The present invention relates generally to security systems. More particularly, the present invention relates to systems and methods for configuring a security sensor within a security system.
Security systems are known to detect threats within a secured area, and such threats include events that represent a risk to human safety or a risk to assets.
Security systems typically include one or more security sensors that detect the threats within the secured area. For example, smoke, motion, and/or intrusion sensors are distributed throughout the secured area in order to detect the threats.
For less sophisticated users, configuring the security sensors of a security system can be quite difficult. For example, known security sensors are configured within the security system using a web-based interface or a mobile application. While these configuration methods successfully configure the security sensors, many users, especially residential customers, find such a configuration process daunting or difficult. As such, there is a need for a simpler and more efficient system and method for configuring the security sensors within the security system.
While this invention is susceptible of an embodiment in many different forms, there are shown in the drawings and will be described herein in detail specific embodiments thereof with the understanding that the present disclosure is to be considered as an exemplification of the principles of the invention. It is not intended to limit the invention to the specific illustrated embodiments.
Embodiments disclosed herein can include systems and methods for configuring a security sensor within a security system. In some embodiments, the security sensor can include one or more buttons or one or more toggles that can automatically set a working mode for the security sensor, such as a total alarm mode or a partial alarm mode. For example, the total alarm mode can configure the security sensor to be active when the security system is operating with either an arm-away status or an arm-stay status, and the partial alarm mode can configure the security sensor to be active only when the security system is operating with the arm-away status. In some embodiments, the security system operating with the arm-away status can include activating all of the security sensors in a secured area, and in some embodiments, the security system operating with the arm-stay status, such as when a homeowner or other authorized person is present within the secured area, can include deactivating the security sensors located in an internal portion of the secured area (e.g. motion sensors, internal security cameras) and activating the security sensors along a periphery of the secured area or at potential avenues of ingress into the secured area (e.g. windows, doors, etc.).
In some embodiments, a user can place the security sensor at a desired location, press a single first button of the one or more buttons on the security sensor to set the security sensor to a first working mode, and turn on the security sensor. Furthermore, in some embodiments, the security sensor can identify the first working mode for the security sensor based on the first button that was pressed by the user and can automatically register with a control panel of the security system in accordance with the first working mode.
In some embodiments, the user may reallocate or reconfigure the security sensor by pressing a second button of the one or more buttons on the security sensor that is different than the first button and resetting the security sensor. For example, resetting the security sensor can cause the security sensor to re-register with the control panel in accordance with a second working mode that corresponds to the second button (e.g. the security sensor can change from the total alarm mode to the partial alarm mode). Additionally or alternatively, the user can add a new security sensor to the security system by purchasing the new security sensor and configuring the new security sensor using the one or more buttons. Additionally or alternatively, the user can remove the security sensor or the new security sensor from the security system by pressing an on/off button on the security sensor or the new security system.
In some embodiments, the security sensor may include at least an on/off button and a working mode selection input on an exterior of a housing of the security sensor. For example, the working mode selection input may include a plurality of buttons, wherein each of the plurality of buttons corresponds to a respective working mode for the security sensor, or a toggle switch, wherein each of a plurality of positions of the toggle switch corresponds to the respective working mode for the security sensor. The user may activate or deactivate the security sensor by pressing the on/off button and may configure the security sensor by pressing or toggling the working mode selection input. In some embodiments, the security sensor may also include an LED indicator or a display that can shine a light or display text indicative of the working mode for the security sensor selected by the user.
Although not illustrated, in some embodiments, the security sensor 100 can additionally or alternatively include a display, and in some embodiments the security sensor 100 can additionally or alternatively include a single working mode selection button. For example, user input selecting the single working mode selection button can cause the security sensor 100 to shuffle through a plurality of working modes available to the security sensor 100, each of which can be displayed on the display for selection by a user. In some embodiments, the display may include one or more LEDs, an LCD screen, or the like, and in some embodiments, the single working mode selection button may also be displayed on a touch screen of the display.
The security sensor 420 can include one or more buttons 428, a transceiver 422, user input circuitry 426, control circuitry 424, one or more programmable processors 424a, and executable control software 424b as would be understood by one of ordinary skill in the art. The executable control software 424b can be stored on a transitory or non-transitory computer readable medium, including, but not limited to local computer memory, RAM, optical storage media, magnetic storage media, flash memory, and the like. In some embodiments, some or all of the control circuitry 424, the programmable processor 424a, and the control software 424b can execute and control the methods described herein.
The control panel 430 can also include a transceiver 432, control circuitry 436, one or more programmable processors 436a, and executable control software 436b as would be understood by one of ordinary skill in the art. The executable control software 436b can be stored on a transitory or non-transitory computer readable medium, including, but not limited to local computer memory, RAM, optical storage media, magnetic storage media, flash memory, and the like.
In some embodiments, the user input circuitry 426 can receive user input selecting one or more of the buttons 428, can identify which of the buttons is selected by the user input, and can transmit a signal to the control circuitry 424 identifying a working mode associated with the selected button. In some embodiments, the control circuitry 424, the programmable processor 424a, and the control software 424b can receive the signal from the user input circuitry 426 identifying which of the buttons 428 is selected by the user input and can transmit a registration message to the control panel 430 through the network 440 in accordance with the signal received from the user input circuitry 426. For example, when the user input selects a first of the buttons 428, the control circuitry 424, the programmable processor 424a, and the control software 424b can transmit a first registration message to the control panel 430 to cause the security sensor 200 to register with the control panel 430 in accordance with a first working mode, but when the user input selects a second of the buttons 428, the control circuitry 424, the programmable processor 424a, and the control software 424b can transmit a second registration message to the control panel 430 to cause the security sensor 200 to register with the control panel 430 in accordance with a second working mode.
Although a few embodiments have been described in detail above, other modifications are possible. For example, the logic flows described above do not require the particular order described or sequential order to achieve desirable results. Other steps may be provided, steps may be eliminated from the described flows, and other components may be added to or removed from the described systems. Other embodiments may be within the scope of the invention.
From the foregoing, it will be observed that numerous variations and modifications may be effected without departing from the spirit and scope of the invention. It is to be understood that no limitation with respect to the specific system or method described herein is intended or should be inferred. It is, of course, intended to cover all such modifications as fall within the spirit and scope of the invention.
This application is a continuation of and claims the benefit of the filing date of U.S. application Ser. No. 16/791,637 filed Feb. 14, 2020, which is a continuation of and claims the benefit of the filing date of U.S. application Ser. No. 15/851,170 filed Dec. 21, 2017, which issued as U.S. Pat. No. 10,600,312 on Mar. 24, 2020.
Number | Name | Date | Kind |
---|---|---|---|
6198389 | Buccola | Mar 2001 | B1 |
6288639 | Addy | Sep 2001 | B1 |
7528711 | Kates | May 2009 | B2 |
8136738 | Kopp | Mar 2012 | B1 |
8185049 | Zhang | May 2012 | B2 |
10169983 | H. M. | Jan 2019 | B2 |
10252037 | Degen et al. | Apr 2019 | B2 |
11100786 | Dey | Aug 2021 | B2 |
20020077077 | Rezvani | Jun 2002 | A1 |
20020126137 | Kaestner | Sep 2002 | A1 |
20040090327 | Soloway | May 2004 | A1 |
20060209176 | Nakamura | Sep 2006 | A1 |
20080252598 | Fan | Oct 2008 | A1 |
20100145479 | Griffiths | Jun 2010 | A1 |
20100219948 | Eaawa | Sep 2010 | A1 |
20120203841 | Cavalcanti | Aug 2012 | A1 |
20120286951 | Hess | Nov 2012 | A1 |
20130067544 | Kwark et al. | Mar 2013 | A1 |
20140036728 | An | Feb 2014 | A1 |
20140258727 | Schmit | Sep 2014 | A1 |
20140266687 | Britton | Sep 2014 | A1 |
20140288912 | Inoue | Sep 2014 | A1 |
20140375436 | Rezvani | Dec 2014 | A1 |
20150221209 | Janardhanan | Aug 2015 | A1 |
20150281872 | Pierrel | Oct 2015 | A1 |
20150332585 | H.M. | Nov 2015 | A1 |
20160183037 | Grohman | Jun 2016 | A1 |
20160189528 | Lee | Jun 2016 | A1 |
20160267774 | Janardhanan | Sep 2016 | A1 |
20160326765 | Barbret | Nov 2016 | A1 |
20160341437 | Matsuoka | Nov 2016 | A1 |
20170013069 | Grohman | Jan 2017 | A1 |
20170032658 | Magyar | Feb 2017 | A1 |
20170078018 | Walma, Jr. | Mar 2017 | A1 |
20170082997 | Lu et al. | Mar 2017 | A1 |
20170119207 | Kim | May 2017 | A1 |
20170159268 | Chevalier | Jun 2017 | A1 |
20170201583 | Leyman | Jul 2017 | A1 |
20170238192 | Lee | Aug 2017 | A1 |
20170240079 | Petrovski | Aug 2017 | A1 |
20180227171 | Yoshida et al. | Aug 2018 | A1 |
Number | Date | Country |
---|---|---|
615798 | Oct 1991 | AU |
3 136 353 | Mar 2017 | EP |
10-0848929 | Aug 2008 | KR |
WO 0049589 | Aug 2000 | WO |
Entry |
---|
English language translation of bibliographic data and abstract for KR100848929 (B1). |
English language translation of Patent Record Full View of KR848929B1. |
Alarm Systems—Custom Security Systems, accessed electronically on Oct. 27, 2017, http://customsecuritysystems.com/home-security/alarm-systems/. |
Extended European search report for corresponding EP patent application 18192491.1, dated Mar. 20, 2019. |
Number | Date | Country | |
---|---|---|---|
20200342743 A1 | Oct 2020 | US |
Number | Date | Country | |
---|---|---|---|
Parent | 16791637 | Feb 2020 | US |
Child | 16923263 | US | |
Parent | 15851170 | Dec 2017 | US |
Child | 16791637 | US |