![]() Method and system for enhancing alarm security
专利摘要:
The invention provides a method of enhancing security in a remotely monitored alarm system in which an alarm communicator (10) communicates alarms signals to a monitoring centre (20), the method comprising the steps of: decoding signals (103) over a communication channel between the alarm communicator (10) and the monitoring centre (20), according to a communications protocol; analysing (103) the decoded signals for an invalid communication event (104); and taking remedial action if an invalid communication event (104) is detected. SET INITIAL COMMUNICATIONS SIGNAL ATTEMPT? OPEN SECOND 1 04 COMMUNICATION VALID CHANNEL N COMMUNICATION EVENT? 公开号:AU2013219172A1 申请号:U2013219172 申请日:2013-08-21 公开日:2014-05-01 发明作者:Glenn Gary Smith 申请人:Multicom Systems Pty Ltd; IPC主号:G08B29-16
专利说明:
1 METHOD AND SYSTEM FOR ENHANCING ALARM SECURITY FIELD [0001] The present invention relates to alarms for protecting premises from burglary and other hazards or intrusions, and in particular but not limited to a method and apparatus for improving the security of the alarm against communication faults and outages. BACKGROUND [0002] Standalone alarm systems are known with alarm communicators which use the PSTN telephone network to communicate alarm signals to a remote monitoring centre using a communications protocol specific for alarms such as ContactID. These may offer only a single path of communication to the Monitoring Centre. Due to this single path, there is no other way to actively indicate to the monitoring centre operators that a failure to communicate alarm signals has occurred. [0003] Existing alarm communicators detect a PSTN fault by (i) failure to detect the presence of a PSTN Connection (PSTN voltage not detected for a programmed period of time) or (ii) failure to detect a valid dial tone when attempting to communicate Alarm Signals. Typically, after detection of a fault alarm communicator will retry sending the alarm signal a pre programmed number of times, and once it completes the programmed retry attempts, the alarm will be generated to indicate a failure has been detected. [0004] These methods require a user to recognise a visual or audible indicator from the alarm communicator at the premises as 2 these alarm signals have not been communicated to the monitoring centre. [0005] The monitoring centre will become aware of the communications fault after the alarm communicator fails to deliver a test report within the monitoring centre's programmed test period. These test periods are typically one day for commercial premises and seven days for non-commercial premises. These long test periods result in the monitoring centre being unaware the alarm communicator is unable to communicate alarm signals, leaving the premises unmonitored. [0006] It is also known to provide an alarm communicator backup device, such that the loss of the premises PSTN will cause the alarm communicator backup device to connect the alarm communicator to GSM Voice Channel communications for the delivery of Alarm Signals. If the GSM voice channel is not able to deliver the Alarm Signals, the same scenario of waiting for the programmed test period to expire or user notification is required before the fault can be detected by the monitoring centre and rectified. [0007] With all the above methods it may be possible for an intruder to bypass the alarm communicator knowing that the communications will not be received for extended periods of time. Advanced methods of using a PSTN Line simulator could be also be used from outside the premises to mimic the presence of the PSTN service, causing the alarm communicator backup device to not take control of the communication of alarm signals. [0008] There is therefore a need to provide an improved method and device for enhancing the security of remotely monitored alarm systems. 3 ) SUMMARY OF THE INVENTION [0009] According to a broad aspect of the invention there is provided a method of enhancing security in a remotely monitored alarm system in which an alarm communicator communicates alarms signals to a monitoring centre, the method comprising the steps of: decoding signals over a communication channel between the alarm communicator and the monitoring centre according to a communications protocol and analysing the decoded signals for an invalid communication event; and taking remedial action if an invalid communication event is detected. [0010] In one embodiment the communications protocol comprises a protocol for dialling a telephone number of the monitoring centre, and the decoded signals comprise the dialled telephone number. [0011] In one embodiment the communications protocol comprises a protocol for communicating alarm signal data, and the invalid communication event comprises decoded signals analysed to be not compliant with at least a particular rule of the communications protocol. [0012] In one embodiment the communications protocol comprises a protocol for communicating alarm signal data, and the invalid communication event comprises decoded signals analysed to be partly but not fully compliant with the communications protocol. [0013] In one embodiment the invalid communication event 4 comprises decoded signals analysed to be incomplete according to the protocol or not containing an acknowledgement according to the protocol by the monitoring centre. [0014] In one embodiment the decoded signals include signals from the alarm communicator and/or the monitoring centre. [0015] In one embodiment the remedial action comprises establishing a connection between the alarm communicator and the monitoring centre over a second communications channelusing the same communications protocol or a second communications protocol [0016] In one embodiment the remedial action comprises sending a message to the monitoring centre informing of the invalid communication event. [0017] In one embodiment the communications channel is a voice communications channel, and the communications protocol utilises tones and/or frequencies of a defined value or duration. [0018] In one embodiment the communications channel is a voice communications channel, the communications protocol utilises tones, and the second communications channel is a digital communications channel. [0019] According to a second broad aspect of the invention there is provided a security device for enhancing security in a remotely monitored alarm system in which an alarm communicator communicates alarms signals to a monitoring centre, the security device comprising: a decoder designed to decode signals over a communications 5 channel between the alarm communicator and the monitoring centre, according to a communications protocol; an analyser designed to analyse the decoded signals for an invalid communication event; and a remedial action effector designed to take remedial action upon detection of the invalid communication event. BRIEF DESCRIPTION OF DRAWINGS [0020] Figure 1 is a block diagram of a remotely monitored alarm system according to an embodiment of the invention; and [0021] Figure 2 is a flow diagram of aspects of the method according to an embodiment of the invention. DETAILED DESCRIPTION OF EMBODIMENTS [0022] A non-limiting embodiment of the current invention will now be described. [0023] Referring first to Figure 1, a monitored alarm system comprises an alarm communicator 10 adapted to communicate over a communications channel (in this case voice) through a PSTN out connector, which feeds to a PSTN input connector 31 of security device 30. In a normal (undiverted) operating state, security device 30 allows signals to pass through, exiting through PSTN out connecter 32 and connecting to the premises PSTN 21. Premises PSTN 21 in turn is connected by the telephone system to a remote monitoring centre 20. [0024] In normal operation, when alarm communicator 10 is 6 activated by an alarm event, it initiates a phone call to the monitoring centre 20 using a standard phone tone dialling protocol and then utilizes tones such as DTMF, Modem Tones or other custom frequencies which representing alarm message information over the voice communications channel, using an alarm-specific communications protocol, such as "ContactID" developed by ADEMCO Group. The alarm-specific communications protocol typically involves a handshake protocol whereby the alarm communicator 10 establishes communication with the monitoring centre 20, followed by a message block incorporating data identifying the account, a message type and message details, followed by a "kiss-off" acknowledgement tone from the monitoring centre notifying that the message was received. [0025] Security device 30 has a device controller 34 for overall control and a decoder and analyser 33 that monitors the alarm signals between alarm communicator 10 and monitoring centre 20. Decoder and analyser 33 attempts to decode the individual signal tones or frequencies according to the expected protocols, and analyses the decoded signals to determine whether they comprise a communication complying with the protocol. This detailed monitoring of the alarm signals allows the security device 30 to analyse and detect any issues with the delivery on the currently used communications channel (typically the PSTN line). The decoder and analyser 33 able to monitor the signals in both directions from the alarm communicator 10 and the monitoring centre 20. This allows the security device 30 to detect alarm signals have not been correctly sent or communicated and take remedial action by the remedial action effector 35, which in this embodiment comprises one or more additional communications channels. [0026] Depending on the nature of the failure, the remedial action may be to establish a connection between the alarm 7 communicator and the monitoring centre over a second communications channel, which could be a mobile GSM voice channel or a digital channel such as GPRS or internet. The remedial action may also comprise a notification to the monitoring centre of the fault so immediate action can be taken. Example configuration [0027] This embodiment has a number of customisable configurations, configured by software configuration files. The relevant configuration and starting conditions for the system according to an example operation in this embodiment are listed below as follows: [0028] (i) The device controller 34 is configured to allow the premises PSTN line 21 as the primary communication path for the alarm communicator 10 which 'direct connects' the Alarm Communicator to the Premises PSTN 21. If there is any failure to detect Premises PSTN 21, or if device controller 34 detects an invalid communication event, the next available communication path to be used is set to a digital line 36 (although there may be many paths available for alarm signal delivery from the security device 30) [0029] (ii) Both the alarm communicator 10 and the processor 34 are configured to use the Security Industry standard ContactID format. [0030] (iii) alarm communicator 10 is configured to retry sending alarm signals 5 times at 20 second intervals; [0031] (iv) device controller 34 is configured to automatically set a communication channel that has failed (an invalid 8 communication event) to the lowest possible priority after one failed communication attempt, the diversion being maintained for ) 1 hour (these two parameters are customisable). This will cause the original communication channel to no longer be used if any other channel is available. [0032] (v) Both the device controller 34 and alarm communicator 10 are configured to recognize two monitoring centre numbers; a primary monitoring centre number 13451111 and a backup monitoring centre number 13452222. Example sequence of events [0033] The following is an example sequence of events in the context of the foregoing configuration and setup: [0034] (A) the alarm communicator 10 attempts to send an alarm signal to the monitoring centre 20 via its PSTN out connector 11. [0035] (B) through the operation of decoder and analyser 33 which is monitoring for a tone dialling event according to a standard dialling protocol, device controller 34 is informed of a dialling attempt and decoder and analyser 33 decodes the number dialled. The number dialled is one of the stored monitoring centre phone number(s) (13451111 or 13452222), and decoder and analyser 33 activates a Contact ID protocol analyser subroutine. [If there was no match no action would be taken as the PSTN line would be assumed to be in use for another purpose.] [0036] (C) The Contact ID protocol analyser subroutine monitors the sequence of signals (if any) decoded according to the 9 Contact ID communications protocol, including initiating handshake signals, message body and kissoff signals. [0037] (D) The subroutine analyses the sequence as non-compliant and device controller 34 logs the signal as an invalid communication and opens a second communications channel. The original communication channel is set to the lowest priority for use for 1 hour after this one failed attempt. [0038] (E) The device controller 34 immediately blocks the signals from being transmitted through PSTN out connection 32. [0039] (F) The device controller 34 causes effector 35 to send a signal via the second communications channel (in this case, a digital channel 36) to the monitoring centre 20 notifying that a communications fault was detected that requires action. [0040] (G) 20 seconds after the failed communication attempt the alarm communicator 10 attempts to resend the initial alarm signal for a second time. [0041] (H) The device controller 34 now receives the alarm signal, decoded by decoder 33, and recreates an equivalent signal with protocol appropriate a digital transmission and sends it via the digital channel. [0042] (I) after the programmed period of 1 hour expires, device controller 34 reverts to allowing signals through the original voice communications channel 32 which failed, effectively reconnecting the alarm communicator 10 to the premises PSTN 21. [0043] (J) When the alarm communicator 10 next sends an alarm signal, the decoder and analyser 34 decodes and analyses the 10 signals, and this time determines that the communication is valid. Device controller 34 causes effector 35 to notify the monitoring centre 20 by a signal through over the digital communications channel 36 that the communications fault has been restored. [If the communication had been unsuccessful (an invalid communication event) the diversion and notification sequence above would have been repeated. [0044] Referring now to Figure 2, method steps 101 to 105 being key steps according to this embodiment are set out. In step 101, the initial communications channel is set. As described above, this is a configurable setting. In step 102, the decoder and analyser 33 monitors the PSTN input signal 31 for an attempted alarm signal, which begins with a tone dialling of one of the two configured numbers. If an attempt is detected, in step 103 the decoder and analyser 33 decodes and analyses the ensuing communication, if any, according to the ContactID protocol. In step 104, if the communication complies, no action is taken, but if there is an invalid communication event, device controller 34 instructs effector 35 to take the remedial action of opening the digital second communications channel and communicating with the monitoring centre. [0045] The following are some typical scenarios which prior art systems cannot deal with, that the security device described above can detect and report: [0046] (i) Alarm communicator is attempting to dial a phone number that is currently barred on the PSTN service. For example, the carrier has barred 13xxxx services [0047] (ii) Someone has connected a voltage feed or PSTN line simulator in place of the Premises PSTN line 11 [0048] (iii) The Premises PSTN line has an unpaid bill; the service still allows you to dial emergency services but will not connect to the Monitoring Centre [0049] (iv) The monitoring centre PSTN receiver is offline, faulty, busy or unavailable [0050] (v) Premises PSTN wiring faults causing interruption of alarm signals. An example would be having PSTN devices wired without Mode 3, or incorrectly configured Mode 3 connections which can interrupt a voice channel communication. [0051] (vi) A GSM service has call barring or is not allowing the Voice Channel Communications to the Control Room. [0052] The invention thus provides a method of enhancing the security of a remotely monitored alarm system, that reduces the risk of substantial outages whereby the alarm communicator is out of touch with the monitoring centre. [0053] Persons skilled in the art will also appreciate that many variations may be made to the invention without departing from the scope of the invention. [0054] For example, the method steps of decoding and analysing and taking remedial action are able to be implemented in any number of ways, typically with the use of widely available computer and communications hardware. As such, the individual steps may overlap or be implemented in a single processor, and the identification of the steps is a purely functional one. Similarly, the effector 35, device controller 34 and decoder and 12 analyser 33 may not be physically separate but may be implemented in an overlapping and distributed fashion within the security device 30. The naming of these elements is purely to define that the functions which they perform are implemented. Further it is also contemplated that the alarm communicator 10 and security device 30 may be collocated into the one unit, in some embodiments. [0055] Also, the various communication channel types and protocols mentioned are exemplary only. For example the second communications channel can be any type of channel, including non-digital GSM voice call. [0056] The term "communications protocol" in the claims encompasses more than one protocol that may apply to a signal train, for example the initial detection of a tone dialling attempt in the above example is interpreted according to a standard tone dialling protocol, whereas subsequent ContactID protocol with the monitoring centre is specific to the alarm system. [0057] Further, other embodiments may define an invalid communications event as an event that fails to comply with the communications protocol in a specific respect, rather than fully complying as described in the example. In other words, the system is not necessarily requiring absolute compliance. [0058] In the claims which follow and in the preceding description of the invention, except where the context requires otherwise due to express language or necessary implication, the word "comprise" or variations such as "comprises" or "comprising" is used in an inclusive sense, i.e. to specify the presence of the stated features but not to preclude the presence 13 or addition of further features in various embodiments of the invention. Further, any method steps recited in the claims are not necessarily intended to be performed temporally in the sequence written, or to be performed without pause once started, unless the context requires it. [0059] It is to be understood that, if any prior art publication is referred to herein, such reference does not constitute an admission that the publication forms a part of the common general knowledge in the art, in Australia or any other country.
权利要求:
Claims (11) [1] 1. A method of enhancing security in a remotely monitored alarm system in which an alarm communicator communicates alarms signals to a monitoring centre, the method comprising the steps of: decoding signals over a communication channel between the alarm communicator and the monitoring centre according to a communications protocol and analysing the decoded signals for an invalid communication event; and taking remedial action if an invalid communication event is detected. [2] 2. The method of claim 1 wherein the communications protocol comprises a protocol for dialling a telephone number of the monitoring centre, and the decoded signals comprise the dialled telephone number. [3] 3. The method of claim 1 wherein the communications protocol comprises a protocol for communicating alarm signal data, and the invalid communication event comprises decoded signals analysed to be not compliant with at least a particular rule of the communications protocol. [4] 4. The method of claim 1 wherein the communications protocol comprises a protocol for communicating alarm signal data, and the invalid communication event comprises decoded signals analysed to be partly but not fully compliant with the communications protocol. [5] 5. The method of claim 1 wherein the invalid communication event comprises decoded signals analysed to be incomplete according to the protocol or not containing an acknowledgement according to the protocol by the monitoring centre. [6] 6. The method of claim 1 wherein the decoded signals include signals from the alarm communicator and/or the monitoring 15 centre. [7] 7. The method of claim 1 wherein the remedial action comprises establishing a connection between the alarm communicator and the monitoring centre over a second communications channel using the same communications protocol or a second communications protocol. [8] 8. The method of claim 1 wherein the remedial action comprises sending a message to the monitoring centre informing of the invalid communication event. [9] 9. The method of claim 1 wherein the communications channel is a voice communications channel, and the communications protocol utilises tones and/or frequencies of a defined value or duration. [10] 10. The method of claim 7 wherein the communications channel is a voice communications channel, the communications protocol utilises tones, and the second communications channel is a digital communications channel. [11] 11. A security device for enhancing security in a remotely monitored alarm system in which an alarm communicator communicates alarms signals to a monitoring centre, the security device comprising: a decoder designed to decode signals over a communications channel between the alarm communicator and the monitoring centre, according to a communications protocol; an analyser designed to analyse the decoded signals for an invalid communication event; and a remedial action effector designed to take remedial action upon detection of the invalid communication event.
类似技术:
公开号 | 公开日 | 专利标题 US9094410B2|2015-07-28|Wireless VoIP network for security system monitoring CA2728834C|2015-11-24|Method and apparatus for communication between a security system and a monitoring center US7593512B2|2009-09-22|Private VoIP network for security system monitoring EP2140674B1|2018-08-22|Alarm system providing multiple network routing, interface module and method US5027383A|1991-06-25|Supervised, interactive alarm reporting system US7734020B2|2010-06-08|Two-way voice and voice over IP receivers for alarm systems EP2695370A2|2014-02-12|Delivery of alarm system event data and audio AU2013219172B2|2017-08-03|Method and system for enhancing alarm security CA2751064C|2015-09-22|System and method for analyzing faulty event transmissions EP2389667B1|2016-11-16|Facsimile aware alarm monitoring station and method WO2009103482A1|2009-08-27|Method for the optimization of alarm systems state monitoring JP2003150407A|2003-05-23|Automatic obstacle restoration system and device thereof JP2004274725A|2004-09-30|Monitoring system JP2000235689A|2000-08-29|Abnormality information system JP2000270500A|2000-09-29|Insulation monitor system GB2469230A|2010-10-06|Periodic polling to test the link between an alarm gateway and an alarm interface device. JP2008252206A|2008-10-16|Terminal state reporting device, method, and program JP2009081796A|2009-04-16|Apartment house intercom system JP2004342122A|2004-12-02|User system monitoring method and remote monitoring system JP2000187792A|2000-07-04|Security system, its implementing method, exchange module, central station exchange and radio unit JP2000023235A|2000-01-21|Signal transmitter, signal transmission method and recording medium JP2002027133A|2002-01-25|Remote supervisory unit and method for building JPH08256378A|1996-10-01|Remote monitor for elevator JP2596319C|1998-11-05| JP2000149175A|2000-05-30|Guard system
同族专利:
公开号 | 公开日 AU2013219172B2|2017-08-03|
引用文献:
公开号 | 申请日 | 公开日 | 申请人 | 专利标题 US4718079A|1986-06-30|1988-01-05|Giuseppe Rabito|Remote unit monitoring system| US4887290A|1987-08-05|1989-12-12|Norbert W. Zawacki|Cellular alarm backup system| JPH01241960A|1988-03-23|1989-09-26|Kitaishi Sangyo Kk|Communication line monitor for alarming| US5737391A|1995-09-06|1998-04-07|Richard J. Dame|Alarm system backup with cut line detector|
法律状态:
2017-11-30| FGA| Letters patent sealed or granted (standard patent)|
优先权:
[返回顶部]
申请号 | 申请日 | 专利标题 AU2012904528A|AU2012904528A0||2012-10-17|Method and system for enhancing alarm security| AU2012904528||2012-10-17|| AU2013219172A|AU2013219172B2|2012-10-17|2013-08-21|Method and system for enhancing alarm security|AU2013219172A| AU2013219172B2|2012-10-17|2013-08-21|Method and system for enhancing alarm security| 相关专利
Sulfonates, polymers, resist compositions and patterning process
Washing machine
Washing machine
Device for fixture finishing and tension adjusting of membrane
Structure for Equipping Band in a Plane Cathode Ray Tube
Process for preparation of 7 alpha-carboxyl 9, 11-epoxy steroids and intermediates useful therein an
国家/地区
|