[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

WO2020096969A1 - System and apparatus for a home security system - Google Patents

System and apparatus for a home security system Download PDF

Info

Publication number
WO2020096969A1
WO2020096969A1 PCT/US2019/059682 US2019059682W WO2020096969A1 WO 2020096969 A1 WO2020096969 A1 WO 2020096969A1 US 2019059682 W US2019059682 W US 2019059682W WO 2020096969 A1 WO2020096969 A1 WO 2020096969A1
Authority
WO
WIPO (PCT)
Prior art keywords
control panel
signal
user
alarm
accessory device
Prior art date
Application number
PCT/US2019/059682
Other languages
French (fr)
Inventor
Syed Zaidi
Original Assignee
Frontpoint Secuiruty Solutions, Llc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Frontpoint Secuiruty Solutions, Llc filed Critical Frontpoint Secuiruty Solutions, Llc
Publication of WO2020096969A1 publication Critical patent/WO2020096969A1/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/02Services making use of location information
    • H04W4/021Services related to particular areas, e.g. point of interest [POI] services, venue services or geofences
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B25/00Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems
    • G08B25/008Alarm setting and unsetting, i.e. arming or disarming of the security system
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B25/00Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems
    • G08B25/14Central alarm receiver or annunciator arrangements
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B19/00Alarms responsive to two or more different undesired or abnormal conditions, e.g. burglary and fire, abnormal temperature and abnormal rate of flow
    • G08B19/005Alarms responsive to two or more different undesired or abnormal conditions, e.g. burglary and fire, abnormal temperature and abnormal rate of flow combined burglary and fire alarm systems
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/30Services specially adapted for particular environments, situations or purposes
    • H04W4/33Services specially adapted for particular environments, situations or purposes for indoor environments, e.g. buildings
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/90Services for handling of emergency or hazardous situations, e.g. earthquake and tsunami warning systems [ETWS]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W84/00Network topologies
    • H04W84/02Hierarchically pre-organised networks, e.g. paging networks, cellular networks, WLAN [Wireless Local Area Network] or WLL [Wireless Local Loop]
    • H04W84/10Small scale networks; Flat hierarchical networks
    • H04W84/12WLAN [Wireless Local Area Networks]

Definitions

  • do-it-yourself systems can be wireless. Because these wireless systems do not require any wiring, homeowners can install them without the help of professionals. As a result, installation of do-it-yourself systems is easier and cheaper. As the do-it-yourself systems dominate the home security market, manufacturers of these systems arc lacing new challenges.
  • control panel typically do-it-yourself systems include a control panel. Because the control panel communicates wirelessly with other devices in the system, the wireless signal range of the control panel is crucial. Therefore, it is an object of this disclosure to describe a home security system with superior wireless signal coverage.
  • control panels include a keypad to arm or disarm the system.
  • the keypad can limit the wireless signal range of the control panel. Therefore, the control panel of this disclosure can have a superior signal range because, in some embodiments, the control panel does not include a keypad. Additionally, without the keypad, there can be additional space inside the housing of the control panel, and thus, one can reposition the antenna such that signal range of the control panel increases, e.g., by placing the antenna over the processing circuitry of the control panel.
  • wireless home security systems can interact with many household devices which have wireless connectivity.
  • a control panel can exchange data and signals with devices such as cellphones and fitness trackers, which traditionally are not connected to home security systems.
  • a security system which can receive data from these devices and operate the system based on the data.
  • a control panel which can command and operate household devices such as smart lights and televisions.
  • these devices are not connected to home security systems, and thus, the interconnectivity of the control panel with these devices provides for a robust system which can automate operation of the system and many household devices.
  • the system can use various techniques for determining a user’s habits and operate the system to accommodate the user.
  • Figure 1 shows a security system according to an example embodiment
  • Figure 2 shows a control panel according to an example embodiment.
  • Figure 3 shows a page of a user interface of a software application of a smart device according to an example embodiment.
  • Figure 4 shows another page of the user interface of the software application of the smart device according to an example embodiment.
  • Figure 5 shows a page for defining a security zone inside a house using the application of the smart device.
  • Figure 6 shows a keypad according to an example embodiment.
  • Figure 7 shows a tracker according to an example embodiment.
  • Figure 8 illustrates exemplary hardware components of a server.
  • a security system can include several components.
  • the security system can include a control panel.
  • the system can also include various accessory devices in communication with the control panel.
  • these accessory devices can include sensors, keypads, cameras, lights, household appliances, and other devices which can interact with the control panel via a wireless communication interface.
  • FIG. 1 shows a security system 100 according to an example embodiment.
  • the security system includes a control panel 101 and various accessory devices 110 such as a motion sensor 111, a tracker 112, a smart device 1 13 and a television
  • the control panel 101 can be in wireless communication with these accessory devices 110.
  • the control panel 101 can be paired with these accessory devices 110.
  • the control panel can also be in communication with a cloud 120 or a server of a service provider.
  • the control panel 101 can exchange data, commands and files with the cloud 120 and the accessory devices 110.
  • FIG. 2 shows a control panel 101 according to an example embodiment.
  • the control panel 101 can include a housing (containing, e.g., top housing 201 and bottom housing 202), a power supply 203, processing circuitry 204, a transceiver 205, an antenna 206.
  • the processing circuitry 204 can include a processor and a memory.
  • the memory of the processing circuitry 204 can store a firmware which when executed by the processor can control various functional aspects of the control panel 101 and the accessories connected to (or in communication with) the control panel.
  • the control panel 101 does not include a keypad.
  • a keypad can include materials and components that can limit the wireless communication range of the control panel.
  • a keypad can include glass and, all of which interfere with electromagnetic frequencies used for wireless communication.
  • the signal range of the control panel can increase.
  • the housing of the control panel 101 can include additional space. For example, this additional space can be used to place the antenna 206 over the power supply 203, the processing circuitry 204 and the transceiver 205. This placement of the antenna 206 can also expand the wireless range of the control panel.
  • the firmware of the control panel 101 can include a module for controlling the transceiver 205.
  • the transceiver 205 can operate with radio, cellular, CAT-M cellular, Wi-Fi,
  • the module can enable the control panel 101 to receive and transmit data, signals and media files.
  • the firmware can include a module for communication with a network such as the Internet. Using this module, the firmware can be in communication with a server of a service provider (or the cloud 120 of the service provider) and exchange data and files with the server.
  • the firmware can also include a module for communication with accessory devices, e.g., the accessory devices 110.
  • the accessory devices 110 can be wirelessly connected to the control panel 101 , i.e., the module of the firmware can exchange data, signals or media files with each accessory device using a wireless communication protocol.
  • the user can pair an accessory device with the control panel 101.
  • the control panel can receive data and commands from various accessory devices, and the control panel can transmit data and commands to these accessory devices.
  • an accessory device such as a motion detection sensor can detect a motion event and notify the control panel that a motion event has been delected, e.g., transmit a trigger signal to the control panel.
  • the control panel can trigger an alarm if the control panel is armed.
  • control panel can ignore the notification.
  • the control panel can receive data from a tracker and based on the tracker data, the control panel can arm the system. For example, the control panel can arm the system in nighttime if the tracker indicates that the user is sleeping.
  • the control panel can notify a monitoring station if an alarm condition is detected. An alarm condition can be detected if, for example, an accessory device transmits a trigger signal indicating that the accessory device has detected unauthorized entry.
  • the control panel can include one or more sensors.
  • the control panel can include a motion sensor, a temperature sensor, a humidity sensor, etc. The control panel can use data from these sensors to generate an alarm.
  • the control panel can transmit the data to a smart device for display to a user.
  • control panel can include a keypad.
  • the keypad can be located on the housing of the control panel or the keypad can be connected to the control panel via a wire connection.
  • Pairing the control panel with an accessory device can establish an initial bonding between the control panel and the accessory device so that communication is allowed and facilitated between the two devices.
  • the control panel can use
  • Bluetooth wireless technology standard or Wi-Fi technology standard for exchanging data and communication between the control panel and the accessory device.
  • Use of other wireless technology standards such as cellular wireless, CAT-M cellular, Induction Wireless, Infrared
  • Wireless, Ultra Wideband, ZigBee, or a combination thereof is also conceivable.
  • control panel and the accessory device can be paired through a network such as the Internet.
  • a network such as the Internet.
  • each of the control panel and the accessory device can connect to the Internet through a wireless connection or via a router or hub, and thus, the control panel can exchange data and communicate with the accessory device using the Internet
  • a link key is used, which can be a shared secret known between the control panel and the accessory device. If both devices store the same link key, they are said to be paired or bonded.
  • Protection against eavesdropping is also possible by encrypting the exchanged data between the control panel and the accessory device. Users can delete link keys from either device, which removes the bond between the devices. It is possible for one device to have a stored link key for a device with which it is no longer paired.
  • the user interface of the application can include a page for pairing accessory devices with the control panel.
  • each of the accessory devices can include a discoverability mode, which can be activated by pressing a button on the accessory device. Once in discoverability mode, the control panel can find the accessory device and pair the accessory device with the control panel. In another embodiment, the control panel can automatically find the accessory device once it is in the discoverability mode.
  • the control panel can be paired with a smart device.
  • the smart device can be a smartphone, a cellphone, a laptop, a desktop, a notebook, a tablet, a wearable device, a tracker, or any other similar device.
  • the smart device can include a software application (“application”), and by using the application, the user can adjust various settings or options of the control panel. Additionally, using the application, the user can provide various indoor location information to the control panel.
  • the smart device can perform these functions (e.g., adjusting settings or providing location information) by transmitting a signal to the control panel. Alternatively, the smart device can perform these functions by transmitting a signal to a server of a service provider.
  • the server can in turn transmit another signal to the control panel.
  • the smart device can directly transmit a signal to the control panel to establish a lighting schedule for a house.
  • the smart device can send the signal to the server and the server can transmit another signal to the control panel to establish the lighting schedule.
  • Figure 3 shows a page 301 of a user interface 300 of a software application of the smart device 113 according to an example embodiment.
  • the user interface 300 can include various pages, URL links, buttons and other similar controls.
  • the user interface 300 can include the page 301 for instructing the control panel 101 to arm or disarm security system
  • the user interface 300 can include an indicator 301 which can indicate whether the control panel 101 is armed or disarmed.
  • the smart device can receive a signal from the control panel 101 or the cloud 120 which can inform the application about the status of the control panel 101.
  • the application can include a button 303 for arming the control panel 101 and if the control panel 101 is armed, the application can include a button
  • buttons 302 for disarming the control panel 101.
  • the control panel 101 is armed, and thus, button 302 is active and can enable the user to arm the control panel 101. Because the control panel 101 is disarmed, the button 303 is inactive.
  • the user interface 300 can display a list of accessory devices 310 paired with the con trol panel 101.
  • the list can further indicate the status of each accessory device connected to the control panel.
  • the list 310 can indicate that items 311-313 are paired with the control panel 101. These items can include the motion sensor
  • the list indicates that the motion sensor 111 is active but has low battery; the tracker 112 is disconnected from the control panel 101 (e.g., the tracker 112 is outside of the detection range of the control panel 101, or the tracker 112 is deactivated by the smart device); and the television 1 14 is active.
  • the smart device 113 can receive the status of each one of these accessory devices for the control panel 101, the cloud
  • Figure 4 shows a page 401 of the user interface 300 of the software application of the smart device 1 13 according to an example embodiment.
  • the application can include the page 401 for defining a schedule for arming or disarming the control panel 101.
  • a user can define a set of dates and times on which the control panel 101 can arm or disarm itself.
  • the user can press the add event button 402, and upon pressing this button, the user can be prompted to select a time of a day, and the event that should occur at this time, e.g., on Monday, June 25, 2018 at 5 PM the control panel should arm itself. Additionally, the user can define whether the event can be repeated, e.g., every Monday at 5 PM the control panel 101 should arm itself.
  • the application can store this data as triggering events.
  • the user can define a period of time during which the control panel can remain armed or disarmed.
  • the user can require the control panel 101 to remain armed starting on Monday,
  • the page 401 can display a schedule of triggering events 410.
  • the schedule 410 can be a list of triggering events defined by the user.
  • the user has defined a disarming event for weekdays at 5 PM.
  • the user has also defined an arming event for weekends at 10 PM.
  • the user has defined a disarming event for Monday, June 25, 2018 at 4 PM.
  • the application can transmit a schedule including all or some of the triggering events to the control panel 101 or the cloud 120. If the schedule is transmitted to the control panel, the control panel 101 can arm or disarm the control panel at the time of each triggering event. If the schedule is transmitted to the cloud 120, the cloud can transmit the schedule to the control panel 101.
  • the cloud can transmit a signal to the control panel 101 so that the control panel 101 implements the triggering event.
  • the smart device 113 transmits a signal to the control panel
  • control panel can include an internal policy for resolving conflicts relating to arming and disarming the control panel. For example, a user can define a period of time during which the control panel should remain disarmed. Yet at the same time, the control panel can receive data from a tracker indicating that the control panel should arm itself (or the control panel can conclude based on the data that it should arm itself).
  • the control panel can refer to the internal policy to resolve this conflict.
  • the user can define priorities for each triggering event. For example, the user can require the scheduled events to override other triggering events, e.g., tracker triggered events. In another embodiment, the user can require onetime events to override repeating events. In yet another embodiment, the user can allow the control panel to make a judgment. For example, the control panel can transmit to the cloud a history of the user commands indicating arming or disarming the control panel. In the cloud, a machine learning technique can be performed to train a model and the model can be transmitted to the control panel. The control panel can use the model to resolve these conflicts.
  • the application can include a page for defining various security zones within the house which includes the security system.
  • Each zone can be an area of the house in which one or more devices such as accessory devices or the control panel are located.
  • a user can define a living room zone, a bedroom zone and a kitchen zone within a house.
  • the user can also associate one or more accessory devices with each zone.
  • the user can specify that a motion sensor, a smoke detector, a television and several smart lights are located in the living room.
  • the user can also specify a unique identification number associated with each one of these accessory devices.
  • the user can press a button on each one of these devices so that the device transmits the unique identification number associated with the device to the control panel or the smart device.
  • Each one of these accessory devices can be paired with the control panel.
  • the application can transfer a log to the control panel, and the log can include a description of each security zone and the identity of the devices included in each zone.
  • the user can implement a selective alarm mode.
  • the control panel can generate an alarm using a variety of alarm devices.
  • the control panel can select different alarm devices for different alarm conditions. These alarm conditions can include, e.g., the type of device which triggers the alarm, the location of the device which triggers the alarm, etc.
  • the user can specify that if an event in zone A creates an alarm condition, the alarm devices in zone B will sound the alarm.
  • the user can specify that if an event in zone A creates an alarm condition, only the devices in zone A will sound the alarm.
  • the user can specify that if a flood sensor generates a trigger signal (or creates an alarm condition), all the alarm devices will generate an alarm.
  • Figure 5 shows a page 501 for defining a security zone inside a house using the application of the smart device 113.
  • the define zone page 501 can include a button 502 for adding new zones and a button 503 for adding devices to the zones. For example, when the user touches the button 502, the application can prompt the user to define a name and write a description for a new zone. Once completed, the application can display the defined zone in the list of zones and devices 510 section of the page 501.
  • the user can add accessory devices to each zone. For example, once a user touches the button 503, the application prompts the user to select a zone.
  • the user can select an already defined zone. Then, the user can be prompted to select an accessory device. In one embodiment, prior to prompting the user, the user can place an accessory device in discoverability mode.
  • the application can display all accessory devices that are in discoverability mode, and enable the user to select one or more of these devices. In another embodiment, the user can manually enter an identification number of the accessory device. Other techniques can also be used by the user to add devices to a security zone.
  • the page 501 can display the list of zones and devices 510 to the user.
  • the user has defined a living room security zone 521 and a bathroom security zone 522.
  • the living room security zone 521 includes the motion sensor 1 11, the television 114 and the keypad 115.
  • the bathroom security zone includes only a flood sensor 523.
  • the application can include an option for creating a floor plan for each security zone defined for the house.
  • Various techniques can be used for this purpose.
  • the user can place the smart device in various locations in each room of the house.
  • the sensors of the smart device e.g., accelerometer and gyroscope
  • the application can create a floor plan for each room of the household.
  • the smartphone can combine the floor plans for all the rooms and create a consolidated floor plan for each floor of the house.
  • the application can define the security zones in association with a floor plan. For example, in one example embodiment, a user can define each room as a security zone. Additionally, the user can specify the accessory devices mounted in each zone.
  • the user can use the application to indicate that in a living room, there is a motion sensor, a smart light and a television.
  • the user can specify an exact location on the floor plan where each accessory device is mounted. For example, after creating the floor plan for a room, the user can move around the room and place the user’s smart device next to each accessory device to define the location of the accessory device in the room.
  • the application of the smart device can use various indoor-localization techniques to determine the location of the smart device relative to other locations in the house.
  • the application can transmit the floor plan (and the data associated with it, c.g., the zones and the accessory devices included in each zone) to the control panel or server to implement a selective alarm mode.
  • Accessory Devices c.g., the zones and the accessory devices included in each zone
  • An accessory device can be a sensor which generates a trigger signal tor the control panel to generate an alarm signal.
  • An accessory device can also be an alarm device, which can receive an alarm signal form the control panel to generate an alarm.
  • Some of the accessory devices disclosed herein can include wireless transceivers for transmitting signals to the control panel.
  • the signals can include trigger signals and periodic signals.
  • the trigger signals can indicate that the accessory device has detected a trigger event
  • the control panel can trigger an alarm if it receives a trigger signal.
  • the periodic signals can be transmitted periodically.
  • the periodic signals can indicate that the accessory device is functional and connected to (or in communication with) the control panel.
  • control panel fails to receive a periodic signal from an accessory device, this can indicate that the accessory device has been tampered with, and thus, the control panel can trigger an alarm.
  • a motion sensor can be an accessory device in communication with the control panel. There are different types of motion sensors. Each one of these sensors can detect motion using a different technique. Once a motion sensor detects motion, it can transmit a trigger signal to the control panel (and the control panel can trigger an alarm).
  • the motion sensor can include a transceiver for transmitting the signal to the control panel.
  • the motion sensor can be a Passive Infrared (PIR) motion sensor.
  • PIR Passive Infrared
  • a PIR sensor can detect changes in the amount of infrared radiation received by its receivers.
  • an object passes in front of a background there can be a change in infrared radiation detected at that point in the sensor’s field of view.
  • This can indicate that there has been a temperature fluctuation at that point in the sensor’s field of view, e.g., when a human appears in front of a wall, the detected infrared radiation can increase, thereby indicating that the temperature has increased, and when the human moves away from the wall, the detected infrared radiation can decrease, thereby indicating that the temperature has decreased.
  • the sensor converts the resulting change in the incoming infrared radiation into a change in the output voltage, and this can indicate motion of an object (e.g., a person).
  • the motion sensor can be a microwave motion sensor. These sensors can send out microwave pulses and detect the pulses as they reflect from a target object.
  • the frequency of the reflected microwave pulses can change. For example, when the object is approaching the motion sensor, the frequency of the returning waves can be higher than the frequency of the transmitted waves and when the object is moving away, the frequency of the returning waves can be lower. Based on this change in frequency, the microwave motion sensor can detect motion of an object.
  • the motion sensor can be an ultrasonic motion sensor. Similar to a microwave motion sensor, an ultrasonic motion sensor can send out pulses of ultrasonic waves and measure the reflection off a moving object. Based on changes in the frequency of the ultrasonic waves, the sensor can detect motion.
  • the motion sensor can be a dual technology motion sensor.
  • Dual technology motion sensors can include at least two independent sensors.
  • a dual technology motion sensor can include a PIR sensor and a microwave sensor.
  • a motion event has to be detected by each of the PIR sensor and the microwave sensor. This dual detection requirement can reduce the number of false alarms detected by the dual technology motion sensor.
  • a motion event can be detected even if only one of the PIR sensor and the microwave sensor detects a motion event
  • the motion sensor can be an area reflective motion sensor.
  • an area reflective motion sensor can emit infrared rays from an LED. Using the reflection of those rays, the sensor can measure the distance to an object and detect if the object is within a designated area.
  • the motion sensor can be a vibration motion sensor.
  • a vibration motion sensor can detect vibration, which can indicate that an object is moved neaiby the vibration motion sensor.
  • a door or window sensor can be an accessory device in communication with the control panel.
  • the door or window sensor can detect whether a door or window has been opened or closed.
  • the door or window sensor can include a transceiver.
  • the senor can transmit a signal to the control panel.
  • the control panel can trigger an alarm when the control panel is armed.
  • the door or window sensor can include a reed switch.
  • the senor can include a magnet and a set of electrical connectors placed slightly apart. When the magnet is placed parallel to the electrical connectors, the magnet imposes a magnetic field on the electrical connectors and the magnet pulls the electrical connectors together, closing a circuit. If someone opens an armed door or window, the magnet is pulled away from the switch, which breaks the circuit and triggers an event. The sensor can transmit a signal to the control panel when an event is triggered.
  • a smoke detector can be an accessory device in communication with the control panel.
  • the smoke detector can sense smoke, which can be an indicator of fire.
  • the smoke detector can include a transceiver which can transmit a signal to the control panel. If the smoke detector detects smoke, it can transmit a signal to the control panel. In response, the control panel can trigger an alarm.
  • the smoke detector can include a speaker for generating an alarm. The speaker can be activated in response to a detection of smoke by the smoke detector or by a signal from the control panel.
  • the smoke detector can use ionization process for detecting smoke.
  • An ionization smoke detector can have a small amount of radioactive material between two electrically charged plates, which ionizes the air and causes current to flow between the plates. When smoke enters the chamber, it disrupts the flow of ions, thus reducing the flow of current. This can trigger the detector to transmit a signal to the control panel.
  • the smoke detector can use an optical process to detect smoke.
  • Optical smoke detectors aim a light source into a sensing chamber at an angle away from a sensor. When smoke enters the chamber, it reflects the light onto the light sensor, and thus the smoke detector can trigger an event.
  • a flood detector can be an accessory device in communication with the control panel.
  • the flood detector can determine presence of water in its surrounding and can transmit a signal to the control panel if water is detected.
  • a flood detector can include two contacts. The contacts are separated, and thus, there is resistance across the two contacts. These contacts can lay flat on a floor. When there is water near the contacts, the resistance across two contacts decreases.
  • the flood detector can then transmit a signal to the control panel to indicate possible flooding.
  • the flood detector can include a speaker for generating an alarm.
  • a camera can be an accessory device in communication with the control panel.
  • the camera can be a standalone camera or it can be a camera included in another device, e.g., smart device, cell phone, laptop, tracker, wearable device, etc.
  • the camera can record a photo, video, media file, or other type of file (“data”) and transmit the data to the control panel.
  • the camera can also stream videos to the control panel.
  • the firmware of the control panel is configured to process and analyze the incoming data. In some embodiments, the firmware of the control panel is configured to transmit the data to a server (or cloud) and the server (or cloud) can analyze or process the data.
  • the camera can be placed near the entrance door.
  • the camera can record images or video of a person at the door, e.g., when a button is pressed or when the camera’s motion detector notices movement at the door.
  • the camera can transmit these images (or video) to the control panel.
  • the control panel can analyze the incoming images (or the control panel can transmit the incoming images to the cloud for analysis). If the control panel identifies the user’s face in the images (or if the control panel receives a signal from the cloud indicating that the user’s face was identified in the images), the control panel can disarm the system.
  • a camera can be an alarm device.
  • the control panel in response to receiving a trigger signal from an accessory device, can transmit an alarm signal to the camera to record the events observable by the camera. This recording can be helpfiil in deconstructing an accident or crime scene.
  • a keypad can be an accessory device in communication with the control panel.
  • Figure 6 shows a keypad 115 according to an example embodiment.
  • the keypad 1 15 can include a plurality of keys 601 for inputting a passcode, arming the control panel, or disarming it.
  • the keypad can include a display for displaying the current state of the system, e.g., armed, disarmed, etc.
  • the keypad can include one or more indicators 602, e.g., LED lights, for displaying signals. For example, an LED light 602 can indicate that the system is armed.
  • the keypad can include a transceiver, and using the transceiver, the keypad can be in communication with the control panel.
  • the keypad can transmit data and media files to the control panel, e.g., a security code or an image.
  • the keypad can receive data from the control panel, e.g., whether the system is armed.
  • the keypad can also receive data relating to the status of various accessory devices in communi cati on with the control panel .
  • the display of the keypad can display whether the battery of one of the accessory devices needs to be changed.
  • the keypad can receive the status data either form the control panel or the accessory devices.
  • the keypad can include a camera 603. Using the camera
  • the keypad 115 can take a photo of any person who is interested in disarming the control panel 101.
  • the keypad 115 can transmit the photo to the control panel 101.
  • the control panel 101 The control panel
  • Processing can include comparing the photo to a known photo of a person already stored in the system.
  • the keypad can include a fingerprint scanner.
  • the fingerprint scanner can scan a user’s fingerprint for arming or disarming the security system.
  • the keypad can determine whether the fingerprint of the user matches a fingerprint stored in the keypad. In other embodiments, the keypad can transmit the scanned finger print to the control panel (or the cloud) for comparing it to known fingerprints stored in the control panel (or the cloud).
  • the keypad can receive a voice command.
  • the keypad can include a microphone, which can record voice commands.
  • the microphone can be activated when a user speaks a preset word, e.g.,“activate.” In some embodiments, the microphone can be activated when a user presses a button on the keypad.
  • the keypad can record a phrase and either process the phrase on the keypad or transmit the phrase to the control panel or the cloud for processing.
  • the processing can include speech recognition, speaker recognition, etc.
  • the keypad, control panel or the cloud can perform a task specified in by command. For example, in response to the phrase“activate arm system,” the keypad can activate the microphone to recognize the phrase, record the phrase, identify the content of the phrase, and transmit a signal to the control panel to arm the system.
  • the keypad can receive wireless commands or files from a smart device.
  • the keypad can receive a command using a Bluetooth, Wi-Fi, cellular, CAT -M cellular or NFC technologies.
  • a user can transfer a command or file to the keypad and the keypad can relay the file to the control panel or the cloud for various purposes, e.g., arming or disarming the control panel.
  • the keypad can be battery operated.
  • the keypad can include a compartment for installing at least one batteiy.
  • the compartment can include a cover and the user can remove the cover to replace the battery.
  • the keypad can be an alarm device.
  • the keypad can include a speaker or a siren, and upon receiving an alarm signal from the control panel, the keypad can generate an alarm.
  • a tracker can be an accessory device in communication with the control panel.
  • Figure 7 shows a tracker 700 according to an example embodiment.
  • the tracker can be a fitness tracker, an activity tracker, a wearable device or a health monitoring device.
  • the tracker 700 can include a wristband 701 , a housing 702, a display 703 and an input button 704.
  • the display 703 can be an OLED, AMOLED, e-Ink, color paper ink, or other display screens known to persons of ordinary skill in the art.
  • the display screen can be a touchscreen device, which can enable the tracker to receive touch commands from the user.
  • the housing 702 can include processing circuitry such as a processor and a memory.
  • the housing 702 can also include a sensor and a transceiver.
  • the transceiver of the tracker can wirelessly send data to and receive data from various devices.
  • the transceiver can also use various localization techniques to determine an indoor location of the tracker and transmit the indoor location to a control panel.
  • the tracker 700 can detect data relating to the user.
  • the tracker can collect biological data from a user, and using the transceiver, the tracker can transmit the data to the control panel.
  • a tracker can include an accelerometer sensor, and using this sensor, the tracker can collect movement data from the user.
  • the tracker can transmit the movement data to the control panel, and the control panel can determine, e.g., that the user is sleeping.
  • the tracker can make the determination that the user is sleeping, and this determination can be transmitted to the control panel for further analysis or decision making.
  • the tracker can collect biological data from the user, and the tracker can transmit the data to the control panel.
  • the control panel can notify the authorities if any abnormality is detected.
  • the tracker can detect the heart rate of the user and periodically transmit the heart rate to the control panel. If the control panel detects an abnormality in the heart rate of the user, e.g., the user is having a stroke, the control panel can notify the authorities and ask for help.
  • the tracker can determine there is an abnormality in the collected biological data and the tracker can notify the control panel that an abnormality is detected. In response to this notification, the control panel can contact the relevant authorities (or transmit a signal to the cloud).
  • the tracker can determine if the user slips or falls.
  • This determination can be made using a sensor included in the tracker, e.g., an accelerometer sensor.
  • the tracker can fiuther determine whether the user is able to stand up after tailing down. If the user is unable to stand up after a threshold period of time, the tracker can notify the control panel and the control panel can contact the authorities for help. In some embodiments, the tracker can transmit data to the control panel and the control panel can determine whether the user has fallen, and whether the control panel should contact the relevant authorities.
  • control panel can make a phone call to a predetermined phone number and play a prerecorded message.
  • the call can be made using a cellular network.
  • control panel can send an electronic message to a third parly.
  • control panel can send an email or text message to the police or a relative of the user.
  • control panel can transmit a signal or a notification to a monitoring station.
  • the monitoring station can include a cloud interface which can receive the signal or notification. Based on the signal or notification, the monitoring station can take further actions, e.g., call the police.
  • the data that the tracker detects can be sent to the control panel, and the control panel can relay the data to a cloud.
  • the cloud can analyze the data and transmit a signal to the control panel based on the analysis. For example, if a tracker transmits sleeping data to a control panel, the control panel can transmit the data to the cloud, which can perform various data analysis techniques.
  • the cloud can transmit an expected sleeping time to the control panel.
  • the control panel can arm or disarm itself based on the expected sleeping time for the user.
  • a smart light bulb (“smart light”) can be an accessory device in communication with the control panel.
  • the smart light can include a wireless communication interface and the control panel can communicate with the smart light, e.g., the control panel can be paired with the smart light.
  • the control panel can provide a command to the smart light and the smart light can perform an action based on the command.
  • the control panel can command the smart light to turn on and off.
  • the control panel can command the smart light to flash for a period of time.
  • the control panel can command the smart light to change the color or intensity of the light emitted by the smart light.
  • the control panel can receive data from a smart light indicating whether the light is on or off. For example, each time a user manually turns the smart light on or off, the smart light can transmit a signal to the control panel. The control panel can evaluate the data and detect patterns. Alternatively, the control panel can transmit this data to a cloud, which can evaluate the data and detect patterns. For example, the cloud can predict a lighting schedule for the smart light. The cloud can transmit this schedule to the control panel and the control panel can operate the smart light based on this schedule.
  • a user can define a lighting schedule for the smart lights using the application. For example, the user can indicate the times when the user intends to turn on the smart lights and the limes when the user intends to turn off the smart lights.
  • the application can transmit the schedule to the control panel and the control panel can operate the smart lights according to the schedule.
  • the user can define a lighting schedule for a security zone and the control panel can operate the smart lights of the security zone according to the provided lighting schedule.
  • a smart light can be an alarm device.
  • the control panel can command the smart light to flash according to a predetermined pattern. This flashing can scare away the intruders.
  • an accessory device can be a sign mounted outside of a house.
  • the sign can include a light bulb with wireless connectivity.
  • the control panel is configured to communicate with the light bulb. In case the control panel detects an alarm condition, the control panel can command the sign to turn on or flash.
  • the sign can assist law enforcement to locate the house faster if and when an alarm is generated.
  • a speaker or a television can be an accessory device in communication with the control panel.
  • the speaker or the television can be paired with the control panel and the control can transmit commands and media files to these devices.
  • the control panel can transmit a command to the speaker or the television to generate an alarm.
  • the alarm can be, for example, playing a predetermined sound, music or video. Therefore, the speaker or the television can operate as an alarm device.
  • a smart speaker can be an accessory device.
  • the smart speaker can be a speaker and voice command device with an integrated virtual assistant that can offer interactive actions and handsfree activation.
  • the smart speaker can include a wireless communication interface compatible with Wi-Fi, Bluetooth or other wireless protocol standards.
  • the user can achieve many of the same functionalities that the user can accomplish using the application of the smart device.
  • the user can speak a command to the smart speaker, and in response, the smart speaker can transmit a signal to the control panel.
  • the signal can be similar to the signals that the application of the smart device can transmit to the control panel.
  • the smart speaker can transmit an arming signal to the control panel.
  • the user can speak a command to turn a specific smart light on and the smart speaker can transmit a signal to the control panel to turn the specific smart light on.
  • the user can create an arming or disarming event (or a schedule of triggering events) by speaking a command to the smart speaker.
  • the smart speaker can be an alarm device, and thus, in response to receiving an alarm command from the control panel, the smart speaker can generate an alarm.
  • the control panel can be paired with consumer electronics, which can operate as an alarm device.
  • the control panel can be paired with a device that has a speaker or a display screen, e.g., telephone, cell phone, laptops, desktop computer.
  • the control panel can use the device as a speaker or display screen to sound an alarm.
  • the control panel can also have a specific image displayed on the device when the control panel generates an alarm.
  • control panel can be paired with a device with wireless communication capability, and the device can operate as an alarm device.
  • the control panel can be paired with a toy such as a drone, and when the control panel receive a trigger signal, the control panel can transmit an alarm signal to the drone.
  • the drone can operate according to a predetermined mode of operation, e.g., flying at a height of 3 feet.
  • a control panel can operate in a plurality of states.
  • the control panel can operate in an armed state and a disarmed state.
  • a trigger signal can cause the control panel to generate an alarm.
  • the control panel might not generate an alarm in response to certain trigger signals.
  • a trigger signal can be a signal received from an accessory device at the control panel.
  • a motion sensor can generate a tri gger signal if the sensor detects motion in front of the sensor.
  • the control panel can generate an alarm by transmitting an alarm signal to an alarm device.
  • the control panel can transmit an alarm signal to a smart light and a speaker, and in response, the smart light can flash and the speaker can play a loud music.
  • the control panel can also generate an alarm by transmitting an alarm signal to the cloud, which can trigger certain events.
  • the control panel can always generate an alarm in response to receiving certain trigger signals.
  • the control panel can always trigger an alarm in response to receiving a trigger signal from a flood sensor. However, in these embodiments, trigger signals from a door or window sensor can be ignored if the control panel is not armed.
  • a user can arm or disarm the control panel using a passcode.
  • the user can provide the passcode through the keypad or the smart device, and these devices can transmit the passcode to the control panel (e.g., via a signal).
  • the control panel can analyze the passcode, and if accurate, the control panel can arm or disarm itself.
  • the user can provide the passcode through the keypad or smart device.
  • the keypad or smart device can transmit the passcode to the control panel, and the control panel can transmit the passcode to the cloud for processing. Once the cloud processes the passcode, the cloud can return a signal to the control panel.
  • the control panel can arm or disarm the control panel.
  • the smart device can transmit the passcode to the cloud and the cloud can process the passcode and transmit a signal to the control panel. Based on the signal, the control panel can arm or disarm the control panel.
  • the passcode can be an alphanumeric string.
  • the passcode can be a photo, video, or a file.
  • the keypad or the smart device can generate the passcode by, e.g., scanning a user’s biometric information.
  • the keypad or the smart device can scan a user’s fingerprint (or take the user’s photo) and use that as a passcode.
  • the control panel or the cloud can analyze or process the passcode. This analysis can be done, for example, to determine whether the user has provided the accurate passcode for arming or disarming the control panel. For example, the analysis can include comparing the passcode with another passcode previously stored on the control panel or the cloud during an initiation
  • the passcode can be a short video of a user making a few gestures and the cloud can process the video to determine the user’s gestures. If the user’s gestures are the same as the gestures stored in the cloud, the cloud can transmit a signal to the control panel to arm or disarm the control panel.
  • the processing can include object recognition techniques.
  • the passcode can include a photo (or video) of an object and the processing would determine the objects included in the photo (or video). If the object is the same as the object specified during the setup stage, the cloud or control panel can arm or disarm the system.
  • the control panel or the cloud can require multiple passcodes for arming or disarming the control panel. For example, in addition to a password, the control panel can require a photo of the user before disarming the control panel. Multi-factor authentication can enhance the security of the security system.
  • a user can arm or disarm individual security zones monitored by the control panel.
  • the user can arm or disarm less than all of the security zones.
  • the control panel can arm the system only as to the specified security zones. This can mean that an alarm signal can be generated when a trigger signal is received from a device located in the specified security zone.
  • the user can arm the control panel only for the living room zone. This can indicate that a trigger signal from a window sensor in the living room zone can trigger the control panel to generate an alarm signal, but a trigger signal from a window sensor in the bedroom zone can be ignored.
  • a control panel can arm or disarm the system in response to receiving a request signal from, e.g., a smart device, a keypad or a cloud. After receiving the request signal, the control panel can wait for a period of time before arming or disarming the system. There can be various techniques for determining the period of time. In one embodiment, the period of time is a predefined period of time specified by the application of the smart device or the keypad. For example, the user can require the control panel to wait 30 seconds before arming the system when the control panel receives the request signal.
  • the period of time can be defined by occurrence of a predefined event.
  • the user can specify that the period of time starts from the moment the control panel receives the signal requesting arming or disarming the system, and continues until a trigger signal of an accessory device is received at the control panel, e.g., a trigger signal from a door sensor installed on the front door.
  • the user can specify which accessory device or devices can transmit the trigger signal.
  • failure to receive a signal from the tracker can indicate that the user has left the house, and thus, failure to receive a signal from the tracker can be used by the control panel as an indication that the period has ended.
  • control panel can calculate the period of time based on past user habits. For example, the control panel can record the user’s actions after sending a request signal. The control panel can record when and what signals the control panel receives after a request signal. For example, the control panel can record that in one instance a trigger signal from a door sensor was received 30 seconds after receiving the request signal, and in another instance the trigger signal was received 1 minute after receiving the request signal.
  • the control panel can calculate the period of time.
  • the control panel can also determine the identity of the trigger signal that if it receives, the control panel will end the period of time. While in this disclosure the control panel is described as having the capability to make various calculations relating to the period of lime, in some embodiments, the control panel can transmit the information to the cloud for calculation and the cloud can provide the control panel with the calculated results. The control panel can arm or disarm the system based on the calculated results.
  • the control panel is configured to arm or disarm the system without receiving any instruction from the user, i.e., the control panel can automatically or autonomously arm or disarm the control panel
  • the control panel can arm the system if the control panel determines that the user is sleeping.
  • the control panel can receive tracker data, e.g., user movement data from the tracker. The control panel can evaluate the data and determine whether the user is asleep. If the control panel determines that the user is sleeping, the control panel can arm the system. Similarly, if the control panel is armed and the user is awake, the control panel can disarm itself.
  • the control panel in addition to (or instead of) tracker data, the control panel considers other factors in deciding whether to arm or disarm the system.
  • the control panel makes the decision partly based on the time of the decision-making. For example, the control panel can create a log indicating the sleeping habits of the user. Based on the information in the log, the control panel can calculate a time when the user most likely goes to bed (e.g., average time). If tracker data indicating that the user is asleep received when the user usually goes to bed, the control panel arms the system. However, if the tracker data is received at a time when the user usually does not go to bed, the control panel does not arm the system.
  • control panel can arm or disarm the system partly based on presence or absence of the tracker or another device within the detection range of the control panel. For example, the control panel can determine that the tracker is not in the detection range of the control panel, e.g., if the control panel does not receive data from the tracker for more than a predetermined period of time. If the tracker is not within a detection rang?; of the control panel, the control panel can determine that the user is not within the house.
  • control panel can arm the system.
  • control panel receives data from the tracker and the data indicates that the user is awake, the control panel will not arm the system.
  • control panel can arm or disarm the system based on a predefined schedule.
  • a user can define a schedule for the control panel using the application of a smart device.
  • the control panel can arm or disarm the system based on the schedule.
  • the control panel can arm or disarm the system at least for one security zone.
  • the control panel can arm or disarm the system only as to the zones that the user does not occupy.
  • the control panel can receive data from the tracker or the smart device, and based on this data, the control panel can determine which security zone the user stays in. Based on this determination, the control panel can activate all the security zones that the user does not occupy.
  • the triggering event for arming or disarming the control panel can be a predefined arming schedule. As the user moves from one zone into another zone, the control panel can receive data from the user’s tracker and determine the user’s movement.
  • control panel can arm the system as to the zone the user leaves and disarm the zone which the user enters.
  • the control panel can transmit a signal to an alarm device to generate an alarm.
  • the control panel can decide which alarm device($) to activate, e.g., which alarm devices to transmit an alarm signal to or what signal to transmit to the alarm devices.
  • the location of the device generating the trigger signal can determine which alarm devices can be activated. For example, if a motion sensor in a living room zone transmits a trigger signal, the control panel can activate all the alarm devices located in the living room zone.
  • the identity or type of the device generating the trigger signal can determine which alarm devices can be activated.
  • the user can define the types of alarm devices that can respond to a device generating a trigger signal. This definition can be provided on the application of the smart device. For example, the user can specify that when a trigger signal is received from a flood sensor, the control panel can activate all the smart lights to flash for a period of 5 minutes. As another example, the user can specify that in response to a flood sensor trigger signal, the alarm devices which are located in the user’s vicinity can be activated. For example, using various localization techniques, the tracker or smart device can transmit a location of the user to the control panel. Using the location data, the control panel can determine which security zone the user is located in. Based on this determination, the control panel can activate only the alarm devices that are located in the security zone that the user is located in.
  • control panel can manage the lighting inside a house.
  • the control panel can consider various factors in determining the lighting arrangement for the house, e.g., time, presence of a tracker device at the house, whether the user is asleep, whether the control panel is armed, etc.
  • the user can specify a lighting schedule on the application of the smart device.
  • the control panel can manage the lighting for various security zones based on a predefined schedule which defines when the lights are turned on and off.
  • An example schedule can require the lights in the living room to be on between the hours of 6-10 PM and otherwise be off.
  • the control panel can turn all the lights off if the tracker is not at the house during daytime.
  • the control panel can turn all the lights off, if the user falls asleep.
  • the user can turn off only the lights which are outside of the security zone that the user is occupying.
  • the control panel can turn the lights on and off according to a random pattern to create the impression that someone is at the house when the user is traveling.
  • the control panel can turn the lights on in the living room zone.
  • the control panel can receive data relating to the location where the user sleeps.
  • the control panel (or the cloud if transmitted by the control panel) can analyze this data and determine a usual sleeping location for the user.
  • the control panel (or the cloud) can also determine a usual sleeping time for the user. If a user fails asleep at the user’s usual sleeping time and at a location other than the user’s usual sleeping location, the control panel can transmit a signal to the lights in the security zone that the user is sleeping.
  • the signal can, e.g., make the lights flash for a predetermined period of time. This can help the user realize that the user has fallen asleep in the wrong location in the house.
  • Various accessory devices or sensors of security systems can trigger false alarms during bad weather conditions.
  • glass break detectors can trigger an alarm during a thunderstorm.
  • the control panel can receive weather related data from the cloud. Based on whether related data, the control panel can disconnect some of the accessory devices or sensors. For example, if thunderstorm is expected in an area, the control panel can receive data indicating the thunderstorm and the control panel can deactivate the detector based on this data. As another example, if thunderstorm is expected in an area, the control panel can receive data indicating that glass break detectors should be deactivated, and in response to this data, the control panel can deactivate the glass sensors.
  • the control panel can deactivate the accessory devices in several ways. In one embodiment, the control panel can ignore the trigger signals received from a deactivated accessory device. In another embodiment, the control panel can transmit a signal to an accessory device and require the device to stop transmitting trigger signals.
  • a control panel can receive weather data from the cloud and can check on certain accessory devices. For example, if flooding is expected, the control panel can transmit a signal to a flood sensor and ensure that the sensor has sufficient battery. If the sensor does not have enough battery, the control panel can generate an alarm.
  • Figure 8 illustrates exemplary hardware components a server of a service provider.
  • a computer system 800 may include and execute one or more subsystem components to perform functions described herein, including the steps of various flow processes described above.
  • a mobile device, a cell phone, a smartphone, a laptop, a desktop, a notebook, a tablet, a wearable device, a server, etc. which includes some of the same components of the computer system 800, may run an application
  • Computer system 800 may connect to a network 814, e.g., Internet, or other network, to receive inquires, obtain data, and transmit information and incentives as described above.
  • a network 814 e.g., Internet, or other network
  • the computer system 800 typically includes a memory 802, a secondary storage device
  • the computer system 800 may also include a plurality of processors
  • the computer system 800 may also include a network connection device 808, a display device 810, and an input device 812.
  • the memory 802 may include RAM or similar types of memory, and it may store one or more applications for execution by processor 806.
  • Secondary storage device 804 may include a hard disk drive, floppy disk drive, CD-ROM drive, or other types of non-volatile data storage.
  • Processor 806 executes the applications), such as those described herein, which are stored in memory 802 or secondary storage 804, or received from the Internet or other network
  • GUIs graphical user interlaces
  • the computer system 800 may store one or more database structures in the secondary storage 804, for example, for storing and maintaining the information necessary to perform the above-described functions. Alternatively, such information may be in storage devices separate from these components.
  • processor 806 may execute one or more software applications to provide the functions described in this specification, specifically to execute and perform the steps and functions in the process flows described above.
  • Such processes may be implemented in software, such as software modules, for execution by computers or other machines.
  • the GUIs may be formatted, for example, as web pages in HyperText Markup Language (HTML),
  • Extensible Markup Language or in any other sui table form for presentation on a display device depending upon applications used by users to interact with the computer system 800.
  • the input device 812 may include any device for entering information into the computer system 800, such as a touch-screen, keyboard, mouse, cursor-control device, microphone, digital camera, video recorder or camcorder.
  • the input and output device 812 may be used to enter information into GUIs during performance of the methods described above.
  • the display device 810 may include any type of device for presenting visual information such as, for example, a computer monitor or flat-screen display (or mobile device screen).
  • the display device 810 may display the GUIs and/or output from sub-system components (or software).
  • Examples of the computer system 800 include dedicated server computers, such as bladed servers, personal computers, laptop computers, notebook computers, palm top computers, network computers, mobile devices, or any processor-controlled device capable of executing a web browser or other type of application for interacting with the system.
  • dedicated server computers such as bladed servers, personal computers, laptop computers, notebook computers, palm top computers, network computers, mobile devices, or any processor-controlled device capable of executing a web browser or other type of application for interacting with the system.
  • system 800 may use multiple computer systems or servers as necessary or desired to support the users and may also use back-up or redundant servers to prevent network downtime in the event of a failure of a particular server.
  • computer system 800 is depicted with various components, one skilled in the art will appreciate that the system can contain additional or different components.
  • aspects of an implementation consistent with the above are described as being stored in a memory, one skilled in the art will appreciate that these aspects can also be stored on or read from other types of computer program products or computer-readable media, such as secondary storage devices, including hard disks, floppy disks, or CD-ROM; or other forms of RAM or ROM.
  • the computer-readable media may include instructions for controlling the computer system 800, to perform a particular method, such as methods described above.

Landscapes

  • Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Emergency Management (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Alarm Systems (AREA)

Abstract

A wireless home security system which can wirelessly interact with household devices is disclosed. The control panel can exchange data and signals with these devices. The control panel can operate the system based on the data received from these devices. The control panel can also command these devices to operate a smart home. The interconnectivity between the control panel and these devices provides for a robust system which can automate operation of the system and these household devices.

Description

SYSTEM AND APPARATUS FOR A HOME SECURITY SYSTEM
CROSS REFERENCE TO RELATED APPLICATION
[001] The present application claims the benefit of U.S. Patent Provisional Application No.
62/755,925, filed on November 5, 2018, the entire disclosure of which is incotporated herein by reference.
BACKGROUND
[002] Recent advancements in technology have drastically enhanced capabilities of home security systems, and as a result, these systems have become more powerful and effective than before. However, still many households remain without any form of home security system.
Installation cost remains the main impediment to implementing security systems in these households. In order to overcome these problems, some security companies offer do-it- yourself systems. These systems are durable and can be installed by the homeowners, thereby minimizing most of the expenses associated with installing or maintaining the system.
SUMMARY
[003] Some do-it-yourself systems can be wireless. Because these wireless systems do not require any wiring, homeowners can install them without the help of professionals. As a result, installation of do-it-yourself systems is easier and cheaper. As the do-it-yourself systems dominate the home security market, manufacturers of these systems arc lacing new challenges.
For example, typically do-it-yourself systems include a control panel. Because the control panel communicates wirelessly with other devices in the system, the wireless signal range of the control panel is crucial. Therefore, it is an object of this disclosure to describe a home security system with superior wireless signal coverage.
[004] Generally, control panels include a keypad to arm or disarm the system. However, the keypad can limit the wireless signal range of the control panel. Therefore, the control panel of this disclosure can have a superior signal range because, in some embodiments, the control panel does not include a keypad. Additionally, without the keypad, there can be additional space inside the housing of the control panel, and thus, one can reposition the antenna such that signal range of the control panel increases, e.g., by placing the antenna over the processing circuitry of the control panel.
[005] Additionally, wireless home security systems can interact with many household devices which have wireless connectivity. For example, a control panel can exchange data and signals with devices such as cellphones and fitness trackers, which traditionally are not connected to home security systems. It is an object of this disclosure to propose a security system which can receive data from these devices and operate the system based on the data. It is also an object of this disclosure to describe a control panel which can command and operate household devices such as smart lights and televisions. Traditionally, these devices are not connected to home security systems, and thus, the interconnectivity of the control panel with these devices provides for a robust system which can automate operation of the system and many household devices.
[006] It is also an object of this disclosure to describe a security system which can automatically arm and disarm itself. For example, the system can use various techniques for determining a user’s habits and operate the system to accommodate the user.
[007] It is also an object of this disclosure to introduce new authentication techniques for arming and disarming the system. Exemplary techniques that can be used for arming and disarming the system can include speech recognition, fecial recognition, etc.
BRIEF DESCRIPTION OF THE DRAWINGS [008] Figure 1 shows a security system according to an example embodiment
[009] Figure 2 shows a control panel according to an example embodiment.
[010] Figure 3 shows a page of a user interface of a software application of a smart device according to an example embodiment.
[011] Figure 4 shows another page of the user interface of the software application of the smart device according to an example embodiment.
[012] Figure 5 shows a page for defining a security zone inside a house using the application of the smart device.
[013] Figure 6 shows a keypad according to an example embodiment.
[014] Figure 7 shows a tracker according to an example embodiment.
[015] Figure 8 illustrates exemplary hardware components of a server.
DETAILED DESCRIPTION
Security System
[016] A security system according to an example embodiment of the present disclosure can include several components. For example, the security system can include a control panel.
The system can also include various accessory devices in communication with the control panel. Examples of these accessory devices can include sensors, keypads, cameras, lights, household appliances, and other devices which can interact with the control panel via a wireless communication interface.
[017] Figure 1 shows a security system 100 according to an example embodiment. In this example embodiment, the security system includes a control panel 101 and various accessory devices 110 such as a motion sensor 111, a tracker 112, a smart device 1 13 and a television
114. The control panel 101 can be in wireless communication with these accessory devices 110. For example, the control panel 101 can be paired with these accessory devices 110. The control panel can also be in communication with a cloud 120 or a server of a service provider.
The control panel 101 can exchange data, commands and files with the cloud 120 and the accessory devices 110.
Control Panel
[018] Figure 2 shows a control panel 101 according to an example embodiment. The control panel 101 can include a housing (containing, e.g., top housing 201 and bottom housing 202), a power supply 203, processing circuitry 204, a transceiver 205, an antenna 206. The processing circuitry 204 can include a processor and a memory. The memory of the processing circuitry 204 can store a firmware which when executed by the processor can control various functional aspects of the control panel 101 and the accessories connected to (or in communication with) the control panel.
[019] In an example embodiment, the control panel 101 does not include a keypad. A keypad can include materials and components that can limit the wireless communication range of the control panel. For example, a keypad can include glass and, all of which interfere with electromagnetic frequencies used for wireless communication. By not including the keypad on the control panel 101, the signal range of the control panel can increase. In this example embodiment, because the control panel 101 does not include a keypad, the housing of the control panel 101 can include additional space. For example, this additional space can be used to place the antenna 206 over the power supply 203, the processing circuitry 204 and the transceiver 205. This placement of the antenna 206 can also expand the wireless range of the control panel.
[020] The firmware of the control panel 101 can include a module for controlling the transceiver 205. The transceiver 205 can operate with radio, cellular, CAT-M cellular, Wi-Fi,
Bluetooth and communication frequencies or protocols. The module can enable the control panel 101 to receive and transmit data, signals and media files. The firmware can include a module for communication with a network such as the Internet. Using this module, the firmware can be in communication with a server of a service provider (or the cloud 120 of the service provider) and exchange data and files with the server. The firmware can also include a module for communication with accessory devices, e.g., the accessory devices 110.
[021] In some embodiments, the accessory devices 110 can be wirelessly connected to the control panel 101 , i.e., the module of the firmware can exchange data, signals or media files with each accessory device using a wireless communication protocol. In these embodiments, the user can pair an accessory device with the control panel 101.
[022] The control panel can receive data and commands from various accessory devices, and the control panel can transmit data and commands to these accessory devices. For example, an accessory device such as a motion detection sensor can detect a motion event and notify the control panel that a motion event has been delected, e.g., transmit a trigger signal to the control panel. In response, the control panel can trigger an alarm if the control panel is armed.
Otherwise, the control panel can ignore the notification. As another example, the control panel can receive data from a tracker and based on the tracker data, the control panel can arm the system. For example, the control panel can arm the system in nighttime if the tracker indicates that the user is sleeping. As yet another example embodiment, the control panel can notify a monitoring station if an alarm condition is detected. An alarm condition can be detected if, for example, an accessory device transmits a trigger signal indicating that the accessory device has detected unauthorized entry. [023] In an example embodiment, the control panel can include one or more sensors. For example, the control panel can include a motion sensor, a temperature sensor, a humidity sensor, etc. The control panel can use data from these sensors to generate an alarm. In some embodiments, the control panel can transmit the data to a smart device for display to a user.
In some embodiments, the control panel can include a keypad. The keypad can be located on the housing of the control panel or the keypad can be connected to the control panel via a wire connection.
Paring the Control Panel with Accessory Devices
[024] Pairing the control panel with an accessory device can establish an initial bonding between the control panel and the accessory device so that communication is allowed and facilitated between the two devices. In an example embodiment, the control panel can use
Bluetooth wireless technology standard or Wi-Fi technology standard for exchanging data and communication between the control panel and the accessory device. Use of other wireless technology standards such as cellular wireless, CAT-M cellular, Induction Wireless, Infrared
Wireless, Ultra Wideband, ZigBee, or a combination thereof is also conceivable.
[025] In one embodiment, the control panel and the accessory device can be paired through a network such as the Internet. For example, each of the control panel and the accessory device can connect to the Internet through a wireless connection or via a router or hub, and thus, the control panel can exchange data and communicate with the accessory device using the Internet
[026] In an example embodiment, during the pairing, a link key is used, which can be a shared secret known between the control panel and the accessory device. If both devices store the same link key, they are said to be paired or bonded. In some embodiments, it is possible to limit the communication of the accessory device only to a control panel that was previously paired with the accessory device. Such limitation can be implemented by cryptographical authentication of the identity of the control panel by the accessory device to ensure that the control panel is the control panel that was previously paired with the accessory device.
Protection against eavesdropping is also possible by encrypting the exchanged data between the control panel and the accessory device. Users can delete link keys from either device, which removes the bond between the devices. It is possible for one device to have a stored link key for a device with which it is no longer paired.
[027] There can be various implementations for pairing a control panel with an accessory device. In one embodiment, the user interface of the application can include a page for pairing accessory devices with the control panel. In other embodiments, each of the accessory devices can include a discoverability mode, which can be activated by pressing a button on the accessory device. Once in discoverability mode, the control panel can find the accessory device and pair the accessory device with the control panel. In another embodiment, the control panel can automatically find the accessory device once it is in the discoverability mode.
Other implementations are also possible.
Software Application for the Control Panel
[028] In an example embodiment, the control panel can be paired with a smart device. The smart device can be a smartphone, a cellphone, a laptop, a desktop, a notebook, a tablet, a wearable device, a tracker, or any other similar device. The smart device can include a software application (“application”), and by using the application, the user can adjust various settings or options of the control panel. Additionally, using the application, the user can provide various indoor location information to the control panel. The smart device can perform these functions (e.g., adjusting settings or providing location information) by transmitting a signal to the control panel. Alternatively, the smart device can perform these functions by transmitting a signal to a server of a service provider. The server can in turn transmit another signal to the control panel. For example, the smart device can directly transmit a signal to the control panel to establish a lighting schedule for a house. Alternatively, the smart device can send the signal to the server and the server can transmit another signal to the control panel to establish the lighting schedule.
Arming and Disarming the Control Panel
[029] Figure 3 shows a page 301 of a user interface 300 of a software application of the smart device 113 according to an example embodiment. The user interface 300 can include various pages, URL links, buttons and other similar controls. For example, the user interface 300 can include the page 301 for instructing the control panel 101 to arm or disarm security system
100. The user interface 300 can include an indicator 301 which can indicate whether the control panel 101 is armed or disarmed. The smart device can receive a signal from the control panel 101 or the cloud 120 which can inform the application about the status of the control panel 101.
[030] If the control panel 101 is disarmed, the application can include a button 303 for arming the control panel 101 and if the control panel 101 is armed, the application can include a button
302 for disarming the control panel 101. In this case, the control panel 101 is armed, and thus, button 302 is active and can enable the user to arm the control panel 101. Because the control panel 101 is disarmed, the button 303 is inactive.
List of Accessory Devices
[031[ In a® example embodiment, the user interface 300 can display a list of accessory devices 310 paired with the con trol panel 101. The list can further indicate the status of each accessory device connected to the control panel. For example, the list 310 can indicate that items 311-313 are paired with the control panel 101. These items can include the motion sensor
111, the tracker 1 12 and the television 114. The list indicates that the motion sensor 111 is active but has low battery; the tracker 112 is disconnected from the control panel 101 (e.g., the tracker 112 is outside of the detection range of the control panel 101, or the tracker 112 is deactivated by the smart device); and the television 1 14 is active. The smart device 113 can receive the status of each one of these accessory devices for the control panel 101, the cloud
120, or directly from each respective device.
Schedule for Arming or Disarming the System
[032] Figure 4 shows a page 401 of the user interface 300 of the software application of the smart device 1 13 according to an example embodiment. In this example embodiment, the application can include the page 401 for defining a schedule for arming or disarming the control panel 101. For example, a user can define a set of dates and times on which the control panel 101 can arm or disarm itself. The user can press the add event button 402, and upon pressing this button, the user can be prompted to select a time of a day, and the event that should occur at this time, e.g., on Monday, June 25, 2018 at 5 PM the control panel should arm itself. Additionally, the user can define whether the event can be repeated, e.g., every Monday at 5 PM the control panel 101 should arm itself. Once the user defines these parameters, the application can store this data as triggering events. In yet another example embodiment, the user can define a period of time during which the control panel can remain armed or disarmed.
For example, the user can require the control panel 101 to remain armed starting on Monday,
June 25, 2018 at 10 AM until 5 PM.
[033] ln 811 example embodiment, the page 401 can display a schedule of triggering events 410. The schedule 410 can be a list of triggering events defined by the user. In this example embodiment, the user has defined a disarming event for weekdays at 5 PM. The user has also defined an arming event for weekends at 10 PM. Additionally, the user has defined a disarming event for Monday, June 25, 2018 at 4 PM.
[034] When a user defines triggering events on the smart device 113, the application can transmit a schedule including all or some of the triggering events to the control panel 101 or the cloud 120. If the schedule is transmitted to the control panel, the control panel 101 can arm or disarm the control panel at the time of each triggering event. If the schedule is transmitted to the cloud 120, the cloud can transmit the schedule to the control panel 101.
Alternatively, at the time of each triggering event, the cloud can transmit a signal to the control panel 101 so that the control panel 101 implements the triggering event. In some embodiments, at the time of each triggering event, the smart device 113 transmits a signal to the control panel
101 or the cloud 120 to implement the triggering event.
[035] In an example embodiment, the control panel can include an internal policy for resolving conflicts relating to arming and disarming the control panel. For example, a user can define a period of time during which the control panel should remain disarmed. Yet at the same time, the control panel can receive data from a tracker indicating that the control panel should arm itself (or the control panel can conclude based on the data that it should arm itself).
The control panel can refer to the internal policy to resolve this conflict. In one embodiment, the user can define priorities for each triggering event. For example, the user can require the scheduled events to override other triggering events, e.g., tracker triggered events. In another embodiment, the user can require onetime events to override repeating events. In yet another embodiment, the user can allow the control panel to make a judgment. For example, the control panel can transmit to the cloud a history of the user commands indicating arming or disarming the control panel. In the cloud, a machine learning technique can be performed to train a model and the model can be transmitted to the control panel. The control panel can use the model to resolve these conflicts.
Security Zones
[036] fa an example embodiment, the application can include a page for defining various security zones within the house which includes the security system. Each zone can be an area of the house in which one or more devices such as accessory devices or the control panel are located. For example, a user can define a living room zone, a bedroom zone and a kitchen zone within a house. The user can also associate one or more accessory devices with each zone. For example, the user can specify that a motion sensor, a smoke detector, a television and several smart lights are located in the living room. The user can also specify a unique identification number associated with each one of these accessory devices. For example, the user can press a button on each one of these devices so that the device transmits the unique identification number associated with the device to the control panel or the smart device. Each one of these accessory devices can be paired with the control panel. The application can transfer a log to the control panel, and the log can include a description of each security zone and the identity of the devices included in each zone.
[037] Using the user defined security zones, the user can implement a selective alarm mode.
In this mode, the control panel can generate an alarm using a variety of alarm devices. The control panel can select different alarm devices for different alarm conditions. These alarm conditions can include, e.g., the type of device which triggers the alarm, the location of the device which triggers the alarm, etc. For example, the user can specify that if an event in zone A creates an alarm condition, the alarm devices in zone B will sound the alarm. As another example, the user can specify that if an event in zone A creates an alarm condition, only the devices in zone A will sound the alarm. As yet another example, the user can specify that if a flood sensor generates a trigger signal (or creates an alarm condition), all the alarm devices will generate an alarm.
[038] Figure 5 shows a page 501 for defining a security zone inside a house using the application of the smart device 113. The define zone page 501 can include a button 502 for adding new zones and a button 503 for adding devices to the zones. For example, when the user touches the button 502, the application can prompt the user to define a name and write a description for a new zone. Once completed, the application can display the defined zone in the list of zones and devices 510 section of the page 501.
[039] By touching the button 503, the user can add accessory devices to each zone. For example, once a user touches the button 503, the application prompts the user to select a zone.
In response, the user can select an already defined zone. Then, the user can be prompted to select an accessory device. In one embodiment, prior to prompting the user, the user can place an accessory device in discoverability mode. The application can display all accessory devices that are in discoverability mode, and enable the user to select one or more of these devices. In another embodiment, the user can manually enter an identification number of the accessory device. Other techniques can also be used by the user to add devices to a security zone.
[040] After adding accessory devices to one or more of the security zones, the page 501 can display the list of zones and devices 510 to the user. In the example embodiment of FIG. 5, the user has defined a living room security zone 521 and a bathroom security zone 522. The living room security zone 521 includes the motion sensor 1 11, the television 114 and the keypad 115. The bathroom security zone includes only a flood sensor 523.
Floor Plan far Security Zones
[041] In an example embodiment, the application can include an option for creating a floor plan for each security zone defined for the house. Various techniques can be used for this purpose. For example, the user can place the smart device in various locations in each room of the house. Using the sensors of the smart device (e.g., accelerometer and gyroscope), the application can create a floor plan for each room of the household. Additionally, the smartphone can combine the floor plans for all the rooms and create a consolidated floor plan for each floor of the house.
[042] In an example embodiment, the application can define the security zones in association with a floor plan. For example, in one example embodiment, a user can define each room as a security zone. Additionally, the user can specify the accessory devices mounted in each zone.
For example, the user can use the application to indicate that in a living room, there is a motion sensor, a smart light and a television. Furthermore, the user can specify an exact location on the floor plan where each accessory device is mounted. For example, after creating the floor plan for a room, the user can move around the room and place the user’s smart device next to each accessory device to define the location of the accessory device in the room. The application of the smart device can use various indoor-localization techniques to determine the location of the smart device relative to other locations in the house.
[043] The application can transmit the floor plan (and the data associated with it, c.g., the zones and the accessory devices included in each zone) to the control panel or server to implement a selective alarm mode. Accessory Devices
[044] An accessory device can be a sensor which generates a trigger signal tor the control panel to generate an alarm signal. An accessory device can also be an alarm device, which can receive an alarm signal form the control panel to generate an alarm.
Transceiver far Accessory Devices
[045] Some of the accessory devices disclosed herein can include wireless transceivers for transmitting signals to the control panel. The signals can include trigger signals and periodic signals. The trigger signals can indicate that the accessory device has detected a trigger event
(or an alarm condition). The control panel can trigger an alarm if it receives a trigger signal.
The periodic signals can be transmitted periodically. The periodic signals can indicate that the accessory device is functional and connected to (or in communication with) the control panel.
If the control panel fails to receive a periodic signal from an accessory device, this can indicate that the accessory device has been tampered with, and thus, the control panel can trigger an alarm.
Motion Sensors
[046] In an example embodiment, a motion sensor can be an accessory device in communication with the control panel. There are different types of motion sensors. Each one of these sensors can detect motion using a different technique. Once a motion sensor detects motion, it can transmit a trigger signal to the control panel (and the control panel can trigger an alarm). The motion sensor can include a transceiver for transmitting the signal to the control panel.
[047] In one embodiment, the motion sensor can be a Passive Infrared (PIR) motion sensor.
A PIR sensor can detect changes in the amount of infrared radiation received by its receivers. When an object passes in front of a background there can be a change in infrared radiation detected at that point in the sensor’s field of view. This can indicate that there has been a temperature fluctuation at that point in the sensor’s field of view, e.g., when a human appears in front of a wall, the detected infrared radiation can increase, thereby indicating that the temperature has increased, and when the human moves away from the wall, the detected infrared radiation can decrease, thereby indicating that the temperature has decreased. The sensor converts the resulting change in the incoming infrared radiation into a change in the output voltage, and this can indicate motion of an object (e.g., a person).
[048] In another embodiment, the motion sensor can be a microwave motion sensor. These sensors can send out microwave pulses and detect the pulses as they reflect from a target object.
If the object is moving relative to the microwave motion sensor, the frequency of the reflected microwave pulses can change. For example, when the object is approaching the motion sensor, the frequency of the returning waves can be higher than the frequency of the transmitted waves and when the object is moving away, the frequency of the returning waves can be lower. Based on this change in frequency, the microwave motion sensor can detect motion of an object. In another embodiment, the motion sensor can be an ultrasonic motion sensor. Similar to a microwave motion sensor, an ultrasonic motion sensor can send out pulses of ultrasonic waves and measure the reflection off a moving object. Based on changes in the frequency of the ultrasonic waves, the sensor can detect motion.
[049] In another embodiment, the motion sensor can be a dual technology motion sensor.
Dual technology motion sensors can include at least two independent sensors. For example, a dual technology motion sensor can include a PIR sensor and a microwave sensor. In this example sensor, in order for the sensor to be triggered, a motion event has to be detected by each of the PIR sensor and the microwave sensor. This dual detection requirement can reduce the number of false alarms detected by the dual technology motion sensor. In other example dual technology motion sensors, a motion event can be detected even if only one of the PIR sensor and the microwave sensor detects a motion event
[050] In another embodiment, the motion sensor can be an area reflective motion sensor. For example, an area reflective motion sensor can emit infrared rays from an LED. Using the reflection of those rays, the sensor can measure the distance to an object and detect if the object is within a designated area.
[051[ hi another embodiment, the motion sensor can be a vibration motion sensor. A vibration motion sensor can detect vibration, which can indicate that an object is moved neaiby the vibration motion sensor.
Door and Window Sensors
[052] In an example embodiment, a door or window sensor can be an accessory device in communication with the control panel. The door or window sensor can detect whether a door or window has been opened or closed. The door or window sensor can include a transceiver.
In response to this detection, the sensor can transmit a signal to the control panel. The control panel can trigger an alarm when the control panel is armed.
[053] In an example embodiment, the door or window sensor can include a reed switch.
Specifically, the sensor can include a magnet and a set of electrical connectors placed slightly apart. When the magnet is placed parallel to the electrical connectors, the magnet imposes a magnetic field on the electrical connectors and the magnet pulls the electrical connectors together, closing a circuit. If someone opens an armed door or window, the magnet is pulled away from the switch, which breaks the circuit and triggers an event. The sensor can transmit a signal to the control panel when an event is triggered.
Smoke Detectors
[054] In an example embodiment, a smoke detector can be an accessory device in communication with the control panel. The smoke detector can sense smoke, which can be an indicator of fire. The smoke detector can include a transceiver which can transmit a signal to the control panel. If the smoke detector detects smoke, it can transmit a signal to the control panel. In response, the control panel can trigger an alarm. In some embodiments, the smoke detector can include a speaker for generating an alarm. The speaker can be activated in response to a detection of smoke by the smoke detector or by a signal from the control panel.
[055] In an example embodiment, the smoke detector can use ionization process for detecting smoke. An ionization smoke detector can have a small amount of radioactive material between two electrically charged plates, which ionizes the air and causes current to flow between the plates. When smoke enters the chamber, it disrupts the flow of ions, thus reducing the flow of current. This can trigger the detector to transmit a signal to the control panel.
[056] In an example embodiment, the smoke detector can use an optical process to detect smoke. Optical smoke detectors aim a light source into a sensing chamber at an angle away from a sensor. When smoke enters the chamber, it reflects the light onto the light sensor, and thus the smoke detector can trigger an event.
Flood Detectors
[057] In an example embodiment, a flood detector can be an accessory device in communication with the control panel. The flood detector can determine presence of water in its surrounding and can transmit a signal to the control panel if water is detected.
[058] In an example embodiment, a flood detector can include two contacts. The contacts are separated, and thus, there is resistance across the two contacts. These contacts can lay flat on a floor. When there is water near the contacts, the resistance across two contacts decreases.
The flood detector can then transmit a signal to the control panel to indicate possible flooding.
In some embodiments, the flood detector can include a speaker for generating an alarm.
Cameras
[059] In an example embodiment, a camera can be an accessory device in communication with the control panel. The camera can be a standalone camera or it can be a camera included in another device, e.g., smart device, cell phone, laptop, tracker, wearable device, etc. The camera can record a photo, video, media file, or other type of file (“data") and transmit the data to the control panel. The camera can also stream videos to the control panel.
[060] In some embodiments, the firmware of the control panel is configured to process and analyze the incoming data. In some embodiments, the firmware of the control panel is configured to transmit the data to a server (or cloud) and the server (or cloud) can analyze or process the data.
[061] In an example embodiment, the camera can be placed near the entrance door. The camera can record images or video of a person at the door, e.g., when a button is pressed or when the camera’s motion detector notices movement at the door. The camera can transmit these images (or video) to the control panel. The control panel can analyze the incoming images (or the control panel can transmit the incoming images to the cloud for analysis). If the control panel identifies the user’s face in the images (or if the control panel receives a signal from the cloud indicating that the user’s face was identified in the images), the control panel can disarm the system.
[062] In an example embodiment, a camera can be an alarm device. For example, in response to receiving a trigger signal from an accessory device, the control panel can transmit an alarm signal to the camera to record the events observable by the camera. This recording can be helpfiil in deconstructing an accident or crime scene.
Keypad
[063] In an example embodiment, a keypad can be an accessory device in communication with the control panel. Figure 6 shows a keypad 115 according to an example embodiment.
The keypad 1 15 can include a plurality of keys 601 for inputting a passcode, arming the control panel, or disarming it. In some embodiments, the keypad can include a display for displaying the current state of the system, e.g., armed, disarmed, etc. In some embodiments, the keypad can include one or more indicators 602, e.g., LED lights, for displaying signals. For example, an LED light 602 can indicate that the system is armed.
[064] In an example embodiment, the keypad can include a transceiver, and using the transceiver, the keypad can be in communication with the control panel. The keypad can transmit data and media files to the control panel, e.g., a security code or an image. The keypad can receive data from the control panel, e.g., whether the system is armed. The keypad can also receive data relating to the status of various accessory devices in communi cati on with the control panel . For example, the display of the keypad can display whether the battery of one of the accessory devices needs to be changed. The keypad can receive the status data either form the control panel or the accessory devices.
[065] In an example embodiment, the keypad can include a camera 603. Using the camera
603, the keypad 115 can take a photo of any person who is interested in disarming the control panel 101. The keypad 115 can transmit the photo to the control panel 101. The control panel
10.1 can process the photo or it can transmit the photo to the cloud 120 for processing. Processing can include comparing the photo to a known photo of a person already stored in the system.
[066] In an example embodiment, the keypad can include a fingerprint scanner. The fingerprint scanner can scan a user’s fingerprint for arming or disarming the security system.
In some embodiments, the keypad can determine whether the fingerprint of the user matches a fingerprint stored in the keypad. In other embodiments, the keypad can transmit the scanned finger print to the control panel (or the cloud) for comparing it to known fingerprints stored in the control panel (or the cloud).
[067] In an example embodiment, the keypad can receive a voice command. The keypad can include a microphone, which can record voice commands. The microphone can be activated when a user speaks a preset word, e.g.,“activate.” In some embodiments, the microphone can be activated when a user presses a button on the keypad. The keypad can record a phrase and either process the phrase on the keypad or transmit the phrase to the control panel or the cloud for processing. The processing can include speech recognition, speaker recognition, etc. After processing the command, the keypad, control panel or the cloud can perform a task specified in by command. For example, in response to the phrase“activate arm system,” the keypad can activate the microphone to recognize the phrase, record the phrase, identify the content of the phrase, and transmit a signal to the control panel to arm the system.
[068] In an example embodiment, the keypad can receive wireless commands or files from a smart device. For example, the keypad can receive a command using a Bluetooth, Wi-Fi, cellular, CAT -M cellular or NFC technologies. In an example embodiment, a user can transfer a command or file to the keypad and the keypad can relay the file to the control panel or the cloud for various purposes, e.g., arming or disarming the control panel. [069] I·1 811 example embodiment, the keypad can be battery operated. The keypad can include a compartment for installing at least one batteiy. The compartment can include a cover and the user can remove the cover to replace the battery.
[070] In ¥ example embodiment, the keypad can be an alarm device. The keypad can include a speaker or a siren, and upon receiving an alarm signal from the control panel, the keypad can generate an alarm.
Trackers
[071] In an example embodiment, a tracker can be an accessory device in communication with the control panel. Figure 7 shows a tracker 700 according to an example embodiment.
The tracker can be a fitness tracker, an activity tracker, a wearable device or a health monitoring device.
[072] The tracker 700 can include a wristband 701 , a housing 702, a display 703 and an input button 704. The display 703 can be an OLED, AMOLED, e-Ink, color paper ink, or other display screens known to persons of ordinary skill in the art. The display screen can be a touchscreen device, which can enable the tracker to receive touch commands from the user.
[073] The housing 702 can include processing circuitry such as a processor and a memory.
The housing 702 can also include a sensor and a transceiver. The transceiver of the tracker can wirelessly send data to and receive data from various devices. The transceiver can also use various localization techniques to determine an indoor location of the tracker and transmit the indoor location to a control panel.
[074] Using the sensor, the tracker 700 can detect data relating to the user. For example, the tracker can collect biological data from a user, and using the transceiver, the tracker can transmit the data to the control panel. For example, a tracker can include an accelerometer sensor, and using this sensor, the tracker can collect movement data from the user. The tracker can transmit the movement data to the control panel, and the control panel can determine, e.g., that the user is sleeping. In some embodiments, the tracker can make the determination that the user is sleeping, and this determination can be transmitted to the control panel for further analysis or decision making.
[075] In another example embodiment, the tracker can collect biological data from the user, and the tracker can transmit the data to the control panel. The control panel can notify the authorities if any abnormality is detected. For example, the tracker can detect the heart rate of the user and periodically transmit the heart rate to the control panel. If the control panel detects an abnormality in the heart rate of the user, e.g., the user is having a stroke, the control panel can notify the authorities and ask for help. In some embodiments, the tracker can determine there is an abnormality in the collected biological data and the tracker can notify the control panel that an abnormality is detected. In response to this notification, the control panel can contact the relevant authorities (or transmit a signal to the cloud).
[076] ln another example embodiment, the tracker can determine if the user slips or falls.
This determination can be made using a sensor included in the tracker, e.g., an accelerometer sensor. The tracker can fiuther determine whether the user is able to stand up after tailing down. If the user is unable to stand up after a threshold period of time, the tracker can notify the control panel and the control panel can contact the authorities for help. In some embodiments, the tracker can transmit data to the control panel and the control panel can determine whether the user has fallen, and whether the control panel should contact the relevant authorities.
[077] There can be several techniques for the control panel to notify the authorities. In an example embodiment, the control panel can make a phone call to a predetermined phone number and play a prerecorded message. The call can be made using a cellular network. In another example embodiment, the control panel can send an electronic message to a third parly.
For example, the control panel can send an email or text message to the police or a relative of the user. As another example, the control panel can transmit a signal or a notification to a monitoring station. The monitoring station can include a cloud interface which can receive the signal or notification. Based on the signal or notification, the monitoring station can take further actions, e.g., call the police.
[078] While various functionalities of the tracker were described in connection with transmitting the data to the control panel, one of ordinary skill in the art recognizes that the data that the tracker detects can be sent to the control panel, and the control panel can relay the data to a cloud. The cloud can analyze the data and transmit a signal to the control panel based on the analysis. For example, if a tracker transmits sleeping data to a control panel, the control panel can transmit the data to the cloud, which can perform various data analysis techniques.
Based on the data analysis, the cloud can transmit an expected sleeping time to the control panel. The control panel can arm or disarm itself based on the expected sleeping time for the user.
Smart Light Bulbs
[079] In an example embodiment, a smart light bulb (“smart light”) can be an accessory device in communication with the control panel. The smart light can include a wireless communication interface and the control panel can communicate with the smart light, e.g., the control panel can be paired with the smart light. The control panel can provide a command to the smart light and the smart light can perform an action based on the command. For example, the control panel can command the smart light to turn on and off. As another example, the control panel can command the smart light to flash for a period of time. As yet another example embodiment, the control panel can command the smart light to change the color or intensity of the light emitted by the smart light.
[080] In an example embodiment, the control panel can receive data from a smart light indicating whether the light is on or off. For example, each time a user manually turns the smart light on or off, the smart light can transmit a signal to the control panel. The control panel can evaluate the data and detect patterns. Alternatively, the control panel can transmit this data to a cloud, which can evaluate the data and detect patterns. For example, the cloud can predict a lighting schedule for the smart light. The cloud can transmit this schedule to the control panel and the control panel can operate the smart light based on this schedule.
[081] In an example embodiment, a user can define a lighting schedule for the smart lights using the application. For example, the user can indicate the times when the user intends to turn on the smart lights and the limes when the user intends to turn off the smart lights. The application can transmit the schedule to the control panel and the control panel can operate the smart lights according to the schedule. In an example embodiment, the user can define a lighting schedule for a security zone and the control panel can operate the smart lights of the security zone according to the provided lighting schedule.
[082] In one embodiment, a smart light can be an alarm device. For example, when the control panel detects an alarm condition, the control panel can command the smart light to flash according to a predetermined pattern. This flashing can scare away the intruders.
Additionally, traditional alarm systems tend to use speakers or sirens inside the house.
However, these devices cannot be heard outside of the house. Therefore, using house lights as an alarm device can be a new mean to notify the people outside of the house that the alarm is activated.
[083] fa an example embodiment, an accessory device can be a sign mounted outside of a house. The sign can include a light bulb with wireless connectivity. The control panel is configured to communicate with the light bulb. In case the control panel detects an alarm condition, the control panel can command the sign to turn on or flash. The sign can assist law enforcement to locate the house faster if and when an alarm is generated.
Speakers, Smart Speakers and other Devices
[084] In an example embodiment, a speaker or a television can be an accessory device in communication with the control panel. For example, the speaker or the television can be paired with the control panel and the control can transmit commands and media files to these devices.
If an alarm condition is detected, the control panel can transmit a command to the speaker or the television to generate an alarm. The alarm can be, for example, playing a predetermined sound, music or video. Therefore, the speaker or the television can operate as an alarm device.
[085] In an example embodiment, a smart speaker can be an accessory device. The smart speaker can be a speaker and voice command device with an integrated virtual assistant that can offer interactive actions and handsfree activation. The smart speaker can include a wireless communication interface compatible with Wi-Fi, Bluetooth or other wireless protocol standards. Using the speaker, the user can achieve many of the same functionalities that the user can accomplish using the application of the smart device. In an example embodiment, the user can speak a command to the smart speaker, and in response, the smart speaker can transmit a signal to the control panel. The signal can be similar to the signals that the application of the smart device can transmit to the control panel. [086] For example, in response to a command asking for arming the system, the smart speaker can transmit an arming signal to the control panel. As another example, the user can speak a command to turn a specific smart light on and the smart speaker can transmit a signal to the control panel to turn the specific smart light on. As yet another example embodiment, the user can create an arming or disarming event (or a schedule of triggering events) by speaking a command to the smart speaker. In some embodiments, the smart speaker can be an alarm device, and thus, in response to receiving an alarm command from the control panel, the smart speaker can generate an alarm.
[087] hi an example embodiment, the control panel can be paired with consumer electronics, which can operate as an alarm device. For example, the control panel can be paired with a device that has a speaker or a display screen, e.g., telephone, cell phone, laptops, desktop computer. When an alarm condition is detected, the control panel can use the device as a speaker or display screen to sound an alarm. The control panel can also have a specific image displayed on the device when the control panel generates an alarm.
[088] In an example embodiment, the control panel can be paired with a device with wireless communication capability, and the device can operate as an alarm device. For example, the control panel can be paired with a toy such as a drone, and when the control panel receive a trigger signal, the control panel can transmit an alarm signal to the drone. Using the alarm signal, the drone can operate according to a predetermined mode of operation, e.g., flying at a height of 3 feet.
Functionalities of the Control Device
Arming and Disarming
[089] In an example embodiment, a control panel can operate in a plurality of states. For example, the control panel can operate in an armed state and a disarmed state. When in the armed stale, a trigger signal can cause the control panel to generate an alarm. When in the disarmed stale, the control panel might not generate an alarm in response to certain trigger signals. A trigger signal can be a signal received from an accessory device at the control panel.
For example, a motion sensor can generate a tri gger signal if the sensor detects motion in front of the sensor.
[090] The control panel can generate an alarm by transmitting an alarm signal to an alarm device. For example, the control panel can transmit an alarm signal to a smart light and a speaker, and in response, the smart light can flash and the speaker can play a loud music. The control panel can also generate an alarm by transmitting an alarm signal to the cloud, which can trigger certain events. The control panel can always generate an alarm in response to receiving certain trigger signals. For example, in some embodiments, the control panel can always trigger an alarm in response to receiving a trigger signal from a flood sensor. However, in these embodiments, trigger signals from a door or window sensor can be ignored if the control panel is not armed.
[091] In an example embodiment, a user can arm or disarm the control panel using a passcode. There can be several techniques for doing so. For example, in one embodiment, the user can provide the passcode through the keypad or the smart device, and these devices can transmit the passcode to the control panel (e.g., via a signal). In response to receiving the passcode, the control panel can analyze the passcode, and if accurate, the control panel can arm or disarm itself. In another embodiment, the user can provide the passcode through the keypad or smart device. The keypad or smart device can transmit the passcode to the control panel, and the control panel can transmit the passcode to the cloud for processing. Once the cloud processes the passcode, the cloud can return a signal to the control panel. Based on the returned signal, the control panel can arm or disarm the control panel. In yet another embodiment, the smart device can transmit the passcode to the cloud and the cloud can process the passcode and transmit a signal to the control panel. Based on the signal, the control panel can arm or disarm the control panel.
[092] In one example embodiment, the passcode can be an alphanumeric string. In another example, the passcode can be a photo, video, or a file. In some embodiments, the keypad or the smart device can generate the passcode by, e.g., scanning a user’s biometric information.
For example, the keypad or the smart device can scan a user’s fingerprint (or take the user’s photo) and use that as a passcode.
[093] In an example embodiment, once the control panel or the cloud receive the passcode, the control panel or the cloud can analyze or process the passcode. This analysis can be done, for example, to determine whether the user has provided the accurate passcode for arming or disarming the control panel. For example, the analysis can include comparing the passcode with another passcode previously stored on the control panel or the cloud during an initiation
(or setup) stage. As another example, the passcode can be a short video of a user making a few gestures and the cloud can process the video to determine the user’s gestures. If the user’s gestures are the same as the gestures stored in the cloud, the cloud can transmit a signal to the control panel to arm or disarm the control panel. As yet another example, the processing can include object recognition techniques. The passcode can include a photo (or video) of an object and the processing would determine the objects included in the photo (or video). If the object is the same as the object specified during the setup stage, the cloud or control panel can arm or disarm the system. [094] In some embodiments, the control panel or the cloud can require multiple passcodes for arming or disarming the control panel. For example, in addition to a password, the control panel can require a photo of the user before disarming the control panel. Multi-factor authentication can enhance the security of the security system.
[095] In some embodiments, a user can arm or disarm individual security zones monitored by the control panel. In other words, the user can arm or disarm less than all of the security zones. For example, using the application of the smart device or the keypad, the user can specify which security zones the user desires to arm. Once the control panel receives this information, the control panel can arm the system only as to the specified security zones. This can mean that an alarm signal can be generated when a trigger signal is received from a device located in the specified security zone. For example, the user can arm the control panel only for the living room zone. This can indicate that a trigger signal from a window sensor in the living room zone can trigger the control panel to generate an alarm signal, but a trigger signal from a window sensor in the bedroom zone can be ignored.
[096] In an example embodiment, a control panel can arm or disarm the system in response to receiving a request signal from, e.g., a smart device, a keypad or a cloud. After receiving the request signal, the control panel can wait for a period of time before arming or disarming the system. There can be various techniques for determining the period of time. In one embodiment, the period of time is a predefined period of time specified by the application of the smart device or the keypad. For example, the user can require the control panel to wait 30 seconds before arming the system when the control panel receives the request signal.
[097] In another embodiment, the period of time can be defined by occurrence of a predefined event. For example, the user can specify that the period of time starts from the moment the control panel receives the signal requesting arming or disarming the system, and continues until a trigger signal of an accessory device is received at the control panel, e.g., a trigger signal from a door sensor installed on the front door. The user can specify which accessory device or devices can transmit the trigger signal. As another example, failure to receive a signal from the tracker can indicate that the user has left the house, and thus, failure to receive a signal from the tracker can be used by the control panel as an indication that the period has ended.
[098] In yet another embodiment, the control panel can calculate the period of time based on past user habits. For example, the control panel can record the user’s actions after sending a request signal. The control panel can record when and what signals the control panel receives after a request signal. For example, the control panel can record that in one instance a trigger signal from a door sensor was received 30 seconds after receiving the request signal, and in another instance the trigger signal was received 1 minute after receiving the request signal.
Based on this information, the control panel can calculate the period of time. The control panel can also determine the identity of the trigger signal that if it receives, the control panel will end the period of time. While in this disclosure the control panel is described as having the capability to make various calculations relating to the period of lime, in some embodiments, the control panel can transmit the information to the cloud for calculation and the cloud can provide the control panel with the calculated results. The control panel can arm or disarm the system based on the calculated results.
[099] Although some of the features of the control panel have been described with respect to either arming or disarming the control panel, one of ordinary skill in the art recognizes that these features are not exclusive, and thus, to the extend not explicitly described, one of ordinary skill in the art recognizes that the features of arming the control panel can equally apply to disarming the control panel and vice versa.
Automatic Arming and Disarming Feature
[100] In an example embodiment, the control panel is configured to arm or disarm the system without receiving any instruction from the user, i.e., the control panel can automatically or autonomously arm or disarm the control panel In one example embodiment, the control panel can arm the system if the control panel determines that the user is sleeping. There can be several techniques for determining whether the user is sleeping. For example, the control panel can receive tracker data, e.g., user movement data from the tracker. The control panel can evaluate the data and determine whether the user is asleep. If the control panel determines that the user is sleeping, the control panel can arm the system. Similarly, if the control panel is armed and the user is awake, the control panel can disarm itself.
[101] In an example embodiment, in addition to (or instead of) tracker data, the control panel considers other factors in deciding whether to arm or disarm the system. In one embodiment, the control panel makes the decision partly based on the time of the decision-making. For example, the control panel can create a log indicating the sleeping habits of the user. Based on the information in the log, the control panel can calculate a time when the user most likely goes to bed (e.g., average time). If tracker data indicating that the user is asleep received when the user usually goes to bed, the control panel arms the system. However, if the tracker data is received at a time when the user usually does not go to bed, the control panel does not arm the system.
[102] In yet another example embodiment, the control panel can arm or disarm the system partly based on presence or absence of the tracker or another device within the detection range of the control panel. For example, the control panel can determine that the tracker is not in the detection range of the control panel, e.g., if the control panel does not receive data from the tracker for more than a predetermined period of time. If the tracker is not within a detection rang?; of the control panel, the control panel can determine that the user is not within the house.
Thus, the control panel can arm the system. As another example, if the control panel receives data from the tracker and the data indicates that the user is awake, the control panel will not arm the system.
[103] In yet another example embodiment, the control panel can arm or disarm the system based on a predefined schedule. For example, a user can define a schedule for the control panel using the application of a smart device. The control panel can arm or disarm the system based on the schedule.
[104] In an example embodiment, the control panel can arm or disarm the system at least for one security zone. For example, the control panel can arm or disarm the system only as to the zones that the user does not occupy. The control panel can receive data from the tracker or the smart device, and based on this data, the control panel can determine which security zone the user stays in. Based on this determination, the control panel can activate all the security zones that the user does not occupy. The triggering event for arming or disarming the control panel can be a predefined arming schedule. As the user moves from one zone into another zone, the control panel can receive data from the user’s tracker and determine the user’s movement.
Based on this movement data, the control panel can arm the system as to the zone the user leaves and disarm the zone which the user enters.
Customizing the Alarm for the Security System
[105] The control panel can transmit a signal to an alarm device to generate an alarm.
Depending on various factors, including the trigger signal, the control panel can decide which alarm device($) to activate, e.g., which alarm devices to transmit an alarm signal to or what signal to transmit to the alarm devices.
[106] In an example embodiment, the location of the device generating the trigger signal can determine which alarm devices can be activated. For example, if a motion sensor in a living room zone transmits a trigger signal, the control panel can activate all the alarm devices located in the living room zone.
[107] In an example embodiment, the identity or type of the device generating the trigger signal can determine which alarm devices can be activated. The user can define the types of alarm devices that can respond to a device generating a trigger signal. This definition can be provided on the application of the smart device. For example, the user can specify that when a trigger signal is received from a flood sensor, the control panel can activate all the smart lights to flash for a period of 5 minutes. As another example, the user can specify that in response to a flood sensor trigger signal, the alarm devices which are located in the user’s vicinity can be activated. For example, using various localization techniques, the tracker or smart device can transmit a location of the user to the control panel. Using the location data, the control panel can determine which security zone the user is located in. Based on this determination, the control panel can activate only the alarm devices that are located in the security zone that the user is located in.
Lighting Management
[108] I11 311 example embodiment, the control panel can manage the lighting inside a house.
The control panel can consider various factors in determining the lighting arrangement for the house, e.g., time, presence of a tracker device at the house, whether the user is asleep, whether the control panel is armed, etc. In an example embodiment, the user can specify a lighting schedule on the application of the smart device. For example, the user can specify that the control panel can manage the lighting for various security zones based on a predefined schedule which defines when the lights are turned on and off. An example schedule can require the lights in the living room to be on between the hours of 6-10 PM and otherwise be off. As another example, the control panel can turn all the lights off if the tracker is not at the house during daytime. As yet another example embodiment, at night time, the control panel can turn all the lights off, if the user falls asleep. As yet another example embodiment, the user can turn off only the lights which are outside of the security zone that the user is occupying. As yet another example embodiment, the control panel can turn the lights on and off according to a random pattern to create the impression that someone is at the house when the user is traveling. As yet another example embodiment, when the user is not at home and the control panel is armed, the control panel can turn the lights on in the living room zone.
[109] As yet another example embodiment, the control panel can receive data relating to the location where the user sleeps. The control panel (or the cloud if transmitted by the control panel) can analyze this data and determine a usual sleeping location for the user. The control panel (or the cloud) can also determine a usual sleeping time for the user. If a user fails asleep at the user’s usual sleeping time and at a location other than the user’s usual sleeping location, the control panel can transmit a signal to the lights in the security zone that the user is sleeping.
The signal can, e.g., make the lights flash for a predetermined period of time. This can help the user realize that the user has fallen asleep in the wrong location in the house.
Weather Data
[110] Various accessory devices or sensors of security systems can trigger false alarms during bad weather conditions. For example, glass break detectors can trigger an alarm during a thunderstorm. In an example embodiment, the control panel can receive weather related data from the cloud. Based on whether related data, the control panel can disconnect some of the accessory devices or sensors. For example, if thunderstorm is expected in an area, the control panel can receive data indicating the thunderstorm and the control panel can deactivate the detector based on this data. As another example, if thunderstorm is expected in an area, the control panel can receive data indicating that glass break detectors should be deactivated, and in response to this data, the control panel can deactivate the glass sensors.
[111] The control panel can deactivate the accessory devices in several ways. In one embodiment, the control panel can ignore the trigger signals received from a deactivated accessory device. In another embodiment, the control panel can transmit a signal to an accessory device and require the device to stop transmitting trigger signals.
[112] Some weather conditions can cause predictable damage to the house. For example, heavy rains can cause flooding. In an example embodiment, a control panel can receive weather data from the cloud and can check on certain accessory devices. For example, if flooding is expected, the control panel can transmit a signal to a flood sensor and ensure that the sensor has sufficient battery. If the sensor does not have enough battery, the control panel can generate an alarm.
Technical Implementation of the Server
[113] Figure 8 illustrates exemplary hardware components a server of a service provider. A computer system 800, or other computer systems similarly configured, may include and execute one or more subsystem components to perform functions described herein, including the steps of various flow processes described above. Likewise, a mobile device, a cell phone, a smartphone, a laptop, a desktop, a notebook, a tablet, a wearable device, a server, etc., which includes some of the same components of the computer system 800, may run an application
(or software) and perform the steps and functionalities described above. Computer system 800 may connect to a network 814, e.g., Internet, or other network, to receive inquires, obtain data, and transmit information and incentives as described above.
[114] The computer system 800 typically includes a memory 802, a secondary storage device
804, and a processor 806. The computer system 800 may also include a plurality of processors
806 and be configured as a plurality of, bladed servers, or other known server configurations. The computer system 800 may also include a network connection device 808, a display device 810, and an input device 812.
[115] The memory 802 may include RAM or similar types of memory, and it may store one or more applications for execution by processor 806. Secondary storage device 804 may include a hard disk drive, floppy disk drive, CD-ROM drive, or other types of non-volatile data storage. Processor 806 executes the applications), such as those described herein, which are stored in memory 802 or secondary storage 804, or received from the Internet or other network
814. The processing by processor 806 may be implemented in software, such as software modules, for execution by computers or other machines. These applications preferably include instructions executable to perform the system and subsystem component functions and methods described above and illustrated in the FIGS, herein. The applications preferably provide graphical user interlaces (GUIs) through which users may view and interact with subsystem components.
[116] The computer system 800 may store one or more database structures in the secondary storage 804, for example, for storing and maintaining the information necessary to perform the above-described functions. Alternatively, such information may be in storage devices separate from these components.
[117] Also, as noted, processor 806 may execute one or more software applications to provide the functions described in this specification, specifically to execute and perform the steps and functions in the process flows described above. Such processes may be implemented in software, such as software modules, for execution by computers or other machines. The GUIs may be formatted, for example, as web pages in HyperText Markup Language (HTML),
Extensible Markup Language (XML) or in any other sui table form for presentation on a display device depending upon applications used by users to interact with the computer system 800.
[118] The input device 812 may include any device for entering information into the computer system 800, such as a touch-screen, keyboard, mouse, cursor-control device, microphone, digital camera, video recorder or camcorder. The input and output device 812 may be used to enter information into GUIs during performance of the methods described above. The display device 810 may include any type of device for presenting visual information such as, for example, a computer monitor or flat-screen display (or mobile device screen). The display device 810 may display the GUIs and/or output from sub-system components (or software).
[119] Examples of the computer system 800 include dedicated server computers, such as bladed servers, personal computers, laptop computers, notebook computers, palm top computers, network computers, mobile devices, or any processor-controlled device capable of executing a web browser or other type of application for interacting with the system.
[120] Although only one computer system 800 is shown in detail, system 800 may use multiple computer systems or servers as necessary or desired to support the users and may also use back-up or redundant servers to prevent network downtime in the event of a failure of a particular server. In addition, although computer system 800 is depicted with various components, one skilled in the art will appreciate that the system can contain additional or different components. In addition, although aspects of an implementation consistent with the above are described as being stored in a memory, one skilled in the art will appreciate that these aspects can also be stored on or read from other types of computer program products or computer-readable media, such as secondary storage devices, including hard disks, floppy disks, or CD-ROM; or other forms of RAM or ROM. The computer-readable media may include instructions for controlling the computer system 800, to perform a particular method, such as methods described above.
[121] The present disclosure is not to be limited in terms of the particular embodiments described in this application, which are intended as illustrations of various aspects. Many modifications and variations can be made without departing from its spirit and scope, as may be apparent Functionally equivalent methods and apparatuses within the scope of the disclosure, in addition to those enumerated herein, may be apparent from the foregoing representative descriptions. Such modifications and variations are intended to fall within the scope of the appended representative claims. The present disclosure is to be limited only by the terms of the appended representative claims, along with the full scope of equivalents to which such representative claims are entitled. It is also to be understood that the terminology used herein is for the purpose of describing particular embodiments only, and is not intended to be limiting.

Claims

In the claims
1. A control panel for a home security system, the control panel comprising:
a housing including a top cover and a bottom cover;
an electronic board including a transceiver, processing circuitry and a power supply, wherein the processing circuitry includes a processor and a memory and a firmware is stored on the memory of the processing circuitry; and
an antenna;
wherein:
the electronic board is situated between the top cover and the bottom cover;
the antenna is connected to the transceiver; and
tlie antenna is situated between the top cover and the electronic board.
2, The control panel of claim 1, wherein the transceiver is configured to:
receive a first signal from a first accessory device; and
transmit an alarm signal.
3. The control panel of claim 2, wherein the first accessory device is a fitness tracker.
4. The control panel of claim 3, wherein the first signal indicates that a user is asleep.
5. The control panel of claim 4, wherein in response to receiving the first signal at the transceiver of the control panel, the firmware of the control panel is configured to arm the control panel.
6, The control panel of claim 5, wherein a second signal is received from a second accessory device.
7, The control panel of claim 6, wherein die second accessory device is a sensor and the second signal Ls a trigger signal.
8. The control panel of claim 7, wherein in response to receiving the trigger signal, the firmware of the control panel transmits the alarm signal to an alarm device.
9. The control panel of claim 8, wherein the alarm signal is configured to generate an alarm using the alarm device.
10. The control panel of claim 7, wherein the alarm signal is transmitted to a cloud, and the alarm signal is configured to trigger the cloud to contact a third party.
11. The control panel of claim 8, wherein the alarm device is a smart light, and the alarm signal is configured to cause the smart light to flash.
12. The control panel of claim 8, wherein the alarm device is a camera and the alarm signal is configured to cause die camera to record a video.
13, The control panel of claim 8, wherein the alarm device is a smart speaker and the alarm signal is configured to cause the smart speaker to generate an alarm sound.
14, The control panel of claim 13, wherein:
the transceiver of the control panel is configured to receive a third signal from the smart speaker;
the third signal was generated based on a voice command spoken to the smart speaker, and
the firmware of the control panel is configured to disarm the control panel based on the third signal.
15. The control panel of claim 5, wherein the transceiver of the control panel is configured to receive a fourth signal from a cloud.
16. The control panel of claim 15, wherein the fourth signal includes weather data.
17, The control panel of claim 16, wherein the firmware of the control panel is configured to deactivate a connected accessory device based on the weather data.
18. The control panel of claim 17, wherein the connected accessory device is a glass sensor.
19. The control panel of claim 16, wherein the firmware of the control panel is configured to check on a battery status of a connected accessory device.
20. The control panel of claim 19, wherein the connected accessory device is a flood sensor.
PCT/US2019/059682 2018-11-05 2019-11-04 System and apparatus for a home security system WO2020096969A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US201862755925P 2018-11-05 2018-11-05
US62/755,925 2018-11-05

Publications (1)

Publication Number Publication Date
WO2020096969A1 true WO2020096969A1 (en) 2020-05-14

Family

ID=70611054

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/US2019/059682 WO2020096969A1 (en) 2018-11-05 2019-11-04 System and apparatus for a home security system

Country Status (1)

Country Link
WO (1) WO2020096969A1 (en)

Cited By (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111585745A (en) * 2020-07-07 2020-08-25 珠海雷特科技股份有限公司 Method for accessing intelligent household control panel to network and intelligent household system
US20210167986A1 (en) * 2018-04-18 2021-06-03 Koninklijke Philips N.V. A system for emergency safety warning and risk mitigation
EP4047579A1 (en) * 2021-02-19 2022-08-24 Johnson Controls Tyco IP Holdings LLP Security / automation system control panel with short range communication disarming
WO2023287643A1 (en) * 2021-07-13 2023-01-19 Ademco Inc. Keypad with repeater mode
US11582746B2 (en) 2021-04-01 2023-02-14 Ademco Inc. Dynamic, multi-frequency superframe slotting
US20230091057A1 (en) * 2021-09-21 2023-03-23 Microsoft Technology Licensing, Llc Accessory device communication utilizing host-synchronized transmission
US11706046B2 (en) 2020-02-07 2023-07-18 Ademco Inc. Dynamic superframe slotting
US11727776B2 (en) 2021-02-19 2023-08-15 Johnson Controls Tyco IP Holdings LLP Security / automation system control panel with diagnostic tool
US11961377B2 (en) 2021-02-19 2024-04-16 Johnson Controls Tyco IP Holdings LLP Security / automation system control panel with acoustic signature detection
US12010613B2 (en) 2021-09-20 2024-06-11 Microsoft Technology Licensing, Llc Accessory device communication utilizing multiple personalities
US12022574B2 (en) 2021-02-19 2024-06-25 Johnson Controls Tyco IP Holdings LLP Security / automation system with cloud-communicative sensor devices
US12026243B2 (en) 2021-02-19 2024-07-02 Johnson Controls Tyco IP Holdings LLP Facial recognition by a security / automation system control panel

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2008019402A2 (en) * 2006-08-11 2008-02-14 Trident Security Concepts, Llc Self-contained security system
WO2009158296A1 (en) * 2008-06-27 2009-12-30 Adt Security Services, Inc. Method and apparatus for communication between a security system and a monitoring center
US20160286169A1 (en) * 2015-02-06 2016-09-29 Google Inc. Systems, Methods, and Devices for Managing Coexistence of Multiple Transceiver Devices by Optimizing Component Layout
US9775520B2 (en) * 2006-06-30 2017-10-03 Empire Ip Llc Wearable personal monitoring system

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9775520B2 (en) * 2006-06-30 2017-10-03 Empire Ip Llc Wearable personal monitoring system
WO2008019402A2 (en) * 2006-08-11 2008-02-14 Trident Security Concepts, Llc Self-contained security system
WO2009158296A1 (en) * 2008-06-27 2009-12-30 Adt Security Services, Inc. Method and apparatus for communication between a security system and a monitoring center
US20160286169A1 (en) * 2015-02-06 2016-09-29 Google Inc. Systems, Methods, and Devices for Managing Coexistence of Multiple Transceiver Devices by Optimizing Component Layout

Cited By (19)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20210167986A1 (en) * 2018-04-18 2021-06-03 Koninklijke Philips N.V. A system for emergency safety warning and risk mitigation
US11706046B2 (en) 2020-02-07 2023-07-18 Ademco Inc. Dynamic superframe slotting
CN111585745A (en) * 2020-07-07 2020-08-25 珠海雷特科技股份有限公司 Method for accessing intelligent household control panel to network and intelligent household system
US12022574B2 (en) 2021-02-19 2024-06-25 Johnson Controls Tyco IP Holdings LLP Security / automation system with cloud-communicative sensor devices
US12026243B2 (en) 2021-02-19 2024-07-02 Johnson Controls Tyco IP Holdings LLP Facial recognition by a security / automation system control panel
US12136325B2 (en) 2021-02-19 2024-11-05 Johnson Controls Tyco IP Holdings LLP Alarm event imaging by a security / automation system control panel
US12106646B2 (en) 2021-02-19 2024-10-01 Tyco Fire & Security Gmbh Security / automation system control panel with active microphones
US11727776B2 (en) 2021-02-19 2023-08-15 Johnson Controls Tyco IP Holdings LLP Security / automation system control panel with diagnostic tool
US11783686B2 (en) 2021-02-19 2023-10-10 Johnson Controls Tyco IP Holdings LLP Security / automation system control panel with removable back speaker
US11961377B2 (en) 2021-02-19 2024-04-16 Johnson Controls Tyco IP Holdings LLP Security / automation system control panel with acoustic signature detection
US12046121B2 (en) 2021-02-19 2024-07-23 Johnson Controls Tyco IP Holdings LLP Security / automation system control panel with short range communication disarming
EP4047579A1 (en) * 2021-02-19 2022-08-24 Johnson Controls Tyco IP Holdings LLP Security / automation system control panel with short range communication disarming
US11582746B2 (en) 2021-04-01 2023-02-14 Ademco Inc. Dynamic, multi-frequency superframe slotting
WO2023287643A1 (en) * 2021-07-13 2023-01-19 Ademco Inc. Keypad with repeater mode
US12021605B2 (en) 2021-07-13 2024-06-25 Ademco Inc. Keypad with repeater mode
US11658736B2 (en) 2021-07-13 2023-05-23 Ademco Inc. Keypad with repeater mode
US12010613B2 (en) 2021-09-20 2024-06-11 Microsoft Technology Licensing, Llc Accessory device communication utilizing multiple personalities
US12063704B2 (en) * 2021-09-21 2024-08-13 Microsoft Technology Licensing, Llc Accessory device communication utilizing host-synchronized transmission
US20230091057A1 (en) * 2021-09-21 2023-03-23 Microsoft Technology Licensing, Llc Accessory device communication utilizing host-synchronized transmission

Similar Documents

Publication Publication Date Title
WO2020096969A1 (en) System and apparatus for a home security system
US20220301401A1 (en) Control access utilizing video analytics
CN107852566B (en) Context-based gesture recognition and control
US9692380B2 (en) Dynamic volume adjustment
US9589446B1 (en) Sensor bypass
US8730029B2 (en) Tablet computer as user interface of security system
US12106646B2 (en) Security / automation system control panel with active microphones
US12026243B2 (en) Facial recognition by a security / automation system control panel
WO2016137890A1 (en) Occupancy based volume adjustment
US10346600B2 (en) Interface of an automation system
EP4047574A1 (en) Security / automation system control panel with acoustic signature detection
EP3144914B1 (en) Fast replacement z-wave device in home automation
CN110950204A (en) Call calling method based on intelligent panel, intelligent panel and storage medium
US10057620B2 (en) Voice control component installation
US10303137B2 (en) Structure modes for controlling various systems in closed environments
US12022574B2 (en) Security / automation system with cloud-communicative sensor devices
US12046121B2 (en) Security / automation system control panel with short range communication disarming

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 19883124

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 19883124

Country of ref document: EP

Kind code of ref document: A1