Alarm Reporting Formats / Contact ID Overview

By: Ari Erenthal, Published on Jan 12, 2017

Alarm reporting formats are methods for communicating complicated information quickly, using plain old telephone service. It is still the main method used by burglar and fire alarm manufacturers to send signals to central station monitoring services.

In this post, we review:

  • The background of alarm reporting formats
  • The options for these formats
  • How Contact ID works
  • Event codes and subcodes
  • How alarm reporting formats make alarms intelligent
  • Examples of using various subcodes for responses / plans

***** ********* ******* *** methods *** ************* *********** information *******, ***** ***** *** ********* *******. ** ** ***** the **** ****** **** by ******* *** **** alarm ************* ** **** signals ** ******* ******* monitoring ********.

** **** ****, ** review:

  • *** ********** ** ***** reporting *******
  • *** ******* *** ***** formats
  • *** ******* ** *****
  • ***** ***** *** ********
  • *** ***** ********* ******* make ****** ***********
  • ******** ** ***** ******* subcodes *** ********* / plans

[***************]

Background ** ***** ********* *******

** **** ***, ******* ID ** *** **** widely **** ***** ********* format. **** ********** ***** generically ** *** **** of ***** ********* ****** as "******* **". ***** common ******* ****** *** *** *** ********, *********** formats **** ** ***** *** and ***** *****, ***, and ***, *** ***** formats **** ** ***, 3x1 *** ***** ********.

******* ** *** ********** developed ** ****** (***** acquired *** ***** ***** by *********) ** **-**-****.**. ** ****, *********** ******** *********** **** ******* **, **** Ademco, **** ********:

(******* **) ** ********* by *** ******** ******** Association (*** ) ** a ** ***** ******** industry ********. ** ** intended ** ********** ******* compatibility *** ******************, ** reduce ***************** ******* ************* and **********, *** ** assist ********** ** ********* the ****** ******** ** fulfill ***** ********** *****. 

How ******* ** *****

*** ***** ***** ***** * preprogrammed ***** ****** ** communicate *** *******. **** the ******** ** *** central ******* ***** **, the ******* ******* ******** ***** a***************. **** *** ***** ***** a ***** ******* ****** (*******, *** *** ***** formats **** ** ***), followed ** ********* ** ****** **** *** message *** *** ********* during ************. *** ******** sends **** ***** *** ********* *** *** ***** know **** *** ******* was ******** *** ** stop ************. **** ** shown ** *** *****:

*** ******** ********** *** DTMF ***** ** * string *******************. *** ******** **** decodes those ****** *** ***** the *********** ** ** operator's ******, ***** **** the **********'* ******** ***********. The ******** **** ******* what ** ** **** the ***********. *** ****** process, **** **** *** panel ******* ** ***** to **** ******** ** the *********** ******** ** the ****** ** ** operator, ***** ******* *** *******. After ****, *** **** becomes ***** ****** *****. 

*** ***** ***** * 13 digit ******* ** *** central *******. ****** **** these ** ****** ** * surprising ****** ** ***********.

**** ** **** * message ***** ****, ***** on ********* ******* **

*** ******* ** ***** ********* formats is ** **** ** much *********** ***** *** problem ** * ***** and ********* ******. *********, not **** **** ******* ID **** *** **** number, *** ** ***** information ***** **** **** of **** ** **.

Event *****

 ******* ** ****** *** a ***** ****** ** event *****. ******* *******:

  • ******* ******
  • **** ******
  • ***** ******
  • ******* ******
  • ** **** *** ******** Zone (*** ************* ******* such ** ************ ******** or ***** **** *********)
  • ****** ******* (*** ******* with *** ***** ******)
  • ****/***** 
  • ****** ******* **** (**** as **** ****** ****** and ******* **** ******)
  • **** *********
  • ***** ***

**** ** ***** ***** codes *** * ****** of ********. *** *******, a ***** **** *** be ********** ******* ***** ****(**** ***), ** **** *** operator *** **** *** police ********** **** ** alarm ********** ** ********** to **** *** **** without ********** *** *********. A **** **** *** specify ******* *** ****** is ****** **** * smoke ******** (**** ***), a **** ******** (**** 114), * **** (**** 116), ** * **** station (**** ***). 

***** ** ** ******* of *** ******** *** burglar ****** ** ******* ID:

Intelligent *****

******* ******** ** * problem ****** * **** to ********* * ******** plan, ******** ****'** ******* of *** **********. **** subscriber ***** ********* ***** for ******* ******* ********* numbers - **** ** common. **** ****** ********* people ** ** ******. ********* types ** ******* *** trigger ********* *********. *** example, *** ******** *** specify **** ** ***** signal (**** ***) **** a ******* **** ****** call *** ****** *** that * ******* ****** (code ***) **** *** same **** ****** **** building ***********. 

******** ***** *** ** even **** ********. *** example, * *********** *** specify * ******* ****** from * ************ **** (code ***) ***** * maintenance ****** *** * ********** manager ** ******, ** that *** **** ** being ******* **** *** case ****** ** **** bad. 

******* ** ***** ***** **** options. **** *** ******* reports (**** ***) ***** users ** ***** **** **** their ********* ****** *** leave. ** ***** ****** their ******** ***** ****** alarm *****, **** *** be **** **** ***** codes **** *** **** at ********* ***** (**** 401). **** ***** **** want ******* ************. ****** will ****** ******* **** by *****, ***, ** post. 

**** ******* ****** ***** for ****/***** *******, ******** another ******* ****** *** commercial *********.

***** ********* ***** ** ****** to **** ** *** of ********. **** ******* stations *** ****** ******* on ************ *******. ***** aware ** ******* ******* **** allow *** ****** ** have * **** **** of **** **** ** problems ***** *** **** work **** **** ** be ****. ** *** user ** ****** *** a *********** ********, *** dealer can *** **** ********* to ******** * ******* call ******* *** ***********. And *** ***** *** can ****** ** ******** even ** ************ *** not *** ** ** advance.

***** ********* ***** ** ****** to ****** ************** *******. ** *** ******* station **** ********, *****, closes, *** **** ******, the ****** **** ** able ** ********* ***** code *** **** ** access *** ****** ***** hours ** ***** **** turned *** *** ***** on *** ****** * burglar ***** ** ***.

Comments (6)

I cannot wait for technology to uplift the alarm industry. Although we have phone apps and cloud based solutions it is not enough to kill off this dinosaur. Yes I can see the beauty of the old days as they will be forever logged in my mental museum of archaic security methodologies.

"Alexa, when will you get off your butt and secure my home/business with IoT already?"

Agreed, UD1! I started a discussion on this topic the other day.

I hate CID, we almost never use it. We are either using Bosch formates or DMP formates. I prefer DMP as it goes to a DMP reciever and we dont need to program zones at the central station because it pushes full data to the receiver similar to CID but it tends to be more reliable. I do however love to takeover panels using CID because we can do it with a simple takeover cellular radio.

I'd be interested to know more about the issues with alarm reporting over VoIP lines. Are certain formats more resilient? What physically causes the issues?

Basically, DTMF relies on a precise reproduction of a series of tones. VoIP lines can compress the signal in order to save bandwidth, causing the central station to be unable to decode the signal, or can cut off the beginning or end of the phone call, causing the handshake or the checksum to be missed. 

Here's a good explanation of exactly how pulsed dialing (for formats such as 4x1) and DTMF dialing (for formats such as Contact ID or the various Bosch formats) works.

Still useful when remote sites can not be connected through LAN/WAN because there is no network or the IT policy restricts even a VPN connection.

GSM communicators can send CID in SMS, and a GSM modem with receiver software can translate CID to an event in central monitoring system  like Genetec SC or anything else. 

Login to read this IPVM report.
Why do I need to log in?
IPVM conducts unique testing and research funded by member's payments enabling us to offer the most independent, accurate and in-depth information.

Related Reports

European Startup Ajax Profile - They "Stand Against Evil" on Jan 03, 2019
European intrusion detection startup Ajax Systems proclaims: How are they standing against evil? And what are the differentiators and potential...
Start Up Safe Zone $150 Gunfire Detector Profile on Mar 06, 2019
While gunfire detectors have been around for years, typically they are limited to enterprise level or municipal deployments. Startup AVidea, makers...
Verified Response Discontinued in Silicon Valley San Jose on Feb 28, 2019
Almost all security alarms are false. This has driven some municipalities to require verified response before dispatching police. However, now San...
Camera Disruptor Wyze Enters Sensor / Security Market on Mar 28, 2019
Wyze, the company that has disrupted consumer IP cameras, combining American marketing and Chinese manufacturer, has just announced its expansion...
Risk of Amazon Alexa Guard: No Battery Or Cell Backup on Jun 20, 2019
Amazon positions its Alexa Guard Service as a "smart home security system" and says it can help you "keep your home safe". However, the...
Alarm.com Suffers Outage on Jul 26, 2019
Alarm.com suffered a major outage this week, impacting its 5+ million customers. Inside, we examine what happened, what Alarm.com told IPVM and...
Access Control Mustering Guide on Sep 30, 2019
In emergencies, determining where employees are located can be critical for knowing whether they are in danger. Access systems can be used for...
"UL Has Blood On Their Hands" Alleges The Interceptor / Keith Jentoft on Oct 14, 2019
"UL has blood on their hands" alleges Keith Jentoft of "The Interceptor Project". We examined The Interceptor in-depth last year, see: The...
Hidden Camera Detectors Tested on Nov 18, 2019
Hidden cameras are a growing problem as cameras become smaller, cheaper and easier to access. However, some companies claim to be able to detect...
Verkada Notification Outage on Dec 12, 2019
Verkada is suffering an event notification outage and analytic search failures. Inside, we examine what the issues are, what Verkada told IPVM...

Most Recent Industry Reports

Intersec 2020 Final Show Report on Jan 21, 2020
IPVM spent all 3 days at the Intersec 2020 show interviewing various companies and finding key trends. We cover: Middle East Enterprise...
Vehicle & Long Range Access Reader Tutorial on Jan 21, 2020
One of the classic challenges for access control are parking lots and garages, where the user's credential is far from the reader. With modern...
Clearview AI Alarm - NY Times Report Says "Might End Privacy" on Jan 20, 2020
Over the weekend, the NY Times released a report titled "The Secretive Company That Might End Privacy as We Know It" about a company named...
Favorite Camera Manufacturers 2020 on Jan 20, 2020
The past 2 years of US bans and sanctions have shaken the video surveillance industry but what impact would this have on integrators' favorite...
"Severely Impacted" Mercury Security 2020 Leap Year Firmware Issue on Jan 17, 2020
One of the largest access controller manufacturers has a big problem: February 29th. Mercury Security, owned by HID, is alerting partners of the...
Apple Acquires XNOR.ai, Loss For The Industry on Jan 16, 2020
Apple has acquired XNOR.ai for $200 million, reports GeekWire. This is a loss for the video surveillance industry. XNOR.ai stunned the industry...
Installation Course January 2020 - Last Chance on Jan 16, 2020
Thursday, January 16th is your last chance to register for the Winter 2020 Video Surveillance Installation Course. This is a unique installation...
Halo Smart Vape Detector Tested on Jan 16, 2020
The Halo Smart Sensor claims to detect vaping, including popular brand Juul and even THC vapes. But how well does it work in real world...
PRC Government Entity Now Controlling Shareholder of Infinova / March Networks on Jan 16, 2020
A PRC government entity is now the controlling shareholder of US security manufacturer Infinova as well as its wholly-owned subsidiary March...
Network Cabling for Video Surveillance on Jan 15, 2020
In this guide, we explain the fundamentals of network cabling for video surveillance networks, how they should be installed, and the differences in...