최소 단어 이상 선택하여야 합니다.
최대 10 단어까지만 선택 가능합니다.
다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
NTIS 바로가기다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
DataON 바로가기다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
Edison 바로가기다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
Kafe 바로가기국가/구분 | United States(US) Patent 등록 |
---|---|
국제특허분류(IPC7판) |
|
출원번호 | US-0920429 (2018-03-13) |
등록번호 | US-10142166 (2018-11-27) |
발명자 / 주소 |
|
출원인 / 주소 |
|
대리인 / 주소 |
|
인용정보 | 피인용 횟수 : 0 인용 특허 : 780 |
A security system is described for managing a premises. The security system comprises security system components and a first controller. A takeover component receives security data of the security system from the first controller. The security data is used to configure a second controller to communi
A security system is described for managing a premises. The security system comprises security system components and a first controller. A takeover component receives security data of the security system from the first controller. The security data is used to configure a second controller to communicate with the security system. The second controller communicates with the security system components and replaces the first controller in management of the security system.
1. A system comprising: a gateway device located at a first location;a takeover component coupled to the gateway device, the takeover component configured to extract security data of a security system from a first controller coupled to the security system, the security system comprising security sys
1. A system comprising: a gateway device located at a first location;a takeover component coupled to the gateway device, the takeover component configured to extract security data of a security system from a first controller coupled to the security system, the security system comprising security system components; anda connection management component configured to facilitate access to a security network comprising a second controller and the gateway device, wherein the second controller is configured to communicate with the security system components to replace one or more functions of the first controller in management of the security system components, and wherein the security data extracted from the first controller is used to configure at least the second controller to enable the communication with the security system components. 2. The system of claim 1, wherein the takeover component sends the security data extracted from the first controller to the second controller. 3. The system of claim 1, wherein the takeover component loads the security data extracted from the first controller in the second controller. 4. The system of claim 1, wherein the gateway device enrolls the security system components in the second controller using the security data. 5. The system of claim 1, further comprising a security server at a second location different from the first location, wherein the security server is in communication with the gateway device. 6. The system of claim 5, wherein the security server receives the security data from the gateway device. 7. The system of claim 5, wherein the security server stores the security data. 8. The system of claim 7, wherein the gateway device loads the security data in the second controller. 9. The system of claim 8, wherein the gateway device sends, to the security server, a query for the security data. 10. The system of claim 9, wherein the gateway device receives the security data from the security server in response to the query. 11. The system of claim 5, wherein the gateway device is coupled to the security server via the internet. 12. The system of claim 5, wherein the security server creates, modifies, and terminates users corresponding to the security system. 13. The system of claim 5, wherein the security server creates, modifies and terminates communication between the gateway device and the security system components. 14. The system of claim 5, wherein the security server performs creation, modification, deletion, and configuration of data associated with the security system components. 15. The system of claim 5, wherein the security server creates data indicative of automations, schedules, and notification rules associated with the security system components. 16. The system of claim 5, wherein the security server manages access to current and logged state data for the security system components. 17. The system of claim 5, wherein the security server manages access to current and logged state data for communication between the gateway device and the security system components. 18. The system of claim 5, wherein the security server manages communications with the security system components. 19. The system of claim 5, wherein the security server generates and transfers notifications to remote client devices, the notifications comprising event data. 20. The system of claim 19, wherein the notifications comprise one or more of short message service messages and electronic mail messages. 21. The system of claim 19, wherein the event data is event data of the security system components. 22. The system of claim 1, wherein the gateway device controls transfer of the security data to the second controller. 23. The system of claim 1, wherein the gateway device instructs the second controller to enter an installation mode. 24. The system of claim 23, wherein the gateway device loads the security data into the second controller when the second controller is in the installation mode. 25. The system of claim 1, wherein the first controller is a control panel of the security system, the control panel controlling the security system components. 26. The system of claim 1, wherein the second controller is a wireless control panel of the security system, the wireless control panel controlling the security system components. 27. The system of claim 1, wherein the takeover component comprises a radio frequency (RF) transceiver. 28. The system of claim 27, wherein the RF transceiver is compatible with the first controller. 29. The system of claim 1, wherein the takeover component communicates wirelessly with the first controller. 30. The system of claim 1, wherein the gateway device locates and identifies wireless components of the security system components. 31. The system of claim 30, wherein the gateway device manages the wireless components. 32. The system of claim 31, wherein the gateway device is configured as a communication relay that relays the security data between the second controller and the wireless components. 33. The system of claim 1, wherein the security data comprises sensor identification data. 34. The system of claim 1, wherein the security data comprises security system component data. 35. The system of claim 1, wherein the security data comprises security system component data for each wireless component of the security system components. 36. The system of claim 1, wherein the security data comprises security system component zone data for each wired component of the security system components. 37. The system of claim 1, wherein the security data comprises security zone data of each zone of the first location. 38. The system of claim 1, wherein the security data comprises security zone names of each zone of the first location. 39. The system of claim 1, wherein the gateway device is in communication with a local area network at the first location, and the local area network is in communication with a wide area network via a router at the first location. 40. The system of claim 1, wherein the gateway device is in communication with a wide area network and is in communication with a local area network at the first location via the connection management component and a router at the first location. 41. The system of claim 1, further comprising an interface in communication with the security network, wherein the interface allows control of functions of the security network by a user. 42. The system of claim 1, further comprising a portal in communication with the gateway device, wherein the portal provides access to communications and functions of the security network via remote client devices. 43. The system of claim 42, further comprising an interface in communication with the security network, wherein the interface allows control of the functions of the security network from the remote client devices. 44. The system of claim 42, wherein the remote client devices comprise one or more of personal computers, personal digital assistants, cellular telephones, or mobile computing devices. 45. The system of claim 1, wherein the gateway device discovers the security system components. 46. The system of claim 45, wherein the gateway device comprises protocols of the security system and uses the protocols to discover the security system components. 47. The system of claim 45, wherein the gateway device receives protocols of the security system from a security server at a second location, wherein the gateway device uses the protocols received to discover the security system components. 48. The system of claim 1, wherein the gateway device communicates with and controls the security system components. 49. The system of claim 1, wherein the gateway device communicates with the security system comprising the security system components. 50. The system of claim 1, wherein the security system is in communication with a central monitoring station via a primary communication link, wherein the gateway device is in communication with the central monitoring station via a secondary communication link that is different than the primary communication link, wherein the central monitoring station is located at a remote location. 51. The system of claim 50, wherein the gateway device transmits event data of the security system components to the central monitoring station over the secondary communication link. 52. The system of claim 51, wherein the event data comprises changes in device states of the security system components, data of the security system components, and data received by the security system components. 53. The system of claim 50, wherein the secondary communication link comprises a broadband coupling. 54. The system of claim 50, wherein the secondary communication link comprises a General Packet Radio Service (GPRS) coupling. 55. The system of claim 50, wherein the gateway device transmits messages comprising event data of the security system components to remote client devices over the secondary communication link. 56. The system of claim 55, wherein the event data comprises changes in device states of the security system components, data of the security system components, and data received by the security system components. 57. The system of claim 50, wherein the gateway device receives control data for control of the security system components from remote client devices via the secondary communication link. 58. The system of claim 1, wherein the security network comprises a network device coupled to the gateway device via a wireless coupling. 59. The system of claim 58, wherein the gateway device discovers the network device. 60. The system of claim 58, wherein the gateway device installs the network device in the security network. 61. The system of claim 58, wherein the gateway device configures the network device for operation in the security network. 62. The system of claim 58, wherein the gateway device controls communications between the network device, the security system components, and a security server. 63. The system of claim 58, wherein the gateway device transmits event data of the network device to remote client devices over at least one of a plurality of communication links. 64. The system of claim 63, wherein the gateway device receives control data for control of the network device from remote client devices via at least one of the plurality of communication links. 65. The system of claim 63, wherein the event data comprises changes in device states of the network device, data of the network device, and data received by the network device. 66. The system of claim 58, wherein the security system is in communication with a central monitoring station via a primary communication link, wherein the gateway device is in communication with the central monitoring station via a secondary communication link that is different than the primary communication link. 67. The system of claim 66, wherein the gateway device transmits event data of the network device to the central monitoring station over the secondary communication link. 68. The system of claim 58, wherein the network device is an Internet Protocol device. 69. The system of claim 58, wherein the network device is a camera. 70. The system of claim 58, wherein the network device is a touchscreen. 71. The system of claim 58, wherein the network device is a device controller that controls an attached device. 72. The system of claim 58, wherein the network device is a sensor. 73. The system of claim 1, wherein the security system components comprises one or more of sensors, cameras, input/output (I/O) devices, and accessory controllers. 74. A method comprising: determining, by a takeover component coupled to a gateway device at a first location and from a first controller of a security system at the first location, security data stored by the first controller, wherein the security system comprises security system components;determining, based on the security data, a configuration for a second controller; andcausing, based on the configuration, the second controller to replace one or more functions of the first controller in the management of the security system, wherein the second controller is configured to communicate, via a security network at the first location, with the security system components. 75. A device comprising: one or more processors; andmemory storing instructions that, when executed by the one or more processors, cause the device to: determine, from a first controller of a security system at a first location, security data stored by the first controller, wherein the security system comprises security system components;determine, based on the security data, a configuration for a second controller; andcause, based on the configuration, the second controller to replace one or more functions of the first controller in the management of the security system, wherein the second controller is configured to communicate, via a security network at the first location, with the security system components.
Copyright KISTI. All Rights Reserved.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.