VoIP line seizure system and method

09621734 ยท 2017-04-11

Assignee

Inventors

Cpc classification

International classification

Abstract

A system for yielding control of a network to a device configured to operate on a PSTN. The system includes a network configured to couple one or more devices to a PSTN, and a PSTN telephone, a PSTN security system, and an ATA and modem coupled to the network. The ATA and modem are configured to provide a VoIP interface between the network and the Internet and to provide a dial tone to the network. An access detector is coupled to the network to detect when the security system attempts to use the network.

Claims

1. A system for yielding control of a network to a device configured to operate on a PSTN, the system comprising: a network configured to couple one or more devices to the PSTN; a first device coupled to the network and configured to operate on the PSTN; a second device coupled to the network and configured to operate on the PSTN; a third device coupled to the network, configured to provide a VoIP interface between the network and the Internet and to provide a dial tone to the network; and a fourth device coupled between the network and the third device, and configured to detect when the second device attempts to use the network during a time when the first device is using the network.

2. The system of claim 1, wherein the third device and the fourth device are incorporated into a single device.

3. The system of claim 1, wherein the fourth device detects that the second device is attempting to access the network based on detecting a sequence of DTMF signals on the network.

4. The system of claim 1, wherein the second device generates a predetermined sequence of DTMF signals when attempting to access the network.

5. The system of claim 4, wherein the sequence of DTMF signals corresponds to a telephone number of a remote location.

6. The system of claim 1, wherein the fourth device determines that the second device is attempting to access the network when the fourth device detects the predetermined sequence of DTMF signals.

7. The system of claim 1, wherein the fourth device transmits a signal when the fourth device detects the second device attempting to access the network.

8. The system of claim 7, wherein the signal is a wireless signal.

9. The system of claim 7, wherein the first device is disconnected from the network when the fourth device transmits the signal.

10. The system of claim 9, wherein the fourth device sends a second signal when the second device is no longer using the network and the first device is reconnected to the network when the fourth device transmits the second signal.

11. The system of claim 7, further comprising a fifth device connected between the first device and the network, the fifth device disconnecting the first device when the fifth device receives the signal.

12. The system of claim 1, wherein the fourth device is incorporated in the first device.

13. The system of claim 1, wherein the fourth device sends the signal as long as the second device is using the network.

14. The system of claim 1, wherein the second device generates the predetermined sequence of DTMF signals when the second device detects that the first device is using the network.

15. A method of seizing control of a network configured to interface with a PSTN, the method comprising: transmitting, by a first device, a sequence of DTMF signals over the network; detecting the sequence of DTMF signals; disconnecting a second device from the network when the detected sequence of DTMF signals matches a predetermined sequence of DTMF signals; and communicating, by the first device, over the network following the disconnecting of the second device from the network.

16. The method of claim 15, further comprising, transmitting a disconnect signal when the sequence of numbers matches the predetermined sequence of DTMF signals.

17. The method of claim 15, further comprising, transmitting a reconnect signal when the first device finishes communicating over the network.

18. The method of claim 17, further comprising receiving the reconnect signal and reconnecting the second device to the network following receiving the reconnect signal.

19. A VoIP security system, comprising: a network comprising a first wire and a second wire; a security system configured to operate on a PSTN, the security system coupled to the first wire and the second wire; a PSTN telephone coupled to the first wire and the second wire and configured to operate on the PSTN; a VoIP interface device coupled to the first wire and the second wire, configured to provide a VoIP interface between the network and the Internet and to provide a dial tone to the network; a detector coupled to the first and the second wire, configured to detect when the security system attempts to access the network and send a signal indicating that the security system is attempting to access the network during a time when the PSTN telephone is using the network; and a device coupled to the first and the second wire, configured to disconnect the PSTN telephone from at least one of the first wire and the second wire based on the signal.

20. The VoIP security system of claim 19, further comprising an access detector configured to detect the security system attempting to access the network and to generate the signal when the security system is attempting to access the network.

21. The VoIP security system of claim 20, wherein the access detector generates a second signal when the security system finishes accessing the network, the device reconnecting the telephone to the network upon receiving the second signal.

22. A system for yielding control of a network to a device configured to operate on a PSTN, the system comprising: a network configured to couple one or more devices to a PSTN; a telephone coupled to the network and configured to operate on the PSTN; a security system coupled to the network and configured to operate on the PSTN; an access detector coupled to the network and configured to detect when the security system attempts to use the network during a time when the telephone is using the network; and an ATA and modem coupled to the network via the access detector and configured to provide a VoIP interface between the network and the Internet and to provide a dial tone to the network.

Description

BRIEF DESCRIPTION OF THE DRAWINGS

(1) FIG. 1 is a schematic representation of a prior-art building telephone system including a security system.

(2) FIG. 2 is a schematic representation of the prior-art VoIP telephone system and a security system connected to a PSTN.

(3) FIG. 3 is a schematic representation of a construction of a VoIP telephone system configured to enable a security system to seize the system according to the invention.

(4) FIG. 4 is a flow chart of the operation of an embodiment of the VoIP telephone system of FIG. 3.

(5) FIG. 5 is a flow chart of the operation of an alternate embodiment of the VoIP telephone system of FIG. 3.

(6) FIG. 6 is a schematic representation of a seizure device.

(7) FIG. 7 is a schematic representation of an alternate construction of the VoIP telephone system of FIG. 3.

(8) FIG. 8 is a schematic representation of a seizure device for use in the VoIP telephone system of FIG. 7.

DETAILED DESCRIPTION

(9) Before any embodiments of the invention are explained in detail, it is to be understood that the invention is not limited in its application to the details of construction and the arrangement of components set forth in the following description or illustrated in the following drawings. The invention is capable of other embodiments and of being practiced or of being carried out in various ways.

(10) FIG. 3 illustrates a construction of a system 300 enabling a PSTN compatible security system 120 having a PSTN connection 150 to gain control of a building telephone network 105, and use a VoIP interface 220 to contact emergency personnel at a remote location. The system 300 includes, in addition to the security system 120 and the telephone network 105, one or more devices 110 (e.g., a telephone, a fax machine, etc.), one or more seizure devices 305, an access detector 310, an ATA 205, and a modem 210. In the construction shown, each device 110 has an associated seizure device 305. However, in other constructions, one or more devices 110 can connect to a single seizure device 305. The modem 210 connects to the Internet 215, and the ATA 205 converts analog PSTN compatible signals, from the devices 110 and the security system 120, into digital signals compatible with the modem 210. The ATA 205 also performs additional functions such as packetizing digital information and generating a dial tone. In some constructions, the seizure device is integrated within one or more of the devices 110.

(11) FIG. 4 illustrates the operation of an embodiment of the system 300. When the security system 120 detects an alarm event, the security system 120 generates a signal on the telephone network 105 (e.g., initiates an off-hook condition) (step 312) to access the telephone network 105. The security system 120 then checks if a dial tone is being generated on the telephone network 105 by the ATA 205 (step 314). If no other devices are using the telephone network 105, the ATA 205 generates the dial tone in response to the off-hook condition, and the security system 120 continues by generating a sequence of dual-tone, multi-frequency (DTMF) signals corresponding to a telephone number of a remote location the security system 120 is trying to contact (step 316). The security system 120 then waits (step 318) for a connection to be made to the remote location. If the connection is made (step 320), the security system 120 sends data (or a message) relating to the alarm event to the remote location (step 322).

(12) If, at step 320, a connection is not completed in a predetermined time period, the security system 120 disconnects the security system 120 from the telephone network 105 (e.g., initiates an on-hook condition) (step 324), pauses or waits for a period of time to allow the telephone network 105 and ATA 205 to reset (step 326) and repeats the process beginning at step 312.

(13) If, at step 314, another device 110 is using the telephone network 105, the ATA 205 does not generate a dial tone. The security system 120, upon not receiving the dial tone in response to its off-hook condition, sends a predetermined sequence of DTMF signals (step 328) to indicate that the security system 120 desires to access the telephone network 105. The access detector 310 detects the sequence of DTMF signals (step 330), and causes the devices 110 to disconnect from the telephone network 105 as described below. The security system 120 then initiates an on-hook condition (step 324), delays or waits (step 326), and repeats the process at step 312, at which time the device(s) 110 using the telephone network 105 are disconnected and the security system 120 receives a dial tone at step 314.

(14) FIG. 5 illustrates the operation of another embodiment of the system 300. When the security system 120 detects an alarm event, the security system 120 initiates an off-hook condition (step 332) to access the telephone network 105. In this embodiment, the security system 120 does not check for a dial tone. Instead, the security system 120 continues by generating a sequence of DTMF signals corresponding to a telephone number of a remote location the security system 120 is trying to contact (step 334). If another device 110 is using the telephone network 105, the access detector 310 detects the sequence of DTMF signals (step 336) and causes the devices 110 to disconnect from the telephone network 105 as described below.

(15) The security system 120 waits (step 338) for a connection to be made to the remote location, whether or not another device was using the telephone network 105. If the connection is made (step 340), the security system 120 sends data relating to the event to the remote location (step 342).

(16) If, at step 340, a connection is not completed in a predetermined time period, either because the telephone network 105 is being used by another device 110 or some other reason, the security system 120 initiates an on-hook condition (step 344), waits for a period of time to allow the telephone network 105 and ATA 205 to reset (step 346) and repeats the process beginning at step 332, at which time if another device 110 was using the telephone network 105, it is disconnected and the security system's call is completed.

(17) In the construction shown in FIG. 3, the access detector 310 is connected between the ATA 205 and the telephone network 105, and is configured to monitor the telephone network 105 for DTMF signals. The access detector 310 detects when the security system 120 is attempting to access the telephone network 105 by recognizing the sequence of DTMF signals produced by the security system 120. In another embodiment (as described above with respect to FIG. 5), whenever the access detector 310 detects any sequence of DTMF signals on the telephone network 105, while the telephone network 105 is being used, the access detector 310 assumes that the security system 120 is attempting to access the telephone network 105. In some embodiments, the access detector 310 determines that the security system 120 is attempting to access the telephone network 105 by detecting when the security system 120 initiates an off-hook condition (e.g., by monitoring voltage levels on the telephone network 105 or at the PSTN connection 150 of the security system 120) while another device 110 is using the telephone network 105.

(18) If the access detector 310 detects that the security system 120 is attempting to access the telephone network 105 while another device 110 (e.g., the telephone) is using the telephone network 105, the access detector 310 sends a disconnect signal to the seizure devices 305 directing the seizure devices 305 to disconnect their respective devices 110 from the telephone network 105. In some embodiments, the access detector 310 sends the disconnect signal continuously until the security system 120 is no longer using the telephone network 105. In other embodiments, the access detector 310 sends the disconnect signal for a period of time (e.g., until the security system 120 has connected to the remote location). The seizure device 305, upon receiving the disconnect signal, disconnects the device 110 from the telephone network 105. In some embodiments, the seizure device 305 automatically reconnects the device 110 to the telephone network 105 at the expiration of a period of time. If the security system 120 is still using the telephone network 105, the device 110 is unable to receive a dial tone, and, therefore, use the telephone network 105 until the security system 120 is no longer using the telephone network 105. In other embodiments, the access detector 310 sends a reconnect signal when the access detector 310 detects that the security system 120 is no longer using the telephone network 105. In these embodiments, the seizure device 305 keeps the device 110 disconnected until the seizure device 305 receives the reconnect signal.

(19) In one construction, schematically shown in FIG. 6, the seizure device 305 includes a switch 350 having a first terminal 355 coupled to a first RJ11 socket or jack 360, a second terminal 365 coupled to a second RJ11 jack 370, and a controller 375. The controller 375 is connected, at line 380, to the first RJ11 jack 360. The controller 375 is also connected to the switch 350 by line 385. The controller 375 controls the opening and closing of the switch 350 using line 385.

(20) In the construction shown, the device 110 connects to the seizure device 305 by a cable 390 (the cable 390 can be integrated into the device 110 or a separate, stand alone, cable that plugs into the device 110). The cable 390 includes a male RJ11 connector or plug 395 that is plugged into the second RJ11 jack 370. A standard telephone cable 400 (e.g., having two RJ11 plugs 405 and 410) is used to connect the seizure device 305 to an RJ11 jack 415 that is connected to the telephone network 105. Alternatively, the seizure device 305 can have an integrated cable including a RJ11 plug 410 for connecting to the telephone network 105.

(21) When the controller 375 detects the disconnect signal on its first line 380, the controller 375 provides a signal on line 385 to open the switch 350. As discussed above, the controller 375 can provide the signal to open the switch 350 continuously, as long as the controller 350 receives the disconnect signal from the access detector 310 or, in other embodiments, can provide the signal to open the switch 350 for a predetermined time period or until a reconnect signal is received from the access detector 310.

(22) FIGS. 7 and 8 illustrate alternative constructions of a system 300 and a seizure device 305. The seizure device 305 is the same as the seizure device 305 of FIG. 6 except that the controller 375 includes a wireless interface 450. The controller 375 receives the disconnect signal (and the reconnect signal if appropriate) via the wireless interface 450 from a wireless interface 455 of an access detector 310, opening and closing the switch 350 based on the signal(s).

(23) In an alternate embodiment, each seizure device 305 includes the access detector 310, and detects when the security system 120 is attempting to access the telephone network 105. The seizure device 305 then disconnects from the telephone network 105 as described above. In some embodiments, the security system 120 includes and/or operates as the access detector 310, sending the disconnect signal (e.g., wired or wirelessly) to the seizure device 305 to disconnect the devices 110 from the telephone network 105 as described above.

(24) In some embodiments, one or more of the devices 110 connected to the telephone network 105 incorporate the seizure device 305 and/or the access detector 310. In other embodiments, the access detector 310 is incorporated in the ATA 205.

(25) Various features and advantages of the invention are set forth in the following claims.