IPC분류정보
국가/구분 |
United States(US) Patent
등록
|
국제특허분류(IPC7판) |
|
출원번호 |
US-0189788
(2008-08-12)
|
등록번호 |
US-8478844
(2013-07-02)
|
발명자
/ 주소 |
- Baum, Marc
- Dawes, Paul J.
- Kinney, Mike
- Raji, Reza
- Swenson, David
- Wood, Aaron
|
출원인 / 주소 |
|
대리인 / 주소 |
|
인용정보 |
피인용 횟수 :
49 인용 특허 :
158 |
초록
▼
An integrated security system is described that integrates broadband and mobile access and control with conventional security systems and premise devices to provide a tri-mode security network (broadband, cellular/GSM, POTS access) that enables users to remotely stay connected to their premises. The
An integrated security system is described that integrates broadband and mobile access and control with conventional security systems and premise devices to provide a tri-mode security network (broadband, cellular/GSM, POTS access) that enables users to remotely stay connected to their premises. The integrated security system, while delivering remote premise monitoring and control functionality to conventional monitored premise protection, complements existing premise protection equipment. The integrated security system integrates into the premise network and couples wirelessly with the conventional security panel, enabling broadband access to premise security systems. Automation devices (cameras, lamp modules, thermostats, etc.) can be added, enabling users to remotely see live video and/or pictures and control home devices via their personal web portal or webpage, mobile phone, and/or other remote client device. Users can also receive notifications via email or text message when happenings occur, or do not occur, in their home.
대표청구항
▼
1. A method comprising: coupling a gateway to a local area network located in a first location and a security server in a second location, wherein the first location includes a security system comprising a plurality of security system components;automatically discovering the plurality of security sy
1. A method comprising: coupling a gateway to a local area network located in a first location and a security server in a second location, wherein the first location includes a security system comprising a plurality of security system components;automatically discovering the plurality of security system components at the gateway and establishing a first communication channel between the gateway and the plurality of security system components;automatically discovering network devices at the gateway and establishing a second communication channel between the gateway and the network devices, wherein the second communication channel is independent of the first communication channel;forming a security network by electronically integrating into the gateway communications and functions of the network devices and the plurality of security system components;receiving at the gateway security data from the plurality of security system components, device data of the network devices, and remote data from the security server;generating processed data by processing at the gateway the security data, the device data, and the remote data;determining a state change of the security system using the processed data; andmaintaining at the security server with use of the processed data objects corresponding to the plurality of security system components and the network devices. 2. The method of claim 1, comprising controlling the functions of the security network via an interface coupled to the security network, wherein the interface is accessed using a remote client device. 3. The method of claim 2, wherein the remote client devices include one or more of personal computers, personal digital assistants, cellular telephones, and mobile computing devices. 4. The method of claim 1, comprising using protocols of the security system to discover the security system components, wherein the gateway includes the protocols of the security system. 5. The method of claim 1, comprising the gateway receiving protocols of the security system from the security server in response to a request, wherein the gateway uses the protocols received to discover the security system components. 6. The method of claim 1, wherein the gateway comprises a connection management component, the connection management component automatically establishing a coupling with the security system including the security system components. 7. The method of claim 6, wherein the connection management component automatically discovers the network devices. 8. The method of claim 6, wherein the connection management component automatically installs the network devices in the security network. 9. The method of claim 6, wherein the connection management component automatically configures the network devices for operation in the security network. 10. The method of claim 1, wherein the gateway includes a rules component that manages rules of interaction between the gateway, the security system components, and the network devices. 11. The method of claim 1, wherein the gateway includes a device connect component that includes definitions of the security system components and the network devices. 12. The method of claim 1, wherein the premise local area network is coupled to a wide area network via a premise router. 13. The method of claim 1, wherein the gateway is coupled to the local area network using a premise router, and the gateway is coupled to a wide area network. 14. The method of claim 1, wherein the gateway is coupled to the network devices using a wireless coupling. 15. The method of claim 1, wherein the gateway is coupled to the security server via the internet. 16. The method of claim 1, wherein the gateway is coupled to a central monitoring station corresponding to the security system, wherein the central monitoring station is located at a third location different from the first location and the second location. 17. The method of claim 1, wherein the security system is coupled to a central monitoring station via a third communication channel, wherein the gateway is coupled to the central monitoring station via a fourth communication channel that is different than the third communication channel. 18. The method of claim 17, comprising transmitting event data of the security system components and the network devices to the central monitoring station via the gateway and the fourth communication channel. 19. The method of claim 18, wherein the event data comprises changes in device states of at least one of security system components and network devices, data of at least one of security system components and network devices, and data received by at least one of security system components and network devices. 20. The method of claim 17, comprising transmitting event data of the security system to the central monitoring station via the gateway and the fourth communication channel when the third communication channel is unavailable. 21. The method of claim 17, wherein the fourth communication channel includes a broadband coupling. 22. The method of claim 17, wherein the fourth communication channel includes a General Packet Radio Service (GPRS) coupling. 23. The method of claim 17, comprising transmitting messages comprising event data of the security system components and the network devices to remote client devices via the gateway and the fourth communication channel. 24. The method of claim 23, wherein the event data comprises changes in device states of at least one of security system components and network devices, data of at least one of security system components and network devices, and data received by at least one of security system components and network devices. 25. The method of claim 1, wherein the security server creates, modifies and terminates users corresponding to the security system. 26. The method of claim 1, wherein the security server creates, modifies and terminates couplings between the gateway and the security system components. 27. The method of claim 1, wherein the security server creates, modifies and terminates couplings between the gateway and the plurality of premise network devices. 28. The method of claim 1, wherein the security server performs creation, modification, deletion and configuration of the security system components. 29. The method of claim 1, wherein the security server performs creation, modification, deletion and configuration of the network devices. 30. The method of claim 1, wherein the security server creates automations, schedules and notification rules associated with the security system components. 31. The method of claim 1, wherein the security server creates automations, schedules and notification rules associated with the network devices. 32. The method of claim 1, wherein the security server manages access to current and logged state data for the security system components. 33. The method of claim 1, wherein the security server manages access to current and logged state data for the network devices. 34. The method of claim 1, wherein the security server manages access to current and logged state data for couplings among the gateway, the security system components and the network devices. 35. The method of claim 1, wherein the security server manages communications with the security system components. 36. The method of claim 1, wherein the security server manages communications with the network devices. 37. The method of claim 1, wherein the security server generates and transfers notifications to remote client devices, the notifications comprising event data. 38. The method of claim 37, wherein the notifications include one or more of short message service messages and electronic mail messages. 39. The method of claim 37, wherein the event data is event data of the security system components. 40. The method of claim 37, wherein the event data is event data of the network devices. 41. The method of claim 1, wherein the security server transmits event data of the security system components and the network devices to a central monitoring station of the security system over the fourth communication channel. 42. The method of claim 1, wherein the security system components include one or more of sensors, cameras, input/output (I/O) devices, and accessory controllers. 43. The method of claim 1, wherein the network device is an Internet Protocol device. 44. The method of claim 1, wherein the network device is a camera. 45. The method of claim 1, wherein the network device is a touchscreen. 46. The method of claim 1, wherein the network device is a device controller that controls an attached device. 47. The method of claim 1, wherein the network device is a sensor. 48. A method comprising: forming a security network by coupling a gateway to a security server, wherein the gateway is located at a first location and coupled to a security system that includes security system components located at the first location, wherein the security server is located at a second location different from the first location;automatically discovering network devices at the gateway and establishing a coupling between the gateway and the network devices located at the first location, wherein the gateway electronically integrates communications and functions of the network devices and the security system components into the gateway and the security network;receiving at the gateway security data from the security system components, device data of the network devices, and remote data from the security server;generating processed data by processing at the gateway the security data, the device data, and the remote data;determining a state change of the security system using the processed data; andmaintaining at the security server with use of the processed data objects corresponding to the plurality of security system components and the network devices. 49. A method comprising: automatically discovering a security system at a gateway and establishing communications between the gateway and the security system in a facility, wherein the security system includes a plurality of security system components that are proprietary to the security system;automatically discovering a plurality of network devices at the gateway and establishing communications between the gateway and the plurality of network devices, wherein the gateway fauns a security network at the facility and couples the security network to a local area network of the facility, wherein the gateway forms the security network by electronically integrating into the gateway communications and functions of the plurality of network devices and the plurality of security system components;receiving at the gateway security data from the plurality of security system components, device data of the plurality of network devices, and remote data from the remote server;generating processed data by processing at the gateway the security data, the device data, and the remote data;determining a state change of the security system using the processed data; andmaintaining at the remote server with use of the processed data objects corresponding to the plurality of security system components and the plurality of network devices. 50. A method comprising: forming a security network by automatically discovering a security system at a gateway and establishing communications between the gateway and the security system, the security system including security system components installed at a facility, wherein the gateway is located at a first location, wherein the gateway is coupled to a security server at a second location different than the first location;automatically discovering a plurality of network devices at the gateway and establishing communications between the security network and the plurality of network devices located at the facility, the gateway electronically integrating communications and functions of the plurality of network devices and the security system components into the gateway and the security network;receiving at the gateway security data from the security system components, device data of the plurality of network devices, and remote data from the security server;generating processed data by processing at the gateway the security data, the device data, and the remote data;determining a state change of the security system using the processed data;maintaining at the security server with use of the processed data objects corresponding to the plurality of security system components and the network devices; andproviding an interface by which a remote client device accesses the security network, the interface enabling communications with and control of the functions of the security system components and the plurality of network devices.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.