CA2402657A1 - Integrated security and communications system with secure communications link - Google Patents

Integrated security and communications system with secure communications link Download PDF

Info

Publication number
CA2402657A1
CA2402657A1 CA002402657A CA2402657A CA2402657A1 CA 2402657 A1 CA2402657 A1 CA 2402657A1 CA 002402657 A CA002402657 A CA 002402657A CA 2402657 A CA2402657 A CA 2402657A CA 2402657 A1 CA2402657 A1 CA 2402657A1
Authority
CA
Canada
Prior art keywords
communication
user
security
control interface
security system
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CA002402657A
Other languages
French (fr)
Other versions
CA2402657C (en
Inventor
Theodore Simon
Steven Winick
Scott H. Simon
Christopher E. Beach
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Ademco Inc
Original Assignee
Pittway Corporation
Theodore Simon
Steven Winick
Scott H. Simon
Christopher E. Beach
Honeywell International Inc.
Ademco Inc.
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Family has litigation
First worldwide family litigation filed litigation Critical https://patents.darts-ip.com/?family=22694565&utm_source=google_patent&utm_medium=platform_link&utm_campaign=public_patent_search&patent=CA2402657(A1) "Global patent litigation dataset” by Darts-ip is licensed under a Creative Commons Attribution 4.0 International License.
Application filed by Pittway Corporation, Theodore Simon, Steven Winick, Scott H. Simon, Christopher E. Beach, Honeywell International Inc., Ademco Inc. filed Critical Pittway Corporation
Publication of CA2402657A1 publication Critical patent/CA2402657A1/en
Application granted granted Critical
Publication of CA2402657C publication Critical patent/CA2402657C/en
Anticipated expiration legal-status Critical
Expired - Lifetime legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B25/00Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems
    • G08B25/008Alarm setting and unsetting, i.e. arming or disarming of the security system
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M11/00Telephonic communication systems specially adapted for combination with other electrical systems
    • H04M11/04Telephonic communication systems specially adapted for combination with other electrical systems with alarm systems, e.g. fire, police or burglar alarm systems

Abstract

An integrated security and communications system combines a security system to either or both of a telephone system interface and a data interface. Users have access to voice-mail or other PBX-type telephone functions, many or all of which can be accessed not only at telephone sets, but also at keypads of the security system. Data functions such as electronic mail and possible partial or full World Wide Web access may also be provided at the keypads, as well as at connected personal computers or computer terminals. The system keypads may be enhanced to better accommodate some of the added functions. A central communications station could be used to maintain secure, shared private key encrypted communications with each premises system, using a redirector arrangement or relay to allow each premises system to communicate securely with a central monitoring station and with other systems.
The secure communications system could be used without a security system to allow secure computer-to-computer communications.

Claims (441)

WHAT IS CLAIMED IS:
1. An integrated security and communications system comprising:
a security controller having at least one sensory input, at least one alarm output and at least one control signal input/output port;
a control interface operatively connected to said at least one control signal input/
output port; and a communications unit connected to a communication channel for providing at least one communication function, a first communication port for connection to one of said at least one control signal input/output port of said security controller for providing at least one of said at least one communication function to a user at said control interface, and a second communication port for connection to a communication device at which said at least one communication function is provided to said user.
2. The system of claim 1 wherein:
said communication channel comprises a telephone line; and said communication device comprises a telephone.
3. The system of claim 2 wherein said at least one communication function comprises telephony.
4. The system of claim 1 wherein:
said communication channel comprises an Internet connection;
said communication device comprises a computer; and said at least one communication function comprises Internet access.
5. The system of claim 1 wherein said communication unit provides at least one function of said control interface at said communication device.
6. A security system for monitoring user premises, said system comprising:
at least one sensor;
at least one alarm output device;
at least one user control interface;
a system controller connected to said sensor, said output device and said user control interface, said at least one user control interface being used by a user to enter commands affecting a state of said system, said system, when said state indicates that said system is active, monitoring said at least one sensor and outputting an alarm on said alarm output device when said at least one sensor indicates that an alarm condition exists; and a telephone interface unit connected to said controller and a telephone line for providing voice mail functionality including one or more of message retrieval, message waiting indication, and message header indication; wherein:
said voice mail functionality is accessible at at least one of said at least one user control interface;
access to said voice mail functionality is restricted based on said state of said system, said voice mail functionality being accessible when said state is consistent with presence of an authorized user on said premises;
said system further having a plurality of authorized users, and having an authorization unit at said at least one user control interface for uniquely identifying each of at least one of said authorized users, wherein:
a particular one of said at least one authorized user initiates said state consistent with presence of an authorized user by activating said authorization unit using an indicium unique to said particular authorized user; and said telephone interface unit presents for access, at said user control interface, only voice mail functions for which said particular authorized user is authorized.
7. The security system of claim 6 wherein:
said authorization unit comprises a keypad at said user control interface;
said indicium comprises a respective passcode unique to each said at least one authorized user; and said activating of said authorization unit comprises entering said passcode on said keypad.
8. The security system of claim 6 wherein:
said authorization unit comprises a receiver at said user control interface;
said indicium comprises a respective transmitter uniquely coded to each said at least one authorized user; and said activating of said authorization unit comprises actuating said transmitter within communication range of said receiver.
9. The security system of claim 8 wherein said receiver and said coded transmitter are wireless.
10. The security system of claim 6 wherein:

said authorization unit comprises a token reader at said user control interface;
said indicium comprises a respective coded token unique to each said at least one authorized user; and said activating of said authorization unit comprises presenting said token to said token reader.
11. The security system of claim 6 wherein said voice mail functionality is activated automatically upon entry of said system into said state consistent with presence of an authorized user on said premises.
12. The security system of claim 6 wherein said telephone interface unit further comprises a remote access unit through which a user remotely controls, during a single telephone call session to said system from a remote location, both (a) at least one security system control function, and (b) at least one voice mail function.
13. The security system of claim 6 further comprising at least one telephone set connected to said telephone line; wherein:
said voice mail functionality comprises playback of an outgoing message to an incoming caller;
said telephone interface unit further provides a call screening function at at least one of (a) said at least one telephone set, and (b) said at least one user control interface, said user control interface including a speaker; and said call screening function is full-duplex, allowing said incoming caller to speak an announcement that is audible at said speaker during said playback of said outgoing message.
14. The security system of claim 6 further comprising at least one telephone set connected to said telephone line; wherein:

said telephone interface unit further provides an aural indication at said at least one telephone set when a voice mail message has been received and is awaiting playback.
15. The security system of claim 6 further comprising at least one telephone set connected to said telephone line, said least one telephone set having a ringer; wherein:

said user control interface includes a speaker; and said telephone interface unit further provides:
a privacy function whereby said ringer can be deactivated under control of a user, and as part of said privacy function, a privacy breakthrough function whereby a caller issues a command when said privacy function is active for broadcasting a message on said speaker.
16. The security system of claim 6 wherein said voice mail functionality includes a toll saver feature controlled by said state of said system.
17. The security system of claim 16 wherein said toll saver feature is active only when said state of said system indicates absence of authorized users from said premises.
18. The security system of claim 17 wherein said toll saver feature can further be controlled by a user at said user control interface.
19. The security system of claim 18 further comprising at least one telephone set connected to said telephone line; wherein:

said toll saver feature can be controlled by a user at at least one of said at least one telephone set.
20. The security system of claim 6 wherein said telephone interface unit further comprises:
a calling party identification unit for displaying calling party identification data, said calling party identification data being displayed at said user control interface; and a distinctive ringing generator responsive to said calling party identification data for generating a distinctive ringing signal different from a standard incoming ringing signal based on said calling party identification data.
21. The security system of claim 20 wherein said distinctive ringing generator generates a first number of distinctive ringing signals, each distinctive ringing signal in said first number of distinctive ringing signals identifying at least one preselected calling party from a second number of preselected calling parties.
22. The security system of claim 21 wherein said first number is equal to said second number, whereby each distinctive ringing signal is associated with a unique preselected calling party.
23. The security system of claim 21 wherein said first number is less than said second number, whereby each distinctive ringing signal is associated with a plurality of said preselected calling parties.
24. The security system of claim 21 wherein said distinctive ringing generator comprises a ringing signal interrupter for interrupting said standard incoming ringing signal in a second number of ways equal to said second number of distinctive ringing signals, to produce said second number of distinctive ringing signals.
25. The security system of claim 20 wherein said distinctive ringing generator comprises a ringing signal interrupter for interrupting said standard incoming ringing signal to produce said distinctive ringing signal.
26. The security system of claim 6 wherein said telephone interface unit further comprises:
a calling party identification unit for displaying calling party identification data, said calling party identification data being displayed at said user control interface;
memory for storing instructions for paging a user when said calling party identification data identifies one of at least one particular calling party; and a processor for acting on said instructions and placing a call to a user s pager when said calling party identification data identify one of said at least one particular calling party.
27. The security system of claim 6 further comprising at least one telephone set connected to said telephone line through said telephone interface unit;
wherein:
at least one of said at least one user control interface comprises a speaker;
said telephone interface unit further comprises a public address function; whereby, when a user issues a command at said telephone set:
said telephone set is disconnected from said telephone line and connected to said speaker of said at least one of said at least one user control interface.
23. The security system of claim 27 wherein said telephone set is connected to said speaker of each said at least one of said at least one user control interface.
29. The security system of claim 27 wherein, on command of said user, said telephone set is connected to said speaker of any one or more of said at least one of said at least one user control interface.
30. The security system of claim 27 wherein, when said user issues said command at said telephone set, said telephone interface unit maintains said telephone line in an off-hook condition while said public address function is in use.
31. The security system of claim 6 further comprising at least one telephone set connected to said telephone line through said telephone interface unit;
wherein:
at least one of said at least one user control interface comprises a microphone;

said telephone interface unit further comprises a room monitor function; whereby, when a user issues a command at said telephone set:
said telephone set is disconnected from said telephone line and connected to said microphone of said at least one of said at least one user control interface.
32. The security system of claim 6 further comprising at least one telephone set connected to said telephone line through said telephone interface unit;
wherein:
at least one programmable parameter of said security system is programmable:
(a) at said at least one user control interface;
(b) at said connected telephone set; and (c) remotely by calling into said system on said telephone line.
33. The security system of claim 32 wherein:
there are a plurality of said programmable parameters; and only a subset of said plurality of programmable parameters is programmable remotely.
34. The security system of claim 6 further comprising at least one user-controlled processor connected via a modem to said telephone line through said telephone interface unit; wherein:
at least one programmable parameter of said security system is programmable;
said telephone interface unit includes a control signal detector for detecting control signals sent from said user-controlled processor through said modem; whereby:

responsive to said control signals from said user-controlled processor, said telephone interface unit disconnects from said telephone line and enters a user-controlled mode.
35. The security system of claim 34 wherein in said user-controlled mode said user-controlled processor performs any one of:
programming said at least one programmable parameter of said security system;
downloading voice mail messages received as part of said voice mail functionality from said telephone interface unit to said user-controlled processor; and uploading voice prompts composed at said user-controlled processor to said telephone interface unit.
36. The security system of claim 34 wherein said user-controlled processor comprises a personal computer.
37. The security system of claim 6 wherein:
said telephone line has central office voice mail associated therewith; and said voice mail functionality comprises indicating a central office voice message waiting.
38. The security system of claim 37 wherein said indicating central office message waiting comprises providing an indication at said user control interface.
39. The security system of claim 38 wherein said indication at said user control interface is visual.
40. The security system of claim 38 wherein said indication at said user control interface is aural.
41. The security system of claim 37 further comprising at least one telephone set connected to said telephone line; wherein:
said indicating central office message waiting comprises providing an indication at said telephone set.
42. The security system of claim 41 wherein said indication at said telephone set is aural.
43. The security system of claim 41 wherein:
said telephone set includes a visual indicator; and said indication at said telephone set is visual.
44. The security system of claim 6 wherein said telephone interface unit further comprises a remote access unit through which a user controls at least one security system control function via said telephone line.
45. The security system of claim 44 wherein said user, through said remote access unit, controls said at least one security system function from a telephone at a remote location by calling into said telephone line from said remote location.
46. The security system of claim 44 further comprising at least one telephone set connected to said telephone line; wherein:

said user, through said telephone interface unit, controls said at least one security system function from said telephone set.
47. The security system of claim 6 further comprising at least one telephone set connected to said telephone line; wherein:
said telephone interface unit monitors said telephone line and, when an outgoing telephone call is placed on said at least one telephone set, logs said outgoing telephone call.
48. The security system of claim 47 wherein:
said telephone interface unit comprises memory for storing data identifying numbers to which outgoing calls are restricted; and when an outgoing call is placed on said telephone set to one of said numbers to which outgoing calls are restricted, said telephone interface unit prevents said outgoing call from being completed.
49. The security system of claim 48 wherein:
said memory further stores at least one user code; and when said user code is entered during said outgoing call, said telephone interface unit allows said outgoing call to be completed to one of said numbers to which outgoing calls are restricted.
50. The security system of claim 6 wherein said user control interface is connected to an external data network for at least one of (a) sending, and (b) receiving, data.
51. The security system of claim 50 wherein:
said data comprise electronic mail; and access to said electronic mail is restricted based on said state of said system.
52. The security system of claim 51 wherein said electronic mail is accessible when said state is consistent with presence of an authorized user on said premises.
53. The security system of claim 52 having a plurality of authorized users, wherein:
when a particular authorized user initiates said state consistent with presence of an authorized user by activating said authorization unit, said user control interface presents, for access at said user control interface, only electronic mail addressed to said particular authorized user.
54. The security system of claim 53 wherein:
said authorization unit comprises a keypad at said user control interface;
said indicium comprises a passcode unique to said particular authorized user; and said activation of said authorization unit comprises entry of said passcode at said keypad.
55. The security system of claim 53 wherein:
said authorization unit comprises a receiver;
said indicium comprises a transmitter coded uniquely to said particular authorized user; and said activation of said authorization unit comprises activation of said coded transmitter in communication range of said receiver.
56. The security system of claim 55 wherein said receiver and said coded transmitter are wireless.
57. The security system of claim 53 wherein:
said authorization unit comprises a token reader;
said indicium comprises a token coded uniquely to said particular authorized user; and said activation of said authorization unit comprises presentation of said coded token to said reader.
58. The security system of claim 52 having a plurality of authorized users, wherein:
when a particular authorized user initiates said state consistent with presence of an authorized user by activating said authorization unit using an indicium unique to said particular authorized user, said user control interface presents access, at said user control interface, to electronic mail message sending from said particular authorized user.
59. The security system of claim 58 wherein:
said authorization unit comprises a keypad at said user control interface;
said indicium comprises a passcode unique to said particular authorized user; and said presentation of said indicium comprises entry of said passcode at said keypad.
60. The security system of claim 58 wherein:
said authorization unit comprises a receiver;
said indicium comprises a transmitter coded uniquely to said particular authorized user; and said activation of said authorization unit comprises activation of said coded transmitter in communication range of said receiver.
61. The security system of claim 60 wherein said receiver and said coded transmitter are wireless.
62. The security system of claim 58 wherein:
said authorization unit comprises a token reader;
said indicium comprises a token coded uniquely to said particular authorized user; and said activation of said authorization unit comprises presentation of said coded token to said reader.
63. The security system of claim 50 wherein:
said data comprise electronic mail;
said system has at least one authorized user; and when one of said at least one authorized user enters a security system command at said user control interface by activating said authorization unit, said user control interface sends an electronic mail message to a predetermined recipient advising of said entry of said command by said one of said at least one authorized user.
64. The security system of claim 63 wherein:
said authorization unit comprises a keypad at said user control interface;
said indicium comprises a passcode unique to said one of said at least one authorized user; and said activation of said authorization unit comprises entry of said passcode at said keypad.
65. The security system of claim 63 wherein:
said authorization unit comprises a receiver;

said indicium comprises a transmitter coded uniquely to said one of said at least one authorized user; and said activation of said authorization unit comprises activation of said coded transmitter in communication range of said receiver.
66. The security system of claim 65 wherein said receiver and said coded transmitter are wireless.
67. The security system of claim 63 wherein:
said authorization unit comprises a token reader;
said indicium comprises a token coded uniquely to said one of said at least one authorized user; and said activation of said authorization unit comprises presentation of said coded token to said reader.
68. The security system of claim 50 wherein:
said external data network is the Internet;
said data comprise World Wide Web pages;
said system has at least one authorized user; and when one of said at least one authorized user enters a security system command at said user control interface by activating said authorization unit, said system retrieves a World Wide Web page directed to said one of said at least one authorized user and displays said World Wide Web page at said user control interface.
69. The security system of claim 68 wherein:

said authorization unit comprises a keypad;
said indicium comprises a passcode unique to said one of said at least one authorized user; and said activation of said authorization unit comprises entry of said passcode at said keypad.
70. The security system of claim 68 wherein:
said authorization unit comprises a receiver;
said indicium comprises a transmitter coded uniquely to said one of said at least one authorized user; and said activation of said authorization unit comprises activation of said coded transmitter in communication range of said receiver.
71. The security system of claim 70 wherein said receiver and said coded transmitter are wireless.
72. The security system of claim 70 wherein:
said transmitter is encoded with multiple codes;
said activation of said authorization unit comprises activation of a selected one of said multiple codes by said one of said at least one authorized user; and said system retrieves a different World Wide Web page based on which of said multiple codes has been selected.
73. The security system of claim 68 wherein:
said authorization unit comprises a token reader;

said indicium comprises a token coded uniquely to said one of said at least one authorized user; and said activation of said authorization unit comprises presentation of said coded token to said reader.
74. The security system of claim 50 wherein:
said system has at least one authorized user;
one of said at least one authorized user enters a security system command at said user control interface by activating said authorization unit;
said external data network is the Internet; and said activation of said authorization unit logs said one of said at least one authorized user onto the Internet at said user control interface.
75. The security system of claim 50 wherein:
said system has at least one authorized user;
one of said at least one authorized user enters a security system command at said user control interface by activating said authorization unit using an indicium unique to said one of said at least one authorized user;
said one of said at least one user uses said external data network to access a financial institution to perform a financial transaction;
said indicium is registered with said financial institution as an identifier of said one of said at least one authorized user; and said indicium is sent to said financial institution as part of said financial transaction.
76. The security system of claim 50 wherein functions of said system are remotely accessible via said external data network.
77. The security system of claim 50 wherein:
said system transmits security data signals to a central communication station via said external data network and said alternate channel and awaits acknowledgment thereof; and when said acknowledgment arrives from a first one of said external data network and said alternate channel, said system terminates transmission of said security data on a second one of said external data network and said alternate channel.
78. The security system of claim 77 wherein:
one of said external data network and said alternate channel normally operates faster than another of said external data network and said alternate channel; and said system begins transmission of said security data signals on said one of said external data network and said alternate channel before beginning transmission of said security data signals on said another of said external data network and said alternate channel.
79. The security system of claim 77 further comprising a firewall between said user control interface and said external data network; wherein:
said firewall allows only communication originating at said system and prevents communication originating on said external data network; and to receive said acknowledgment from said central communication station, said system initiates communication with said external data network so that said firewall allows said communication, said initiated communication including a query to said external data network for said acknowledgment to be communicated from said central communication station to said system.
80. The security system of claim 79 wherein said query to said external network comprises a query to said central communication station.
81. The security system of claim 77 wherein said alternate channel is said telephone line.
82. The security system of claim 50 wherein:
said system transmits security data signals to a central communication station via a plurality of channels; and when said acknowledgment arrives from a first one of said plurality of channels, said system terminates transmission of said security data on each other one of said plurality of channels.
83. The security system of claim 82 wherein:
one of said plurality of channels normally operates faster than others said plurality of channels; and said system begins transmission of said security data signals on said one of said plurality of channels before beginning transmission of said security data signals on said others of said plurality of channels.
84. The security system of claim 50 wherein said system accepts commands from a user via said external data network.
85. The security system of claim 84 further comprising a firewall between said user control interface and said external data network; wherein:
said firewall allows only communication originating at said system and prevents communication originating on said external data network; and to receive said commands from said user, said system initiates communication with said external data network so that said firewall allows said communication, said initiated communication including a query to said external data network for commands issued by said user to be communicated from said external data network to said system.
86. The security system of claim 50 wherein said system sends security data signals to predetermined recipients via said external data network.
87. The security system of claim 50 comprising more than one of said user control interface, each said user control interface functioning as an independent terminal of said external data network.
88. The security system of claim 50 further comprising a firewall between said user control interface and said external data network; wherein:
said firewall allows only communication originating at said system and prevents communication originating on said external data network; and to receive data, said system initiates communication with said external data network so that said firewall allows said communication, said initiated communication including a query to said external data network for data sought to be communicated from said external data network to said system.
89. A security system for monitoring user premises, said system comprising:
at least one sensor;
at least one alarm output device;
at least one user control interface; and a system controller connected to said sensor, said output device and said user control interface; wherein:
at least one of said at least one user control interface is connected to an external data network for at least one of (a) sending, and (b) receiving, data.
90. The security system of claim 89 wherein said data comprise electronic mail.
91. The security system of claim 89 wherein said at least one user control interface:
is used by a user to enter commands affecting a state of said system, said system, when said state indicates that said system is active; and monitors said at least one sensor and outputs an alarm on said alarm output device when said at least one sensor indicates that an alarm condition exists.
92. The security system of claim 91 wherein:
said data comprise electronic mail; and access to said electronic mail is restricted based on said state of said system.
93. The security system of claim 92 wherein said electronic mail is accessible when said state is consistent with presence of an authorized user on said premises.
94. The security system of claim 93 having a plurality of authorized users, and having an authorization unit for uniquely identifying each of at least one of said authorized users, wherein:
a particular authorized user initiates said state consistent with presence of an authorized user by activating said authorization unit using an indicium unique to said particular authorized user; and said user control interface presents for access at said user control interface only electronic mail addressed to said particular authorized user.
95. The security system of claim 94 wherein:
said user control interface comprises a keypad;
said indicium comprises a respective passcode unique to each said at least one authorized user; and said activating of said authorization unit comprises entry of said passcode at said keypad.
96. The security system of claim 94 wherein:
said user control interface comprises a receiver;
said indicium comprises a respective transmitter uniquely coded to each of said at least one authorized user; and said activating of said authorization unit comprises activation of said coded transmitter in communication range of said receiver.
97. The security system of claim 96 wherein said receiver and said coded transmitter are wireless.
98. The security system of claim 94 wherein:
said user control interface comprises a token reader;
said indicium comprises a token uniquely coded to each of said at least one authorized user; and said activating of said authorization unit comprises presentation of said coded token to said reader.
99. The security system of claim 93 having a plurality of authorized users, and having an authorization unit for uniquely identifying each of at least one of said authorized users, wherein:
a particular authorized user initiates said state consistent with presence of an authorized user by activating said authorization unit using an indicium unique to said particular authorized user; and said user control interface presents access at said user control interface to electronic mail message sending from said particular authorized user.
100. The security system of claim 99 wherein:
said user control interface comprises a keypad;
said indicium comprises a respective passcode unique to each of said at least one authorized user; and said activation of said authorization unit indicium comprises entry of said passcode at said keypad.
101. The security system of claim 99 wherein:
said user control interface comprises a receiver;

said indicium comprises a respective transmitter uniquely coded to each of said at least one authorized user; and said activation of said authorization unit comprises activation of said coded transmitter in communication range of said receiver.
102. The security system of claim 101 wherein said receiver and said coded transmitter are wireless.
103. The security system of claim 99 wherein:
said user control interface comprises a token reader;
said indicium comprises a respective token uniquely coded to each of said at least one authorized user; and said activation of said authorization unit comprises presentation of said coded token to said reader.
104. The security system of claim 89 wherein:
said data comprise electronic mail;
said system has at least one authorized user, and has an authorization unit for uniquely identifying each of at least one of said authorized users; and when one of said at least one authorized user enters a security system command at said user control interface by activating said authorization unit using an indicium unique to said one of said at least one authorized user, said user control interface sends an electronic mail message to a predetermined recipient advising of said entry of said command by said user.
105. The security system of claim 104 wherein:

said user control interface comprises a keypad;
said indicium comprises a respective passcode unique to each of said at least one authorized user; and said activation of said authorization unit comprises entry of said passcode at said keypad.
106. The security system of claim 104 wherein:
said user control interface comprises a receiver;
said indicium comprises a respective transmitter uniquely coded for each of said at least one authorized user; and said activation of said authorization unit comprises activation of said coded transmitter in communication range of said receiver.
107. The security system of claim 106 wherein said receiver and said coded transmitter are wireless.
108. The security system of claim 104 wherein:
said user control interface comprises a token reader;
said indicium comprises a token uniquely coded to each of said at least one authorized user; and said activation of said authorization unit comprises presentation of said coded token to said reader.
109. The security system of claim 89 wherein:
said external data network is the Internet;
said data comprise World Wide Web pages;

said system has at least one authorized user, and has an authorization unit for uniquely identifying each of at least one of said authorized users; and when one of said at least one authorized user enters a security system command at said user control interface by activating said authorization unit using an indicium unique to said one of said at least one authorized user, said system retrieves a World Wide Web page directed to said one of said at least one authorized user and displays said World Wide Web page at said user control interface.
110. The security system of claim 109 wherein:
said user control interface comprises a keypad;
said indicium comprises a respective passcode unique to each of said at least one authorized user; and said activation of said authorization unit comprises entry of said passcode at said keypad.
111. The security system of claim 109 wherein:
said user control interface comprises a receiver;
said indicium comprises a respective transmitter uniquely coded for each of said at least one authorized user; and said activation of said authorization unit comprises activation of said coded transmitter in communication range of said receiver.
112. The security system of claim 111 wherein said receiver and said coded transmitter are wireless.
113. The security system of claim 111 wherein:
said respective transmitter is encoded with multiple codes;
said activation of said authorization unit comprises activation of a selected one of said multiple codes by said one of said at least one authorized user; and said system retrieves a different World Wide Web page based on which of said multiple codes has been selected.
114. The security system of claim 109 wherein:
said user control interface comprises a token reader;
said indicium comprises a respective token uniquely coded for each of said at least one authorized user; and said activation of said authorization unit comprises presentation of said coded token to said reader.
115. The security system of claim 89 wherein:
said system has at least one authorized user, and has an authorization unit for uniquely identifying each of at least one of said authorized users;
one of said at least one authorized user activates said authorization unit using an indicium unique to said one of said at least one authorized user;
said external data network is the Internet; and said activation of said authorization unit logs said one of said at least one authorized user onto the Internet at said user control interface.
116. The security system of claim 89 wherein:
said system has at least one authorized user, and has an authorization unit for uniquely identifying each of at least one of said authorized users;
one of said at least one authorized user enters a security system command at said user control interface by activating said authorization unit using an indicium unique to said one of said at least one authorized user;
said one of said at least one user uses said external data network to access a financial institution to perform a financial transaction;
said indicium is registered with said financial institution as an identifier of said one of said at least one authorized user; and said indicium is sent to said financial institution as part of said financial transaction.
117. The security system of claim 89 wherein functions of said system are remotely accessible via said external data network.
118. The security system of claim 89 wherein:
said system transmits security data signals to a central communication station via said external data network and an alternate channel and awaits acknowledgment thereof; and when said acknowledgment arrives from a first one of said external data network and said alternate channel, said system terminates transmission of said security data on a second one of said external data network and said alternate channel.
119. The security system of claim 118 wherein:
one of said external data network and said alternate channel normally operates faster than another of said external data network and said alternate channel; and said system begins transmission of said security data signals on said one of said external data network and said alternate channel before beginning transmission of said security data signals on said another of said external data network and said alternate channel.
120. The security system of claim 118 further comprising a firewall between said user control interface and said external data network; wherein:
said firewall allows only communication originating at said system and prevents communication originating on said external data network; and to receive said acknowledgment from said central communication station, said system initiates communication with said external data network so that said firewall allows said communication, said initiated communication including a query to said external data network for said acknowledgment to be communicated from said central communication station to said system.
121. The security system of claim 120 wherein said query to said external network comprises a query to said central communication station.
122. The security system of claim 118 wherein said alternate channel is said telephone line.
123. The security system of claim 118 wherein:
said system transmits security data signals to a central communication station via a plurality of channels; and when said acknowledgment arrives from a first one of said plurality of channels, said system terminates transmission of said security data on each other one of said plurality of channels.
124. The security system of claim 123 wherein:
one of said plurality of channels normally operates faster than others of said plurality of channels; and said system begins transmission of said security data signals on said one of said plurality of channels before beginning transmission of said security data signals on said others of said plurality of channels.
125. The security system of claim 89 wherein said system accepts commands from a user via said external data network.
126. The security system of claim 125 further comprising a firewall between said user control interface and said external data network; wherein:
said firewall allows only communication originating at said system and prevents communication originating on said external data network; and to receive said commands from said user, said system initiates communication with said external data network so that said firewall allows said communication, said initiated communication including a query to said external data network for commands issued by said user to be communicated from said external data network to said system.
127. The security system of claim 89 wherein said system sends security data signals to predetermined recipients via said external data network.
128. The security system of claim 89 comprising more than one of said user control interface, each said user control interface functioning as an independent terminal of said external data network.
129. The security system of claim 89 further comprising a firewall between said user control interface and said external data network; wherein:
said firewall allows only communication originating at said system and prevents communication originating on said external data network; and to receive data, said system initiates communication with said external data network so that said firewall allows said communication, said initiated communication including a query to said external data network for data sought to be communicated from said external data network to said system.
130. A secure communications system comprising:
a first communication station connected to a communication medium;
a central communication station connected to said communication medium; and at least a second communication station connected to said communication medium; wherein:

all communication between said first communication station and said central communication station is initiated by said first communication station;
communication between said first communication station and said second communication station is established by leaving a message for said first communication station at said central communication station indicating communication is desired between said first communication station and said second communication station; and when said first communication station initiates communication with said central communcation station, said first communication station receives said message for said first communication station, maintains its initiated communication with said central communication station and instructs said central communication station to relay communications between said first communication station and said second communication station.
131. The secure communications system of claim 130 wherein said message for said first communication station is left by said second communication station.
132. The secure communications system of claim 130 wherein said message for said first communication station is left by said central communication station.
133. The secure communications system of claim 130 wherein:
said first communication station includes a first firewall between said first communication station and said communication medium;
and said first firewall allows only communication originating at said first station and prevents communication originating on said communication medium.
134. The secure communications system of claim 130 wherein:
said first communication station further comprises a first station encryption processor for encrypting and decrypting communications using a first digital key identified with said first station;
said central communication station further comprises:
a central encryption processor for encrypting and decrypting communications using a digital key, and key memory for storing said first digital key and associating said stored first digital key with said first communication station;
said first communication station uses said first station encryption processor to encrypt with said first station digital key each communication sent to said central communication station, and to decrypt with said first station digital key each communication received from said central communication station; and said central communication station uses said central encryption processor to encrypt with said first station digital key each communication sent to said first communication station and to decrypt with said first station digital key each communication received from said first communication station.
135. The secure communications system of claim 134 wherein:

all communication between said second communication station and said central communication station is initiated by said second communication station;
communication between said second communication station and said first communication station is established by leaving a message for said second communication station at said central communication station indicating communication is desired between said second communication station and said first communication station; and when said second communication station initiates communication with said central communcation station, said second communication station receives said message for said second communication station, maintains its initiated communication with said central communication station and instructs said central communication station to relay communications between said first communication station and said second communication station.
136. The secure communications system of claim 135 wherein said message for said second communication station is left by said first communication station.
137. The secure communications system of claim 135 wherein said message for said second communication station is left by said central communication station.
138. The secure communications system of claim 135 wherein:
said second communication station includes a second firewall between said second communication station and said communication medium;
and said second firewall allows only communication originating at said second station and prevents communication originating on said communication medium.
139. The secure communications system of claim 135 wherein:
said second communication station further comprises a second station encryption processor for encrypting and decrypting communications using a second digital key identified with said second station;
said key memory of said central communication station further stores said second digital key and associates said stored second digital key with said second communication station;
said second communication station uses said second station encryption processor to encrypt with said second station digital key each communication sent to said central communication station, and to decrypt with said second station digital key each communication received from said central communication station; and said central communication station uses said central encryption processor to encrypt with said second station digital key each communication sent to said second communication station and to decrypt with said second station digital key each communication received from said second communication station.
140. The secure communications system of claim 139 wherein:
said first communication station is a premises alarm system; and said second communication station is a central alarm monitoring station.
141. The secure communications system of claim 139 wherein:
said first communication station is a first premises alarm system; and said second communication station is a second premises alarm system.
142. The secure communications system of claim 139 wherein:
said first communication station is a premises alarm system; and said second communication station is a remote communications terminal.
143. The secure communications system of claim 130 wherein:
all communication between said second communication station and said central communication station is initiated by said second communication station;
communication between said second communication station and said first communication station is established by leaving a message for said second communication station at said central communication station indicating communication is desired between said second communication station and said first communication station; and when said second communication station initiates communication with said central communcation station, said second communication station receives said message for said second communication station, maintains its initiated communication with said central communication station and instructs said central communication station to relay communications between said first communication station and said second communication station.
144. The secure communications system of claim 143 wherein said message for said second communication station is left by said first communication station.
145. The secure communications system of claim 143 wherein said message for said second communication station is left by said central communication station.
146. The secure communications system of claim 143 wherein:
said second communication station includes a second firewall between said second communication station and said communication medium;
and said second firewall allows only communication originating at said second station and prevents communication originating on said communication medium.
147. The secure communications system of claim 143 wherein:
said first communication station is a premises alarm system; and said second communication station is a central alarm monitoring station.
148. The secure communications system of claim 143 wherein:
said first communication station is a first premises alarm system; and said second communication station is a second premises alarm system.
149. The secure communications system of claim 143 wherein:
said first communication station is a premises alarm system; and said second communication station is a remote communications terminal.
150. The secure communications system of claim 130 wherein:
said first communication station is a premises alarm system; and said second communication station is a central alarm monitoring station.
151. The secure communications system of claim 130 wherein:
said first communication station is a first premises alarm system; and said second communication station is a second premises alarm system.
152. The secure communications system of claim 130 wherein:
said first communication station is a premises alarm system; and said second communication station is a remote communications terminal.
153. The secure communications system of claim 130 further comprising:
at said central communication station, at least one service agent unit for communicating between said first communication station and at least one service on said communications medium; wherein:
at least one of said at least one service requires a secure identifier for access thereto; and at least one of said at least one service agent unit comprises secure identifier storage, a user at said first communication station registering said user's secure identifier for said at least one of said at least one service; whereby:
when said user accesses said at least one of said at least one service, said user need not transmit said secure identifier over said communication medium, said secure identifier being transmitted securely by said service agent unit from said secure identifier storage.
154. A secure communications system for communicating between first and second communication stations connected to a communications medium; said system comprising:
a central communication station connected to said communication medium and having a secure digital session key generator; wherein:
each of said first and second communication means further comprises a respective encryption processor for encrypting and decrypting communications using a digital key;
all communication with said first communication station is initiated by said first communication station;
all communication with said second communication station is initiated by said second communication station;
communication between said first communication station and said second communication station is established by generating at said secure digital session key generator a secure digital session key and leaving a respective message at said central communication station for each of said first and second communication stations, each said respective message including said secure digital session key;
when said first communication station initiates communication with said central communcation station, said first communication station receives said message including said secure digital session key;
when said second communication station initiates communication with said central communcation station, said second communication station receives said message including said secure digital session key;
and said first and second communication stations communicate with one another using said secure digital session key and said respective encryption processors.
155. An integrated security and communications method comprising:
providing a security controller having at least one sensory input, at least one alarm output and at least one control signal input/output port;
providing a control interface operatively connected to said at least one control signal input/output port; and providing a communications unit connected to a communication channel for providing at least one communication function, a first communication port for connection to one of said at least one control signal input/output port of said security controller for providing at least one of said at least one communication function to a user at said control interface, and a second communication port for connection to a communication device at which said at least one communication function is provided to said user.
156. The method of claim 155 wherein:
said communication channel comprises a telephone line;
said communication device comprises a telephone; and said at least one communication function comprises telephony.
157. The method of claim 155 wherein:
said communication channel comprises an Internet connection;
said communication device comprises a computer; and said at least one communication function comprises Internet access.
158. The method of claim 155 further comprising providing at least one function of said control interface at said communication device.
159. A security method for monitoring user premises, said method comprising:
providing at least one sensor;
providing at least one alarm output device;
providing at least one user control interface;
connecting a system controller to said sensor, said output device and said user control interface, said at least one user control interface being used by a user to enter commands affecting a state of a security system;

when said state indicates that said system is active, monitoring said at least one sensor and outputting an alarm on said alarm output device when said at least one sensor indicates that an alarm condition exists; and connecting a telephone interface unit to said controller and a telephone line for providing voice mail functionality including one or more of message retrieval, message waiting indication, and message header indication; wherein:
said voice mail functionality is accessible at at least one of said at least one user control interface;
access to said voice mail functionality is restricted based on said state of said system, said voice mail functionality being accessible when said state is consistent with presence of an authorized user on said premises;
said system further having a plurality of authorized users, and having an authorization unit at said at least one user control interface for uniquely identifying each of at least one of said authorized users, wherein:
a particular one of said at least one authorized user initiates said state consistent with presence of an authorized user by activating said authorization unit using an indicium unique to said particular authorized user; and said telephone interface unit presents for access, at said user control interface, only voice mail functions for which said particular authorized user is authorized.
160. The security method of claim 159 further comprising:

providing a keypad at said user control interface; wherein:
said indicium comprises a respective passcode unique to each said at least one authorized user; and said activating of said authorization unit comprises entering said passcode on said keypad.
161. The security method of claim 159 wherein:
said authorization unit comprises a receiver at said user control interface;
said indicium comprises a respective transmitter uniquely coded to each said at least one authorized user; and said activating of said authorization unit comprises actuating said transmitter within communication range of said receiver.
162. The security method of claim 161 wherein said receiver and said coded transmitter are wireless.
163. The security method of claim 159 further comprising:
providing a token reader at said user control interface; and providing as said indicium a respective coded token unique to each said at least one authorized user; wherein:
said activating of said authorization unit comprises presenting said token to said token reader.
164. The security method of claim 159 wherein said voice mail functionality is activated automatically upon entry of said system into said state consistent with presence of an authorized user on said premises.
165. The security method of claim 159 further comprising remotely controlling, through a remote access unit which a user remotely controls, during a single telephone call session to said system from a remote location, both (a) at least one security system control function, and (b) at least one voice mail function.
166. The security method of claim 159 wherein said voice mail functionality comprises playback of an outgoing message to an incoming caller; said method further comprising:
connecting at least one telephone set to said telephone line; and providing a call screening function at at least one of (a) said at least one telephone set, and (b) said at least one user control interface, said user control interface including a speaker; wherein:
said call screening function is full-duplex, allowing said incoming caller to speak an announcement that is audible at said speaker during said playback of said outgoing message.
167. The security method of claim 159 further comprising:
connecting at least one telephone set connected to said telephone line; and providing an aural indication at said at least one telephone set when a voice mail message has been received and is awaiting playback.
168. The security method of claim 159 wherein said user control interface includes a speaker; said method further comprising:
connecting at least one telephone set to said telephone line, said least one telephone set having a ringer;
providing a privacy function whereby said ringer can be deactivated under control of a user;
and providing, as part of said privacy function, a privacy breakthrough function whereby a caller issues a command when said privacy function is active for broadcasting a message on said speaker.
169. The security method of claim 159 wherein said voice mail functionality includes a toll saver feature controlled by said state of said system.
170. The security method of claim 169 wherein said toll saver feature is active only when said state of said system indicates absence of authorized users from said premises.
171. The security method of claim 170 further comprising controlling said toll saver feature at said user control interface.
172. The security method of claim 171 further comprising connecting at least one telephone set to said telephone line; wherein:
said toll saver feature can be controlled by a user at at least one of said at least one telephone set.
173. The security method of claim 159 further comprising:

displaying calling party identification data at said user control interface; and responsive to said calling party identification data, generating a distinctive ringing signal different from a standard incoming ringing signal based on said calling party identification data.
174. The security method of claim 173 further comprising generating a first number of distinctive ringing signals, each distinctive ringing signal in said first number of distinctive ringing signals identifying at least one preselected calling party from a second number of preselected calling parties.
175. The security method of claim 174 wherein said first number is equal to said second number, whereby each distinctive ringing signal is associated with a unique preselected calling party.
176. The security method of claim 174 wherein said first number is less than said second number, whereby each distinctive ringing signal is associated with a plurality of said preselected calling parties.
177. The security method of claim 174 wherein said generating of distinctive ringing signals comprises interrupting said standard incoming ringing signal in a second number of ways equal to said second number of distinctive ringing signals, to produce said second number of distinctive ringing signals.
178. The security method of claim 173 wherein said generating of distinctive ringing signals comprises interrupting said standard incoming ringing signal to produce said distinctive ringing signal.
179. The security method of claim 159further comprising:
displaying calling party identification data at said user control interface;
storing instructions for paging a user when said calling party identification data identifies one of at least one particular calling party; and acting on said instructions and placing a call to a user's pager when said calling party identification data identify one of said at least one particular calling party.
180. The security method of claim 159 further comprising:
connecting at least one telephone set to said telephone line through said telephone interface unit;
providing a speaker at at least one of said at least one user control interface;
providing a public address function at said telephone interface whereby, when a user issues a command at said telephone set:
said telephone set is disconnected from said telephone line and connected to said speaker of said at least one of said at least one user control interface.
181. The security method of claim 180 further comprising connecting said telephone set to said speaker of each said at least one of said at least one user control interface.
182. The security method of claim 180 further comprising, on command of said user, connecting said telephone set to said speaker of any one or more of said at least one of said at least one user control interface.
183. The security method of claim 180 further comprising, when said user issues said command at said telephone set, maintaining said telephone line in an off-hook condition while said public address function is in use.
184. The security method of claim 159 further comprising:
connecting at least one telephone set connected to said telephone line through said telephone interface unit;
providing a microphone at at least one of said at least one user control interface;
providing a room monitor function at said telephone interface unit whereby, when a user issues a command at said telephone set:
said telephone set is disconnected from said telephone line and connected to said microphone of said at least one of said at least one user control interface.
185. The security method of claim 159 further comprising connecting at least one telephone set to said telephone line through said telephone interface unit; wherein:
at least one programmable parameter of said security system is programmable:
(a) at said at least one user control interface;
(b) at said connected telephone set; and (c) remotely by calling into said system on said telephone line.
186. The security method of claim 185 wherein:
there are a plurality of said programmable parameters; and only a subset of said plurality of programmable parameters is programmable remotely.
187. The security method of claim 159 further comprising connecting at least one user-controlled processor via a modem to said telephone line through said telephone interface unit; wherein:
at least one programmable parameter of said security system is programmable; and said telephone interface unit includes a control signal detector for detecting control signals sent from said user-controlled processor through said modem; said method further comprising:
responsive to said control signals from said user-controlled processor, disconnecting said telephone interface unit from said telephone line and placing said system in a user-controlled mode.
188. The security method of claim 187 wherein in said user-controlled mode said user-controlled processor performs any one of:
programming said at least one programmable parameter of said security system;
downloading voice mail messages received as part of said voice mail functionality from said telephone interface unit to said user-controlled processor; and uploading voice prompts composed at said user-controlled processor to said telephone interface unit.
189. The security method of claim 187 wherein said user-controlled processor comprises a personal computer.
190. The security method of claim 159 wherein:
said telephone line has central office voice mail associated therewith; and said voice mail functionality comprises indicating a central office voice message waiting.
191. The security method of claim 190 wherein said indicating central office message waiting comprises providing an indication at said user control interface.
192. The security method of claim 191 wherein said providing indication at said user control interface comprises providing visual indication.
193. The security method of claim 191 wherein said providing indication at said user control interface comprises providing aural indication.
194. The security method of claim 190 further comprising connecting at least one telephone set to said telephone line; wherein:
said indicating central office message waiting comprises providing an indication at said telephone set.
195. The security method of claim 194 wherein said providing an indication at said telephone set comprises providing an aural indication.
196. The security method of claim 194 wherein:
said telephone set includes a visual indicator; and said providing an indication at said telephone set comprises providing a visual indication.
197. The security method of claim 159 wherein said telephone interface unit further comprises a remote access unit through which a user controls at least one security system control function via said telephone line.
198. The security method of claim 197 wherein said user, through said remote access unit, controls said at least one security system function from a telephone at a remote location by calling into said telephone line from said remote location.
199. The security method of claim 197 further comprising:
connecting at least one telephone set to said telephone line; wherein:
said user, through said telephone interface unit, controls said at least one security system function from said telephone set.
200. The security method of claim 159 further comprising:
connecting at least one telephone set connected to said telephone line;
monitoring said telephone line and, when an outgoing telephone call is placed on said at least one telephone set, logging said outgoing telephone call.
201. The security method of claim 200 further comprising:
storing data identifying numbers to which outgoing calls are restricted; and when an outgoing call is placed on said telephone set to one of said numbers to which outgoing calls are restricted, preventing said outgoing call from being completed.
202. The security method of claim 201 further comprising:
further storing at least one user code;
and when said user code is entered during said outgoing call, allowing said outgoing call to be completed to one of said numbers to which outgoing calls are restricted.
203. The security method of claim 159 further comprising connecting said user control interface to an external data network for at least one of (a) sending, and (b) receiving, data.
204. The security method of claim 203 wherein:
said data comprise electronic mail; and access to said electronic mail is restricted based on said state of said system.
205. The security method of claim 204 wherein said electronic mail is accessible when said state is consistent with presence of an authorized user on said premises.
206. The security method of claim 205 wherein said system has a plurality of authorized users; said method further comprising, when a particular authorized user initiates said state consistent with presence of an authorized user by activating said authorization unit:
presenting, for access at said user control interface, only electronic mail addressed to said particular authorized user.
207. The security method of claim 206 further comprising providing a keypad at said user control interface; wherein:
said indicium comprises a passcode unique to said particular authorized user; and said activation of said authorization unit comprises entry of said passcode at said keypad.
208. The security method of claim 206 wherein:
said authorization unit comprises a receiver; and said indicium comprises a transmitter coded uniquely to said particular authorized user; said method further comprising:
activating said authorization unit by activating said coded transmitter in communication range of said receiver.
209. The security method of claim 206 wherein:
said authorization unit comprises a token reader; and said indicium comprises a token coded uniquely to said particular authorized user; said method further comprising activating said authorization unit by presenting of said coded token to said reader.
210. The security method of claim 205 wherein:
said system has a plurality of authorized users; said method further comprising, when a particular authorized user initiates said state consistent with presence of an authorized user by activating said authorization unit using an indicium unique to said particular authorized user:
presenting access, at said user control interface, to electronic mail message sending from said particular authorized user.
211. The security method of claim 210 further comprising:
providing a keypad at said user control interface; wherein:
said indicium comprises a passcode unique to said particular authorized user; and said presentation of said indicium comprises entry of said passcode at said keypad.
212. The security method of claim 210 wherein:
said authorization unit comprises a receiver; and said indicium comprises a transmitter coded uniquely to said particular authorized user; said method further comprising:
activating said authorization unit by activating said coded transmitter in communication range of said receiver.
213. The security method of claim 210 wherein:
said authorization unit comprises a token reader; and said indicium comprises a token coded uniquely to said particular authorized user; said method further comprising:
activating said authorization unit by presenting said coded token to said reader.
214. The security method of claim 203 wherein:
said data comprise electronic mail; and said system has at least one authorized user; said method further comprising, when one of said at least one authorized user enters a security system command at said user control interface by activating said authorization unit:
sending an electronic mail message to a predetermined recipient advising of said entry of said command by said one of said at least one authorized user.
215. The security method of claim 214 further comprising:
providing a keypad at said user control interface; wherein:
said indicium comprises a passcode unique to said one of said at least one authorized user; and said activation of said authorization unit comprises entry of said passcode at said keypad.
216. The security method of claim 214 wherein:
said authorization unit comprises a receiver;
said indicium comprises a transmitter coded uniquely to said one of said at least one authorized user; said method further comprising:

activating said authorization unit by activating said coded transmitter in communication range of said receiver.
217. The security method of claim 214 wherein:
said authorization unit comprises a token reader; and said indicium comprises a token coded uniquely to said one of said at least one authorized user; said method further comprising:
activating said authorization unit by presenting said coded token to said reader.
218. The security method of claim 203 wherein:
said external data network is the Internet;
said data comprise World Wide Web pages;
and said system has at least one authorized user; said method further comprising, when one of said at least one authorized user enters a security system command at said user control interface by activating said authorization unit:
retrieving a World Wide Web page directed to said one of said at least one authorized user; and displaying said World Wide Web page at said user control interface.
219. The security method of claim 218 further comprising:
providing a keypad at said user control interface; wherein:

said indicium comprises a passcode unique to said one of said at least one authorized user; and said activation of said authorization unit comprises entry of said passcode at said keypad.
220. The security method of claim 218 wherein:
said authorization unit comprises a receiver; and said indicium comprises a transmitter coded uniquely to said one of said at least one authorized user; said method further comprising:
activating of said authorization unit by activating said coded transmitter in communication range of said receiver.
221. The security method of claim 220 wherein:
said transmitter is encoded with multiple codes; and said activation of said authorization unit comprises activation of a selected one of said multiple codes by said one of said at least one authorized user; said method further comprising:
retrieving a different World Wide Web page based on which of said multiple codes has been selected.
222. The security method of claim 218 wherein:
said authorization unit comprises a token reader; and said indicium comprises a token coded uniquely to said one of said at least one authorized user; said method further comprising:

activating said authorization unit by presenting said coded token to said reader.
223. The security method of claim 203 wherein:
said system has at least one authorized user;
one of said at least one authorized user enters a security system command at said user control interface by activating said authorization unit; and said external data network is the Internet; said method further comprising, on activation of said authorization unit by said one of said at least one authorized user:
logging said one of said at least one authorized user onto the Internet at said user control interface.
224. The security method of claim 203 wherein:
said system has at least one authorized user;
one of said at least one authorized user enters a security system command at said user control interface by activating said authorization unit using an indicium unique to said one of said at least one authorized user;
said one of said at least one user uses said external data network to access a financial institution to perform a financial transaction; and said indicium is registered with said financial institution as an identifier of said one of said at least one authorized user; said method further comprising:
sending said indicium to said financial institution as part of said financial transaction.
225. The security method of claim 203 further comprising:
transmitting security data signals to a central communication station via said external data network and an alternate channel and awaiting acknowledgment thereof; and when said acknowledgment arrives from a first one of said external data network and said alternate channel, terminating transmission of said security data on a second one of said external data network and said alternate channel.
226. The security method of claim 225 wherein:
one of said external data network and said alternate channel normally operates faster than another of said external data network and said alternate channel; and transmitting of said security data signals to said central communication station via said one of said external data network and said alternate channel begins before transmitting of said security data signals to said central communication station via said another of said external data network and said alternate channel.
227. The security method of claim 225 further comprising:
providing a firewall between said user control interface and said external data network, said firewall allowing only communication originating at said system and prevents communication originating on said external data network; and to receive said acknowledgment from said central communication station, initiating communication with said external data network so that said firewall allows said communication, said initiated communication including a query to said external data network for said acknowledgment to be communicated from said central communication station to said system.
228. The security method of claim 227 wherein said query to said external network comprises a query to said central communication station.
229. The security method of claim 225 wherein said alternate channel is said telephone line.
230. The security method of claim 203 further comprising:
transmitting security data signals to a central communication station via a plurality of channels; and when said acknowledgment arrives from a first one of said plurality of channels, terminating transmission of said security data on each other one of said plurality of channels.
231. The security method of claim 230 wherein:
one of said plurality of channels normally operates faster than others of said plurality of channels; and transmitting of said security data signals to said central communication station via said one of said plurality of channels begins before transmitting of said security data signals to said central communication station via said others of said plurality of channels.
232. The security method of claim 203 further comprising accepting commands from a user via said external data network.
233. The security method of claim 232 further comprising:
providing a firewall between said user control interface and said external data network, said firewall allowing only communication originating at said system and preventing communication originating on said external data network; and to receive said commands from said user, initiating communication with said external data network so that said firewall allows said communication, said initiated communication including a query to said external data network for commands issued by said user to be communicated from said external data network to said system.
234. The security method of claim 203 further comprising sending security data signals to predetermined recipients via said external data network.
235. The security method of claim 203 further comprising providing more than one of said user control interface, each said user control interface functioning as an independent terminal of said external data network.
236. The security method of claim 203 further comprising:
providing a firewall between said user control interface and said external data network, said firewall allowing only communication originating at said system and preventing communication originating on said external data network; and to receive data, initiating communication with said external data network so that said firewall allows said communication, said initiated communication including a query to said external data network for data sought to be communicated from said external data network to said system.
237. A security method for monitoring user premises, said method comprising:
providing at least one sensor;
providing at least one alarm output device;
providing at least one user control interface;
providing a system controller connected to said sensor, said output device and said user control interface; wherein:
at least one of said at least one user control interface is connected to an external data network for at least one of (a) sending, and (b) receiving, data.
238. The security method of claim 237 wherein said data comprise electronic mail.
239. The security method of claim 237 wherein:
said at least one user control interface is used by a user to enter commands affecting a state of said system; said method further comprising:
when said state indicates that said system is active, monitoring said at least one sensor and outputting an alarm on said alarm output device when said at least one sensor indicates that an alarm condition exists.
240. The security method of claim 239 wherein:
said data comprise electronic mail; and access to said electronic mail is restricted based on said state of said system.
241. The security method of claim 240 wherein said electronic mail is accessible when said state is consistent with presence of an authorized user on said premises.
242. The security method of claim 241 wherein:
there are a plurality of authorized users, said system having an authorization unit for uniquely identifying each of at least one of said authorized users; and a particular authorized user initiates said state consistent with presence of an authorized user by activating said authorization unit using an indicium unique to said particular authorized user;
said method further comprising:
presenting, for access at said user control interface, only electronic mail addressed to said particular authorized user.
243. The security method of claim 242 further comprising:
providing a keypad at said user control interface; wherein:
said indicium comprises a respective passcode unique to each said at least one authorized user; and said activating of said authorization unit comprises entry of said passcode at said keypad.
244. The security method of claim 242 wherein:
said user control interface comprises a receiver; and said indicium comprises a respective transmitter uniquely coded to each of said at least one authorized user; said method further comprising:
activating said authorization unit by activating said coded transmitter in communication range of said receiver.
245. The security method of claim 242 wherein:
said user control interface comprises a token reader; and said indicium comprises a token uniquely coded to each of said at least one authorized user;
said method further comprising:
activating said authorization unit by presenting said coded token to said reader.
246. The security method of claim 241 wherein:
said system has a plurality of authorized users, and has an authorization unit for uniquely identifying each of at least one of said authorized users; and a particular authorized user initiates said state consistent with presence of an authorized user by activating said authorization unit using an indicium unique to said particular authorized user;
said method further comprising:

presenting access at said user control interface to electronic mail message sending from said particular authorized user.
247. The security method of claim 246 further comprising:
providing a keypad at said user control interface; wherein:
said indicium comprises a respective passcode unique to each of said at least one authorized user; and said activation of said authorization unit indicium comprises entry of said passcode at said keypad.
248. The security method of claim 246 further comprising:
providing a receiver at said user control interface; wherein:
said indicium comprises a respective transmitter uniquely coded to each of said at least one authorized user; and said activation of said authorization unit comprises activation of said coded transmitter in communication range of said receiver.
249. The security method of claim 246 wherein:
said user control interface comprises a token reader; and said indicium comprises a respective token uniquely coded to each of said at least one authorized user; said method further comprising:
activating said authorization unit by presenting said coded token to said reader.

-113-~
250. The security method of claim 237 wherein:
said data comprise electronic mail; and said system has at least one authorized user, and has an authorization unit for uniquely identifying each of at least one of said authorized users; said method further comprising, when one of said at least one authorized user enters a security system command at said user control interface by activating said authorization unit using an indicium unique to said one of said at least one authorized user:
sending an electronic mail message to a predetermined recipient advising of said entry of said command by said user.
251. The security method of claim 250 further comprising:
providing a keypad at said user control interface; wherein:
said indicium comprises a respective passcode unique to each of said at least one authorized user; and said activation of said authorization unit comprises entry of said passcode at said keypad.
252. The security method of claim 250 wherein:
said user control interface comprises a receiver; and said indicium comprises a respective transmitter uniquely coded for each of said at least one authorized user; said method further comprising:
activating said authorization unit by activating said coded transmitter in communication range of said receiver.
253. The security method of claim 250 wherein:
said user control interface comprises a token reader; and said indicium comprises a token uniquely coded to each of said at least one authorized user;
said method further comprising:
activating said authorization unit by presenting said coded token to said reader.
254. The security method of claim 237 wherein:
said external data network is the Internet;
said data comprise World Wide Web pages;
said system has at least one authorized user, and has an authorization unit for uniquely identifying each of at least one of said authorized users; said method further comprising, when one of said at least one authorized user enters a security system command at said user control interface by activating said authorization unit using an indicium unique to said one of said at least one authorized user:
retrieving a World Wide Web page directed to said one of said at least one authorized user and displaying said World Wide Web page at said user control interface.
255. The security method of claim 254 further comprising:
providing a keypad at said user control interface; wherein:
said indicium comprises a respective passcode unique to each of said at least one authorized user; and said activation of said authorization unit comprises entry of said passcode at said keypad.
256. The security method of claim 254 wherein:
said user control interface comprises a receiver; and said indicium comprises a respective transmitter uniquely coded for each of said at least one authorized user; said method further comprising:
activating said authorization unit by activating said coded transmitter in communication range of said receiver.
257. The security method of claim 256 wherein:
said respective transmitter is encoded with multiple codes; and said activation of said authorization unit comprises activation of a selected one of said multiple codes by said one of said at least one authorized user; said method further. comprising:
retrieving a different World Wide Web page based on which of said multiple codes has been selected.
258. The security method of claim 254 wherein:
said user control interface comprises a token reader; and said indicium comprises a respective token uniquely coded for each of said at least one authorized user; said method further comprising:
activating said authorization unit by presenting said coded token to said reader.
259. The security method of claim 237 wherein:
said system has at least one authorized user, and has an authorization unit for uniquely identifying each of at least one of said authorized users;
one of said at least one authorized user activates said authorization unit using an indicium unique to said one of said at least one authorized user; and said external data network is the Internet; said method further comprising:
on said activation of said authorization unit, logging said one of said at least one authorized user onto the Internet at said user control interface.
260. The security method of claim 237 wherein:
said system has at least one authorized user, and has an authorization unit for uniquely identifying each of at least one of said authorized users;
one of said at least one authorized user enters a security system command at said user control interface by activating said authorization unit using an indicium unique to said one of said at least one authorized user;
said one of said at least one user uses said external data network to access a financial institution to perform a financial transaction; and said indicium is registered with said financial institution as an identifier of said one of said at least one authorized user; said method further comprising:
sending said indicium to said financial institution as part of said financial transaction.
261. The security method of claim 237 further comprising:
transmitting security data signals to a central communication station via said external data network and an alternate channel and awaiting acknowledgment thereof; and when said acknowledgment arrives from a first one of said external data network and said alternate channel, terminating transmission of said security data on a second one of said external data network and said alternate channel.
262. The security method of claim 261 wherein:
one of said external data network and said alternate channel normally operates faster than another of said external data network and said alternate channel; and transmitting of said security data signals to said central communication station via said one of said external data network and said alternate channel begins before transmitting of said security data signals to said central communication station via said another of said external data network and said alternate channel.
263. The security method of claim 261 wherein:
there is a firewall between said user control interface and said external data network, said firewall allowing only communication originating at said system and preventing communication originating on said external data network; said method further comprising:
to receive said acknowledgment from said central communication station, initiating communication with said external data network so that said firewall allows said communication, said initiated communication including a query to said external data network for said acknowledgment to be communicated from said central communication station to said system.
264. The security method of claim 263 wherein said query to said external network comprises a query to said central communication station.
265. The security method of claim 261 wherein said alternate channel is said telephone line.
266. The security method of claim 237 further comprising:
transmitting security data signals to a central communication station via a plurality of channels; and when said acknowledgment arrives from a first one of said plurality of channels, terminating transmission of said security data on each other one of said plurality of channels.
267. The security method of claim 266 wherein:
one of said plurality of channels normally operates faster than others of said plurality of channels; and transmitting of said security data signals to said central communication station via said one of said plurality of channels begins before transmitting of said security data signals to said central communication station via said others of said plurality of channels.
268. The security method of claim 237 further comprising accepting commands from a user via said external data network.
269. The security method of claim 268 wherein:
there is a firewall between said user control interface and said external data network, said firewall allowing only communication originating at said system and preventing communication originating on said external data network; said method further comprising:
to receive said commands from said user, initiating communication with said external data network so that said firewall allows said communication, said initiated communication including a query to said external data network for commands issued by said user to be communicated from said external data network to said system.
270. The security method of claim 237 further comprising sending security data signals to predetermined recipients via said external data network.
271. The security method of claim 237 wherein:
there is a firewall between said user control interface and said external data network, said firewall allowing only communication originating at said system and preventing communication originating on said external data network; said method further comprising:
to receive data, initiating communication with said external data network so that said firewall allows said communication, said initiated communication including a query to said external data network for data sought to be communicated from said external data network to said system.
272. A secure communications method for communicating between first and second communication stations connected to a communications medium; said method comprising:
providing a central communication station connected to said communication medium;
initiating all communication between said first communication station and said central communication station at said first communication station;
establishing communication between said first communication station and said second communication station by leaving a message for said first communication station at said central communication station indicating communication is desired between said first communication station and said second communication station; and when said first communication station initiates communication with said central communcation station, said first communication station receiving said message for said first communication station, maintaining its initiated communication with said central communication station and instructing said central communication station to relay communications between said first communication station and said second communication station.
273. The secure communications method of claim 272 further comprising said second communication station leaving said message for said first communication station.
274. The secure communications method of claim 272 further comprising said central communication station leaving said message for said first communication station.
275. The secure communications method of claim 272 wherein said first communication station includes a first firewall between said first communication station and said communication medium, said first firewall allowing only communication originating at said first station and preventing communication originating on said communication medium.
276. The secure communications method of claim 272 further comprising:
at said central communication station and said first communication station, storing a first digital key and associating said stored first digital key with said first communication station;
at said first communication station, encrypting each communication sent to said central communication station, and decrypting each communication received from said central communication station, using said first digital key identified with said first communication station; and at said central communication station, encrypting with said first station digital key each communication sent to said first communication station and decrypting with said first station digital key each communication received from said first communication station.
277. The secure communications method of claim 276 further comprising:
initiating all communication between said second communication station and said central communication station at said second communication station;
establishing communication between said second communication station and said first communication station by leaving a message for said second communication station at said central communication station indicating communication is desired between said second communication station and said first communication station; and when said second communication station initiates communication with said central communcation station, said second communication station receiving said message for said second communication station, maintaining its initiated communication with said central communication station and instructing said central communication station to relay communications between said second communication station and said first communication station.
278. The secure communications method of claim 277 further comprising said first communication station leaving said message for said second communication station.
279. The secure communications method of claim 277 further comprising said central communication station leaving said message for said second communication station.
280. The secure communications method of claim 277 wherein said second communication station includes a second firewall between said second communication station and said communication medium, said second firewall allowing only communication originating at said second station and preventing communication originating on said communication medium.
281. The secure communications method of claim 277 wherein:
at said central communication station and said second communication station, storing a second digital key and associating said stored second digital key with said second communication station;
at said second communication station, encrypting each communication sent to said central communication station, and decrypting each communication received from said central communication station, using said second digital key identified with said second communication station; and at said central communication station, encrypting with said second station digital key each communication sent to said second communication station and decrypting with said second station digital key each communication received from said second communication station.
282. The secure communications method of claim 272 further comprising:
initiating all communication between said second communication station and said central communication station at said second communication station;
establishing communication between said second communication station and said first communication station by leaving a message for said second communication station at said central communication station indicating communication is desired between said second communication station and said first communication station; and when said second communication station initiates communication with said central communcation station, said second communication station receiving said message for said second communication station, maintaining its initiated communication with said central communication station and instructing said central communication station to relay communications between said second communication station and said first communication station.
283. The secure communications method of claim 282 further comprising said first communication station leaving said message for said second communication station.
284. The secure communications method of claim 282 further comprising said central communication station leaving said message for said second communication station.
285. The secure communication method of claim 282 wherein said second communication station includes a second firewall between said second communication station and said communication medium, said second firewall allowing only communication originating at said second station and preventing communication originating on said communication medium.
286. The secure communications method of claim 272 further comprising:
at said central communication station, providing at least one service agent unit for communicating between said first communication station and at least one service on said communications medium;
wherein:
at least one of said at least one service requires a secure identifier for access thereto; said method further comprising:
providing secure storage at at least one of said at least one service agent,unit, and storing in said secure storage a secure identifier for said at least one of said at least one service registered at said secure storage by a user at said first communication station; whereby:
when said user accesses said at least one of said at least one service, said user need not transmit said secure identifier over said communication medium, said secure identifier being transmitted securely by said service agent unit from said secure identifier storage.
287. A secure communications method for communicating between first and second communication stations connected to a communications medium; said method comprising:
providing a central communication station connected to said communication medium and having a secure digital session key generator;
providing at each of said first and second communication means a respective encryption processor for encrypting and decrypting communications using a digital key;
initiating all communication with said first communication station at said first communication station;
initiating all communication with said second communication station at said second communication station;
establishing communication between said first communication station and said second communication station by generating at said secure digital session key generator a secure digital session key and leaving a respective message at said central communication station for each of said first and second communication stations, each said respective message including said secure digital session key;

when said first communication station initiates communication with said central communcation station, said first communication station receiving said message including said secure digital session key;
when said second communication station initiates communication with said central communcation station, said second communication station receiving said message including said secure digital session key;
and said first and second communication stations communicating with one another using said secure digital session key and said respective encryption processors.
288. An integrated security and communications system comprising:
a security controller means having at least one means for accepting sensory input, at least one means for outputting an alarm and at least one means for inputting/outputting a control signal;
a control interface means operatively connected to said at least one means for inputting/
outputting a control signal; and means for communicating connected to a communication channel for providing at least one communication function, a first communication port for connection to one of said at least one means of said security controller for inputting/outputting a control signal for providing at least one of said at least one communication function to a user at said control interface means, and a second communication port for connection to a communication device at which said at least one communication function is provided to said user.
289. The system of claim 288 wherein:

said communication channel comprises a telephone line; and said communication device comprises a telephone.
290. The system of claim 289 wherein said at least one communication function comprises telephony.
291. The system of claim 288 wherein:
said communication channel comprises an Internet connection;
said means for communicating comprises means for computing; and said at least one communication function comprises Internet access.
292. The system of claim 288 wherein said means for communicating provides at least one function of said control interface at said communication device.
293. A security system for monitoring user premises, said system comprising:
at least one means for sensing;
at least one means for outputting an alarm;
at least one user control interface means;
a system controller means connected to said means for sensing, said means for outputting an alarm and said user control interface means, said at least one user control interface means being used by a user to enter commands affecting a state of said system, said system, when said state indicates that said system is active, monitoring said at least one means for sensing and outputting an alarm on said means for outputting an alarm when said at least one means for sensing indicates that an alarm condition exists;
and a telephone interface means connected to said controller means and a telephone line for providing voice mail functionality including one or more of message retrieval, message waiting indication, and message header indication; wherein:
said voice mail functionality is accessible at at least one of said at least one user control interface means;
access to said voice mail functionality is restricted based on said state of said system, said voice mail functionality being accessible when said state is consistent with presence of an authorized user on said premises;
said system further having a plurality of authorized users, and having a means for authorizing at said at least one user control interface means for uniquely identifying each of at least one of said authorized users, wherein:
a particular one of said at least one authorized user initiates said state consistent with presence of an authorized user by activating said means for authorizing using an indicium unique to said particular authorized user; and said telephone interface means presents for access, at said user control interface means, only voice mail functions for which said particular authorized user is authorized.
294. The security system of claim 293 wherein:
said means for authorizing comprises keypad means at said user control interface means;

said indicium comprises a respective passcode unique to each said at least one authorized user; and said activating of said means for authorizing comprises entering said passcode on said keypad means.
295. The security system of claim 293 wherein:
said means for authorizing comprises means for receiving at said user control interface means;
said indicium comprises a respective means for transmitting uniquely coded to each said at least one authorized user; and said activating of said means for authorizing comprises actuating said means for transmitting within communication range of said means for receiving.
296. The security system of claim 295 wherein said means for receiving and said coded means for transmitting are wireless.
297. The security system of claim 293 wherein:
said means for authorizing comprises means for reading a token at said user control interface means;
said indicium comprises a respective coded token unique to each said at least one authorized user; and said activating of said means for authorizing comprises presenting said token to said token reading means.
298. The security system of claim 293 wherein said voice mail functionality is activated automatically upon entry of said system into said state consistent with presence of an authorized user on said premises.
299. The security system of claim 293 wherein said telephone interface means further comprises means for remote access through which a user remotely controls, during a single telephone call session to said system from a remote location, both (a) at least one security system control function, and (b) at least one voice mail function.
300. The security system of claim 293 further comprising at least one telephone set connected to said telephone line; wherein:
said voice mail functionality comprises playback of an outgoing message to an incoming caller;
said telephone interface means further provides a call screening function at at least one of (a) said at least one telephone set, and (b) said at least one user control interface means, said user control interface means including speaker means; and said call screening function is full-duplex, allowing said incoming caller to speak an announcement that is audible at said speaker means during said playback of said outgoing message.
301. The security system of claim 293 further comprising at least one telephone set connected to said telephone line; wherein:
said telephone interface means further provides an aural indication at said at least one telephone set when a voice mail message has been received and is awaiting playback.
302. The security system of claim 293 further comprising at least one telephone set connected to said telephone line, said least one telephone set having means for ringing; wherein:
said user control interface means includes speaker means; and said telephone interface means further provides:
a privacy function whereby said means for ringing can be deactivated under control of a user, and as part of said privacy function, a privacy breakthrough function whereby a caller issues a command when said privacy function is active for broadcasting a message on said speaker means.
303. The security system of claim 293 wherein said voice mail functionality includes a toll saver feature controlled by said state of said system.
304. The security system of claim 303 wherein said toll saver feature is active only when said state of said system indicates absence of authorized users from said premises.
305. The security system of claim 304 wherein said toll saver feature can further be controlled by a user at said user control interface means.
306. The security system of claim 305 further comprising at least one telephone set connected to said telephone line; wherein:
said toll saver feature can be controlled by a user at at least one of said at least one telephone set.
307. The security system of claim 293 wherein said telephone interface means further comprises:
means for displaying calling party identification data, said calling party identification data being displayed at said user control interface means; and means responsive to said calling party identification data for generating a distinctive ringing signal, different from a standard incoming ringing signal, based on said calling party identification data.
308. The security system of claim 307 wherein said means for generating a distinctive ringing signal generates a first number of distinctive ringing signals, each distinctive ringing signal in said first number of distinctive ringing signals identifying at least one preselected calling party from a second number of preselected calling parties.
309. The security system of claim 308 wherein said first number is equal to said second number, whereby each distinctive ringing signal is associated with a unique preselected calling party.
310. The security system of claim 308 wherein said first number is less than said second number, whereby each distinctive ringing signal is associated with a plurality of said preselected calling parties.
311. The security system of claim 308 wherein said means for generating distinctive ringing signals comprises means for interrupting said standard incoming ringing signal in a second number of ways equal to said second number of distinctive ringing signals, to produce said second number of distinctive ringing signals.
312. The security system of claim 307 wherein said means for generating distinctive ringing signals comprises means for interrupting said standard incoming ringing signal to produce said distinctive ringing signal.
313. The security system of claim 293 wherein said telephone interface means further comprises:
means for displaying calling party identification data at said user control interface;
means for storing instructions for paging a user when said calling party identification data identifies one of at least one particular calling party; and processor means for acting on said instructions and placing a call to a user's pager when said calling party identification data identify one of said at least one particular calling party.
314. The security system of claim 293 further comprising at least one telephone set connected to said telephone line through said telephone interface means;
wherein:
at least one of said at least one user control interface means comprises speaker means;
said telephone interface means further comprises a public address function; whereby, when a user issues a command at said telephone set:
said telephone set is disconnected from said telephone line and connected to said speaker means of said at least one of said at least one user control interface means.
315. The security system of claim 314 wherein said telephone set is connected to said speaker means of each said at least one of said at least one user control interface means.
316. The security system of claim 314 wherein, on command of said user, said telephone set is connected to said speaker means of any one or more of said at least one of said at least one user control interface means .
317. The security system of claim 314 wherein, when said user issues said command at said telephone set, said telephone interface means maintains said telephone line in an off-hook condition while said public address function is in use.
318. The security system of claim 293 further comprising at least one telephone set connected to said telephone line through said telephone interface means;
wherein:
at least one of said at least one user control interface means comprises a microphone;
said telephone interface means further comprises a room monitor function; whereby, when a user issues a command at said telephone set:
said telephone set is disconnected from said telephone line and connected to said microphone of said at least one of said at least one user control interface means.
319. The security system of claim 293 further comprising at least one telephone set connected to said telephone line through said telephone interface means;
wherein:

at least one programmable parameter of said security system is programmable:
(a) at said at least one user control interface means;
(b) at said connected telephone set; and (c) remotely by calling into said system on said telephone line.
320. The security system of claim 319 wherein:
there are a plurality of said programmable parameters; and only a subset of said plurality of programmable parameters is programmable remotely.
321. The security system of claim 293 further comprising at least one user-controlled processor means connected via modem means to said telephone line through said telephone interface means; wherein:
at least one programmable parameter of said security system is programmable;
said telephone interface means includes means for detecting control signals sent from said user-controlled processor means through said modem means; whereby:
responsive to said control signals from said user-controlled processor means, said telephone interface means disconnects from said telephone line and enters a user-controlled mode.
322. The security system of claim 321 wherein in said user-controlled mode said user-controlled processor means performs any one of:
programming said at least one programmable parameter of said security system;

downloading voice mail messages received as part of said voice mail functionality from said telephone interface means to said user-controlled processor means; and uploading voice prompts composed at said user-controlled processor means to said telephone interface means .
323. The security system of claim 321 wherein said user-controlled processor means comprises a personal computer.
324. The security system of claim 293 wherein:
said telephone line has central office voice mail associated therewith; and said voice mail functionality comprises indicating a central office voice message waiting.
325. The security system of claim 324 wherein said indicating central office message waiting comprises providing an indication at said user control interface.
326. The security system of claim 325 wherein said indication at said user control interface is visual.
327. The security system of claim 325 wherein said indication at said user control interface is aural.
328. The security system of claim 324 further comprising at least one telephone set connected to said telephone line; wherein:

said indicating central office message waiting comprises providing an indication at said telephone set.
329. The security system of claim 328 wherein said indication at said telephone set is aural.
330. The security system of claim 328 wherein:
said telephone set includes means for indicating visually; and said indication at said telephone set is visual.
331. The security system of claim 293 wherein said telephone interface means further comprises means for remote access through which a user controls at least one security system control function via said telephone line.
332. The security system of claim 331 wherein said user, through said means for remote access, controls said at least one security system function from a telephone at a remote location by calling into said telephone line from said remote location.
333. The security system of claim 331 further comprising at least one telephone set connected to said telephone line; wherein:
said user, through said telephone interface means, controls said at least one security system function from said telephone set.
334. The security system of claim 293 further comprising at least one telephone set connected to said telephone line; wherein:

said telephone interface means monitors said telephone line and, when an outgoing telephone call is placed on said at least one telephone set, logs said outgoing telephone call.
335. The security system of claim 334 wherein:
said telephone interface means comprises means for storing data identifying numbers to which outgoing calls are restricted; and when an outgoing call is placed on said telephone set to one of said numbers to which outgoing calls are restricted, said telephone interface means prevents said outgoing call from being completed.
336. The security system of claim 335 wherein:
said means for storing further stores at least one user code; and when said user code is entered during said outgoing call, said telephone interface means allows said outgoing call to be completed to one of said numbers to which outgoing calls are restricted.
337. The security system of claim 293 wherein said user control interface is connected to an external data network for at least one of (a) sending, and (b) receiving, data.
338. The security system of claim 337 wherein:
said data comprise electronic mail; and access to said electronic mail is restricted based on said state of said system.
339. The security system of claim 338 wherein said electronic mail is accessible when said state is consistent with presence of an authorized user on said premises.
340. The security system of claim 339 having a plurality of authorized users, wherein:
when a particular authorized user initiates said state consistent with presence of an authorized user by activating said means for authorizing, said user control interface means presents, for access at said user control interface means, only electronic mail addressed to said particular authorized user.
341. The security system of claim 340 wherein:
said means for authorizing comprises keypad means at said user control interface means;
said indicium comprises a passcode unique to said particular authorized user; and said activation of said means for authorizing comprises entry of said passcode at said keypad means.
342. The security system of claim 340 wherein:
said means for authorizing comprises means for receiving;
said indicium comprises means for transmitting coded uniquely to said particular authorized user; and said activation of said means for authorizing comprises activation of said coded means for transmitting in communication range of said means for receiving.
343. The security system of claim 342 wherein said means for receiving and said coded means for transmitting are wireless.
344. The security system of claim 340 wherein:
said means for authorizing comprises means for reading a token;
said indicium comprises a token coded uniquely to said particular authorized user; and said activation of said means for authorizing unit comprises presentation of said coded token to said token reading means.
345. The security system of claim 339 having a plurality of authorized users, wherein:
when a particular authorized user initiates said state consistent with presence of an authorized user by activating said means for authorizing using an indicium unique to said particular authorized user, said user control interface means presents access, at said user control interface means, to electronic mail message sending from said particular authorized user.
346. The security system of claim 345 wherein:
said means for authorizing comprises keypad means at said user control interface means;
said indicium comprises a passcode unique to said particular authorized user; and said presentation of said indicium comprises entry of said passcode at said keypad means.
347. The security system of claim 345 wherein:

said means for authorizing comprises means fox receiving;
said indicium comprises means for transmitting coded uniquely to said particular authorized user; and said activation of said means for authorizing comprises activation of said coded means for transmitting in communication range of said means for receiving.
348. The security system of claim 347 wherein said means for receiving and said coded means for transmitting are wireless.
349. The security system of claim 345 wherein:
said means for authorizing comprises means for reading a token;
said indicium comprises a token coded uniquely to said particular authorized user; and said activation of said means for authorizing comprises presentation of said coded token to said means for reading.
350. The security system of claim 337 wherein:
said data comprise electronic mail;
said system has at least one authorized user; and when one of said at least one authorized user enters a security system command at said user control interface by activating said means for authorizing, said user control interface means sends an electronic mail message to a predetermined recipient advising of said entry of said command by said one of said at least one authorized user.
351. The security system of claim 350 wherein:
said means for authorizing comprises keypad means at said user control interface means;
said indicium comprises a passcode unique to said one of said at least one authorized user; and said activation of said means for authorizing comprises entry of said passcode at said keypad means.
352. The security system of claim 350 wherein:
said means for authorizing comprises means for receiving;
said indicium comprises means for transmitting coded uniquely to said one of said at least one authorized user; and said activation of said means for authorizing comprises activation of said coded means for transmitting in communication range of said means for receiving.
353. The security system of claim 352 wherein said means for receiving and said coded means for transmitting are wireless.
354. The security system of claim 350 wherein:
said means for authorizing comprises means for reading a token;
said indicium comprises a token coded uniquely to said one of said at least one authorized user; and said activation of said means for authorizing comprises presentation of said coded token to said means for reading.
355. The security system of claim 337 wherein:
said external data network is the Internet;
said data comprise World Wide Web pages;
said system has at least one authorized user; and when one of said at least one authorized user enters a security system command at said user control interface means by activating said means for authorizing, said system retrieves a World Wide Web page directed to said one of said at least one authorized user and displays said World Wide Web page at said user control interface means.
356. The security system of claim 355 wherein:
said means for authorizing comprises keypad means;
said indicium comprises a passcode unique to said one of said at least one authorized user; and said activation of said means for authorizing comprises entry of said passcode at said keypad means.
357. The security system of claim 355 wherein:
said means for authorizing comprises means for receiving;

said indicium comprises means for transmitting coded uniquely to said one of said at least one authorized user; and said activation of said means for authorizing comprises activation of said coded means for transmitting in communication range of said means for receiving.
358. The security system of claim 357 wherein said means for receiving and said coded means for transmitting are wireless.
359. The security system of claim 357 wherein:
said means for transmitting is encoded with multiple codes;
said activation of said means for authorizing comprises activation of a selected one of said multiple codes by said one of said at least one authorized user; and said system retrieves a different World Wide Web page based on which of said multiple codes has been selected.
360. The security system of claim 355 wherein:
said means for authorizing comprises means for reading a token;
said indicium comprises a token coded uniquely to said one of said at least one authorized user; and said activation of said means for authorizing comprises presentation of said coded token to said means for reading.
361. The security system of claim 337 wherein:
said system has at least one authorized user;
one of said at least one authorized user enters a security system command at said user control interface means by activating said means for authorizing;
said external data network is the Internet; and said activation of said means for authorizing logs said one of said at least one authorized user onto the Internet at said user control interface means.
362. The security system of claim 337 wherein:
said system has at least one authorized user;
one of said at least one authorized user enters a security system command at said user control interface means by activating said means for authorizing using an indicium unique to said one of said at least one authorized user;
said one of said at least one authorized user uses said external data network to access a financial institution to perform a financial transaction;
said indicium is registered with said financial institution as an identifier of said one of said at least one authorized user; and said indicium is sent to said financial institution as part of said financial transaction.
363. The security system of claim 337 wherein functions of said system are remotely accessible via said external data network.
364. The security system of claim 337 wherein:
said system transmits security data signals to a central communication station via said external data network and an alternate channel and awaits acknowledgment thereof; and when said acknowledgment arrives from a first one of said external data network and said alternate channel, said system terminates transmission of said security data on a second one of said external data network and said alternate channel.
365. The security system of claim 364 wherein:
one of said external data network and said alternate channel normally operates faster than another of said external data network and said alternate channel; and said system begins transmission of said security data signals on said one of said external data network and said alternate channel before beginning transmission of said security data signals on said another of said external data network and said alternate channel.
366. The security system of claim 364 further comprising firewall means between said user control interface means and said external data network;
wherein:
said firewall means allows only communication originating at said system and prevents communication originating on said external data network; and to receive said acknowledgment from said central communication station, said system initiates communication with said external data network so that said firewall means allows said communication, said initiated communication including a query to said external data network for said acknowledgment to be communicated from said central communication station to said system.
367. The security system of claim 366 wherein said query to said external network comprises a query to said central communication station.
368. The security system of claim 364 wherein said alternate channel is said telephone line.
369. The security system of claim 337 wherein:
said system transmits security data signals to a central communication station via a plurality of channels; and when said acknowledgment arrives from a first one of said plurality of channels, said system terminates transmission of said security data on each other one of said plurality of channels.
370. The security system of claim 369 wherein:
one of said plurality of channels normally operates faster than others of said plurality of channels; and said system begins transmission of said security data signals on said one of said plurality of channels before beginning transmission of said security data signals on said others of said plurality of channels.
371. The security system of claim 337 wherein said system accepts commands from a user via said external data network.
372. The security system of claim 371 further comprising firewall means between said user control interface and said external data network; wherein:
said firewall means allows only communication originating at said system and prevents communication originating on said external data network; and to receive said commands from said user, said system initiates communication with said external data network so that said firewall means allows said communication, said initiated communication including a query to said external data network for commands issued by said user to be communicated from said external data network to said system.
373. The security system of claim 337 wherein said system sends security data signals to predetermined recipients via said external data network.
374. The security system of claim 337 comprising more than one of said user control interface means, each said user control interface means functioning as an independent terminal of said external data network.
375. The security system of claim 337 further comprising firewall means between said user control interface means and said external data network;
wherein:
said firewall means allows only communication originating at said system and prevents communication originating on said external data network; and to receive data, said system initiates communication with said external data network so that said firewall means allows said communication, said initiated communication including a query to said external data network for data sought to be communicated from said external data network to said system.
376. A security system for monitoring user premises, said system comprising:
at least one means for sensing;
at least one means for outputting an alarm;
at least one user control interface means; and a system controller means connected to said means for sensing, said means for outputting an alarm and said user control interface means; wherein:
at least one of said at least one user control interface means is connected to an external data network for at least one of (a) sending, and (b) receiving, data.
377. The security system of claim 376 wherein said data comprise electronic mail.
378. The security system of claim 376 wherein:

said at least one user control interface means is used by a user to enter commands affecting a state of said system; and said system, when said state indicates that said system is active, monitors said at least one means for sensing and outputs an alarm on said means for outputting an alarm when said at least one means for sensing indicates that an alarm condition exists.
379. The security system of claim 378 wherein:
said data comprise electronic mail; and access to said electronic mail is restricted based on said state of said system.
380. The security system of claim 379 wherein said electronic mail is accessible when said state is consistent with presence of an authorized user on said premises.
381. The security system of claim 380 having a plurality of authorized users, and having means for authorizing for uniquely identifying each of at least one of said authorized users, wherein:
a particular authorized user initiates said state consistent with presence of an authorized user by activating said authorization unit using an indicium unique to said particular authorized user; and said user control interface means presents for access at said user control interface means only electronic mail addressed to said particular authorized user.
382. The security system of claim 381 wherein:

said user control interface means comprises keypad means;
said indicium comprises a respective passcode unique to each said at least one authorized user; and said activating of said means for authorizing comprises entry of said passcode at said keypad means.
383. The security system of claim 381 wherein:
said user control interface means comprises means for receiving;
said indicium comprises a respective means for transmitting uniquely coded to each of said at least one authorized user; and said activating of said means for authorizing comprises activation of said coded means for transmitting in communication range of said means for receiving.
384. The security system of claim 383 wherein said means for receiving and said coded means for transmitting are wireless.
385. The security system of claim 3'81 wherein:
said user control interface means comprises means for reading a token;
said indicium comprises a token uniquely coded to each of said at least one authorized user; arid said activating of said means for authorizing comprises presentation of said coded token to said means for reading.
386. The security system of claim 380 having a plurality of authorized users, and having a means for authorizing for uniquely identifying each of at least one of said authorized users, wherein:
a particular authorized user initiates said state consistent with presence of an authorized user by activating said means for authorizing using an indicium unique to said particular authorized user; and said user control interface means presents access at said user control interface means to electronic mail message sending from said particular authorized user.
387. The security system of claim 386 wherein:
said user control interface means comprises keypad means;
said indicium comprises a respective passcode unique to each of said at least one authorized user; and said activation of said means for authorizing indicium comprises entry of said passcode at said keypad means.
388. The security system of claim 386 wherein:
said user control interface means comprises means for receiving;
said indicium comprises a respective means for transmitting uniquely coded to each of said at least one authorized user; and said activation of said means for authorizing unit comprises activation of said coded means for transmitting in communication range of said means for receiving.
389. The security system of claim 388 wherein said means for receiving and said coded means for transmitting are wireless.
390. The security system of claim 99 wherein:
said user control interface means comprises means for reading a token;
said indicium comprises a respective token uniquely coded to each of said at least one authorized user; and said activation of said means for authorizing comprises presentation of said coded token to said means for reading.
391. The security system of claim 376 wherein:
said data comprise electronic mail;
said system has at least one authorized user, and has a means for authorizing for uniquely identifying each of at least one of said authorized users; and when one of said at least one authorized user enters a security system command at said user control interface means by activating said means for authorizing using an indicium unique to said one of said at least one authorized user, said user control interface sends an electronic mail message to a predetermined recipient advising of said entry of said command by said user.
392. The security system of claim 391 wherein:
said user control interface means comprises keypad means;

said indicium comprises a respective passcode unique to each of said at least one authorized user; and said activation of said means for authorizing comprises entry of said passcode at said keypad means.
393. The security system of claim 391 wherein said user control interface means comprises a means for receiving;
said indicium comprises a respective means for transmitting uniquely coded for each of said at least one authorized user; and said activation of said means for authorizing comprises activation of said coded means for transmitting in communication range of said means for receiving.
394. The security system of claim 393 wherein said means for receiving and said coded means for transmitting are wireless.
395. The security system of claim 391 wherein:
said user control interface means comprises means for reading a token;
said indicium comprises a token uniquely coded to each of said at least one authorized user; and said activation of said means for authorizing comprises presentation of said coded token to said means for reading.
396. The security system of claim 376 wherein:

said external data network is the Internet;
said data comprise World Wide Web pages;
said system has at least one authorized user, and has a means for authorizing for uniquely identifying each of at least one of said authorized users; and when one of said at least one authorized user enters a security system command at said user control interface means by activating said means for authorizing using an indicium unique to said one of said at least one authorized user, said system retrieves a World Wide Web page directed to said one of said at least one authorized user and displays said World Wide Web page at said user control interface.
397. The security system of claim 396 wherein:
said user control interface means comprises keypad means;
said indicium comprises a respective passcode unique to each of said at least one authorized user; and said activation of said means fox authorizing comprises entry of said passcode at said keypad means.
398. The security system of claim 396 wherein:
said user control interface means comprises means for receiving;
said indicium comprises a respective means for transmitting uniquely coded for each of said at least one authorized user; and said activation of said means for authorizing comprises activation of said coded means for transmitting in communication range of said means for receiving.
399. The security system of claim 398 wherein said means for receiving and said coded means for transmitting are wireless.
400. The security system of claim 398 wherein:
said respective means for transmitting is encoded with multiple codes;
said activation of said means for authorizing comprises activation of a selected one of said multiple codes by said one of said at least one authorized user; and said system retrieves a different World Wide Web page based on which of said multiple codes has been selected.
401. The security system of claim 396 wherein:
said user control interface means comprises means for reading a token;
said indicium comprises a respective token uniquely coded for each of said at least one authorized user; and said activation of said means for authorizing comprises presentation of said coded token to said means for reading.
402. The security system of claim 376 wherein:
said system has at least one authorized user, and has a means for authorizing for uniquely identifying each of at least one of said authorized users;

one of said at least one authorized user activates said means for authorizing using an indicium unique to said one of said at least one authorized user;
said external data network is the Internet; and said activation of said means for authorizing logs said one of said at least one authorized user onto the Internet at said user control interface means.
403. The security system of claim 376 wherein:
said system has at least one authorized user, and has a means for authorizing for uniquely identifying each of at least one of said authorized users;
one of said at least one authorized user enters a security system command at said user control interface means by activating said means for authorizing using an indicium unique to said one of said at least one authorized user;
said one of said at least one user uses said external data network to access a financial institution to perform a financial transaction;
said indicium is registered with said financial institution as an identifier of said one of said at least one authorized user; and said indicium is sent to said financial institution as part of said financial transaction.
404. The security system of claim 376 wherein functions of said system are remotely accessible via said external data network.
405. The security system of claim 376 wherein:
said system transmits security data signals to a central communication station via said external data network and an alternate channel and awaits acknowledgment thereof; and when said acknowledgment arrives from a first one of said external data network and said alternate channel, said system terminates transmission of said security data on a second one of said external data network and said alternate channel.
406. The security system of claim 405 wherein:
one of said external data network and said alternate channel normally operates faster than another of said external data network and said alternate channel; and said system begins transmission of said security data signals on said one of said external data network and said alternate channel before beginning transmission of said security data signals on said another of said external data network and said alternate channel.
407. The security system of claim 405 further comprising firewall means between said user control interface means and said external data network;
wherein:
said firewall means allows only communication originating at said system and prevents communication originating on said external data network; and to receive said acknowledgment from said central communication station, said system initiates communication with said external data network so that said firewall means allows said communication, said initiated communication including a query to said external data network for said acknowledgment to be communicated from said central communication station to said system.
408. The security system of claim 407 wherein said query to said external network comprises a query to said central communication station.
409. The security system of claim 405 wherein said alternate channel is said telephone line.
410. The security system of claim 376 wherein:
said system transmits security data signals to a central communication station via a plurality of channels; and when said acknowledgment arrives from a first one of said plurality of channels, said system terminates transmission of said security data on each other one of said plurality of channels.
411. The security system of claim 410 wherein:
one of said plurality of channels normally operates faster than others of said plurality of channels; and said system begins transmission of said security data signals on said one of said plurality of channels before beginning transmission of said security data signals on said others of said plurality of channels.
412. The security system of claim 376 wherein said system accepts commands from a user via said external data network.
413. The security system of claim 412 further comprising firewall means between said user control interface means and said external data network;
wherein:
said firewall means allows only communication originating at said system and prevents communication originating on said external data network; and to receive said commands from said user, said system initiates communication with said external data network so that said firewall means allows said communication, said initiated communication including a query to said external data network for commands issued by said user to be communicated from said external data network to said system.
414. The security system of claim 376 wherein said system sends security data signals to predetermined recipients via said external data network.
415. The security system of claim 376 comprising more than one of said user control interface means, each said user control interface means functioning as an independent terminal of said external data network.
416. The security system of claim 376 further comprising firewall means between said user control interface means and said external data network;
wherein:

said firewall means allows only communication originating at said system and prevents communication originating on said external data network; and to receive data, said system initiates communication with said external data network so that said firewall means allows said communication, said initiated communication including a query to said external data network for data sought to be communicated from said external data network to said system.
417. A secure communications system comprising:
first communication means connected to a communication medium;
central communication means connected to said communication medium; and at least second communication means connected to said communication medium; wherein:
all communication between said first communication means and said central communication means is initiated by said first communication means;
communication between said first communication means and said second communication means is established by leaving a message for said first communication means at said central communication means indicating communication is desired between said first communication means and said second communication means; and when said first communication means initiates communication with said central communication means, said first communication means receives said message for said first communication means, maintains its initiated communication with said central communication means and instructs said central communication means to relay communications between said first communication means and said second communication means.
418. The secure communications system of claim 417 wherein said message for said first communication means is left by said second communication means.
419. The secure communications system of claim 417 wherein said message for said first communication means is left by said second communication means.
420. The secure communications system of claim 417 wherein:
said first communication means includes a first firewall between said first communication means and said communication medium; and said first firewall allows only communication originating at said first communication means and prevents communication originating on said communication medium.
421. The secure communications system of claim 417 wherein:
said first communication means further comprises first encryption. means for encrypting and decrypting communications using a first digital key identified with said first communication means;
said central communication means further comprises:
central encryption means for encrypting and decrypting communications using a digital key, and key memory for storing said first digital key and associating said stored first digital key with said first communication means;
said first communication means uses said first encryption means to encrypt with said first digital key each communication sent to said central communication means, and to decrypt with said first digital key each communication received from said central communication means; and said central communication means uses said central encryption means to encrypt with said first digital key each communication sent to said first communication station and to decrypt with said first station digital key each communication received from said first communication station.
422. The secure communications system of claim 421 wherein:
all communication between said second communication means and said central communication means is initiated by said second communication means;
communication between said second communication means and said first communication means is established by leaving a message for said second communication means at said central communication means indicating communication is desired between said second communication means and said first communication means;
and when said second communication means initiates communication with said central communcation means, said second communication means receives said message for said second communication means, maintains its initiated communication with said central communication means and instructs said central communication means to relay communications between said first communication means and said second communication means.
423. The secure communications system of claim 422 wherein said message for said second communication means is left by said first communication means.
424. The secure communications system of claim 422 wherein said message for said second communication means is left by said central communication means.
425. The secure communications system of claim 422 wherein:
said second communication means includes a second firewall between said second communication means and said communication medium; and said second firewall allows only communication originating at said second communication means and prevents communication originating on said communication medium.
426. The secure communications system of claim 422 wherein:
said second communication means further comprises a second encryption means for encrypting and decrypting communications using a second digital key identified with said second communication means;
said key memory of said central communication means further stores said second digital key and associates said stored second digital key with said second communication means;
said second communication means uses said second encryption means to encrypt with said second digital key each communication sent to said central communication means, and to decrypt with said second digital key each communication received from said central communication means; and said central communication means uses said central encryption means to encrypt with said second digital key each communication sent to said second communication means and to decrypt with said second digital key each communication received from said second communication means.
427. The secure communications system of claim 426 wherein:
said first communication means is a premises alarm system; and said second communication means is a central alarm monitoring station.
428. The secure communications system of claim 426 wherein:
said first communication means is a first premises alarm system; and said second communication means is a second premises alarm system.
429. The secure communications system of claim 426 wherein:
said first communication means is a premises alarm system; and said second communication means is a remote communications terminal.
430. The secure communications system of claim 417 wherein:
all communication between said second communication means and said central communication means is initiated by said second communication means;

communication between said second communication means and said first communication means is established by leaving a message for said second communication means at said central communication means indicating communication is desired between said second communication means and said first communication means;
and when said second communication means initiates communication with said central communcation means, said second communication means receives said message for said second communication means, maintains its initiated communication with said central communication means and instructs said central communication means to relay communications between said first communication means and said second communication means.
431. The secure communications system of claim 430 wherein said message for said second communication means is left by said first communication means.
432. The secure communications system of claim 430 wherein said message for said second communication means is left by said central communication means.
433. The secure communications system of claim 430 wherein:
said second communication means includes a second firewall between said second communication means and said communication medium; and said second firewall allows only communication originating at said second communication means and prevents communication originating on said communication medium.
434. The secure communications system of claim 430 wherein:
said first communication means is a premises alarm system; and said second communication means is a central alarm monitoring station.
435. The secure communications system of claim 430 wherein:
said first communication means is a first premises alarm system; and said second communication means is a second premises alarm system.
436. The secure communications system of claim 430 wherein:
said first communication means is a premises alarm system; and said second communication means is a remote communications terminal.
437. The secure communications system of claim 417 wherein:
said first communication means is a premises alarm system; and said second communication means is a central alarm monitoring station.
438. The secure communications system of claim 417 wherein:
said first communication means is a first premises alarm system; and said second communication means is a second premises alarm system.
439. The secure communications system of claim 417 wherein:
said first communication means is a premises alarm system; and said second communication means is a remote communications terminal.
440. The secure communications system of claim 417 further comprising:
at said central communication means, at least one service agent means for communicating between said first communication means and at least one service on said communications medium; wherein:
at least one of said at least one service requires a secure identifier for access thereto; and at least one of said at least one service agent measn comprises means for securely storing an identifier, a user at said first communication means registering said user s secure identifier for said at least one of said at least one service; whereby:
when said user accesses said at least one of said at least one service, said user need not transmit said secure identifier over said communication medium, said secure identifier being transmitted securely by said service agent means from said secure identifier storage means.
441. A secure communications system for communicating between first and second communication means connected to a communications medium; said system comprising:
a central communication means connected to said communication medium and having a secure digital session key generating means; wherein:

each of said first and second communication means further comprises a respective encryption means for encrypting and decrypting communications using a digital key;
all communication with said first communication means is initiated by said first communication means;
all communication with said second communication station is initiated by said second communication means;
communication between said first communication means and said second communication means is established by generating at said secure digital session key generating means a secure digital session key and leaving a respective message at said central communication means for each of said first and second communication means, each, said respective message including said secure digital session key;
when said first communication means, initiates communication with said central communication means, said first communication means receives said message including said secure digital session key;
when said second communication means initiates communication with said central communcation means, said second communication means receives said message including said secure digital session key; and said first and second communication means communicate with one another using said secure digital session key and said respective encryption means.
CA2402657A 2000-03-13 2001-03-13 Integrated security and communications system with secure communications link Expired - Lifetime CA2402657C (en)

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
US18879800P 2000-03-13 2000-03-13
US60/188,798 2000-03-13
PCT/US2001/008046 WO2001069564A2 (en) 2000-03-13 2001-03-13 Integrated security and communications system with secure communications link

Publications (2)

Publication Number Publication Date
CA2402657A1 true CA2402657A1 (en) 2001-09-20
CA2402657C CA2402657C (en) 2012-07-10

Family

ID=22694565

Family Applications (2)

Application Number Title Priority Date Filing Date
CA2402657A Expired - Lifetime CA2402657C (en) 2000-03-13 2001-03-13 Integrated security and communications system with secure communications link
CA002402375A Abandoned CA2402375A1 (en) 2000-03-13 2001-03-13 Integrated security and communications system with secure communications link

Family Applications After (1)

Application Number Title Priority Date Filing Date
CA002402375A Abandoned CA2402375A1 (en) 2000-03-13 2001-03-13 Integrated security and communications system with secure communications link

Country Status (14)

Country Link
US (3) US6928148B2 (en)
EP (4) EP1272993A2 (en)
JP (2) JP2003527803A (en)
AT (3) ATE362630T1 (en)
AU (2) AU2001253849A1 (en)
BR (2) BR0109231A (en)
CA (2) CA2402657C (en)
DE (3) DE60128473T2 (en)
ES (3) ES2287633T3 (en)
HU (2) HUP0301050A3 (en)
MX (2) MXPA02009009A (en)
PL (2) PL358669A1 (en)
RU (2) RU2002127416A (en)
WO (2) WO2001069565A2 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2008067638A1 (en) * 2006-12-08 2008-06-12 Harmonya Technologies Inc. Environment sensing system for the hearing-impaired

Families Citing this family (230)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6595430B1 (en) * 2000-10-26 2003-07-22 Honeywell International Inc. Graphical user interface system for a thermal comfort controller
US7054645B1 (en) * 2001-03-07 2006-05-30 At&T Corp. System for intelligent home controller and home monitor
US6924739B1 (en) 2001-03-07 2005-08-02 At&T Corp. Home resource controller system
US7006832B1 (en) * 2001-03-07 2006-02-28 At&T Corp. Method for intelligent home controller and home monitor
US20030088767A1 (en) * 2001-06-28 2003-05-08 Emerson Harry E. Integrating the internet with the public switched telephone network
DE10145596A1 (en) 2001-09-15 2003-04-03 Philips Corp Intellectual Pty Network with several sub-networks
US6658091B1 (en) 2002-02-01 2003-12-02 @Security Broadband Corp. LIfestyle multimedia security system
US6868493B2 (en) * 2002-03-13 2005-03-15 Honeywell International, Inc. System and method for panel linking in a security system
US6999562B2 (en) * 2002-04-09 2006-02-14 Honeywell International Inc. Security control and communication system and method
US20030200145A1 (en) * 2002-04-18 2003-10-23 Brad Krassner Internet-based system and method for creating and distributing customized rich media marketing and sales materials via e-mail
JP2003316395A (en) * 2002-04-26 2003-11-07 Toshiba Corp Information reproducing device, and signal processing module and its program therefor
US8509391B2 (en) 2002-06-20 2013-08-13 Numerex Corp. Wireless VoIP network for security system monitoring
US9131040B2 (en) 2002-06-20 2015-09-08 Numerex Corp. Alarm system for use over satellite broadband
US9054893B2 (en) 2002-06-20 2015-06-09 Numerex Corp. Alarm system IP network with PSTN output
US6996212B1 (en) * 2002-06-26 2006-02-07 Bellsouth Intellectual Property Corporation Voicemail system with subscriber specific storage folders
US7221742B1 (en) * 2002-06-26 2007-05-22 Bellsouth Intellectual Property Corporation Voicemail box with caller-specific storage folders
US7096001B2 (en) * 2002-12-18 2006-08-22 Honeywell International, Inc. Security system with telephone controller
US20040128531A1 (en) * 2002-12-31 2004-07-01 Rotholtz Ben Aaron Security network and infrastructure
EP1480107A3 (en) * 2003-05-16 2006-05-24 Berner Fachhochschule Hochschule für Technik und Architektur Biel Method for authentication of a user with an authorizing device, and a security apparatus for carrying out the method
US7126465B2 (en) * 2003-11-17 2006-10-24 Honeywell International, Inc. Monitoring system and method
US7114554B2 (en) * 2003-12-01 2006-10-03 Honeywell International Inc. Controller interface with multiple day programming
US7225054B2 (en) * 2003-12-02 2007-05-29 Honeywell International Inc. Controller with programmable service event display mode
US8554374B2 (en) 2003-12-02 2013-10-08 Honeywell International Inc. Thermostat with electronic image display
US7706923B2 (en) 2003-12-02 2010-04-27 Honeywell International Inc. Controller interface with separate schedule review mode
US10705549B2 (en) * 2003-12-02 2020-07-07 Ademco Inc. Controller interface with menu schedule override
US7181317B2 (en) 2003-12-02 2007-02-20 Honeywell International Inc. Controller interface with interview programming
US7274972B2 (en) * 2003-12-02 2007-09-25 Honeywell International Inc. Programmable controller with saving changes indication
US7142948B2 (en) 2004-01-07 2006-11-28 Honeywell International Inc. Controller interface with dynamic schedule display
US7590055B2 (en) 2004-02-09 2009-09-15 Alcatel Lucent High availability broadband connections through switching from wireline to diverse wireless network
US7193508B2 (en) 2004-02-12 2007-03-20 Hill Philip A Portable security system
US11368429B2 (en) 2004-03-16 2022-06-21 Icontrol Networks, Inc. Premises management configuration and control
US11316958B2 (en) 2008-08-11 2022-04-26 Icontrol Networks, Inc. Virtual device systems and methods
US8988221B2 (en) 2005-03-16 2015-03-24 Icontrol Networks, Inc. Integrated security system with parallel processing architecture
US10313303B2 (en) 2007-06-12 2019-06-04 Icontrol Networks, Inc. Forming a security network including integrated security system components and network devices
US9609003B1 (en) 2007-06-12 2017-03-28 Icontrol Networks, Inc. Generating risk profile using data of home monitoring and security system
US7711796B2 (en) 2006-06-12 2010-05-04 Icontrol Networks, Inc. Gateway registry methods and systems
US10062273B2 (en) 2010-09-28 2018-08-28 Icontrol Networks, Inc. Integrated security system with parallel processing architecture
US8073931B2 (en) * 2005-03-16 2011-12-06 Icontrol Networks, Inc. Networked touchscreen with integrated interfaces
US10721087B2 (en) 2005-03-16 2020-07-21 Icontrol Networks, Inc. Method for networked touchscreen with integrated interfaces
US11916870B2 (en) 2004-03-16 2024-02-27 Icontrol Networks, Inc. Gateway registry methods and systems
EP1738540B1 (en) 2004-03-16 2017-10-04 Icontrol Networks, Inc. Premises management system
US8473619B2 (en) 2005-03-16 2013-06-25 Icontrol Networks, Inc. Security network integrated with premise security system
US11677577B2 (en) 2004-03-16 2023-06-13 Icontrol Networks, Inc. Premises system management using status signal
US8996665B2 (en) 2005-03-16 2015-03-31 Icontrol Networks, Inc. Takeover processes in security network integrated with premise security system
US9172553B2 (en) 2005-03-16 2015-10-27 Icontrol Networks, Inc. Security system with networked touchscreen and gateway
US9531593B2 (en) 2007-06-12 2016-12-27 Icontrol Networks, Inc. Takeover processes in security network integrated with premise security system
US10237237B2 (en) 2007-06-12 2019-03-19 Icontrol Networks, Inc. Communication protocols in integrated systems
US10339791B2 (en) 2007-06-12 2019-07-02 Icontrol Networks, Inc. Security network integrated with premise security system
US11343380B2 (en) 2004-03-16 2022-05-24 Icontrol Networks, Inc. Premises system automation
US11811845B2 (en) 2004-03-16 2023-11-07 Icontrol Networks, Inc. Communication protocols over internet protocol (IP) networks
US11244545B2 (en) 2004-03-16 2022-02-08 Icontrol Networks, Inc. Cross-client sensor user interface in an integrated security network
US10348575B2 (en) 2013-06-27 2019-07-09 Icontrol Networks, Inc. Control system user interface
US9141276B2 (en) 2005-03-16 2015-09-22 Icontrol Networks, Inc. Integrated interface for mobile device
US11190578B2 (en) 2008-08-11 2021-11-30 Icontrol Networks, Inc. Integrated cloud system with lightweight gateway for premises automation
US11368327B2 (en) 2008-08-11 2022-06-21 Icontrol Networks, Inc. Integrated cloud system for premises automation
US8612591B2 (en) 2005-03-16 2013-12-17 Icontrol Networks, Inc. Security system with networked touchscreen
US8963713B2 (en) 2005-03-16 2015-02-24 Icontrol Networks, Inc. Integrated security network with security alarm signaling system
US11582065B2 (en) 2007-06-12 2023-02-14 Icontrol Networks, Inc. Systems and methods for device communication
US8086703B2 (en) 2005-03-16 2011-12-27 Icontrol Networks, Inc. Takeover processes in security network integrated with premise security system
US11113950B2 (en) 2005-03-16 2021-09-07 Icontrol Networks, Inc. Gateway integrated with premises security system
US9191228B2 (en) 2005-03-16 2015-11-17 Icontrol Networks, Inc. Cross-client sensor user interface in an integrated security network
US10156959B2 (en) 2005-03-16 2018-12-18 Icontrol Networks, Inc. Cross-client sensor user interface in an integrated security network
US10382452B1 (en) 2007-06-12 2019-08-13 Icontrol Networks, Inc. Communication protocols in integrated systems
US11277465B2 (en) 2004-03-16 2022-03-15 Icontrol Networks, Inc. Generating risk profile using data of home monitoring and security system
US9729342B2 (en) 2010-12-20 2017-08-08 Icontrol Networks, Inc. Defining and implementing sensor triggered response rules
US10200504B2 (en) 2007-06-12 2019-02-05 Icontrol Networks, Inc. Communication protocols over internet protocol (IP) networks
US10444964B2 (en) 2007-06-12 2019-10-15 Icontrol Networks, Inc. Control system user interface
US11489812B2 (en) 2004-03-16 2022-11-01 Icontrol Networks, Inc. Forming a security network including integrated security system components and network devices
US10375253B2 (en) 2008-08-25 2019-08-06 Icontrol Networks, Inc. Security system with networked touchscreen and gateway
US20090077623A1 (en) 2005-03-16 2009-03-19 Marc Baum Security Network Integrating Security System and Network Devices
US8209400B2 (en) * 2005-03-16 2012-06-26 Icontrol Networks, Inc. System for data routing in networks
US10522026B2 (en) 2008-08-11 2019-12-31 Icontrol Networks, Inc. Automation system user interface with three-dimensional display
US11159484B2 (en) 2004-03-16 2021-10-26 Icontrol Networks, Inc. Forming a security network including integrated security system components and network devices
US8635350B2 (en) 2006-06-12 2014-01-21 Icontrol Networks, Inc. IP device discovery systems and methods
US8086702B2 (en) * 2005-03-16 2011-12-27 Icontrol Networks, Inc. Takeover processes in security network integrated with premise security system
US10142392B2 (en) 2007-01-24 2018-11-27 Icontrol Networks, Inc. Methods and systems for improved system performance
US11201755B2 (en) 2004-03-16 2021-12-14 Icontrol Networks, Inc. Premises system management using status signal
AU2005241943B8 (en) * 2004-04-30 2009-01-22 Utc Fire & Security Corp. Security system communications including encryption
US8296562B2 (en) 2004-07-15 2012-10-23 Anakam, Inc. Out of band system and method for authentication
EP1766839B1 (en) * 2004-07-15 2013-03-06 Anakam, Inc. System and method for blocking unauthorized network log in using stolen password
US8528078B2 (en) * 2004-07-15 2013-09-03 Anakam, Inc. System and method for blocking unauthorized network log in using stolen password
US8533791B2 (en) 2004-07-15 2013-09-10 Anakam, Inc. System and method for second factor authentication services
US7403598B2 (en) * 2004-07-27 2008-07-22 Honeywell International Inc. Remote control of a speaker phone device as a standalone device or as part of a security system
US20060183513A1 (en) * 2004-09-10 2006-08-17 Milan Slamka Audio caller ID for mobile telephone headsets
US20060056605A1 (en) * 2004-09-13 2006-03-16 Andrew Whitfield Telemetry using "always-on" communication connection system and method
US7675402B2 (en) * 2004-09-20 2010-03-09 Honeywell International Inc. Network communication for a security system
US8248226B2 (en) * 2004-11-16 2012-08-21 Black & Decker Inc. System and method for monitoring security at a premises
US7861941B2 (en) * 2005-02-28 2011-01-04 Honeywell International Inc. Automatic thermostat schedule/program selector system
US9450776B2 (en) 2005-03-16 2016-09-20 Icontrol Networks, Inc. Forming a security network including integrated security system components
US10999254B2 (en) 2005-03-16 2021-05-04 Icontrol Networks, Inc. System for data routing in networks
US8122131B2 (en) 2005-03-16 2012-02-21 Icontrol Networks, Inc. Takeover processes in security network integrated with premise security system
US20120324566A1 (en) 2005-03-16 2012-12-20 Marc Baum Takeover Processes In Security Network Integrated With Premise Security System
US11496568B2 (en) 2005-03-16 2022-11-08 Icontrol Networks, Inc. Security system with networked touchscreen
US11615697B2 (en) 2005-03-16 2023-03-28 Icontrol Networks, Inc. Premise management systems and methods
US20110128378A1 (en) 2005-03-16 2011-06-02 Reza Raji Modular Electronic Display Platform
US8825871B2 (en) 2005-03-16 2014-09-02 Icontrol Networks, Inc. Controlling data routing among networks
US11700142B2 (en) 2005-03-16 2023-07-11 Icontrol Networks, Inc. Security network integrating security system and network devices
US8819178B2 (en) * 2005-03-16 2014-08-26 Icontrol Networks, Inc. Controlling data routing in integrated security systems
US9306809B2 (en) 2007-06-12 2016-04-05 Icontrol Networks, Inc. Security system with networked touchscreen
US8713132B2 (en) * 2005-03-16 2014-04-29 Icontrol Networks, Inc. Device for data routing in networks
US9059863B2 (en) * 2005-03-16 2015-06-16 Icontrol Networks, Inc. Method for data routing in networks
US20170180198A1 (en) 2008-08-11 2017-06-22 Marc Baum Forming a security network including integrated security system components
US7584897B2 (en) 2005-03-31 2009-09-08 Honeywell International Inc. Controller system user interface
US7787892B2 (en) 2005-10-05 2010-08-31 Via Technologies, Inc. Method and apparatus for adaptive multi-stage multi-threshold detection of paging indicators in wireless communication systems
US7429921B2 (en) * 2005-10-27 2008-09-30 Viking Electronic Service Llc Communication system for a fire alarm or security system
US11004090B2 (en) 2005-12-24 2021-05-11 Rich Media Club, Llc System and method for creation, distribution and tracking of advertising via electronic networks
CN101346739B (en) 2005-12-24 2017-10-13 富媒体俱乐部有限责任公司 The system and method that advertisement is created, distributed and tracked by electric network
US11468453B2 (en) 2005-12-24 2022-10-11 Rich Media Club, Llc System and method for creation, distribution and tracking of advertising via electronic networks
US10380602B2 (en) * 2005-12-24 2019-08-13 Rich Media Club, Llc System and method for creation, distribution and tracking of advertising via electronic networks
US20100153836A1 (en) * 2008-12-16 2010-06-17 Rich Media Club, Llc Content rendering control system and method
US20070220585A1 (en) * 2006-03-01 2007-09-20 Farrugia Augustin J Digital rights management system with diversified content protection process
US7848505B2 (en) 2006-03-09 2010-12-07 Honeywell International Inc. Security system and method for blocking an incoming telephone call, and a security system with a telephone do not disturb feature
US7965171B2 (en) * 2006-05-04 2011-06-21 Shmuel Hershkovitz Security system entry control
US10079839B1 (en) 2007-06-12 2018-09-18 Icontrol Networks, Inc. Activation of gateway device
US8576068B2 (en) 2006-12-29 2013-11-05 Honeywell International Inc. Method and system for uploading near-real-time messages to keypad of a security system
US7818573B2 (en) * 2006-12-29 2010-10-19 Honeywell International Inc. Remote control of a security system using e-mail
US11706279B2 (en) 2007-01-24 2023-07-18 Icontrol Networks, Inc. Methods and systems for data communication
EP2118858A4 (en) 2007-02-06 2010-03-31 Numerex Corp Service escrowed transportable wireless event reporting system
US7633385B2 (en) 2007-02-28 2009-12-15 Ucontrol, Inc. Method and system for communicating with and controlling an alarm system from a remote server
US8451986B2 (en) 2007-04-23 2013-05-28 Icontrol Networks, Inc. Method and system for automatically providing alternate network access for telecommunications
US8290133B2 (en) * 2007-05-31 2012-10-16 Centurylink Intellectual Property Llc System and method for remote home monitoring and intercom communication
US10616075B2 (en) 2007-06-12 2020-04-07 Icontrol Networks, Inc. Communication protocols in integrated systems
US10498830B2 (en) 2007-06-12 2019-12-03 Icontrol Networks, Inc. Wi-Fi-to-serial encapsulation in systems
US11212192B2 (en) 2007-06-12 2021-12-28 Icontrol Networks, Inc. Communication protocols in integrated systems
US10423309B2 (en) 2007-06-12 2019-09-24 Icontrol Networks, Inc. Device integration framework
US11646907B2 (en) 2007-06-12 2023-05-09 Icontrol Networks, Inc. Communication protocols in integrated systems
US11601810B2 (en) 2007-06-12 2023-03-07 Icontrol Networks, Inc. Communication protocols in integrated systems
US11237714B2 (en) 2007-06-12 2022-02-01 Control Networks, Inc. Control system user interface
US10666523B2 (en) 2007-06-12 2020-05-26 Icontrol Networks, Inc. Communication protocols in integrated systems
US11316753B2 (en) 2007-06-12 2022-04-26 Icontrol Networks, Inc. Communication protocols in integrated systems
US10051078B2 (en) 2007-06-12 2018-08-14 Icontrol Networks, Inc. WiFi-to-serial encapsulation in systems
US10389736B2 (en) 2007-06-12 2019-08-20 Icontrol Networks, Inc. Communication protocols in integrated systems
US11423756B2 (en) 2007-06-12 2022-08-23 Icontrol Networks, Inc. Communication protocols in integrated systems
US11089122B2 (en) 2007-06-12 2021-08-10 Icontrol Networks, Inc. Controlling data routing among networks
US11218878B2 (en) 2007-06-12 2022-01-04 Icontrol Networks, Inc. Communication protocols in integrated systems
US10523689B2 (en) 2007-06-12 2019-12-31 Icontrol Networks, Inc. Communication protocols over internet protocol (IP) networks
US11831462B2 (en) 2007-08-24 2023-11-28 Icontrol Networks, Inc. Controlling data routing in premises management systems
WO2009029296A1 (en) * 2007-08-31 2009-03-05 At & T Mobility Ii Llc Enhanced messaging with language translation feature
CA2700077A1 (en) * 2007-10-17 2009-04-23 Tyco Safety Products Canada Ltd. Alarm system call handling
US20090129486A1 (en) * 2007-11-15 2009-05-21 Sequel Technologies, Llc. Systems and methods for providing security communication procesess in a security system
US8167216B2 (en) 2007-11-30 2012-05-01 Honeywell International Inc. User setup for an HVAC remote control unit
US20090143880A1 (en) 2007-11-30 2009-06-04 Honeywell International, Inc. Hvac controller with context sensitive help screens
WO2009089045A1 (en) * 2008-01-08 2009-07-16 Kessler Jonathan A Image based interaction and communication method
US11916928B2 (en) 2008-01-24 2024-02-27 Icontrol Networks, Inc. Communication protocols over internet protocol (IP) networks
CA2665130A1 (en) 2008-05-02 2009-11-02 Escherlogic Inc. Emergency warning system and method of installation
US20170185278A1 (en) 2008-08-11 2017-06-29 Icontrol Networks, Inc. Automation system user interface
WO2010002382A1 (en) * 2008-06-30 2010-01-07 At&T Mobility Ii Llc Call handling treatment for voicemail systems
US11758026B2 (en) 2008-08-11 2023-09-12 Icontrol Networks, Inc. Virtual device systems and methods
US11258625B2 (en) 2008-08-11 2022-02-22 Icontrol Networks, Inc. Mobile premises automation platform
US11792036B2 (en) 2008-08-11 2023-10-17 Icontrol Networks, Inc. Mobile premises automation platform
US11729255B2 (en) 2008-08-11 2023-08-15 Icontrol Networks, Inc. Integrated cloud system with lightweight gateway for premises automation
US9047753B2 (en) * 2008-08-25 2015-06-02 Icontrol Networks, Inc. Networked touchscreen with integrated interfaces
WO2010025468A1 (en) * 2008-08-29 2010-03-04 Icontrol Networks, Inc. Battery-backed power interface transformer for low-power devices
US9628440B2 (en) 2008-11-12 2017-04-18 Icontrol Networks, Inc. Takeover processes in security network integrated with premise security system
US8356247B2 (en) 2008-12-16 2013-01-15 Rich Media Worldwide, Llc Content rendering control system and method
US8638211B2 (en) 2009-04-30 2014-01-28 Icontrol Networks, Inc. Configurable controller and interface for home SMA, phone and multimedia
US8737271B2 (en) * 2009-06-01 2014-05-27 Telefonaktiebolaget L M Ericsson (Publ) Graphical user-interface for terminals with visual call progress indicator
US20110013762A1 (en) * 2009-07-18 2011-01-20 Gregg Bieser Notification apparatus & method
US20110046805A1 (en) 2009-08-18 2011-02-24 Honeywell International Inc. Context-aware smart home energy manager
US8456278B1 (en) * 2010-03-24 2013-06-04 Resolution Products, Inc. Communicating within a wireless security system
US9144143B2 (en) 2010-04-30 2015-09-22 Icontrol Networks, Inc. Power and data solution for remote low-power devices
AU2011250886A1 (en) 2010-05-10 2013-01-10 Icontrol Networks, Inc Control system user interface
US9002481B2 (en) 2010-07-14 2015-04-07 Honeywell International Inc. Building controllers with local and global parameters
US8950687B2 (en) 2010-09-21 2015-02-10 Honeywell International Inc. Remote control of an HVAC system that uses a common temperature setpoint for both heat and cool modes
US8836467B1 (en) 2010-09-28 2014-09-16 Icontrol Networks, Inc. Method, system and apparatus for automated reporting of account and sensor zone information to a central station
US11750414B2 (en) 2010-12-16 2023-09-05 Icontrol Networks, Inc. Bidirectional security sensor communication for a premises security system
US9147337B2 (en) 2010-12-17 2015-09-29 Icontrol Networks, Inc. Method and system for logging security event data
EP2695370A4 (en) 2011-04-04 2015-03-11 Numerex Corp Delivery of alarm system event data and audio
WO2012138443A1 (en) 2011-04-04 2012-10-11 Numerek Corp. Delivery of alarm system event data and audio over hybrid networks
US8705716B2 (en) 2011-04-27 2014-04-22 Numerex Corp. Interactive control of alarm systems by telephone interface using an intermediate gateway
WO2012166915A1 (en) * 2011-05-31 2012-12-06 Numerex Corp. System and method for alarm system tamper detection and reporting
US9366448B2 (en) 2011-06-20 2016-06-14 Honeywell International Inc. Method and apparatus for configuring a filter change notification of an HVAC controller
US9157764B2 (en) 2011-07-27 2015-10-13 Honeywell International Inc. Devices, methods, and systems for occupancy detection
US9115908B2 (en) 2011-07-27 2015-08-25 Honeywell International Inc. Systems and methods for managing a programmable thermostat
US8665084B2 (en) 2011-07-29 2014-03-04 Adt Us Holdings, Inc. Security system and method
BR112014005073B1 (en) * 2011-09-06 2022-07-26 Savant Systems, Inc METHOD AND DEVICE FOR INTEROPERATION BETWEEN A PRIVATE PHONE EXCHANGE (PBX) AND AUTOMATION OF AUDIO/VIDEO DEVICES AND HOUSEHOLD DEVICES
US8892223B2 (en) 2011-09-07 2014-11-18 Honeywell International Inc. HVAC controller including user interaction log
US8902071B2 (en) 2011-12-14 2014-12-02 Honeywell International Inc. HVAC controller with HVAC system fault detection
JP5930691B2 (en) * 2011-12-14 2016-06-08 セコム株式会社 Security equipment
US9002523B2 (en) 2011-12-14 2015-04-07 Honeywell International Inc. HVAC controller with diagnostic alerts
US9206993B2 (en) 2011-12-14 2015-12-08 Honeywell International Inc. HVAC controller with utility saver switch diagnostic feature
US10747243B2 (en) 2011-12-14 2020-08-18 Ademco Inc. HVAC controller with HVAC system failure detection
US10533761B2 (en) 2011-12-14 2020-01-14 Ademco Inc. HVAC controller with fault sensitivity
US20130158720A1 (en) 2011-12-15 2013-06-20 Honeywell International Inc. Hvac controller with performance log
JP5871608B2 (en) * 2011-12-22 2016-03-01 セコム株式会社 Security equipment
US10139843B2 (en) 2012-02-22 2018-11-27 Honeywell International Inc. Wireless thermostatic controlled electric heating system
US9442500B2 (en) 2012-03-08 2016-09-13 Honeywell International Inc. Systems and methods for associating wireless devices of an HVAC system
US10452084B2 (en) 2012-03-14 2019-10-22 Ademco Inc. Operation of building control via remote device
US9488994B2 (en) 2012-03-29 2016-11-08 Honeywell International Inc. Method and system for configuring wireless sensors in an HVAC system
USD678084S1 (en) 2012-06-05 2013-03-19 Honeywell International Inc. Thermostat housing
GB201212878D0 (en) 2012-07-20 2012-09-05 Pike Justin Authentication method and system
US9594384B2 (en) 2012-07-26 2017-03-14 Honeywell International Inc. Method of associating an HVAC controller with an external web service
US9477239B2 (en) 2012-07-26 2016-10-25 Honeywell International Inc. HVAC controller with wireless network based occupancy detection and control
DE102012215755A1 (en) * 2012-09-05 2014-03-06 Robert Bosch Gmbh Low-voltage network with DC-DC converter and method for testing a low-voltage battery
CA2882769A1 (en) 2012-09-28 2014-04-03 Numerex Corp. Method and system for untethered two-way voice communication for an alarm system
US10094585B2 (en) 2013-01-25 2018-10-09 Honeywell International Inc. Auto test for delta T diagnostics in an HVAC system
US9928975B1 (en) 2013-03-14 2018-03-27 Icontrol Networks, Inc. Three-way switch
US9287727B1 (en) 2013-03-15 2016-03-15 Icontrol Networks, Inc. Temporal voltage adaptive lithium battery charger
US9867143B1 (en) 2013-03-15 2018-01-09 Icontrol Networks, Inc. Adaptive Power Modulation
US9584119B2 (en) 2013-04-23 2017-02-28 Honeywell International Inc. Triac or bypass circuit and MOSFET power steal combination
US9806705B2 (en) 2013-04-23 2017-10-31 Honeywell International Inc. Active triac triggering circuit
US20140324227A1 (en) 2013-04-30 2014-10-30 Honeywell International Inc. Hvac controller having a fixed segment display with an interactive message center
US9983244B2 (en) 2013-06-28 2018-05-29 Honeywell International Inc. Power transformation system with characterization
US11054448B2 (en) 2013-06-28 2021-07-06 Ademco Inc. Power transformation self characterization mode
US10811892B2 (en) 2013-06-28 2020-10-20 Ademco Inc. Source management for a power transformation system
US10841668B2 (en) 2013-08-09 2020-11-17 Icn Acquisition, Llc System, method and apparatus for remote monitoring
TWI497458B (en) * 2013-09-11 2015-08-21 Grand Mate Co Ltd Method of data extraction of household appliances
WO2015040074A1 (en) * 2013-09-20 2015-03-26 Ultravex Trading Llc Person and property protection system and method
USD720633S1 (en) 2013-10-25 2015-01-06 Honeywell International Inc. Thermostat
US9673811B2 (en) 2013-11-22 2017-06-06 Honeywell International Inc. Low power consumption AC load switches
US10563876B2 (en) 2013-11-22 2020-02-18 Ademco Inc. Setup routine to facilitate user setup of an HVAC controller
US9857091B2 (en) 2013-11-22 2018-01-02 Honeywell International Inc. Thermostat circuitry to control power usage
EP3080967B1 (en) 2013-12-11 2021-10-13 Ademco Inc. Building automation control systems
US11146637B2 (en) 2014-03-03 2021-10-12 Icontrol Networks, Inc. Media content management
US11405463B2 (en) 2014-03-03 2022-08-02 Icontrol Networks, Inc. Media content management
TWI512688B (en) * 2014-04-10 2015-12-11 Univ Hsiuping Sci & Tech Fire alarm system with a safety escape guiding mechanism and the opertaing method thereof
US9628074B2 (en) 2014-06-19 2017-04-18 Honeywell International Inc. Bypass switch for in-line power steal
US9683749B2 (en) 2014-07-11 2017-06-20 Honeywell International Inc. Multiple heatsink cooling system for a line voltage thermostat
US9183730B1 (en) 2014-07-16 2015-11-10 Numerex Corp. Method and system for mitigating invasion risk associated with stranger interactions in a security system environment
US9449497B2 (en) 2014-10-24 2016-09-20 Numerex Corp. Method and system for detecting alarm system tampering
US9489822B2 (en) 2015-03-18 2016-11-08 Google Inc. Systems and methods of privacy within a security system
US9619985B2 (en) * 2015-04-08 2017-04-11 Vivint, Inc. Home automation communication system
EP3144913B1 (en) 2015-09-18 2021-01-13 Carrier Corporation A system, apparatus and method to facilitate alarm system communication
US10317100B2 (en) 2016-07-22 2019-06-11 Ademco Inc. Simplified schedule programming of an HVAC controller
US10253994B2 (en) 2016-07-22 2019-04-09 Ademco Inc. HVAC controller with ventilation review mode
US10302322B2 (en) 2016-07-22 2019-05-28 Ademco Inc. Triage of initial schedule setup for an HVAC controller
US10488062B2 (en) 2016-07-22 2019-11-26 Ademco Inc. Geofence plus schedule for a building controller
US10417458B2 (en) * 2017-02-24 2019-09-17 Microsoft Technology Licensing, Llc Securing an unprotected hardware bus
US11098921B2 (en) * 2019-07-18 2021-08-24 Johnson Controls Tyco IP Holdings LLP Building management system with automatic comfort constraint adjustment
KR20220105154A (en) 2019-08-06 2022-07-26 듀레이션 미디어 엘엘씨 Skills for content presentation

Family Cites Families (46)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4409590A (en) 1981-09-28 1983-10-11 General Electric Company Building security, communication and control system
GB8327672D0 (en) 1983-10-15 1983-11-16 Markem Syst Ltd Printing mechanism
US5153906A (en) 1983-11-11 1992-10-06 Nippo Communication Industrial Co., Ltd. Personal-servicing communication system
US6581092B1 (en) * 1999-09-29 2003-06-17 Ricoh Co., Ltd. Method and system for remote diagnostic, control and information collection based on various communication modes for sending messages to users
JPH01152847A (en) * 1987-12-10 1989-06-15 Kokusai Denshin Denwa Co Ltd <Kdd> Terminal equipment for caller number notifying communication network
US4937855A (en) 1988-02-09 1990-06-26 Viscount Industries Limited Building security system
US5086385A (en) * 1989-01-31 1992-02-04 Custom Command Systems Expandable home automation system
US5195126A (en) * 1991-05-09 1993-03-16 Bell Atlantic Network Services, Inc. Emergency alert and security apparatus and method
HU212356B (en) 1991-12-19 1996-06-28 Bartos An one-wire remote controlled tv picture monitoring system and an one-wire remote selected safety sensing and alarm system
US5210550A (en) 1991-12-23 1993-05-11 Xerox Corporation Maintenance station for ink jet printers
US5440624A (en) * 1992-11-10 1995-08-08 Netmedia, Inc. Method and apparatus for providing adaptive administration and control of an electronic conference
SE9300964D0 (en) 1993-03-23 1993-03-23 Jan Ruus ALARM SYSTEM
AU7172194A (en) 1993-06-23 1995-01-17 David H. Feinberg An integrated telephone, intercom, security and control system for a multi-unit building
US5394445A (en) * 1993-06-25 1995-02-28 Ball; Randel H. Telephone call screening and answering device
US5534897A (en) 1993-07-01 1996-07-09 Xerox Corporation Ink jet maintenance subsystem
US5481594A (en) * 1993-08-06 1996-01-02 Aastra Corporation Audio caller identification unit
US5604791A (en) 1993-10-13 1997-02-18 Lee; Shonh S. Single line telephone answering system with access security features
US5838792A (en) 1994-07-18 1998-11-17 Bell Atlantic Network Services, Inc. Computer system for centralized session key distribution, privacy enhanced messaging and information distribution using a split private key public cryptosystem
US5805064A (en) * 1995-08-04 1998-09-08 Yorkey; David Security system
US5870475A (en) 1996-01-19 1999-02-09 Northern Telecom Limited Facilitating secure communications in a distribution network
US5986571A (en) 1996-03-25 1999-11-16 Flick; Kenneth E. Building security system having remote transmitter code verification and code reset features
HU216856B (en) 1996-05-10 1999-09-28 Ferenc Nyeste Method and equipment for the remote control of properties
WO1997048220A2 (en) 1996-06-07 1997-12-18 Telalert, Inc. Programmed telephone security system
US6192282B1 (en) * 1996-10-01 2001-02-20 Intelihome, Inc. Method and apparatus for improved building automation
US6430268B1 (en) * 1997-09-20 2002-08-06 Statsignal Systems, Inc. Systems for requesting service of a vending machine
US6028917A (en) * 1997-04-04 2000-02-22 International Business Machines Corporation Access to extended telephone services via the internet
GB2325548B (en) 1997-05-21 2001-02-14 Richard Parviz Nabavi Improvements in and relating to security alarm systems and their controllers
AU2565699A (en) * 1998-01-29 1999-08-16 Internet Monitoring, Inc. Networked security system for network-based monitoring and control of an environment
GB2334235B (en) 1998-02-13 2002-01-09 Graseby Allen Ltd Print apparatus with movable printhead for user access
WO1999046923A1 (en) 1998-03-09 1999-09-16 Siemens Schweiz Ag Monitoring system
AU5079599A (en) * 1998-06-08 1999-12-30 Ericsson Inc. Application and communication platform for connectivity based services
US6060994A (en) * 1999-01-20 2000-05-09 Tempa Communication Inc. Method for controlling united home security system
US6442241B1 (en) * 1999-07-15 2002-08-27 William J. Tsumpes Automated parallel and redundant subscriber contact and event notification system
US6370233B1 (en) * 1999-08-03 2002-04-09 Ameritech Corporation Security system with call management functionality
US20020009184A1 (en) * 1999-10-22 2002-01-24 J. Mitchell Shnier Call classification indication using sonic means
US7171473B1 (en) * 1999-11-17 2007-01-30 Planet Exchange, Inc. System using HTTP protocol for maintaining and updating on-line presence information of new user in user table and group table
AU4136701A (en) * 1999-11-30 2001-06-12 Joseph N. D'amico Security system linked to the internet
US6252952B1 (en) * 1999-12-30 2001-06-26 At&T Corp Personal user network (closed user network) PUN/CUN
US6585347B1 (en) 2000-01-31 2003-07-01 Hewlett-Packard Company Printhead servicing based on relocating stationary print cartridges away from print zone
US6807564B1 (en) * 2000-06-02 2004-10-19 Bellsouth Intellectual Property Corporation Panic button IP device
US6754621B1 (en) * 2000-10-06 2004-06-22 Andrew Cunningham Asynchronous hypertext messaging system and method
WO2002047911A2 (en) 2000-12-13 2002-06-20 Rena Informationstechnik Gmbh & Co. Kg Ink-jet printer with service device
KR100426087B1 (en) 2001-10-12 2004-04-06 삼성전자주식회사 Printhead cleaning apparatus and ink jet printer having the same
US7240982B2 (en) 2002-03-07 2007-07-10 Fuji Xerox Co., Ltd. Ink-jet line printer and image forming apparatus using the same
US20040252161A1 (en) 2003-06-11 2004-12-16 Andreas Bibl Tilt head cleaner
US6913341B2 (en) 2003-07-31 2005-07-05 Hewlett-Packard Development Company, L.P. Service station architecture and method for drum printer

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2008067638A1 (en) * 2006-12-08 2008-06-12 Harmonya Technologies Inc. Environment sensing system for the hearing-impaired

Also Published As

Publication number Publication date
PL358668A1 (en) 2004-08-09
EP1465131B1 (en) 2007-06-06
RU2002127416A (en) 2004-03-10
EP1272993A2 (en) 2003-01-08
RU2002127417A (en) 2004-03-10
EP1465131A2 (en) 2004-10-06
US20010029585A1 (en) 2001-10-11
PL358669A1 (en) 2004-08-09
AU2001250834B2 (en) 2005-11-24
DE60135511D1 (en) 2008-10-02
AU2001253849A1 (en) 2001-09-24
HUP0301050A2 (en) 2003-08-28
AU2001250834B9 (en) 2007-05-24
ATE362630T1 (en) 2007-06-15
JP2003527804A (en) 2003-09-16
HUP0301047A2 (en) 2003-08-28
EP1303843A2 (en) 2003-04-23
DE60128840T2 (en) 2008-04-30
MXPA02009010A (en) 2004-10-15
HUP0301047A3 (en) 2003-09-29
DE60128473D1 (en) 2007-06-28
EP1762996B1 (en) 2008-08-20
DE60128840D1 (en) 2007-07-19
US20010050976A1 (en) 2001-12-13
WO2001069564A2 (en) 2001-09-20
JP2003527803A (en) 2003-09-16
ES2287633T3 (en) 2007-12-16
ATE405907T1 (en) 2008-09-15
WO2001069564A8 (en) 2002-03-07
EP1762996A1 (en) 2007-03-14
CA2402657C (en) 2012-07-10
US6928148B2 (en) 2005-08-09
BR0109231A (en) 2003-06-03
ES2312074T3 (en) 2009-02-16
ES2286115T3 (en) 2007-12-01
US20050213715A1 (en) 2005-09-29
EP1465131A3 (en) 2005-02-16
CA2402375A1 (en) 2001-09-20
DE60128473T2 (en) 2008-01-10
ATE364285T1 (en) 2007-06-15
MXPA02009009A (en) 2004-10-15
US7558379B2 (en) 2009-07-07
AU5083401A (en) 2001-09-24
WO2001069565A2 (en) 2001-09-20
WO2001069565A3 (en) 2002-05-30
HUP0301050A3 (en) 2003-09-29
EP1303843B1 (en) 2007-05-16
BR0109210A (en) 2002-12-17

Similar Documents

Publication Publication Date Title
CA2402657A1 (en) Integrated security and communications system with secure communications link
US9942737B2 (en) Multimedia emergency services
US8929548B2 (en) Providing secured communication connections using a secured communication connection object
US5065428A (en) Secure mode answering machine
AU2005217992B2 (en) Integrated security and communications system with secure communications link
KR100989704B1 (en) System for transmitting of the calling identification to mobile phone
KR200219106Y1 (en) wire/wireless combined internet phone
AU2001250834A1 (en) Integrated security and communications system with secure communications link
JP2004147057A (en) Automatic answering telephone set
KR20020030508A (en) Method for controlling wire/wireless combined internet phone

Legal Events

Date Code Title Description
EEER Examination request
MKEX Expiry

Effective date: 20210315