processor or some other control circuitry that executes instructions to control operation of an alarm system. These examples show that the controller 212 can be programmed to receive input from sensors or detectors and control the operation of alarm system devices. The controller 212 could be used to control the operation of the wireless communication module 214, the speaker 226 and the microphone 218 in the alarm panel 210.

“The wireless communication module (214) is a device that allows wireless communication over the network. The wireless communication device 214 can be used to exchange data over both a wireless data channel or a wireless voice channel. The wireless communication module could transmit alarm data via a wireless data channel, and establish a two way voice communication session using a wireless voice channel. One or more GSM modules, a radio module, cellular transmission or any other type of module that can exchange communications in one the following formats: GSM, GPRS or CDMA, EDGE, EDGE, EGPRS or EV-DO, UMTS or IP.

The speaker 216 could include an electromechanical transmitter that converts electrical signals into sound. The controller 212 may send an electrical signal to the speaker 216 and the speaker 216 will produce an audible signal based on that signal. The controller 212 may send an electrical signal to the speaker, 212 in response to an alarm event. This will cause the speaker to emit an audible alarm sound. Another example is that the controller 212 might send a signal indicating a voice communication to speaker 216 in order to make the speaker produce an audible voice communication. The controller 212 could control the wireless communications module 214 to establish voice communication sessions over a wireless voice channel. It may also send an electrical signal to speaker 216 to trigger the speaker to output the audio of voice communications received by the wireless communication modules 214. Another example is that the wireless communication module might send an electrical signal to the speaker 216, which could be representative of a voice communications. Some implementations may place the speaker 216 in a different location than the alarm panel. This may allow the speaker to have a coverage area different from that of the alarm panel. These implementations may have multiple speakers in order to cover a greater area. For example, an alarm system could monitor an entire building or a large number of sensors.

“The microphone 218 could include an acoustic-to-electronic transducer, or sensor that converts sound to an electrical signal. The microphone 218 can sense sound, such as a person speaking near the microphone 218, and generate an electrical signal based upon the sound. The microphone 218 might sense sound in an area close to the microphone 218, and send a signal corresponding to that sound to controller 212. The wireless communication module 221 may send the signal to the wireless communications module 214 for a voice communication. This is a session that establishes wireless communication with another entity (e.g. a monitoring station). The microphone 218 can transmit the electrical signal to the wireless communication module 214, instead of sending it through the controller 212. Further implementations may place the microphone 218 in a different location than the alarm panel so that it covers a wider area than the alarm panel. These implementations may have multiple microphones in order to cover a greater area. For example, an entire building that the alarm system monitors or areas close to all sensors.

“The alarm system that includes alarm panel 210 also includes one or more sensors and detectors. The alarm system could include multiple sensors 220 or 222. Sensors 220 and 222, for example, could be motion sensors or contact sensors. They also can be temperature sensors, smoke detectors, carbon monoxide, panic buttons sensors, or other sensors that detect an environment or physical condition. The controller 212 communicates with the sensors 220, 222 via communication links 224 or 226. The communication links 226 and 224 may be wired or wireless data pathways that transmit signals from the sensors 222 and 220 to the controller 212. The sensors 220, 222 and 226 may transmit continuously sensed data to controller 212. They also transmit periodically sensed values from the controller 212, or send sensed information to the controller 221 in response to changes in a sensed value. The controller 212 can receive signals from sensors 220 and 222, and may detect an alarm event based upon the sensed values. The sensor 220 could be a contact sensor attached to a door. The communication link 224 may be wirelessly connected between the controller 212 and sensor 220. The sensor 220 might sense that the door is open (e.g., there is no connection between the contacts in the sensor), and wirelessly transmit data to the controller 212 via communication link 224. This indicates that the door was opened. Based on the data received from the sensor 220-222, the controller 212 determines whether an alarm event (e.g. the door opening) occurred using the communication link 224. Based on the signal from the sensor 220, the controller 212 controls the operation of the alarm system.

“The monitoring system230 is an electronic device (e.g. a host, server, etc.). The alarm monitoring service can be provided by exchanging communications over the network with the alarm panel 220 and alarm server 240. The monitoring system 230 can be used to monitor alarm events generated from the alarm panel. The monitoring system 230 could communicate with the wireless communication module214 in the alarm panel210 to receive alarm events. Monitoring system 230 can receive alarm events via wireless data communications sent over a wireless data channel.

“In some cases, the monitoring system may be set up to establish two-way voice communication sessions using the wireless communication module (214) included in the alarm panel. These implementations allow the monitoring system to establish voice communication sessions with the wireless communication module214 via a wireless voice channel. In response to alarm panel 210 data, the monitoring system 230 can establish a two way voice communication session with wireless communication module214. This will allow the alarm panel to know that an alarm event has taken place. The monitoring system 230 can establish a two-way voice communication with the wireless communication module 214. This will allow an operator to respond to an alarm by listening to the microphone 218 in an area that is covered and then providing voice communications to the speaker 216.

“The monitoring system230 comprises multiple terminals 232, 234, and 234. Operators may use the terminals 232 or 234 to process alarm events. Operators may use the terminals 234 and 232 to process alarm events. For example, the monitoring device 230 could route alarm data to these terminals. The terminals 232 or 234 can be general-purpose computers (e.g. desktop personal computers, workstations or laptop computers), that are designed to receive alarm data from the monitoring system 230. They also display information based on this data. In the above example, the controller may control the wireless communication unit 214 to transmit alarm data to the monitoring system. The alarm data may be received by the monitoring system 230 and sent to the terminal232 for processing by the operator associated with terminal 232. Operators may be able to see information associated with an alarm event from the terminal 232. This could include the name of the alarm user, address of the building being monitored, type of alarm, and so on. The operator can use the information to handle the alarm event. In this example, the monitoring device 230 could establish a voice communication session over wireless voice channels between the wireless communication module 214, the terminal 223, or another device associated to the operator via the terminal 223. The operator can establish a voice communication session to listen to the microphone 218 in an area that is covered and then speak to the people using the speaker 216. The operator can determine if the alarm is a true alarm or false alarm. In this way, he/she may also be able more effectively handle the alarm event if it is a real alarm.

“In some cases, terminals 232 or 234 could be mobile devices, or devices that are specifically designed to perform a function. FIG. FIG.

“The alarm server 244 is an electronic device (e.g. a host, server, etc.). The alarm server 240 is designed to provide alarm monitoring services through electronic communication with the alarm panel, 210 and monitoring system 230 via the network 205. The alarm server 240 can be used to monitor alarm events generated from the alarm panel. The alarm server 240 could exchange electronic communications with a wireless communication module (214) in the alarm panel 220 to receive alarm events. Alarm server 240 can receive alarm events via wireless data communications sent over a wireless data channel.

“In some cases, the alarm server 244 may route alarm data from the wireless communication module 214, to the monitoring system 220. The alarm server 240, for example, may transmit alarm data to the monitoring device 230 via the network 205. The alarm server 240 could transmit alarm data to the monitoring device 230 via a communication medium other than wireless data channels. The alarm server 240 might transmit alarm data from the wireless communication module214 to the monitoring system230 via a wired telephone line. Alarm server 240 can add information to the alarm data from the wireless communication modules 214. It may also convert or transform alarm data into a format that is used by the monitoring systems 230.

The alarm server 240 may also facilitate the establishment of a voice communication between the monitoring system (230) and the wireless communication module (214), which is part of the alarm panel 220. The alarm server 240, for example, may transmit telephone information to the monitoring device 230 or wireless communication module 214, which can be used in the establishment of a wireless voice communication session via a wireless channel. The monitoring system and wireless communication module may also receive confirmation signals from the alarm server 240 regarding receipt and transmission alarm data. Some implementations allow the alarm panel 220 and the monitoring system 220 to exchange communications directly, and the alarm server 244 is not required.

“FIG. 3. illustrates an example 300 process for setting up a voice communication session between an operator and alarm system. FIG. 2 contains a list of components that can be used to facilitate the process. 2 are referred to as performing the process 300. Similar methodologies can be used in other implementations, where different components define the system’s structure or the functionality is distributed among them.

“The alarm panel210 receives a signal (230) The controller 212 might receive a signal over the communication link 220. This signal could indicate an alarm event, security breach, or other information. The signal could be an indication that the contact sensor has been removed (e.g. that the door has been opened). Another example is that the sensor 220 could be a smoke detector. The signal may indicate smoke detection. Or, the sensor 220-a motion detector may indicate motion detection.

The alarm panel 210 detects an alarm event using the signal (304). The controller 212, for example, analyzes the signal from sensor 220 to determine if an alarm event occurred. The controller 212 might access a list of criteria that are used to detect alarm events, and compare the signal received to this set to determine if an alarm event occurred. The controller 212 might determine that an alarm event occurred when it receives the signal from sensor 220 if the alarm system is set to an armed status.

“Some implementations may require multiple signals from multiple sensor before detecting an alert event. Other factors, such time and date, may also be required. The controller 212 might detect an alarm event if a motion sensor is activated along with a contact sensor, glass breaker sensor, or both. The alarm system user may have a pet capable of activating the motion sensor. However, detection of the motion sensors alone should not trigger an alarm event. Another example is that the controller 212 might compare the signal to a date or time associated with the received signal when detecting an alarm event. The alarm panel 210 may only detect an alarm event if it is received at a specific date and/or hour.

The alarm panel 210 transmits alarm data to alarm server 240 (306) when it detects an alarm event. The wireless communication module 214, for example, may transmit alarm data via a wireless data channel to alarm server 240. The wireless communication module 214, in some cases, may transmit alarm data as IP packets via a wireless data channel that is configured to transport IP packets. Other implementations allow the wireless communication module to 214 to send the alarm data via SMS over a wireless channel that can transport SMS messages. The wireless communication module 214, which communicates directly with the monitoring device 230, may transmit alarm data directly to the monitoring device 230. In these cases, the alarm server 240 will not be required.

The alarm data contains sufficient information for the alarm server 244 to respond to the alarm event. The alarm data could include information such as the alarm panel number 210, user ID 210 or location of alarm panel 220. Alarm data may contain a customer account number that the alarm server 244 can access to customer information. The alarm data can also include information about the type of alarm (e.g. security breach, fire alarm), The type of services required (e.g. police services, fire service, etc. ), the type of services required (e.g. police, fire, etc.

“The wireless communication module 214 sends alarm data to the alarm server 240 (310). The alarm server 240, for example, receives alarm data via wireless data channel through a wireless communication interface. The alarm server 240 receives the alarm data and processes it to determine the alarm event information. The alarm server 244 extracts the account number from alarm data and retrieves the associated information from electronic storage. Alarm server 240 can access information about the location where the alarm system associated to the account number is protecting. It may also access information regarding the name and phone number of the user associated to the account number. The alarm server 240 could access information that identifies the monitoring device 230 as the one used by the customer for the account number. It may also have information about how to contact the monitoring service 230. The alarm server 244 may access the information to transmit alarm data to the monitoring systems 230.

The alarm server converts alarm data (310). Alarm server 240 can convert alarm data from one format to another format that is used by the monitoring systems 230. The alarm server 240 can also convert the protocol used for transmitting alarm data from a first communication protocol that was used by alarm panel 210 to another communication protocol that is used by monitoring system 230. One example is that the alarm server 240 may be able to receive alarm data in IP packets over a wireless data channel. It may also convert the alarm data into digital dialer signals for transmission over a POTS phone line. Another example is that the alarm server 244 may receive alarm data as an SMS message over a wireless channel. It may then convert the alarm data to IP packets for transmission over an IP network.

“In certain implementations, the alarm servers 240 may add information before transmitting alarm data to monitoring system 230. The alarm server may add customer information (e.g. the customer’s telephone number) to the alarm data. This information is required by the monitoring systems 230 to process the alarm data (e.g. an account number for monitoring system 230). The monitoring system 230 might not recognize the account number associated to alarm server 244, so the alarm server 220 may need to add additional data to alarm data in order to allow the monitoring system 233,230 to identify the customer associated to alarm panel 210.

“The alarm server 244 transmits alarm data to the monitoring device 230 (312). The alarm server 240, for example, forwards alarm data from the alarm panel 220 to the monitoring system 230. The alarm server 240 can either directly forward the alarm data received from the alarm panel 210 to the monitoring system 230. The alarm server 240 may transmit the alarm data to monitoring system 230 via a different communication medium than the one from which it received the alarm data. The alarm server 240 might receive alarm data from the wireless communication unit 214 in the alarm panel210 via a wireless data channel. It may also transmit alarm data to the monitoring systems over a POTS telephone number.

“The monitoring system230 receives alarm data (314), and assigns alarm data to the operator for processing (316). The monitoring system 230, for example, receives alarm data via the network 205 and sends it to the alarm server 244. It then processes the alarm data to allow an operator to respond to the alarm. The monitoring system may assign an operator to process an alarm event and send the alarm data to the terminal associated with that operator (e.g. terminal 232 or 234). Other implementations place the alarm data into a queue to be processed by the next available operator. The next operator then accesses the alarm information from the queue.

The monitoring system 230 can process alarm data to assign it for operator processing and extract the information needed by the operator in order to handle the alarm event. The monitoring system 230 may also access electronic storage that is associated with the monitoring systems to retrieve information an operator might need in handling an alarm event, such as name, address, telephone numbers, etc. The monitoring system 230 can assign priority to the processing of alarm data, and then place the alarm data into the processing queue based on that priority. The monitoring system 230 might assign a priority higher to a smoke alert event for a residence when people are sleeping there than to one for a commercial building when people are absent.

“The monitoring system230 transmits a confirmation signal indicating receipt of alarm data to alarm server 240 (318). The monitoring system 230, for example, transmits an electronic confirmation message to alarm server 240 via the network 205. The confirmation message could indicate that the monitoring systems 230 received the alarm data correctly and that the monitoring systems 230 are handling the alarm event.

“The confirmation message from the monitoring systems 230 (320) is received by the alarm server 240. The alarm server 240 may receive the confirmation message from monitoring system 230 via electronic communication over the network. 205 Alarm server 240 can process the confirmation message to verify that the monitoring system 220 received correct alarm data. The alarm server 240 might decide that an additional transmission of alarm data is not necessary because the monitoring system has confirmed receipt.

“The alarm server 244 transmits the confirmation message (322) to the alarm panel 220 (322). The alarm server 240, for example, forwards the confirmation message from the monitoring system to the alarm panel 220 via the network 205. The alarm server 240 can either directly forward the confirmation message received from the monitoring system 230 to the alarm panel 210 over the network 205. The alarm server 240 may transmit the confirmation message to alarm panel 210 via a different communication medium than the one from which it received the confirmation message. The alarm server 240 might receive the confirmation message over a POTS telephone line from the monitoring system, and transmit it to the wireless communication module (214) included in the alarm panel.

“The alarm panel210 receives the confirmation message (324), and makes a wireless voicecall to the monitoring system (230) (326). The wireless communication module 214 in the alarm panel210 receives the confirmation message via the network 205 and an electronic communication from alarm server 240. The confirmation message is received by the controller 212 in the alarm panel210. This allows the controller to access the telephone number for the monitoring system230. It can then place a wireless voicecall to the monitoring system230 telephone number using the wireless communication module 214. The alarm panel 210 may allow the controller 212 to access the telephone number of the monitoring system.

“In some cases, the wireless communication unit 214 in the alarm panel210 transmits the alarm data to the alarm server 244 over a different wireless voice channel than the wireless data channel with the wireless communication system 214. The wireless voice channel is designed for voice communication and transmits data via a wireless data channel.

Waiting for the confirmation message to indicate that the monitoring device 230 has received the alarm information before placing the wireless voice calls, may allow the establishment of a two way voice communication session to be coordinated with the transmission. This will ensure that the monitoring equipment 230 can appropriately handle the wireless voice calls. The wireless communication module 214, for example, may have placed the wireless call before the monitoring system 220 received the alarm data. In this case, the monitoring system 220 could handle the wireless call as an ordinary call, and not process it to establish a two way voice communication session. The alarm panel 210 can wait for a confirmation message to confirm that it has received the wireless voice calls. This will ensure that the monitoring system data is available to the alarm panel.

“The wireless voice call is received by the monitoring system 230 (328). The wireless voice call is received by the wireless communication modules 214 and transmitted to the monitoring systems 230 by a wireless service provider. The call may be received by the monitoring system 230 via a telephone exchange (e.g. a PBX or telephone switch).

“The monitoring system230 recognizes the alarm panel210 based upon the received call (330). The monitoring system 230, for example, can identify the call as coming from alarm panel 210 by referring to the telephone number that was associated with the call. The monitoring system 230 could identify the call as coming from the wireless communication module 214 in the alarm panel using ANI, DNIS or other similar techniques. The monitoring system 230 could identify a customer account number associated to the alarm panel 210 by searching for that customer account number in the ANI and DNIS information. You may also use other methods to identify the call as coming from the alarm panel.

“The monitoring system230 identifies which operator is handling alarm data for alarm panel 210 (332). The monitoring system 230 can determine that the call was received from the alarm panels 210 and identify the operator responsible for handling the alarm data from the alarm panel210. The monitoring system 230, for example, may identify a customer number associated with the received phone call based upon ANI or DNIS information. This will then identify the operator who is handling the alarm data associated to the customer account number.

“The monitoring system230 routes the call to the operator who handles the alarm data associated the alarm panel210 (334). The monitoring system 230 could access information about the operator who is responsible for the alarm data associated to the alarm panel 210. Based on this information, it may route the call towards a communication device that the operator uses. The monitoring system 230 could access the telephone number of the operator who is handling the alarm data to route the call. The operator can answer the phone call by routing it to his telephone number and establish a two way voice communication session with alarm panel 210. Two-way voice communication sessions may allow the operator to listen in to an area near the microphone 218 in alarm panel210 and to speak to people who are located in an area close to the speaker 216 in alarm panel210.

The operator can determine whether an alarm event associated to the alarm data is a true alarm or false alarm by using the two-way voice communications session. The operator might ask someone in the vicinity of speaker 216 for a secret number if they believe the alarm is false alarm. If the secret code is given, the operator will determine that the alarm is false alarm. The operator can also provide better emergency services by using two-way voice communication. The operator might be able, for example, to communicate with an incapacitated person in an area near the alarm panel 210 to send medical assistance. The incapacitated person might not have any other means of communication with the operator or emergency service (e.g., they could not answer a call or get up to place) so the operator may establish a two-way voice communication session.

“FIG. “FIG. FIG. 2 shows a list of components that are included in the process 400. 2 are referred to as performing the process 400. Similar methodologies can be used in other implementations, where different components define the structure or the functionality is distributed among the components.

“The alarm panel210 receives a signal (202) from the sensor 220- and detects an alarm event (404). The alarm panel 210, for example, receives a signal (402) from the sensor 220. It then detects an alarm event using the techniques described in FIG. 302 and 304. 3.”

“In response to an alarm event being detected, the alarm panel210 transmits alarm data (406) to the alarm server. The alarm panel 210, for example, transmits alarm data via the alarm server to 240. This is done using the techniques shown in FIG. 306, but with the exception of step 306 (see FIG. 3.”

“The alarm server 244 receives alarm data from wireless communication module 214, converts it (410) and transmits it to the monitoring system 231 (412). The alarm server 240, for example, receives alarm data from wireless communication module 214, converts it (410), and transmits the alarm to monitoring system 230. This is done using the steps 308, 312 and 312 in FIG. 3.”

“The monitoring system230 receives alarm data (414), and transmits a confirmation to the alarm server240 (416). The monitoring system 230, for example, receives alarm data and sends a confirmation message to the alarm server. 240. This is done using the techniques described in FIG. 314 and 318. 3.”

“The monitoring system230 determines that alarm panel 210 has an two-way voice feature (418). The monitoring system 230, for example, processes alarm data to determine if the alarm panel 210 that is associated with the alarm data has the two-way voice feature. Some implementations may contain information in the alarm data that indicates whether the alarm panel210 associated with the alarm system data has a 2-way voice feature. These implementations may include a code or part from an account number that indicates whether the alarm system 210 associated with the alarm data features a two way voice feature. The monitoring system 230 can determine if the alarm panel210 has a 2-way voice feature by extracting the code/part of the account number, and comparing it to other information. The monitoring system 230 can identify the alarm panel210 using alarm data. It may also have access to electronic storage that is associated with the monitoring device 230. This information will indicate whether the alarm panel features a two-way feature. The monitoring system 230 might access information to determine whether the model number of the alarm panel 210 has a two-way voice feature. Another example is that the monitoring system 230 could access customer information using the alarm panel 220 and determine if the customer has subscribed to monitoring services with a two-way voice feature.

The monitoring system 230 stores the alarm data (420) in response to the detection that the alarm panel210 has a two way voice feature. The monitoring system 230 could store the alarm data temporarily until it receives a call from alarm panel 210, or until a predetermined time has passed. The monitoring system 230 may not assign alarm data to operator processing until the alarm panel210 calls it. In this case, both the alarm data as well as the call from alarm panel210 can be routed to the operator simultaneously. After a predetermined time period, the monitoring system 230 will assign the alarm data to operator processing. This is in order that the alarm data can be processed without the use of two-way voice communications in the unlikely event that they are not established. The predetermined time period may be greater or smaller than the time required to receive a call from an alarm panel, or if there is an acceptable delay in responding.

“In some cases, the monitoring device 230 may start processing the alarm data and send an alarm server 240 or 210 a command. This indicates that the monitoring system is waiting for a call or make a call to the alarm panel. The monitoring system may issue a command to alarm panel 220 instructing it to stop trying to contact the monitoring system 233. The alarm panel 210 may then be called by the monitoring system 230.

“The alarm server 244 receives the confirmation from the monitoring system (422) and transmits it to the alarm panel 220 (424). The alarm server 240, for example, receives the confirmation from the monitoring system (230) and transmits it to the alarm panel (210) using the techniques described in FIG. 3.”

Click here to view the patent on Google Patents.