The present invention relates generally to security systems and methods. More particularly, the present invention relates to a system and method of security enhancement in a security panel.
Keyfobs are known in the art. For example, known keyfobs can wirelessly communicate with a security system, including a control panel of a security system. Indeed, some known keyfobs can include a disarm button that, when depressed, can wirelessly transmit a signal to the security system to disarm the security system.
However, keyfobs are highly susceptible to being stolen or lost, which can create a dangerous situation for a user of a security system. Indeed, if an unauthorized user obtains possession of a known keyfob, then he can easily disarm the security system simply by depressing the disarm button on the keyfob.
In view of the above, there is a continuing, ongoing need for improved systems and methods.
While this invention is susceptible of an embodiment in many different forms, there are shown in the drawings and will be described herein in detail specific embodiments thereof with the understanding that the present disclosure is to be considered as an exemplification of the principles of the invention. It is not intended to limit the invention to the specific illustrated embodiments.
Embodiments disclosed herein include a system and method of security enhancement in a security panel. For example, some embodiments disclosed herein include a keyfob that can include a disarm button protected by a user pass code.
As disclosed herein, some embodiments can include configuring a keyfob with a protected disarm button. For example, a control panel of a security system can be placed in a configuration mode for a keyfob identified by the control panel. In some embodiments, a user can provide input to identify the keyfob to the control panel. Additionally or alternatively, in some embodiments, a keyfob can wirelessly transmit a signal to the control panel that includes identifying information of the keyfob.
After the control panel has identified the keyfob, the control panel can prompt a user to enter a user pass code into the control panel. For example, the pass code can include a sequence of buttons on the keyfob to be depressed by a user. The user can save the user pass code at the control panel, and the control panel can wirelessly transmit the saved user pass code to the identified keyfob.
As disclosed herein, some embodiments can also include disarming a security system with a keyfob that includes a protected disarm button. For example, a user can depress a disarm button on the keyfob and then depress a sequence of buttons on the keyfob. The keyfob can determine whether the depressed sequence of buttons corresponds to a valid user pass code saved in the keyfob. If so, then the keyfob can wirelessly transmit a signal to a control panel of a security system to disarm the security system. However, if the keyfob determines that the depressed sequence of buttons does not correspond to a valid user pass code saved in the keyfob, then the keyfob will not transmit a disarm signal to the security system.
In some embodiments, the keyfob can provide audible or visual feedback when the keyfob determines that the depressed sequence of buttons corresponds to the valid user pass code saved in the keyfob and responsive thereto, transmits the disarm signal to the control panel of the security system. For example, the keyfob can include one or more LEDs that can flash, blink, or light up upon the occurrence of such predetermined conditions. Additionally or alternatively, the keyfob can include one or more annunciators that can beep upon the occurrence of such predetermined conditions.
After the control panel has identified the keyfob as in 110, the method 100 can include the control panel prompting a user to enter a user pass code into the control panel and receiving user input that includes the user pass code as in 120. Then, the method 100 can include the control panel saving the entered user pass code as in 130 and wirelessly transmitting the saved user pass code to the identified keyfob as in 140.
The wireless transceiver 310 can communicate with a control panel of a security system, and the memory device 320 can store a user pass code received from the control panel of the security system, via the transceiver 310. The user interface device 330 can include a plurality of buttons or other user input mechanisms, including a disarm button. In accordance with disclosed embodiments, a user can select or depress a sequence of the user input mechanisms, and the control circuitry 340, programmable processor 340a, and executable control software 340b can compare the received sequence with a valid user pass code stored in the memory device 320. Responsive thereto, the control circuitry 340, programmable processor 340a, and executable control software 340b can determine whether to transmit a disarm signal, via the transceiver 310 to the control panel of the security system.
It is to be understood that although embodiments have been described with respect to a keyfob that includes a disarm button protected with a user pass code, systems and methods disclosed herein are not so limited. Instead, the systems and methods disclosed herein can include protecting any user input mechanism or button of a keyfob with a user pass code as disclosed and described herein.
Although a few embodiments have been described in detail above, other modifications are possible. For example, the logic flows described above do not require the particular order described, or sequential order, to achieve desirable results. Other steps may be provided, or steps may be eliminated, from the described flows, and other components may be added to, or removed from, the described systems. Other embodiments may be within the scope of the invention.
From the foregoing, it will be observed that numerous variations and modifications may be effected without departing from the spirit and scope of the invention. It is to be understood that no limitation with respect to the specific system or method described herein is intended or should be inferred. It is, of course, intended to cover all such modifications as fall within the spirit and scope of the invention.