System for transmitting and verifying alarm signals

Communications: electrical – Condition responsive indicating system – With particular system function

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C340S531000, C340S506000, C713S152000, C709S224000

Reexamination Certificate

active

06741171

ABSTRACT:

FIELD OF THE INVENTION
This invention relates to alarms and remote alarm monitoring systems and more particularly to methods and apparatus for transmitting and verifying alarm signals over a TCP/IP network.
BACKGROUND OF THE INVENTION
Commercial and residential alarm systems which are remotely monitored are well known. In simplest terms, these systems comprise some form of sensor which produces a signal when the sensor is tripped, a means for transmitting the signal and an alarm monitoring station.
The alarm sensors can take many different forms, including fire, smoke, heat, motion, noise, power failure, intrusion and light detectors. Typically, these sensors have only two states, on and off, one of which indicates an alarm situation. That is, with some alarm sensors a circuit is closed and a signal is sent when the relevant alarm situation arises. With other alarm sensors a circuit is opened and a signal stops being sent when the relevant alarm situation arises. Typically, the alarm sensors are connected to some device which interprets the absence or presence (as the case may be) of a signal from the alarm sensor as an alarm situation and produces an alarm signal. With remotely monitored alarm systems, the alarm signal is then transmitted to the alarm monitoring station. As well, the alarm signal may be indicated at the location of the alarm sensor by various means, including bells, horns and flashing lights.
The known means for transmitting the alarm signal include wireless (for example, cellular telephone), telephone lines, and Transmission Control Protocol/Internet Protocol (referred to as TCP/IP) networks.
A network is a collection of computing devices connected together so that some of the software programs resident on those computing devices can exchange information. Such networks may include conventional telephone lines, high-speed data lines, and wireless and cellular telephone connections. An essential element for the proper functioning of any network is a set of rules for the exchange of information between the software programs. Such rules are referred to as data communication protocols. TCP/IP is a widely used set of data communication protocols. Networks which use TCP/IP to communicate are referred to as TCP/IP networks. The Internet is a global TCP/IP network.
The computing device on which a particular software program resides is said to be hosting that software and is referred to as the host computer or host. For the purpose of conceptualizing the exchange of information over a network, it is useful to think of the software programs as distinct entities and to characterize them as either clients or servers. Servers are software programs, which reside on computing devices connected to networks and which listen for incoming communication and permit communication to be initiated by other software programs, but do not initiate communication. Clients are software programs, which reside on computing devices connected to networks and which initiate communication with other software programs. A host computer can host more than one program.
The TCP/IP protocols provide several important characteristics which facilitate world-wide communication on the Internet, including a common addressing scheme which allows any device running TCP/IP to uniquely address any other device on the Internet. The backbone of the Internet consists of a series of high-speed communication links between major supercomputer sites, and educational and research institutions throughout the world. Connected to this backbone are thousands of World-Wide Web servers and millions of host computers. The Internet is a very robust communication means because, usually, many alternate routes are available between any two sites connected to the Internet.
The basis of Internet data transmission is an underlying, connectionless packet delivery system. The basic unit of data transfer is the packet, a block of data with a strict upper limit on block size that carries with it sufficient identification necessary for delivery to its destination. Data is transmitted through the Internet by dividing it into packets and sending one packet at a time. Each packet contains the sender's IP address and the destination IP address.
The networking of computing devices raises security concerns about the software programs and data used by, and stored on, those computing devices connected to the network, particularly the Internet. So-called hackers are persons who attempt to use the Internet to gain access to data in the private computer systems of individuals, businesses and governments. A hacker who desires to break into a computer system will use an external computing device to attempt to initiate communication with that computer system through the Internet. The fact of communication initiation is very significant in network security, as the party which initiates communication can usually define the scope of the communication. For example, if an external computing device is able to successfully initiate communication with a computer system, this essentially creates a doorway through which the external computing device may make other connections within the computing system.
A common response to the concerns about network security caused by hackers is to install so-called firewalls. Firewalls are software programs which implement a set of rules to restrict the flow of packets between the network, which they protect, and the Internet. Among other things, firewalls typically prevent server programs protected by the firewall from accepting client connections from outside the firewall.
Each host computer connected to a TCP/IP network has an IP address, a unique digital address which can be used to send messages to that host. However, the number of hosts which routinely connect to the Internet now outnumber the IP addresses available under the current IP address system. There are two methods currently in use to deal with this address shortage. The two systems are referred to as the Dynamic IP address and Proxy servers.
Dynamic IP Address:
Fortunately, not all hosts are connected to the Internet at the same time and not all hosts need permanent IP addresses. For example, host computers hosting servers must have permanent IP addresses because the servers are listening for hosts wishing to connect to them and otherwise they could not be found on the Internet. On the other hand, computing devices hosting clients need not have permanent IP addresses, and often don't. A host without a permanent IP address can obtain a temporary, or dynamic, IP address each time it wishes to initiate communication over the Internet. Typically, the dynamic IP address is provided by the relevant Internet service provider. As with permanent IP addresses, the relevant host's dynamic IP address is added to every packet sent by that host to enable the recipients to reply.
Proxy Servers:
A single IP address on the Internet may be shared by a number of hosts on a Local Area Network (LAN) through a proxy server. Each host on the LAN is given an IP address which is locally valid, but not unique, globally valid IP address. When a client program running on a host on the LAN wants to communicate with a server on the Internet, it actually makes the connection request to the proxy server, which puts its own IP address on the packet and passes the request along to the intended server. That server replies to the proxy server, which passes the reply along to the host on the LAN which originated the connection.
Fortunately, not all hosts are connected to the Internet at the same time and not all hosts need permanent IP addresses. For example, host computers hosting servers must have permanent IP addresses because the servers are listening for hosts wishing to connect to them and otherwise they could not be found on the Internet. On the other hand, computing devices hosting clients need not have permanent IP addresses, and often don't. A host without a permanent IP address can obtain a temporary, or dynamic, IP address each time it wishes to initiate commun

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

System for transmitting and verifying alarm signals does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with System for transmitting and verifying alarm signals, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and System for transmitting and verifying alarm signals will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-3241158

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.