This application is related to co-pending U.S. patent application Ser. No. 16/289,400, entitled “Virtual partition of a security system” and is incorporated herewith in its entirety.
Home security system can be used to notify the homeowner of intrusions and other alerts (e.g., porch light left on all night). These security systems communicate with sensors placed throughout a facility (e.g., home, office). However, the hardware settings on these security system limits the number of available zones. Thus, a homeowner wishing to add another zone to monitor an in-law unit of his home may need to purchase another security system that is capable of monitoring two zones.
To easily identify the discussion of any particular element or act, the most significant digit or digits in a reference number refer to the figure number in which that element is first introduced.
“Component” refers to a device, physical entity, or logic having boundaries defined by function or subroutine calls, branch points, APIs, or other technologies that provide for the partitioning or modularization of particular processing or control functions. Components may be combined via their interfaces with other components to carry out a machine process. A component may be a packaged functional hardware unit designed for use with other components and a part of a program that usually performs a particular function of related functions. Components may constitute either software components (e.g., code embodied on a machine-readable medium) or hardware components. A “hardware component” is a tangible unit capable of performing certain operations and may be configured or arranged in a certain physical manner. In various example embodiments, one or more computer systems (e.g., a standalone computer system, a client computer system, or a server computer system) or one or more hardware components of a computer system (e.g., a processor or a group of processors 1004) may be configured by software (e.g., an application 916 or application portion) as a hardware component that operates to perform certain operations as described herein. A hardware component may also be implemented mechanically, electronically, or any suitable combination thereof. For example, a hardware component may include dedicated circuitry or logic that is permanently configured to perform certain operations. A hardware component may be a special-purpose processor, such as a field-programmable gate array (FPGA) or an application specific integrated circuit (ASIC). A hardware component may also include programmable logic or circuitry that is temporarily configured by software to perform certain operations. For example, a hardware component may include software executed by a general-purpose processor or other programmable processor. Once configured by such software, hardware components become specific machines (or specific components of a machine 1000) uniquely tailored to perform the configured functions and are no longer general-purpose processors 1004. It will be appreciated that the decision to implement a hardware component mechanically, in dedicated and permanently configured circuitry, or in temporarily configured circuitry (e.g., configured by software), may be driven by cost and time considerations. Accordingly, the phrase “hardware component”(or “hardware-implemented component”) should be understood to encompass a tangible entity, be that an entity that is physically constructed, permanently configured (e.g., hardwired), or temporarily configured (e.g., programmed) to operate in a certain manner or to perform certain operations described herein. Considering embodiments in which hardware components are temporarily configured (e.g., programmed), each of the hardware components need not be configured or instantiated at any one instance in time. For example, where a hardware component comprises a general-purpose processor configured by software to become a special-purpose processor, the general-purpose processor may be configured as respectively different special-purpose processors (e.g., comprising different hardware components) at different times. Software accordingly configures a particular processor or processors, for example, to constitute a particular hardware component at one instance of time and to constitute a different hardware component at a different instance of time. Hardware components can provide information to, and receive information from, other hardware components. Accordingly, the described hardware components may be regarded as being communicatively coupled. Where multiple hardware components exist contemporaneously, communications may be achieved through signal transmission (e.g., over appropriate circuits and buses) between or among two or more of the hardware components. In embodiments in which multiple hardware components are configured or instantiated at different times, communications between such hardware components may be achieved, for example, through the storage and retrieval of information in memory structures to which the multiple hardware components have access. For example, one hardware component may perform an operation and store the output of that operation in a memory device to which it is communicatively coupled. A further hardware component may then, at a later time, access the memory device to retrieve and process the stored output. Hardware components may also initiate communications with input or output devices, and can operate on a resource (e.g., a collection of information). The various operations of example methods described herein may be performed, at least partially, by one or more processors that are temporarily configured (e.g., by software) or permanently configured to perform the relevant operations. Whether temporarily or permanently configured, such processors may constitute processor-implemented components that operate to perform one or more operations or functions described herein. As used herein, “processor-implemented component” refers to a hardware component implemented using one or more processors. Similarly, the methods described herein may be at least partially processor-implemented, with a particular processor or processors being an example of hardware. For example, at least some of the operations of a method may be performed by one or more processors 1004 or processor-implemented components. Moreover, the one or more processors may also operate to support performance of the relevant operations in a “cloud computing” environment or as a “software as a service” (SaaS). For example, at least sonic of the operations may be performed by a group of computers (as examples of machines including processors), with these operations being accessible via a network (e.g., the Internet) and via one or more appropriate interfaces (e.g., an API). The performance of certain of the operations may be distributed among the processors, not only residing within a single machine, but deployed across a number of machines. In some example embodiments, the processors or processor-implemented components may be located in a single geographic location (e.g., within a home environment, an office environment, or a server farm). In other example embodiments, the processors or processor-implemented components may be distributed across a number of geographic locations.
“Communication Network” refers to one or more portions of a network that may be an ad hoc network, an intranet, an extranet, a virtual private network (VPN), a local area network (LAN), a wireless LAN (WLAN), a wide area network (WAN), a wireless WAN (WWAN), a metropolitan area network (MAN), the Internet, a portion of the Internet, a portion of the Public Switched Telephone Network (PSTN), a plain old telephone service (POTS) network, a cellular telephone network, a wireless network, a Wi-Fi® network, another type of network, or a combination of two or more such networks. For example, a network or a portion of a network may include a wireless or cellular network and the coupling may be a Code Division Multiple Access (CDMA) connection, a Global System for Mobile communications (GSM) connection, or other types of cellular or wireless coupling. In this example, the coupling may implement any of a variety of types of data transfer technology, such as Single Carrier Radio Transmission Technology (1xRTT), Evolution-Data Optimized (EVDO) technology, General Packet Radio Service (GPRS) technology, Enhanced Data rates for GSM Evolution (EDGE) technology, third Generation Partnership Project (3GPP) including 3G, fourth generation wireless (4G) networks, Universal Mobile Telecommunications System (UMTS), High Speed Packet Access (HSPA), Worldwide Interoperability for Microwave Access (WiMAX), Long Term Evolution (LTE) standard, others defined by various standard-setting organizations, other long-range protocols, or other data transfer technology.
“Machine-Storage Medium” refers to a single or multiple storage devices and/or media (e.g., a centralized or distributed database, and/or associated caches and servers) that store executable instructions, routines and/or data. The term shall accordingly be taken to include, but not be limited to, solid-state memories, and optical and magnetic media, including memory internal or external to processors. Specific examples of machine-storage media, computer-storage media and/or device-storage media include non-volatile memory, including by way of example semiconductor memory devices, e.g., erasable programmable read-only memory (EPROM), electrically erasable programmable read-only memory (EEPROM), FPGA, and flash memory devices; magnetic disks such as internal hard disks and removable disks; magneto-optical disks; and CD-ROM and DVD-ROM disks The terms “machine-storage medium,” “device-storage medium,” “computer-storage medium” mean the same thing and may be used interchangeably in this disclosure. The terms “machine-storage media,” “computer-storage media,” and “device-storage media” specifically exclude carrier waves, modulated data signals, and other such media, at least some of which are covered under the term “signal medium.”
“Processor” refers to any circuit or virtual circuit (a physical circuit emulated by logic executing on an actual processor) that manipulates data values according to control signals (e.g., “commands”, “op codes”, “machine code”, etc.) and which produces corresponding output signals that are applied to operate a machine. A processor may, for example, be a Central Processing Unit (CPU), a Reduced Instruction Set Computing (RISC) processor, a Complex Instruction Set Computing (CISC) processor, a Graphics Processing Unit (GPU), a Digital Signal Processor (DSP), an Application Specific Integrated Circuit (ASIC), a Radio-Frequency Integrated Circuit (RFIC) or any combination thereof. A processor may further be a multi-core processor having two or more independent processors (sometimes referred to as “cores”) that may execute instructions contemporaneously.
“Carrier Signal” refers to any intangible medium that is capable of storing, encoding, or carrying instructions for execution by the machine, and includes digital or analog communications signals or other intangible media to facilitate communication of such instructions. Instructions may be transmitted or received over a network using a transmission medium via a network interface device.
“Signal Medium” refers to any intangible medium that is capable of storing, encoding, or carrying the instructions for execution by a machine and includes digital or analog communications signals or other intangible media to facilitate communication of software or data. The term “signal medium” shall be taken to include any form of a modulated data signal, carrier wave, and so forth. The term “modulated data signal” means a signal that has one or more of its characteristics set or changed in such a matter as to encode information in the signal. The terms “transmission medium” and “signal medium” mean the same thing and may be used interchangeably in this disclosure.
“Computer-Readable Medium” refers to both machine-storage media and transmission media. Thus, the terms include both storage devices/media and carrier waves/modulated data signals. The terms “machine-readable medium,” “computer-readable medium” and “device-readable medium” mean the same thing and may be used interchangeably in this disclosure.
Example methods and systems are directed to dynamic partitioning of security systems. Examples merely typify possible variations. Unless explicitly stated otherwise, components and functions are optional and may be combined or subdivided, and operations may vary in sequence or be combined or subdivided. In the following description, for purposes of explanation, numerous specific details are set forth to provide a thorough understanding of example embodiments. It will be evident to one skilled in the art, however, that the present subject matter may be practiced without these specific details.
A homeowner (and user of a security system) may want to two separate partitions for their property: one for their house and one for their garage. In another example, a company may want dozens of partitions to monitor the security of a row of locked cabinets in a lab. Some security systems may not dynamically increase or decrease the number of partitions because those security systems are typically are hardwired for a preset number of static partitions. In another example, a homeowner may wish to use one partition to monitor his house and a car parked at his house and two partitions to monitor his house and his car (when the car is away from the house). When the car is back to the house, the security system dynamically adjusts the two partitions (house sensors and car sensors) into one partition (house and car sensors combined).
In another example, a homeowner may wish to use two partitions to monitor his house and a car parked at his house. The security system can dynamically adjust when the car is away from the house to monitor only the house partition. The car's partition (once away from the house) can adjust to form a complete and independent security system. When the car is back to the house, the security system dynamically adjusts to reform (or restore) two partitions (house partition and car partition) into one security system (house and car combined).
The present application describes a method for dynamically partitioning a security system. In one example embodiment, a security system identifies sensors registered with the security system. The security system then identities a first partition attribute of a first group of sensors of the sensors. The first partition attribute indicates a primary partition of the security system. The security system then identifies a second partition attribute of a second group of sensors of the sensors. The second partition attribute indicates a secondary partition of the security system. The security system forms a dynamic partition of the security system based on a combination of the first and second partition attributes.
One or more application servers 104 provide server-side functionality via a network 102 to a networked user device, in the form of a security system 130 and a client device 106 of the user 128. The security system 130 includes a control panel (not shown) connected to sensors in a household 132 of the user 128. A web client 110 (e.g., a browser) and a programmatic client 108 (e.g., an “app”) are hosted and execute on the client device 106. The client device 106 can communicate with the security system 130 via the network 102 or via other wireless or wired means with security system 130.
An Application Program Interface (API) server 118 and a web server 120 provide respective programmatic and web interfaces to application servers 104. A specific application server 116 hosts a remote security monitoring application 122 that operates with the security system 130. In one example, the remote security monitoring application 122 receives an alert from a sensor of the security system 130, identifies a partition associated with the alert, and communicates the alert to a mobile device (or a control panel) associated with the partition.
The web client 110 communicates with the remote security monitoring application 122 via the web interface supported by the web server 120. Similarly, the programmatic client 108 communicates with the remote security monitoring application 122 via the programmatic interface provided by the Application Program Interface (API) server 118. The third-party application 114 may, for example, be a topology application that determines the topology of a factory (e.g., how many cabinets, rooms, which rooms contain valuable items), building, apartment complex, or neighborhood. The application server 116 is shown to be communicatively coupled to database servers 124 that facilitates access to an information storage repository or databases 126. In an example embodiment, the databases 126 includes storage devices that store information to he published and/or processed by the remote security monitoring application 122.
Additionally, a third-party application 114 executing on a third-party server 112, is shown as having programmatic access to the application server 116 via the programmatic interface provided by the Application Program Interface (API) server 118. For example, the third-party application 114, using information retrieved from the application server 116, may supports one or more features or functions on a website hosted by the third party. In one example, the third-party server 112 communicates with another remote controlled device (e.g., smart door lock) located at the household 132. The third-party server 112 provides the door lock status to the security system 130, the client device 106, or the application server 116. In another example, the security system 130, the client device 106, and the application server 116 can control the door lock via the third-party application 114.
The security system 130 (although hardwired to operate with one partition) may be partitioned to operate as two virtual security systems. For example, the security system 130 forms two partitions: Partition A 210 and Partition B 212. Partition A 210 includes camera 202 and temperature sensor 204. Partition B 212 includes speaker 208 and door lock 206. Those of ordinary skill in the art will recognize that partitions may include a combination of any of the sensors and devices. For example, Partition B 212 can also include temperature sensor 204 (which is also part of Partition A 210).
In one example embodiment, the security system 130 includes a dynamic partition that can be adjusted to combine different partitions. For example, the dynamic partition may include both Partition A 210 and Partition B 212 when the sensors of both partitions are located within a preset distance threshold of the security system 130. If the sensors from Partition B 212 are moved away from the security system 130 or are no longer in communication with security system 130, the dynamic partition is adjusted to include only Partition A 210. In another example, the dynamic partition is adjusted to include Partition B 212 in addition to Partition A 210 when the speaker 208 and the door lock 206 are back in communication with the security system 130.
In another example embodiment, the security system 130 can dynamically adjust the number of partitions to combine different partitions or different security systems into a single partition or single security system. For example, the security system may include both Partition A 210 and Partition B 212 when the sensors of both partitions are located within a preset distance threshold of the security system 130, if Partition B 212 is moved away from the security system 130 or is no longer in communication with security system 130, the security system dynamically adjusts to include only Partition A 210. in another example, the security system adjusted to include Partition B 212 in addition to Partition A 210 when the speaker 208 and the door lock 206 are back in communication with the security system 130.
In another example embodiment, the dynamic partition of the security system 130 can be adjusted to provide more flexibility to the user 128. For example, the dynamic partition can adjust the Partition A 210 to include temperature sensor 204 and door lock 206. The dynamic partition can adjust the Partition B 212 to include camera 202 and speaker 208.
The security system 130 can be configured to operate both partitions as the same time by receiving sensor data from the corresponding sensors and controlling the sensors corresponding to the partitions. In another example, the security system 130 may enable the user 128 to operate only Partition A 210 and another user to operate only Partition B 212 (based on the access rights of the user 128).
In one example embodiment, the sensor interface 302 identifies a partition attribute for each sensor of sensors 310. For example, the partition attribute of a sensor identifies one or more specific partitions to which the sensor is assigned to. In another example, the partition attribute of a safety related sensor (e.g., smoke sensor) identifies all partitions of the security system 130. In another example, the partition attribute of a sensor may be set to identify all partitions of the security system 130 by default. In another example, the partition attribute of a sensor may be set to identify a partition of the security system 130 based on a location of the sensor (e.g., sensors at home are to be assigned to home partition).
The virtual partition module 304 forms one or more partitions based on the partition attributes of the sensors 310. For example, the virtual partition module 304 forms a first partition for a first and second sensor of sensors 310. The first and second sensors each include a partition attribute that identifies the first partition. The virtual partition module 304 forms a second partition based on a third and fourth sensor of sensors 310. The second and third sensors each include a partition attribute that identifies the second partition.
The user interface module 306 generates a user interface for each partition based on the sensors included in the corresponding partition. In one example, the user interface may identify a name of the partition, a description of the partition, sensors in the partition, sensor status, and authorized users having access to the partition (e.g., renters having access to sensor data from sensors in their apartment, and landlord having access to sensor data of sensors from a building). This allows both the renters and landlord to use the single security system 130 with different partitions.
The control panel 308 includes a display and user input that enables the user 128 to control the features of the security system 130 corresponding to a partition. For example, the user 128 may arm a first partition and disarm a second partition using the control panel 308. In another example, the control panel 308 identifies the user 128 and provides the user 128 with access to the corresponding partition (e.g., one partition at a time or several partitions at a time). In another example, the control panel 308 may be a virtual control panel that is accessed via a client device 106 or a computing device registered with the security system 130. The control panel 308 receives the different user interfaces from the user interface module 306 for each partition.
In one example embodiment, the user interface module 306 determines that a first user interface for a first partition refers to the control panel A 402. The user interface module 306 then communicates the first user interface and sensor data of the sensors corresponding to the partition of the first user interface to the control panel A 402. The user interface module 306 determines that a second user interface for a second partition refers to the control panel B 404. The user interface module 306 then communicates the second user interface and sensor data of the sensors corresponding to the partition of the second user interface to the control panel B 404.
The control panel A 402 includes a display and user input that enables a user at the control panel A 402 to control the features of the security system 130. For example, the user may control features corresponding to a first partition at control panel A 402. The control panel B 404 includes a display and user input that enables a user at the control panel B 404 to control the features of the security system 130. For example, the user may control features corresponding to a first partition at control panel A 402.
In another example embodiment, the dynamic partition configurator 502 adjusts the partition based on detected new sensors. For example, the dynamic partition configurator 502 detects a new sensor in communication with the security system 130. The security system 130 registers the new sensor and also detects/identifies a physical location of the new sensor (e.g., location provided by a user or the new sensor). The dynamic partition configurator 502 determines that the physical location of the new sensor corresponds to a preset region of sensors in the partition (e.g., a new window sensor in a living room of a house with an existing partition). The dynamic partition configurator 502 adds the new sensor to the partition based on the physical location of the new sensor.
The virtual partition module 304 uses the partition attributes from the sensors 310 to form the partitions: partition p1 includes data from sensors s1602, s3610. Partition p2 includes data from sensors s2604, s3610, and s4608. Partition p3 includes data from sensor s5606. Partition p4 includes data from sensors s1602, s2604, and s4608.
The user interface module 306 generates a user interface 612 for partitions p1, p2, and p4. The user interface module 306 generates a user interface 614 for partition p3. The control panel A 402 accesses the user interface 612. The control panel B 404 accesses the user interface 614. In one example, each partition includes a corresponding user interface, in another example, one or more partitions may share a user interface. In the example of
Because the sensors from the home 820 and the sensors from the car 818 all are located at home 820 and are within reach of the security system 130, the security system 130 dynamically adjusts the dynamic partition of the security system 130 to include all sensors (e.g., s1802, s2808, s3810, s4812, s5814) in the dynamic partition. The control panel A 804 displays the status of all sensors as HOME & CAR STATUS: OK 816. The control panel B 806 may also display the status of all sensors as HOME & CAR STATUS: OK 816.
The sensors s4812 and s5814 communicate with the control panel B 806 and provides sensor data to the control panel B 806 as part of its own partition: CAR STATUS: OK 902. It is noted that the control panel B 806 does not display sensor data from sensors s1802, s2808, and s3810.
The security system 130 detects communication from the sensors s4812 and s5814 and adjusts the dynamic partition to now include the sensors s4812 and s5814 in addition to s1802, s2808, and s3810. The control panel A 804 displays the status of sensors from the dynamic partition (e.g., sensors s1802, s2808, s3810, s4812, and s5814): HOME & CAR STATUS: OK 1002.
The control panels 816, 810, 814, 812 are connected to the security system 130. The security system 130 creates a partition for each apartment such that each user can control and access security features related to its apartment. For example, user 128 can arm or disarm sensors located in apartment 1218 using control panel 1216. In another example embodiment, an administrator (e.g., landlord) may have access to all sensors and access controls in the apartment complex 1202. For example, the landlord can remotely monitor which door or window (in the apartment complex 1202) is open or close using the security system 130.
At block 1302, the security system 130 identifies sensors registered with the security system 130. In another example embodiment, the security system 130 identifies sensors in communication with the security system 130. At block 1304, the security system 130 forms a dynamic partition based on the present or sensors detected at the security system 130. At block 1306, the security system 130 detects a new sensor for the security system 130 or an absent sensor from the security system 130. At block 1308, the security system 130 adjust the dynamic partition based on the new sensor or the absent sensor.
At block 1402, the security system 130 determines an absent sensor from the security system 130. At block 1404, the security system 130 determines that the absent sensor is assigned to a secondary partition in addition to the dynamic partition of the security system 130. At block 1406, the security system 130 removes the absent sensor from the dynamic partition. At block 1408, the security system 130 forms the secondary partition with the absent sensor.
At block 1502, the security system 130 determines a new sensor at the security system 130. At block 1504, the security system 130 determines that the new sensor is assigned to a secondary partition in addition to the dynamic partition of the security system 130.
At block 1602, the security system 130 identifies sensors connected to the security system 130. At block 1604, the security system 130 defines/forms partitions based on a combination of sensors. At block 1606, the security system 130 generates a user interface for the corresponding one or more partitions. At block 1608, the security system 130 provides the user interface to one or more control panels.
At block 1702, the dynamic partition configurator 502 receives a selection of connected sensors (e.g., a user identifies or selects which sensors to be included in a partition). At block 1704, the dynamic partition configurator 502 forms a partition based on the selection of connected sensors. At block 1706, the dynamic partition configurator 502 forms a user interface corresponding to the partition. At block 1708, the dynamic partition configurator 502 receives a selection of a control panel for partition. At block 1710, the dynamic partition configurator 502 provides the user interface to the selected control panel.
At block 1802, the partition manager 504 receives a sensor signal (e.g., door open signal) from a sensor (e.g., contact sensor). At block 1804, the partition manager 504 identifies which partition is associated with the sensor, At block 1806, the partition manager 504 identifies which control panel is associated with the partition. At block 1808, the partition manager 504 provides a notification to the identified control panel based on the sensor signal. At block 1810, the partition manager 504 provides a notification to a user associated with the identified control panel.
The machine 2000 may include processors 2002, memory 2004, and I/O components 2042, which may be configured to communicate with each other via a bus 2044. In an example embodiment, the processors 2002 (e.g., a Central Processing Unit (CPU), a Reduced Instruction Set Computing (RISC) processor, a Complex Instruction Set Computing (CISC) processor, a Graphics Processing Unit (GPU), a Digital Signal Processor (DSP), an ASIC, a Radio-Frequency Integrated Circuit (RFIC), another processor, or any suitable combination thereof) may include, for example, a processor 2006 and a processor 2010 that execute the instructions 2008. The term “processor” is intended to include multi-core processors that may comprise two or more independent processors (sometimes referred to as “cores”) that may execute instructions contemporaneously. Although
The memory 2004 includes a main memory 2012, a static memory 2014, and a storage unit 2016, both accessible to the processors 2002 via the bus 2044. The main memory 2004, the static memory 2014, and storage unit 2016 store the instructions 2008 embodying any one or more of the methodologies or functions described herein. The instructions 2008 may also reside, completely or partially, within the main memory 2012, within the static memory 2014, within machine-readable medium 2018 within the storage unit 2016, within at least one of the processors 2002 (e.g., within the processor's cache memory), or any suitable combination thereof, during execution thereof by the machine 2000.
The I/O components 2042 may include a wide variety of components to receive input, provide output, produce output, transmit information, exchange information, capture measurements, and so on. The specific I/O components 2042 that are included in a particular machine will depend on the type of machine. For example, portable machines such as mobile phones may include a touch input device or other such input mechanisms, while a headless server machine will likely not include such a touch input device. It will be appreciated that the I/O components 2042 may include many other components that are not shown in
In further example embodiments, the I/O components 2042 may include biometric components 2032, motion components 2034, environmental components 2036, or position components 2038, among a wide array of other components. For example, the biometric components 2032 include components to detect expressions (e.g., hand expressions, facial expressions, vocal expressions, body gestures, or eye tracking), measure biosignals (e.g., blood pressure, heart rate, body temperature, perspiration, or brain waves), identify a person (e.g., voice identification, retinal identification, facial identification, fingerprint identification, or electroencephalogram-based identification), and the like. The motion components 2034 include acceleration sensor components (e.g., accelerometer), gravitation sensor components, rotation sensor components (e.g., gyroscope), and so forth. The environmental components 2036 include, for example, illumination sensor components (e.g., photometer), temperature sensor components (e.g., one or more thermometers that detect ambient temperature), humidity sensor components, pressure sensor components (e.g., barometer), acoustic sensor components (e.g., one or more microphones that detect background noise), proximity sensor components (e.g., infrared sensors that detect nearby objects), gas sensors (e.g., gas detection sensors to detection concentrations of hazardous gases for safety or to measure pollutants in the atmosphere), or other components that may provide indications, measurements, or signals corresponding to a surrounding physical environment. The position components 2038 include location sensor components (e.g., a GPS receiver component), altitude sensor components (e.g., altimeters or barometers that detect air pressure from which altitude may be derived), orientation sensor components (e.g., magnetometers), and the like.
Communication may be implemented using a wide variety of technologies. The I/O components 2042 further include communication components 2040 operable to couple the machine 2000 to a network 2020 or devices 2022 via a coupling 2024 and a coupling 2026, respectively. For example, the communication components 2040 may include a network interface component or another suitable device to interface with the network 2020. In further examples, the communication components 2040 may include wired communication components, wireless communication components, cellular communication components, Near Field Communication (NFC) components, Bluetooth® components (e.g., Bluetooth® Low Energy), Wi-Fi® components, and other communication components to provide communication via other modalities. The devices 2022 may be another machine or any of a wide variety of peripheral devices (e.g., a peripheral device coupled via a USB).
Moreover, the communication components 2040 may detect identifiers or include components operable to detect identifiers. For example, the communication components 2040 may include Radio Frequency Identification (RFID) tag reader components, NFC smart tag detection components, optical reader components (e.g., an optical sensor to detect one-dimensional bar codes such as Universal Product Code (UPC) bar code, multi-dimensional bar codes such as Quick Response (QR) code, Aztec code, Data Matrix, Dataglyph, MaxiCode, PDF417, Ultra Code, UCC RSS-2D bar code, and other optical codes), or acoustic detection components (e.g., microphones to identify tagged audio signals). In addition, a variety of information may be derived via the communication components 2040, such as location via Internet Protocol (IP) geolocation, location via Wi-Fi® signal triangulation, location via detecting an NFC beacon signal that may indicate a particular location, and so forth.
The various memories (e.g., memory 2004, main memory 2012, static memory 2014, and/or memory of the processors 2002) and/or storage unit 2016 may store one or more sets of instructions and data structures (e.g., software) embodying or used by any one or more of the methodologies or functions described herein. These instructions (e.g., the instructions 2008), when executed by processors 2002, cause various operations to implement the disclosed embodiments.
The instructions 2008 may be transmitted or received over the network 2020, using a transmission medium, via a network interface device (e.g., a network interface component included in the communication components 2040) and using any one of a number of well-known transfer protocols (e.g., hypertext transfer protocol (HTTP)). Similarly, the instructions 2008 may be transmitted or received using a transmission medium via the coupling 2026 (e.g., a peer-to-peer coupling) to the devices 2022.
Although an embodiment has been described with reference to specific example embodiments, it will be evident that various modifications and changes may be made to these embodiments without departing from the broader scope of the present disclosure. Accordingly, the specification and drawings are to be regarded in an illustrative rather than a restrictive sense. The accompanying drawings that form a part hereof, show by way of illustration, and not of limitation, specific embodiments in which the subject matter may be practiced. The embodiments illustrated are described in sufficient detail to enable those skilled in the art to practice the teachings disclosed herein. Other embodiments may be utilized and derived therefrom, such that structural and logical substitutions and changes may be made without departing from the scope of this disclosure. This Detailed Description, therefore, is not to be taken in a limiting sense, and the scope of various embodiments is defined only by the appended claims, along with the full range of equivalents to which such claims are entitled.
Such embodiments of the inventive subject matter may be referred to herein, individually and/or collectively, by the term “invention” merely for convenience and without intending to voluntarily limit the scope of this application to any single invention or inventive concept if more than one is in fact disclosed. Thus, although specific embodiments have been illustrated and described herein, it should be appreciated that any arrangement calculated to achieve the same purpose may be substituted for the specific embodiments shown. This disclosure is intended to cover any and all adaptations or variations of various embodiments. Combinations of the above embodiments, and other embodiments not specifically described herein, will be apparent to those of skill in the art upon reviewing the above description.
The Abstract of the Disclosure is provided to allow the reader to quickly ascertain the nature of the technical disclosure. It is submitted with the understanding that it will not be used to interpret or limit the scope or meaning of the claims. In addition, in the foregoing Detailed Description, it can be seen that various features are grouped together in a single embodiment for the purpose of streamlining the disclosure. This method of disclosure is not to be interpreted as reflecting an intention that the claimed embodiments require more features than are expressly recited in each claim. Rather, as the following claims reflect, inventive subject matter lies in less than all features of a single disclosed embodiment. Thus the following claims are hereby incorporated into the Detailed Description, with each claim standing on its own as a separate embodiment.
Example 1 is a method comprising: identifying a plurality of sensors registered with a security system; identifying a first partition attribute of a first group of sensors of the plurality of sensors, the first partition attribute indicating a primary partition of the security system; identifying a second partition attribute of a second group of sensors of the plurality of sensors, the second partition attribute indicating a secondary partition of the security system; and forming a dynamic partition of the security system based on a combination of the first and second partition attributes.
In example 2, the subject matter of example 1, further comprises: adjusting the dynamic partition of the security system to be based on the first group of sensors and the second group of sensors, the dynamic partition including the primary partition and secondary partition.
In example 3, the subject matter of example 1, further comprises: adjusting the dynamic partition of the security system to be based only on the first group of sensors, the dynamic partition including the primary partition.
In example 4, the subject matter of example 1, further comprises: adjusting the dynamic partition of the security system based on a sensor communication status between the second group of sensors and the security system.
In example 5, the subject matter of example 4, further comprises: detecting that the second group of sensors is no longer in communication with the security system; and adjusting the dynamic partition of the security system to include only the primary partition in response to detecting that the second group of sensors is no longer in communication with the security system.
In example 6, the subject matter of example 1, wherein adjusting further comprises: adjusting the dynamic partition of the security system based on a distance between the second group of sensors and the security system.
In example 7, the subject matter of example 6, further comprising: detecting that the distance between the second group of sensors and the security system exceeds a predefined distance partition threshold associated with the secondary partition; and adjusting the dynamic partition of the security system to include only the first partition in response to detecting that the distance between the second group of sensors and the security system exceeds the predefined distance partition threshold.
In example 8, the subject matter of example 7, further comprising: forming the secondary partition at a secondary security system in response to the dynamic partition including only the primary partition, the second group of sensors being registered with the secondary security system.
In example 9, the subject matter of example 1, further comprising: generating a dynamic user interface for the dynamic partition, the dynamic user interface providing status information of the sensors identified in the dynamic partition.
In example 10, the subject matter of example 1, further comprising: detecting a local communication from the first group of sensors with the security system; detecting a remote communication from the second group of sensors with the security system; and adjusting the dynamic partition of the security system to be based on the first group of sensors and the second group of sensors in response to detecting the local communication from the first group of sensors and the remote communication from the second group of sensors.
Number | Name | Date | Kind |
---|---|---|---|
4974601 | Tranjan | Dec 1990 | A |
5091780 | Pomerleau | Feb 1992 | A |
5225806 | Stanley-Arslanok | Jul 1993 | A |
5416725 | Pacheco | May 1995 | A |
6035016 | Moore | Mar 2000 | A |
6049753 | Nimura | Apr 2000 | A |
6067502 | Hayashida | May 2000 | A |
6147601 | Sandelman | Nov 2000 | A |
6157299 | Wang | Dec 2000 | A |
6160477 | Sandelman | Dec 2000 | A |
6211782 | Sandelman | Apr 2001 | B1 |
6380851 | Gilbert | Apr 2002 | B1 |
6400265 | Saylor | Jun 2002 | B1 |
6408232 | Cannon | Jun 2002 | B1 |
6563430 | Kemink | May 2003 | B1 |
6633240 | Sweatt | Oct 2003 | B1 |
6661340 | Saylor | Dec 2003 | B1 |
6970077 | Johnson | Nov 2005 | B2 |
6989745 | Milinusic | Jan 2006 | B1 |
7161481 | Turner | Jan 2007 | B2 |
7248161 | Spoltore | Jul 2007 | B2 |
7259656 | Wright | Aug 2007 | B1 |
7302323 | Anderson | Nov 2007 | B2 |
7859571 | Brown | Dec 2010 | B1 |
7961089 | McSheffrey | Jun 2011 | B2 |
8000694 | Labidi | Aug 2011 | B2 |
8350694 | Trundle | Jan 2013 | B1 |
8365278 | Njemanze | Jan 2013 | B1 |
8369487 | Alexander Elliot | Feb 2013 | B2 |
8369967 | Hoffberg | Feb 2013 | B2 |
8384539 | Denny | Feb 2013 | B2 |
8447265 | Flippo | May 2013 | B2 |
8473619 | Baum | Jun 2013 | B2 |
8612591 | Dawes | Dec 2013 | B2 |
8635350 | Gutt | Jan 2014 | B2 |
8660790 | Stahl | Feb 2014 | B2 |
8693610 | Hess | Apr 2014 | B2 |
8698614 | Trundle | Apr 2014 | B1 |
8705704 | Smith | Apr 2014 | B2 |
8705716 | Gregory | Apr 2014 | B2 |
8713132 | Baum | Apr 2014 | B2 |
8779921 | Curtiss | Jul 2014 | B1 |
8988232 | Sloo | Mar 2015 | B1 |
9342223 | Dharmalingam | May 2016 | B2 |
9412248 | Cohn | Aug 2016 | B1 |
9516215 | Datikashvili | Dec 2016 | B1 |
9565575 | Kore | Feb 2017 | B2 |
9568902 | Dunn | Feb 2017 | B2 |
9599967 | Price | Mar 2017 | B2 |
9686686 | Dalvi | Jun 2017 | B1 |
9997036 | Scalisi | Jun 2018 | B2 |
10055108 | Bates | Aug 2018 | B2 |
10091014 | Dawes | Oct 2018 | B2 |
10310621 | Lien | Jun 2019 | B1 |
10437448 | Moses | Oct 2019 | B2 |
10448434 | Warren | Oct 2019 | B1 |
10574945 | Seyfi | Feb 2020 | B1 |
10832545 | Ouellette | Nov 2020 | B2 |
11343665 | Wong | May 2022 | B2 |
11379798 | Park | Jul 2022 | B2 |
20020099550 | Emerick, Jr. | Jul 2002 | A1 |
20030202101 | Monroe | Oct 2003 | A1 |
20040174256 | Hershkovitz | Sep 2004 | A1 |
20040189471 | Ciarcia, Jr. | Sep 2004 | A1 |
20040267385 | Lingemann | Dec 2004 | A1 |
20050035855 | Sarnowsky | Feb 2005 | A1 |
20050079880 | Donner | Apr 2005 | A1 |
20050128068 | Winick | Jun 2005 | A1 |
20050192742 | Okochi | Sep 2005 | A1 |
20050253706 | Spoltore | Nov 2005 | A1 |
20060155666 | Diehl | Jul 2006 | A1 |
20070139182 | O'Connor | Jun 2007 | A1 |
20070139183 | Kates | Jun 2007 | A1 |
20070229517 | May | Oct 2007 | A1 |
20070279209 | Kogan | Dec 2007 | A1 |
20080005784 | Miliefsky | Jan 2008 | A1 |
20080109099 | Moshier | May 2008 | A1 |
20090010197 | Chao | Jan 2009 | A1 |
20090036148 | Yach | Feb 2009 | A1 |
20090045952 | Bahari | Feb 2009 | A1 |
20090261943 | Jana | Oct 2009 | A1 |
20090264150 | Andreasson | Oct 2009 | A1 |
20090295918 | Horovitz | Dec 2009 | A1 |
20100004816 | Bauchot | Jan 2010 | A1 |
20100085310 | Becker | Apr 2010 | A1 |
20100161630 | Moriwaki | Jun 2010 | A1 |
20100176962 | Yossef | Jul 2010 | A1 |
20100188197 | Ackley | Jul 2010 | A1 |
20100241744 | Fujiwara | Sep 2010 | A1 |
20100241862 | Garcia Morchon | Sep 2010 | A1 |
20100277315 | Cohn | Nov 2010 | A1 |
20100279649 | Thomas | Nov 2010 | A1 |
20100299118 | Sharma | Nov 2010 | A1 |
20100312366 | Madonna | Dec 2010 | A1 |
20110082618 | Small | Apr 2011 | A1 |
20110082619 | Small | Apr 2011 | A1 |
20110082620 | Small | Apr 2011 | A1 |
20110231451 | Hamamura | Sep 2011 | A1 |
20110274251 | Omernick | Nov 2011 | A1 |
20120086568 | Scott | Apr 2012 | A1 |
20120086573 | Bischoff | Apr 2012 | A1 |
20120092158 | Kumbhar | Apr 2012 | A1 |
20120120773 | O'Toole | May 2012 | A1 |
20120120930 | Ji | May 2012 | A1 |
20120130513 | Hao | May 2012 | A1 |
20120154108 | Sugaya | Jun 2012 | A1 |
20120169487 | Poder | Jul 2012 | A1 |
20120310598 | Gregory | Dec 2012 | A1 |
20130018284 | Kahn | Jan 2013 | A1 |
20130021155 | Gandara | Jan 2013 | A1 |
20130100268 | Mihailidis | Apr 2013 | A1 |
20130116922 | Cai | May 2013 | A1 |
20130157612 | Cordero | Jun 2013 | A1 |
20130218456 | Zelek | Aug 2013 | A1 |
20130271286 | Quan | Oct 2013 | A1 |
20130276144 | Hansen | Oct 2013 | A1 |
20130331087 | Shoemaker | Dec 2013 | A1 |
20140032895 | Moon | Jan 2014 | A1 |
20140100893 | Zizzi | Apr 2014 | A1 |
20140128994 | Hallman | May 2014 | A1 |
20140143695 | Sundermeyer | May 2014 | A1 |
20140198628 | Yang | Jul 2014 | A1 |
20140211099 | Saha | Jul 2014 | A1 |
20140218514 | Dziadosz | Aug 2014 | A1 |
20140218518 | Oliver | Aug 2014 | A1 |
20140235265 | Slupik | Aug 2014 | A1 |
20140243021 | Lerenc | Aug 2014 | A1 |
20140266764 | Henrie | Sep 2014 | A1 |
20140267112 | Dunn | Sep 2014 | A1 |
20140281990 | Gu | Sep 2014 | A1 |
20140306833 | Ricci | Oct 2014 | A1 |
20140309870 | Ricci | Oct 2014 | A1 |
20140313044 | Thompson | Oct 2014 | A1 |
20140359101 | Dawes | Dec 2014 | A1 |
20140368621 | Michiyama | Dec 2014 | A1 |
20150002292 | Cavalcanti | Jan 2015 | A1 |
20150049592 | Braswell | Feb 2015 | A1 |
20150051754 | Kwon | Feb 2015 | A1 |
20150061841 | Lee | Mar 2015 | A1 |
20150074582 | Shearer | Mar 2015 | A1 |
20150230056 | Shin | Aug 2015 | A1 |
20150293509 | Bankowski | Oct 2015 | A1 |
20150304406 | Penilla | Oct 2015 | A1 |
20150339031 | Zeinstra | Nov 2015 | A1 |
20150341375 | Bauer | Nov 2015 | A1 |
20150358387 | Smereka | Dec 2015 | A1 |
20160018798 | Jiang | Jan 2016 | A1 |
20160034762 | Chang | Feb 2016 | A1 |
20160065414 | Sundermeyer | Mar 2016 | A1 |
20160085412 | Meganathan | Mar 2016 | A1 |
20160193983 | Sawada | Jul 2016 | A1 |
20160197999 | Chun | Jul 2016 | A1 |
20160323548 | Khot | Nov 2016 | A1 |
20160337720 | Krishnamurthy | Nov 2016 | A1 |
20160357176 | Chand | Dec 2016 | A1 |
20160359825 | Chand | Dec 2016 | A1 |
20160359873 | Chand | Dec 2016 | A1 |
20170004205 | Jain | Jan 2017 | A1 |
20170032658 | Magyar | Feb 2017 | A1 |
20170076583 | Hua | Mar 2017 | A1 |
20170076584 | Eskildsen | Mar 2017 | A1 |
20170080898 | Cogill | Mar 2017 | A1 |
20170082997 | Lu | Mar 2017 | A1 |
20170103644 | Chauhan | Apr 2017 | A1 |
20170186309 | Sager | Jun 2017 | A1 |
20170191693 | Bruhn | Jul 2017 | A1 |
20170193803 | Dey | Jul 2017 | A1 |
20170322715 | Cohrt | Nov 2017 | A1 |
20170372600 | Palin | Dec 2017 | A1 |
20180031371 | Mankovskii | Feb 2018 | A1 |
20180063681 | Mankovskii | Mar 2018 | A1 |
20180137743 | Tanaka | May 2018 | A1 |
20180174413 | Siminoff | Jun 2018 | A1 |
20180176512 | Siminoff | Jun 2018 | A1 |
20180203723 | Krueger | Jul 2018 | A1 |
20180203807 | Krueger | Jul 2018 | A1 |
20180211301 | Davies | Jul 2018 | A1 |
20180211510 | Poder | Jul 2018 | A1 |
20180373236 | Ewert | Dec 2018 | A1 |
20190005942 | Ma | Jan 2019 | A1 |
20190042063 | Mizuno | Feb 2019 | A1 |
20190149696 | Drako | May 2019 | A1 |
20190176752 | Cermak | Jun 2019 | A1 |
20190187283 | Kathan | Jun 2019 | A1 |
20190190738 | Jiang | Jun 2019 | A1 |
20190196692 | Ma | Jun 2019 | A1 |
20190212909 | Napier | Jul 2019 | A1 |
20190288868 | Mosalem | Sep 2019 | A1 |
20190289134 | Dawes | Sep 2019 | A1 |
20190372862 | Carrigan | Dec 2019 | A1 |
20200053325 | Deyle | Feb 2020 | A1 |
20200097734 | Miyake | Mar 2020 | A1 |
20200226388 | Ghessassi | Jul 2020 | A1 |
20200279473 | Paxton | Sep 2020 | A1 |
20210097315 | Carruthers | Apr 2021 | A1 |
20220031172 | He | Feb 2022 | A1 |
Number | Date | Country |
---|---|---|
104781632 | Jul 2015 | CN |
107967128 | Apr 2018 | CN |
WO-2012119253 | Sep 2012 | WO |
WO-2020176802 | Sep 2020 | WO |
Entry |
---|
Deng et al., Research of Intelligent Home Control System (Year: 2010). |
Fujita et al., Menu Driven User Interface for Home System (Year: 1994). |
Nichols et al., Controlling Home and Office Appliances with Smart Phones (Year: 2006). |
Putra et al., Monitor and Control Panel of Building Security (Year: 2017). |
Control4, The Connected Car Meets the Connected Home (Year: 2016). |
AT&T, Integrates Home Security and Automation Controls with the Connected Car (Year: 2015). |
U.S. Appl. No. 16/289,400, filed Feb. 28, 2019, Virtual Partition of a Security System. |
“U.S. Appl. No. 16/289,400, Final Office Action dated Jun. 26, 2020”, 42 pgs. |
“U.S. Appl. No. 16/289,400, Non Final Office Action dated Dec. 20, 2019”, 34 pgs. |
“U.S. Appl. No. 16/289,400, Response filed Mar. 20, 2020 to Non Final Office Action dated Dec. 20, 2019”, 13 pgs. |
“U.S. Appl. No. 16/289,400, Response filed Sep. 25, 2020 to Final Office Action dated Jun. 26, 2020”, 13 pgs. |
“International Application Serial No. PCT/US2020/020230, International Search Report dated Jun. 30, 2020”, 3 pgs. |
“International Application Serial No. PCT/US2020/020230, Written Opinion dated Jun. 30, 2020”, 4 pgs. |
“Appearance of Virtual Character Reflects User Security Risk Attributes”, IP, (2013). |
“U.S. Appl. No. 16/289,400, Examiner Interview Summary dated Feb. 12, 2021”, 3 pgs. |
“U.S. Appl. No. 16/289,400, Final Office Action dated Mar. 1, 2021”, 49 pgs. |
“U.S. Appl. No. 16/289,400, Non Final Office Action dated Nov. 10, 2020”, 45 pgs. |
“U.S. Appl. No. 16/289,400, Response filed Feb. 10, 2021 to Non Final Office Action dated Nov. 10, 2020”, 14 pgs. |
“U.S. Appl. No. 16/289,400, Response filed Jun. 1, 2021 to Final Office Action dated Mar. 1, 2021”, 14 pgs. |
Ali, Bako, et al., “Cyber and Physical Security Vulnerability Assessment for IoT-Based Smart Homes”, Sensors, 18(3), 817, (2018), 23 pgs. |
Boussard, Mathieu, et al., “Future Spaces: Reinventing the Home Network for Better Security and Automation in the IoT Era”, Sensors, 18(9), 2986, (2018), 38 pgs. |
Madria, Sanjay, “Sensor Cloud Sensing-as-a-Service Paradigm”, (2018). |
Ohoussou, et al., “Autonomous Agent Based Intrusion Detection in Virtual Computing Environment”, (2010). |
Varadharajan, et al., “On the Design and Implementation of an Integrated Security Architecture for Cloud with Improved Resilience”, (2017). |
Yang, Aimin, et al., “Security and Privacy of Smart Home Systems Based on the Internet of Things and Stereo Matching Algorithms”, IEEE Internet of Things Journal, 7(4), (Apr. 2020), 2521-2530. |
Zhao, et al., “The Application of Virtual Machines on System Security”, (2009). |
“U.S. Appl. No. 16/289,400, Non Final Office Action dated Jul. 7, 2021”, 48 pgs. |
“U.S. Appl. No. 16/289,400, Response filed Nov. 5, 2021 to Non Final Office Action dated Jul. 7, 2021”, 14 pgs. |
“Hardwire (verb) American English definition and synonyms _ Macmillan Dictionary”. |
“International Application Serial No. PCT/US2020/020230, International Preliminary Report on Patentability dated Sep. 10, 2021”, 6 pgs. |
Patrick, McNeil, “Secure Internet of Things Deployment in the Cement Industry Guidance for Plant Managers”, (2018). |
Patrick, McNeil, “Secure IoT deployment in the cement industry”, (2017). |
Stauffer, et al., “Smart enabling system for home automation”, (1991). |
“Chinese Application Serial No. 202080032159.5, Office Action dated Mar. 22, 2022”, with English translation, 18 pages. |
“Chinese Application Serial No. 202080032159.5, Response filed Aug. 8, 2022 to Office Action dated Mar. 22, 2022”, w English Claims, 20 pgs. |
“U.S. Appl. No. 16/289,400, Appeal Brief filed Aug. 24, 2022”, 30 pgs. |
“Chinese Application Serial No. 202080032159.5, Office Action dated Oct. 11, 2022”, w English Translation, 19 pgs. |
Number | Date | Country | |
---|---|---|---|
20200279475 A1 | Sep 2020 | US |