Claims
- 1. A method for configuring a security system containing at least one controller function connected to a first telephone line, wherein
the user calls a remote server from a first telephone connected to the said first telephone line, the said controller function provides first information regarding the security system to the remote server, the user and remote server engage in an exchange of second information, the remote server provides third information to the said controller function wherein the said third information is based upon the said first information and the said second information.
- 2. A configuration program operating on a server remote from a security system, wherein
the said configuration program can receive commands from the user, the said configuration program can receive system data from the security system, the said configuration program determines appropriate configuration data, and the said configuration program can send the said configuration data to the security system.
- 3. The configuration program in claim 2 wherein the said configuration program further supports voice processing and at least some of the commands from the user are voice based.
- 4. The configuration program in claim 2 wherein the said configuration program has a user interface structured in a menu format, and the menu content can be altered by the said configuration program based upon the said system data.
- 5. The configuration program in claim 2 wherein the said configuration program can receive the said system data and the said commands during a single telephone call.
- 6. The configuration program in claim 5 wherein the said single telephone call is defined as occurring from the time that the user initiates a call to the configuration program until the telephone line is released by the latter of the user or the security system.
- 7. The configuration program in claim 2 wherein the said system data includes data regarding the types and quantity of components installed in the security system.
- 8. The configuration program in claim 2 wherein the said configuration data includes labels for components in the security system.
- 9. The configuration program in claim 2 wherein the said configuration data includes audio labels for components in the security system, wherein the audio labels can be output by a speaker in the security system.
- 10. The configuration program in claim 2 wherein the said configuration data includes routing information used by the security system for routing wireless messages between components in the security system.
- 11. A server for configuring a security system, wherein the server is at a location remote from the security system, including
a first telecommunications interface for exchanging configuration information with the security system a second telecommunications interface for receiving commands from a user of the security system a program whereby the configuration information is changed based upon the commands received from the user of the security system.
- 12. The server in claim 111 wherein at least a portion of the commands received from the said user of the security system are voice based.
- 13. The server in claim 111 wherein the said first telecommunications interface and the said second telecommunications interface are logical interfaces within the server sharing a common physical telecommunications interface.
- 14. The server in claim 13 wherein the said common physical telecommunications interface is a telephone line of the type provided by a public switched telephone network.
- 15. The server in claim 11 wherein the said first telecommunications interface is an ethernet-based interface and the said second telecommunications interface is a telephone line of the type provided by a public switched telephone network.
- 16. The server in claim 11 wherein the said configuration information includes a list of components contained within the security system.
- 17. The server in claim 16 wherein the said program presents a sequence of information and queries to the said user in a menu-based format.
- 18. The server in claim 17 wherein the said program alters at least a portion of its menu sequence based upon the list of components contained within the said security system.
- 19. The server in claim 16 wherein the said program provides the said user of the security system a means for recording a voice label for at least one of components contained within the said security system.
- 20. The server in claim 19 wherein the said program incorporates the said voice label into the configuration information.
- 21. The server in claim 19 wherein the said program can download the said voice label to the said security system.
- 22. The server in claim 11 further including a database for storing a copy of the said configuration information.
- 23. The server in claim 11 further including a third interface to a computer system used by an alarm monitoring company.
- 24. The server in claim 23 wherein the said program can send the said configuration information to the said computer system used by an alarm monitoring company.
- 25. The server in claim 24 wherein the said program can convert the said configuration information into a format compatible with the said computer system used by an alarm monitoring company.
- 26. The server in claim 11 wherein the said server authenticates the said security system before exchanging the said configuration information with the said security system.
- 27. The server in claim 26 wherein the said security system authenticates the said server before exchanging the said configuration information with the said server.
- 28. The server in claim 11 wherein the said configuration information that may be changed includes software that may execute on a processor within the said security system.
CROSS REFERENCE TO RELATED APPLICATIONS
[0001] This patent application is a continuation in part of U.S. application Ser. No. 10/795,368, Multi-controller Security Network, attorney document number RFID-0108, filed Mar. 9, 2004 by the inventor of the present application, which is itself a continuation-in-part of U.S. application Ser. No. 10/602,854, RFID Reader for a Security Network, attorney document number RFID-0107, filed Jun. 25, 2003, which is itself a continuation-in-part of U.S. application Ser. No. 10/423,887, RFID Based Security Network, attorney document number RFID-0106, filed Apr. 28, 2003. This patent application is further cross referenced to the patent application filed on Mar. 23, 2004, titled Communications Architecture for a Security Network, attorney document number RFID-0109 (U.S. application Ser. No. 10/806,371), and to the patent application filed on Feb. 3, 2003, titled RFID Based Security System, attorney document number RFID-0100 (U.S. application Ser. No. 10/356,512) and to the following patent applications, all filed Feb. 14, 2003:
[0002] Communications Control in a Security System, RFID-0101 (Ser. No. 10/366,320);
[0003] Device Enrollment in a Security System, RFID-0102 (Ser. No. 10/366,335);
[0004] Controller for a Security System, RFID-0103 (Ser. No. 10/366,334);
[0005] RFID Transponder for a Security System, RFID-0104 (Ser. No. 10/366,317);
[0006] RFID Reader for a Security System, RFID-0105 (Ser. No. 10/366,316).
[0007] All of the foregoing cross referenced patent applications are incorporated by reference into this present patent application.
Continuation in Parts (3)
|
Number |
Date |
Country |
Parent |
10795368 |
Mar 2004 |
US |
Child |
10820804 |
Apr 2004 |
US |
Parent |
10602854 |
Jun 2003 |
US |
Child |
10795368 |
Mar 2004 |
US |
Parent |
10423887 |
Apr 2003 |
US |
Child |
10602854 |
Jun 2003 |
US |