US20180158294A1 - Building security and automation system having user-defined screens and associated method - Google Patents
Building security and automation system having user-defined screens and associated method Download PDFInfo
- Publication number
- US20180158294A1 US20180158294A1 US15/871,764 US201815871764A US2018158294A1 US 20180158294 A1 US20180158294 A1 US 20180158294A1 US 201815871764 A US201815871764 A US 201815871764A US 2018158294 A1 US2018158294 A1 US 2018158294A1
- Authority
- US
- United States
- Prior art keywords
- screen
- control panel
- user
- display
- depicted
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
Images
Classifications
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B13/00—Burglar, theft or intruder alarms
- G08B13/02—Mechanical actuation
- G08B13/08—Mechanical actuation by opening, e.g. of door, of window, of drawer, of shutter, of curtain, of blind
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B13/00—Burglar, theft or intruder alarms
- G08B13/18—Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength
- G08B13/189—Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems
- G08B13/194—Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems
- G08B13/196—Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
- G08B13/19678—User interface
- G08B13/19684—Portable terminal, e.g. mobile phone, used for viewing video remotely
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B25/00—Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems
- G08B25/008—Alarm setting and unsetting, i.e. arming or disarming of the security system
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B25/00—Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems
- G08B25/009—Signalling of the alarm condition to a substation whose identity is signalled to a central station, e.g. relaying alarm signals in order to extend communication range
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B25/00—Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems
- G08B25/01—Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems characterised by the transmission medium
- G08B25/10—Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems characterised by the transmission medium using wireless transmission systems
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B25/00—Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems
- G08B25/14—Central alarm receiver or annunciator arrangements
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B3/00—Audible signalling systems; Audible personal calling systems
- G08B3/10—Audible signalling systems; Audible personal calling systems using electric transmission; using electromagnetic transmission
-
- H—ELECTRICITY
- H02—GENERATION; CONVERSION OR DISTRIBUTION OF ELECTRIC POWER
- H02J—CIRCUIT ARRANGEMENTS OR SYSTEMS FOR SUPPLYING OR DISTRIBUTING ELECTRIC POWER; SYSTEMS FOR STORING ELECTRIC ENERGY
- H02J50/00—Circuit arrangements or systems for wireless supply or distribution of electric power
- H02J50/20—Circuit arrangements or systems for wireless supply or distribution of electric power using microwaves or radio frequency waves
-
- H—ELECTRICITY
- H02—GENERATION; CONVERSION OR DISTRIBUTION OF ELECTRIC POWER
- H02J—CIRCUIT ARRANGEMENTS OR SYSTEMS FOR SUPPLYING OR DISTRIBUTING ELECTRIC POWER; SYSTEMS FOR STORING ELECTRIC ENERGY
- H02J50/00—Circuit arrangements or systems for wireless supply or distribution of electric power
- H02J50/80—Circuit arrangements or systems for wireless supply or distribution of electric power involving the exchange of data, concerning supply or distribution of electric power, between transmitting devices and receiving devices
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/28—Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
- H04L12/2803—Home automation networks
- H04L12/2816—Controlling appliance services of a home automation network by calling their functionalities
- H04L12/282—Controlling appliance services of a home automation network by calling their functionalities based on user interaction within the home
-
- H04W4/008—
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/80—Services using short range communication, e.g. near-field communication [NFC], radio-frequency identification [RFID] or low energy communication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/28—Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
- H04L12/2803—Home automation networks
- H04L2012/284—Home automation networks characterised by the type of medium used
- H04L2012/2841—Wireless
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/28—Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
- H04L12/2803—Home automation networks
- H04L2012/2847—Home automation networks characterised by the type of home appliance used
- H04L2012/285—Generic home appliances, e.g. refrigerators
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y02—TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
- Y02B—CLIMATE CHANGE MITIGATION TECHNOLOGIES RELATED TO BUILDINGS, e.g. HOUSING, HOUSE APPLIANCES OR RELATED END-USER APPLICATIONS
- Y02B70/00—Technologies for an efficient end-user side electric power management and consumption
- Y02B70/30—Systems integrating technologies related to power network operation and communication or information technologies for improving the carbon footprint of the management of residential or tertiary loads, i.e. smart grids as climate change mitigation technology in the buildings sector, including also the last stages of power distribution and the control, monitoring or operating management systems at local level
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y04—INFORMATION OR COMMUNICATION TECHNOLOGIES HAVING AN IMPACT ON OTHER TECHNOLOGY AREAS
- Y04S—SYSTEMS INTEGRATING TECHNOLOGIES RELATED TO POWER NETWORK OPERATION, COMMUNICATION OR INFORMATION TECHNOLOGIES FOR IMPROVING THE ELECTRICAL POWER GENERATION, TRANSMISSION, DISTRIBUTION, MANAGEMENT OR USAGE, i.e. SMART GRIDS
- Y04S20/00—Management or operation of end-user stationary applications or the last stages of power distribution; Controlling, monitoring or operating thereof
- Y04S20/20—End-user application control systems
Definitions
- FIG. 1 is a conceptual diagram illustrating an example of a system that includes a building security and automation system and a central monitoring station.
- FIG. 2 is a conceptual diagram illustrating various examples of components of the security system 12 of FIG. 1 , including a control panel and various sensors.
- FIG. 3 is a functional block diagram illustrating an example of the control panel of the security system in FIG. 2 , in accordance with this disclosure.
- FIG. 4 is a perspective view of an example of the control panel of FIG. 2 .
- FIG. 5 is a side view of the example control panel of FIG. 4 .
- FIG. 6A is perspective front view of the example control panel of FIG. 4 , illustrating a sealed speaker, in accordance with this disclosure.
- FIG. 6B is cross-sectional end view of the example control panel of FIG. 4 , illustrating a sealed speaker, in accordance with this disclosure.
- FIG. 7 is perspective back view of the example control panel of FIG. 6A , illustrating a replaceable cellular module, in accordance with this disclosure.
- FIGS. 8A and 8B are perspective views of the replaceable cellular module of FIG. 7 , in accordance with this disclosure.
- FIG. 9 is a perspective view of a portion of a control panel.
- FIGS. 10A-10D are examples of screenshots of various portions depicting a user-defined home screen.
- this disclosure is directed to a security system control panel or home automation control panel comprising an end-user replaceable cellular telephony module that is removable from the control panel without disassembling the control panel, the cellular module including a body; a cellular telephony circuit coupled to the body; a cellular telephony antenna coupled to the body and the cellular telephony circuit; and a first connector coupled to the cellular telephony circuit and the body, wherein the first connector is sized and shaped or otherwise configured to be removably engaged by the end-user with a second connector in the control panel.
- this disclosure is directed to a security system control panel or home automation control panel comprising a display; a housing configured to support the display; and a speaker having a front from which sound is projected, a rear opposite the front, a first side, and a second side opposite the first side; and a sealed speaker enclosure positioned within the housing, the sealed speaker enclosure including a speaker case, wherein a portion of the speaker case and a portion of the speaker define the sealed speaker enclosure.
- this disclosure is directed to a security system control panel or home automation control panel comprising a Bluetooth circuit configured to receive at least one Bluetooth signal from one or more Bluetooth-enabled devices; a processor configured to store data identifying an authorized Bluetooth-enabled device in a memory; detect the authorized Bluetooth-enabled device; and disarm the security system control panel in response to the detection.
- a Bluetooth circuit configured to receive at least one Bluetooth signal from one or more Bluetooth-enabled devices
- a processor configured to store data identifying an authorized Bluetooth-enabled device in a memory; detect the authorized Bluetooth-enabled device; and disarm the security system control panel in response to the detection.
- this disclosure is directed to security system control panel or home automation control panel comprising a user interface including a display; and a home screen module configured to: receive an input from the end-user defining at least one screen depicted on the display; store data representing the at least one end-user-defined screen in a memory; and perform one or more actions previously associated by the user with the defined screen.
- this disclosure is directed to a security system control panel or home automation control panel comprising an end-user replaceable cellular telephony module that is removable from the control panel without disassembling the control panel, the cellular module including a body; a cellular telephony circuit coupled to the body; a cellular telephony antenna coupled to the body and the cellular telephony circuit; and a first connector coupled to the cellular telephony circuit and the body, wherein the first connector is sized and shaped or otherwise configured to be removably engaged by the end-user with a second connector in the control panel.
- the control panel further includes a display; a housing configured to support the display; a speaker having a front from which sound is projected, a rear opposite the front, a first side, and a second side opposite the first side; and a sealed speaker enclosure positioned within the housing, the sealed speaker enclosure including a speaker case, wherein a portion of the speaker case and a portion of the speaker define the sealed speaker enclosure.
- the control panel further includes a user interface including the display; and a home screen module configured to: receive an input from the end-user defining at least one screen depicted on the display; store data representing the at least one end-user-defined screen in a memory; and perform one or more actions previously associated by the user with the defined screen; a Bluetooth circuit configured to receive at least one Bluetooth signal from one or more Bluetooth-enabled devices; a processor configured to: store data identifying an authorized Bluetooth-enabled device in a memory; detect the authorized Bluetooth-enabled device; and disarm the security system control panel in response to the detection.
- a user interface including the display
- a home screen module configured to: receive an input from the end-user defining at least one screen depicted on the display; store data representing the at least one end-user-defined screen in a memory; and perform one or more actions previously associated by the user with the defined screen
- a Bluetooth circuit configured to receive at least one Bluetooth signal from one or more Bluetooth-enabled devices
- a processor configured to: store data
- the control panel further includes a radio-frequency (RF) circuit configured to: when the control panel is in an unpowered state: receive power from an RF signal from an RF programming device; receive data embedded in the RF signal from the powered RF circuit; and using the received power from the RF signal store the data in a memory that is otherwise unpowered, wherein the processor is configured to: when the control panel is in a powered state: receive the stored data; and configure at least one parameter using the received data.
- RF radio-frequency
- FIG. 1 is a conceptual diagram illustrating an example of a system 10 that may include a building security and automation system 12 and a central monitoring station 14 that monitors received communications from one or more building security and automation systems 12 .
- the building security and automation system 12 (also referred to in this disclosure as “security system 12 ”) may transmit signals to and receive signals from the central monitoring station 14 via a network 16 .
- the security system 12 may detect an unauthorized opening of a monitored building, e.g., home, door or window and transmit an alarm signal to the central monitoring station 14 .
- personnel at the central monitoring station 14 may attempt to contact a user by way of a control panel (depicted in detail in FIG. 3 ) of the security system 12 , e.g., using bidirectional communication techniques.
- the security system 12 may communicate with the central monitoring station 14 using wired or wireless communication techniques.
- the network 16 may utilize a traditional POTS (plain old telephone service) telephone line, or wired Ethernet.
- POTS plain old telephone service
- the network 16 may be a cellular telephone network for wireless communication. It may be desirable to communicate signals wirelessly to the central monitoring station 14 in order to eliminate an intruder's ability to cut or otherwise damage a wired phone line and thus disable communications.
- the security system 12 may also receive control signals via a remote device 18 , e.g., a smartphone, tablet computer, or other computing device, that may control one or more aspects of the security system 12 . Also, the remote device 18 may receive status signals from the security system 12 that indicate one or more statuses of the security system 12 .
- a remote device 18 e.g., a smartphone, tablet computer, or other computing device
- the user may remotely arm the security system 12 using the remote device 18 via the network 16 .
- the remote device 18 may receive a status signal from the security system 12 indicating that the security system 12 is unarmed, and display the status, e.g., via an application executed on a smartphone.
- the remote device 18 may receive a status signal from the security system 12 indicating that the security system 12 is armed, and display the status.
- the security system 12 of FIG. 1 may receive signals that may be used as part of an automation scheme to control various aspects of the building, e.g., home.
- a user may use a control panel (depicted in detail in FIG. 3 ) of the security system 12 to, for example, turn lights on/off in a home or other building, adjust a temperature, e.g., raise or lower a thermostat setting, and the like.
- the user may use a remote device 18 , e.g., a smartphone, tablet computer, or other computing device, to transmit signals to the control panel of the security system 12 via the network 16 to turn lights on/off in a home or other building, adjust a temperature, e.g., raise or lower a thermostat setting, and the like.
- a remote device 18 e.g., a smartphone, tablet computer, or other computing device, to transmit signals to the control panel of the security system 12 via the network 16 to turn lights on/off in a home or other building, adjust a temperature, e.g., raise or lower a thermostat setting, and the like.
- FIG. 2 is a conceptual diagram illustrating various examples of components of the security system 12 of FIG. 1 , including a control panel 20 and various sensors.
- the security system 12 may include a control panel 20 for receiving status signals from various sensors, including, for example, a window sensor 22 , a motion sensor 24 , and a door sensor 26 . Numerous other types of sensors may also be included as part of the security system 12 , which are not depicted FIG. 2 .
- the security system 12 may also include one or more of the following sensors: glass break sensors, smoke detection sensors, carbon monoxide detection sensors, and flooding sensors.
- the security system 12 may include a key fob 28 that may transmit control signals, e.g., RF control signals, to the control panel 20 to control various aspects of the security system 12 .
- control signals e.g., RF control signals
- a user may remotely arm/disarm the security system 12 using the key fob 28 .
- the security system 12 may also include a remote keypad 30 that may transmit control signals to and receive status signals from the control panel 20 .
- a remote keypad 30 may be located in a bedroom of a home, thereby allowing a user to arm/disarm the security system 12 or view the status of the security system 12 from the bedroom without having to use the control panel 20 , which may be located in another part of the home.
- the security system 12 may also be used for automation purposes.
- the control panel 20 of FIG. 2 (and/or the remote keypad 30 ) may depict a lighting controller 32 and a temperature controller 34 .
- the control panel 20 may be configured to transmit control signals to the lighting controller 32 that turns one or more lights in a building on/off.
- the control panel 20 may transmit the lighting control signals at programmed times, e.g., using a programmed daily schedule.
- control panel 20 may be configured to transmit control signals to a temperature controller 34 that adjusts a temperature, e.g., raise or lower a thermostat setting, in a building.
- control panel 20 may transmit the temperature control signals at programmed times, e.g., using a programmed daily schedule.
- the remote keypad 30 may be configured to transmit control signals to the control panel 20 , which can then transmit the signal(s) to the lighting controller 32 and/or the temperature controller 34 , e.g., using a programmed daily schedule.
- control panel 20 may receive signals from and/or transmit signals to a remote device 18 , e.g., a smartphone, tablet computer, or other computing device.
- the remote device 18 may receive status signals from the control panel 20 that indicate one or more statuses of the security system 12 , e.g., whether the system is armed or disarmed.
- the remote device 18 may also transmit control signals that control one or more aspects of the security system 12 .
- the security system 12 may include one or more speakers (not depicted) as part of a home automation system, for example. Enunciations, signals, or other alerts from the security system may interrupt an audio stream playing through the speakers and transmit the enunciations, signals, or other alerts through the speakers.
- FIG. 3 is a functional block diagram illustrating an example of the control panel 20 of the security system in FIG. 2 , in accordance with this disclosure.
- the control panel 20 of FIG. 3 may include a processor 40 , a power supply 42 (e.g., an AC powered source and a battery backup circuit), a memory circuit (or memory device) 44 , a user interface 46 configured to receive input from a user, a speaker circuit 48 , and a speaker 50 .
- the control panel 20 can also include a piezoelectric siren circuit and piezoelectric transducer (not depicted).
- the processor 40 may be a microprocessor, general purpose controller, field-programmable gate array (FPGA), application-specific integrated circuit (ASIC), or other discrete or integrated logic circuitry, for example.
- FPGA field-programmable gate array
- ASIC application-specific integrated circuit
- the user interface 46 may include a touchscreen display for receiving input, e.g., arming/disarming the security system 12 , or defining a home screen or bookmark.
- the touchscreen display may display one or more buttons for controlling various aspects of the security system.
- the user interface may include a display and one or more physical buttons for controlling various aspects of the security system 12 .
- the memory circuit 44 may include one or more volatile or non-volatile memory devices, e.g., Flash memory, RAM, EPROM, EEPROM, embedded MMC, etc.
- the memory circuit 44 may store instructions that, when executed by the processor 40 , configure the processor 40 to perform the functionality described in this disclosure. For example, upon receiving an input to arm the security system 12 , the processor 40 may execute instructions that cause the speaker circuit 48 to output a signal to the speaker 50 that announces that the security system will soon be armed.
- control panel 20 may include a cellular circuit 52 with an associated antenna 54 for transmitting signals to and receiving signals from the central monitoring station 14 or the remote device 18 , e.g., via a cellular network 16 .
- the cellular circuit 52 and the antenna 54 may be formed as part of a replaceable cellular module (shown at 110 in FIGS. 7, 8A, 8B ). This replaceable module may allow a customer or technician, for example, to replace a cellular module without disassembling the control panel 20 .
- the cellular circuit 52 e.g., radio
- the antenna 54 may be interchangeable on the replaceable cellular module.
- the antenna 54 may be detachable so that a first antenna can be detached and replaced by a second antenna, e.g., an antenna extending outside the control panel (external), on the replaceable cellular module.
- This may allow the manufacturer, for example, to pair a radio and an antenna on the replaceable cellular module at the factory so that the customer does not have to connect the antenna and the radio.
- the control panel 20 may also include a tamper detection circuit 56 for detecting when a door (shown in FIGS. 5 and 7 ) that allows the replaceable cellular module to be replaced has been opened and, if so, transmit an alarm signal to the central monitoring station 14 before the replaceable cellular module has been removed from the control panel 20 .
- the cellular circuit 52 can generally be powered when the control panel 20 is powered. Removing the replaceable cellular module from the control panel 20 while the replaceable cellular module is powered, however, may damage the replaceable cellular module and/or the control panel 20 . For example, removal of a powered cellular module from the control panel 20 may cause electrical arcing at the connector pins, which may permanently damage the control panel 20 .
- the processor 40 may remove power from the cellular circuit 52 if the tamper detection circuit 56 detects that the door (shown in FIGS. 5 and 7 ) has been opened.
- the control panel 20 of FIG. 3 may also include a radio-frequency identification (RFID) circuit 58 , in accordance with this disclosure.
- the RFID circuit 58 may allow a manufacturer, for example, to download configuration parameters into an onboard memory circuit 59 of the RFID circuit 58 , for example, while the control panel 20 is in a sealed box in the factory.
- the RFID circuit 58 can write to the onboard memory 59 even when the control panel 20 is not powered up.
- the RFID circuit 58 can receive power from an RF signal from an RF programming device, receive data embedded in the RF signal from the powered RF circuit, and, using the received power from the RF signal, store the data in the memory 59 that is otherwise unpowered.
- the processor 40 can read/receive the stored data from the memory 59 and configure the control panel 20 (and track other parameters and functions) using the received data and data stored in memory circuit 44 .
- the RFID circuit 58 Upon receiving a signal from an RFID programmer unit, the RFID circuit 58 , which includes an antenna 60 , powers up and begins receiving, for example, the configuration parameters that may then be stored directly to the onboard memory circuit 59 of the RFID circuit 58 . This may allow a manufacturer or distributor, for example, to customize one or more packaged, unpowered control panels based on customer preferences before the control panels are shipped to the customer. For example, after the control panel is powered up, the processor 40 can read the stored configuration parameters from the onboard memory 59 and retrieve from the memory circuit 44 the instructions needed to configure the default language, e.g., English, Spanish, Portuguese, Italian, French, Japanese, etc., of the control panel 20 based on the customer's geographic region.
- the default language e.g., English, Spanish, Portuguese, Italian, French, Japanese, etc.
- the control panel 20 of FIG. 3 may also include a Wi-Fi circuit 62 .
- the Wi-Fi circuit 62 may include Wi-Fi Direct functionality, in accordance with this disclosure.
- Wi-Fi Direct may allow various Wi-Fi enabled components of the security system 12 to communicate with one another without using a wireless access point, e.g., a wireless router.
- the security system 12 may include one or more remote keypads 30 that include Wi-Fi chips and are Wi-Fi enabled.
- the one or more Wi-Fi enabled remote keypads 30 may establish a peer-to-peer connection with the control panel 20 , instead of using a wireless access point of a home network, for example.
- Wi-Fi Direct may eliminate the need to use a proprietary wireless communication protocol or use wired communications techniques.
- Wi-Fi Direct instead of Wi-Fi may simplify the setup for the user by eliminating the need for a wireless access point.
- control panel 20 can be configured to interface with a home automation controller using serial or TCP/IP protocols, for example.
- the control panel 20 can include a terminal block (not depicted) that can connect to the home automation controller using a wired connection, e.g., via RS-232 serial cable or via an Ethernet cable.
- the control panel 20 can connect using a wireless protocol, e.g., IEEE 802.11 standards.
- control panel 20 can receive signals from a Wi-Fi connected camera (not depicted) using the Wi-Fi circuit 62 .
- the Wi-Fi connected camera can be used to detect motion.
- the Wi-Fi connected camera can detected.
- the panel can also receive camera signal over a wired Ethernet connection.
- the control panel 20 of FIG. 3 may also include a Bluetooth circuit 64 configured to receive at least one Bluetooth signal from one or more Bluetooth-enabled devices.
- the Bluetooth circuit 64 may be used by the control panel 20 to automatically disarm the security system 12 when an authorized Bluetooth-enabled device is within range of the control panel 20 .
- Bluetooth is a communications protocol standardized as IEEE 802.15.1.
- the processor 40 of the control panel 20 may instruct the memory circuit 44 to store data identifying the authorized Bluetooth-enabled device(s), e.g., a user's smartphone.
- the processor 40 may retrieve the identifying data from the memory circuit 44 , determine whether the Bluetooth-enabled device is an authorized device, and, if so, disarm the control panel 20 automatically, e.g., without any action taken by the user.
- the processor 40 may cause a confirmation message to be transmitted to an authorized user prior to disarming the security system 12 . Once the authorized user affirmatively responds to the confirmation message, the processor 40 may disarm the security system 12 .
- the control panel 20 of FIG. 3 may also include a Universal Serial Bus (USB) circuit 66 connected to a USB connector 68 , e.g., micro-USB, mini-USB, or other USB compatible connector.
- USB connector 68 and USB circuit 66 may allow peripheral electronic component(s) to be added to the security system 12 .
- a USB web-camera (not depicted) may be connected to the control panel 20 using the USB connector 68 . Connecting a USB web-camera using the USB connector 68 may be desirable as it allows the web-camera to be easily upgraded or otherwise replaced.
- the USB web-camera may be articulated to allow it to point at a particular location, in contrast to a camera that is integrated into the control panel 20 and thus cannot turn.
- a standard USB extension cable could be used to locate the camera a few feet away from the panel in almost any orientation.
- the user may remotely control the articulation of the web-camera, e.g., using the remote device 18 .
- the control panel 20 may include a camera integrated into the control panel (not depicted).
- a camera e.g., USB camera or integrated camera
- biometric authentication e.g., retinal scan, face recognition, etc.
- the control panel 20 can use the camera(s) to scan and store biometric information for one more users. Once armed, for example, the control panel 20 can request that a user position a recognizable feature, e.g., eye, face, etc., close to the camera. Upon comparing the feature to the stored information, the control panel 20 can disarm the system.
- the control panel 20 can include a connector that can be connected to an accessory radio transceiver (not depicted).
- the accessory transceiver can be used to receive signals from one or more peripheral devices and increase the functionality of the control panel 20 .
- the accessory radio transceiver can receive signal from a wireless camera or a wireless image sensor, e.g., motion detector with a camera to capture an image.
- the accessory transceiver can be placed behind the wall upon which the control panel is mounted to conserve space.
- the control panel 20 may also include a leveling vial 70 that is integrated into the housing of the control panel 20 .
- An integrated leveling vial 70 may allow a technician or other user to more quickly and accurately install the control panel 20 .
- the control panel 20 may include a speaker 50 .
- the speaker 50 may be enclosed within a sealed chamber.
- the sound volume may be increased, e.g., by about 10 decibels (dB), relative to speaker 50 similarly positioned in a similar control panel, e.g., having dimensions of about 2 inches by about 5.5 inches by about 1.25 inches, and tested on a wall about 10 feet away from the control panel.
- the sealed chamber may improve the bass and midrange frequency response of the speaker 50 and thus improve the sound quality.
- Another advantage of the sealed speaker design is to provide equivalent sound at a reduced the size and depth. As a result, the control panel can be smaller and thinner.
- control panel 20 may include a home screen module 72 that can receive an input from a user defining one or more screens depicted on a display 46 , store data representing the at least one user-defined screen in a memory, e.g., memory circuit 44 , and perform one or more actions previously associated by the user with the defined screen.
- the home screen module 72 may enable a user to associate one or more actions such as, for example, temperature settings, lighting settings, security settings, with the default or primary screen of the display of the user interface of their control panel 20 or remote keypad 30 , which can allow the user interface, without navigating beyond the nominal default screen, to be a home control panel, security panel, bed-side controller, room controller, thermostat controller or other type of panel.
- Defining a home screen or defining bookmarks may reduce the number of keystrokes that the user must enter to reach a desired screen or prompt on the user interface.
- the home screen module 72 can then perform the one or more actions previously associated by the user with the defined screen.
- FIG. 4 is a perspective view of an example of the control panel of FIG. 2 .
- the control panel 20 of FIG. 4 includes a housing 80 , a user interface 46 , e.g., a touchscreen display or other display, and, in some examples, one or more buttons 82 A and 82 B.
- a user may enter commands, navigate menus, and the like using the touchscreen and/or using the buttons 82 A, 82 B.
- the remote keypad 30 of FIG. 2 may be similar to the control panel 20 of FIG. 4 . For purposes of conciseness, the remote keypad 30 and the control panel 20 will be described together.
- the control panel 20 may also include a USB connector 68 .
- the USB connector 68 is located at the top of the control panel 20 .
- an external web-camera (not depicted) may be connected to the control panel 20 via the USB connector 68 .
- the user interface 46 may be configured to display many different screens depending on the type of application, e.g., security or home automation.
- the memory circuit 44 may store instructions that, when executed by the processor 40 , cause the user interface to display a security panel, bed-side controller panel, home theater room controller panel, and/or a home automation panel.
- aspects of home automation that may be displayed include, but are not limited to, a thermostat panel, a lighting panel, a door lock panel, a garage door panel, a home audio or other speaker system panel, or other type of panel.
- control panel 20 and the remote keypad 30 may include the ability for a user to define a home screen and/or bookmark one or more panels using the home screen module 72 .
- a user may define a remote keypad 30 located in a home theater room to display a home theater room controller panel as a default home screen.
- a user may define a remote keypad 30 located in their bedroom to display a thermostat panel as a default home screen.
- the user may define a thermostat panel as a default home screen and may define the security panel using a bookmark to allow quick access.
- the user may define a remote keypad 30 in their bedroom to be a bedside controller and have an “all lights in room ON/OFF” default home screen.
- the user may build a customized home screen for remote keypad 30 designated as a bedside controller in their bedroom.
- the user may build a “go to bed” home screen that may include thermostat control, security panel control (e.g., “arm stay”, and an “all lights OFF” control, or any other system control features that the user may use at bedtime.
- each of these controls may be displayed on a single screen of the user interface of the remote keypad 30 for the user to individually control. That is, the user may individually turn down the thermostat, turn off all the lights, and arm the security system.
- the “go to bed” home screen may allow a user to touch a single button on the user interface of the remote keypad 30 that initiates a sequence of events including, for example, turning down the thermostat, turning off all the lights, and arming the security system.
- a user may build a customized home screen for a remote keypad 30 located in a hallway.
- the user may build a customized “return from work” home screen that allows a user to touch a single button on the user interface of the remote keypad 30 in the hallway that initiates a sequence of events including, for example, turning up the thermostat and turning on various lights in the house.
- Each remote keypad 30 located about the house may have different home screens defined by the user.
- the user-defined home screens may display the status of various system components, e.g., a thermostat setting and an alarm status, and also display control icons to control the various system components, e.g., increase/decrease thermostat setting and arm/disarm the alarm system.
- various system components e.g., a thermostat setting and an alarm status
- control icons e.g., increase/decrease thermostat setting and arm/disarm the alarm system.
- a user when setting or defining a default home screen, a user may navigate through various menus on the control panel 20 until the user interface 46 displays the preferred home screen.
- the home screen module 72 may cause the user interface to display a home screen or bookmark icon. Once on the preferred home screen, the user may touch a displayed home screen (or bookmark) icon to confirm that the displayed home screen is the preferred home screen or bookmark.
- the home screen module 72 may store the settings in the memory circuit 44 , e.g., in a user preferences or configuration file.
- the home screen module 72 may cause the user interface 46 to display the preferred home screen as the default screen based on the stored settings.
- a user may again navigate through various menus until the user interface 46 displays a panel that the user would like to bookmark as a favorite panel, e.g., a thermostat panel.
- the user may touch a displayed home screen (or bookmark) icon to confirm that the displayed screen should be bookmarked as a favorite panel.
- the home screen module 72 may store the settings in the memory circuit 44 , e.g., in a configuration file. The home screen module 72 may cause the user interface 46 to display the preferred home screen as the default screen based on the stored settings.
- the user interface 46 may display thumbnail views or text, for example, of the various panels that can be selected as preferred panels.
- the home screen module 72 may prompt a user to select the desired screen, prompt the user to confirm that the displayed screen should be bookmarked as a favorite panel or as a default home screen, and then, upon receiving the confirmation, the home screen module 72 may store the settings in the memory circuit 44 , e.g., in a configuration file.
- FIGS. 10A-10D are examples of screenshots of various portions depicting a user-defined screen of a user-interface 46 , e.g., display.
- the control panel 20 may include a home screen module 72 that can receive an input from a user defining one or more screens depicted on a display 46 and store data representing the at least one user-defined screen in a memory, e.g., memory circuit 44 .
- FIG. 10A is an example of a screenshot 200 in which the user has yet to provide input to define a screen, e.g., set a bookmark.
- a bookmark icon is shown at 202 .
- the user can define a screen for the master bedroom.
- the user can select the “smart home controls” button 204 at the bottom of the screen 200 . Selecting the “smart home controls” button 204 can cause new buttons 206 A- 206 F to appear on the screen, as seen in screen 208 in FIG. 10B .
- the user can select the “rooms” button 206 F on the screen 208 .
- Selecting the “rooms” button 206 F can cause one or more “room” buttons 210 A- 210 B to appear on the screen 212 , as seen in FIG. 10C .
- the screen 212 displays a “master bedroom” button 210 A and an “add new room” button 210 B, which can allow a user to define settings for a room other than the master bedroom.
- the user can select the “master bedroom” button 210 A on the screen 212 in FIG. 10C . Selecting the “master bedroom” button 210 A can cause one or more control icons to appear on the screen 214 , as seen in FIG. 10D . As seen in FIG. 10D , the user can define, for example, the lighting and/or the thermostat settings. For example, the user can use slider control icon 216 A to set the brightness of the lighting for the master bedroom.
- the user can also define the thermostat settings. For example, the user can define the heating and cooling set point temperatures using the up/down arrows shown generally at 216 B, 216 C, respectively. In addition, the user can define the fan settings at 216 D and the mode settings at 216 E. After defining the lighting and/or temperature settings, for example, for the master bedroom, the user can select the bookmark icon 202 to bookmark the screen for the master bedroom.
- the home screen module 72 may constitute either a software module, e.g., code embodied on a non-transitory machine-readable medium, or a hardware-implemented module. If embodied as a software module, the memory circuit 44 may include computer-readable instructions that, when executed by the processor 40 , cause the processor 40 to perform various functions attributed throughout this disclosure to the home screen module 72 .
- a hardware-implemented module may be implemented mechanically or electronically.
- a hardware-implemented module may comprise dedicated circuitry or logic that is permanently configured, e.g., as a special-purpose processor, such as a field programmable gate array (FPGA) or an application-specific integrated circuit (ASIC), to perform certain operations.
- a hardware-implemented module may also comprise programmable logic or circuitry, e.g., as encompassed within a general-purpose processor or other programmable processor, that is temporarily configured by software to perform certain operations. It will be appreciated that the decision to implement a hardware-implemented module mechanically, in dedicated and permanently configured circuitry, or in temporarily configured circuitry, e.g., configured by software, may be driven by cost and time considerations.
- the term “hardware-implemented module” should be understood to encompass a tangible entity, be that an entity that is physically constructed, permanently configured, e.g., hardwired, or temporarily or transitorily configured, e.g., programmed, to operate in a certain manner and/or to perform certain operations described herein.
- hardware-implemented modules are temporarily configured, e.g., programmed
- each of the hardware-implemented modules need not be configured or instantiated at any one instance in time.
- the hardware-implemented modules comprise a general-purpose processor configured using software
- the general-purpose processor may be configured as respective different hardware-implemented modules at different times.
- Software may accordingly configure a processor, for example, to constitute a particular hardware-implemented module at one instance of time and to constitute a different hardware-implemented module at a different instance of time.
- FIG. 5 is a side view of the example control panel of FIG. 4 .
- the control panel 20 may include a replaceable cellular module (depicted at 110 in FIGS. 7, 8A, 8B ) that includes the cellular circuit 52 , e.g., cellular radio, and the antenna 54 of FIG. 3 .
- An end-user e.g., customer or technician, may install or replace the replaceable cellular module by opening the door 90 of FIG. 5 , e.g., after removing a screw (shown at 116 in FIG. 9 ) and inserting the module through a slot defined by the housing (shown at 93 in FIG. 9 ).
- the door 90 has an open state and a closed state, and the end-user replaceable cellular module is replaceable through the slot when the door is in the open state.
- the door 90 can be snapped in place or snapped in place and secured with an optional screw.
- the door can be removed and replaced without requiring a tool. In this manner, the replaceable cellular module is replaceable without disassembling the control panel or housing.
- the tamper detection circuit 56 of FIG. 3 may detect when the door 90 is opened, as described in more detail below.
- the control panel 20 includes an improved speaker design. Speaker designs of existing security systems utilize forward facing, rearward facing, or side facing speakers with grills. These designs, however, often result in thin, metallic (e.g., tinny), unintelligible sounds. As shown in FIGS. 6A-6B and as described below, the sound quality and volume of the speaker 50 of the control panel 20 may be improved by using a sealed speaker enclosure, e.g., a resonant speaker enclosure, thus resulting in a thinner, more desirable panel with comparable sound quality.
- the control panel 20 may be configured to provide two-way communication using a microphone (not depicted) and the speaker 50 . As such, the increase in bass and midrange frequency responses of the speaker 50 may improve the intelligibility and sound quality of received communication, e.g., from the central monitoring station 14 .
- control panel 20 may be configured to provide sirens, signaling, and annunciation using the speaker 50 .
- the sealed speaker enclosure 100 of FIGS. 6A and 6B may increase the volume of the speaker 50 over existing speaker designs.
- FIG. 6A is perspective front view of the example control panel of FIG. 4 , illustrating a sealed speaker enclosure, in accordance with this disclosure.
- the front cover of the control panel 20 has been removed in FIG. 6A in order to depict the speaker 50 within a sealed speaker enclosure 100 (depicted by cross-hatching in FIG. 6A ).
- the sealed speaker enclosure 100 may increase the bass and midrange frequency responses of the speaker 50 .
- the volume 98 extending to the left of the speaker 50 is the primary volume that forms the sealed speaker enclosure 100 .
- the diaphragm 102 of the speaker 50 may also form part of the sealed enclosure 100 , which seals any air behind the diaphragm 102 .
- the cross-hatching in FIG. 6A defines at least a portion of the boundary of the sealed speaker enclosure 100 .
- FIG. 6B is cross-sectional end view of the example control panel of FIG. 4 , illustrating a sealed speaker, in accordance with this disclosure.
- the speaker 50 includes a front 120 from which sound is projected, a rear 122 opposite the front 120 , a first side 124 , and a second side 126 opposite the first side.
- the housing 80 can include a front interior side 130 , a rear interior side 132 opposite the front interior side 130 , a first interior side 134 , and a second interior side 136 opposite the first interior side 134 .
- the sealed speaker enclosure 100 (shown with hatching) is positioned within the housing 80 and at least partially defined by a speaker case 103 positioned within the housing.
- the volume of the sealed speaker enclosure 100 can be between about 0.35 liters to about 0.45 liters to provide the improved performance characteristics described in this disclosure.
- a sealant 105 can be applied, e.g., room-temperature vulcanization (RTV) silicone, resulting in a sealed sound box within the control panel 20 .
- the diaphragm 102 of the speaker 50 may also form part of the sealed enclosure 100 , which seals any air behind the diaphragm 102 .
- the primary volume of air 98 of the sealed speaker enclosure 100 is adjacent to the first side 124 of the speaker 50 and extends away from the first side 124 and, in some examples, behind other components within the control panel 20 , e.g., piezoelectric element 104 .
- a small, secondary volume of air 101 of the sealed speaker enclosure 100 may extend to the right of the speaker 50 in FIG. 6B .
- the second side 126 of the speaker 50 is positioned adjacent the second interior side 136 of the housing 80 , and the sealed speaker enclosure 100 defines the secondary acoustic volume of air 101 that extends between the second side 126 of the speaker 50 and the second interior side 136 of the housing 80 .
- the second side 126 of the speaker 50 is positioned adjacent the second interior side 136 of the housing 80 , and the primary acoustic volume of air extends away from the first side 124 of the speaker 50 toward the first interior side 134 of the housing 80 .
- the rear portion 122 of the speaker 50 is adjacent the rear interior side 132 of the housing 80 , and the sealed speaker enclosure 100 extends across only a portion of the rear portion 122 of the speaker 50 .
- the sealed speaker enclosure 100 is positioned directly behind the speaker 50 .
- the design of the sealed speaker enclosure 100 of FIGS. 6A and 6B may result in a reduced profile of the control panel 20 .
- the dimensions of the control panel 20 e.g., the depth, may need to be increased in order to create an equivalent acoustic volume.
- control panel 20 with the sealed speaker enclosure 100 may form part of an all-in-one home automation and security control panel, e.g., a control panel that includes all the radios of the home automation and security system without additional accessory boxes/panels.
- FIG. 7 is perspective back view of the example control panel of FIG. 6A , illustrating a replaceable cellular module, in accordance with this disclosure.
- the control panel 20 of FIG. 7 may include an end-user replaceable cellular telephony module 110 , that is removable from the control panel 20 without disassembling the control panel, having a body 112 that includes the cellular telephony circuit 52 and the cellular telephony antenna 54 .
- the control panel 20 includes a door 90 through which the replaceable cellular module 110 may be inserted for connection to the circuitry of the control panel 20 .
- the control panel 20 can include a connector 113 sized and shaped or otherwise configured to be removably engaged by the end-user with a connector 114 coupled to the cellular circuit 52 and the body 112 of the replaceable cellular module 110 .
- a customer or technician may open the door 90 , remove the replaceable cellular module 110 , and install a new replaceable cellular module 110 through the slot 93 (or compartment) when the door 90 is in an open state or position, e.g., removed.
- the door 90 is removable and not hinged and can be affixed to the housing when installed and removed when it is opened. At least a portion of the end-user replaceable cellular module is sized and shaped or otherwise configured to fit through the door 90 and/or the slot 93 .
- an updated replaceable cellular module 110 e.g., next generation protocol radios such as a 3G or a 4G protocol, may be shipped to and installed by the customer without having to disassemble the housing 80 .
- next generation protocol radios such as a 3G or a 4G protocol
- FIGS. 8A and 8B are perspective views of the replaceable cellular module 110 of FIG. 7 , in accordance with this disclosure. For purposes of conciseness FIGS. 8A and 8B will be described together.
- the cellular circuit 52 e.g., radio chip, and the antenna 54 (shown in FIG. 8B ) are attached to a body 112 and together form part of the replaceable cellular module 110 .
- the antenna 54 is electrically connected to the cellular circuit 52
- the cellular circuit 52 is connected to the control panel 20 using a multi-pin connector 114 .
- a pull-tab 55 can be included to assist the user in removing the replaceable cellular module 110 from the control panel 20 .
- the cellular circuit 52 and the antenna 54 may each be detached from the replaceable cellular module 110 .
- the cellular circuit 52 may be a circuit board that may be removed and replaced by another cellular circuit, e.g., radio chip, that snaps into position on the body 112 .
- antenna 54 may be detachable by the service professional or end-user and replaced by a different type of antenna that has one or more improved performance characteristics.
- a paddle antenna may be replaced by another antenna type that has different performance characteristics in order to produce an optimized radiation pattern, e.g., an isotropic radiation pattern.
- the antenna 54 can be unwound and re-routed, e.g., out of the replaceable cellular module 110 and behind the wall.
- one end of the antenna 54 can remain connected to the cellular circuit 52 and be unwound.
- the unconnected end can be pulled out of the replaceable cellular module 110 and positioned to adjust the signal strength, e.g., behind the wall supporting the control panel 20 .
- FIG. 9 is a perspective view of a portion of the control panel 20 .
- a faceplate covering the control panel 20 has been removed to provide access the optional door locking screw 116 . Once the door locking screw 116 is removed, the door 90 can be removed.
- the door 90 may be in communication with the tamper detection circuit 56 .
- tamper detection with the door 90 is a two-step process.
- the tamper detection circuit 56 can detect tampering with the door 90 .
- the tamper detection circuit 56 includes a microswitch 94 held in a first state, e.g., closed, by a portion 106 of the door 90 , e.g., a tab. A person attempting to remove the replaceable cellular module 110 may begin removing the screw 116 .
- the portion 106 of the door 90 no longer holds the microswitch 94 in the first state and, as a result, the microswitch 94 may change to a second state, e.g., open.
- the processor 40 may detect the change in state of the microswitch 94 , e.g., open. In response and prior to the removal of the replaceable cellular module 110 from the control panel 20 , the processor 40 can cause the cellular circuit 52 to transmit a signal to the central monitoring station 14 that indicates that tampering has been detected at the control panel 20 .
- the time delay between the detection of tampering and removal of the replaceable cellular module 110 is sufficient for the processor 40 and the cellular circuit 52 to transmit a tamper detect signal to the central monitoring station 14 .
- the processor 40 and the cellular circuit 52 may detect and transmit the tamper detect signal in about 100 milliseconds (ms) to about one second.
- the processor 40 may power down the cellular circuit 52 to prevent damage to the control panel 20 . That is, removing the replaceable cellular module 110 from the control panel 20 while the replaceable cellular module 110 is powered may damage the replaceable cellular module 110 and/or the control panel 20 . For example, removal of a powered cellular module from the control panel 20 may cause electrical arcing at the connector pins, which may permanently damage the control panel 20 . Hence, the processor may remove power from the cellular circuit 52 if the tamper detection circuit 56 detects that the door 90 has been opened.
- Example 1 includes subject matter (such as a device, apparatus, or machine) comprising: an end-user replaceable cellular telephony module that is removable from the control panel without disassembling the control panel, the cellular module including: a body; a cellular telephony circuit coupled to the body; a cellular telephony antenna coupled to the body and the cellular telephony circuit; and a first connector coupled to the cellular telephony circuit and the body, wherein the first connector is sized and shaped or otherwise configured to be removably engaged by the end-user with a second connector in the control panel.
- an end-user replaceable cellular telephony module that is removable from the control panel without disassembling the control panel
- the cellular module including: a body; a cellular telephony circuit coupled to the body; a cellular telephony antenna coupled to the body and the cellular telephony circuit; and a first connector coupled to the cellular telephony circuit and the body, wherein the first connector is sized and
- Example 2 the subject matter of Example 1 may include, wherein the antenna is a first antenna, and wherein the module is configured such that the first antenna can be detached from the body by the end-user and replaced by a second antenna.
- Example 3 the subject matter of any one of Examples 1 to 2 may include, wherein the second antenna is configured to have a different performance characteristic than the first antenna.
- Example 4 the subject matter of any one of Examples 1 to 3 may include, a housing defining a slot, and wherein at least a portion of the end-user replaceable cellular module is sized and shaped or otherwise configured to fit through the slot.
- Example 5 the subject matter of any one of Examples 1 to 4 may include, a door removably affixed to the housing, wherein at least a portion of the end-user replaceable cellular module is sized and shaped or otherwise configured to fit through the slot when the door is removed.
- Example 6 the subject matter of any one of Examples 1 to 5 may include, a switch configured to detect an opening of the door affixed, wherein the switch is configured to change state upon detecting the opening; and a processor configured to: detect the changed state of the switch; and control transmission of a tamper detection signal to a central monitoring station upon detection of the changed state of the switch.
- Example 7 the subject matter of any one of Examples 1 to 6 may include, a display; a housing configured to support the display; and a speaker having a front from which sound is projected, a rear opposite the front, a first side, and a second side opposite the first side; and a sealed speaker enclosure positioned within the housing, the sealed speaker enclosure including a speaker case, wherein a portion of the speaker case and a portion of the speaker define the sealed speaker enclosure.
- Example 8 the subject matter of any one of Examples 1 to 7 may include, wherein the sealed speaker enclosure includes a speaker case.
- Example 9 the subject matter of any one of Examples 1 to 8 may include, wherein the sealed speaker enclosure has a volume of between about 0.35 liters to about 0.45 liters.
- Example 10 the subject matter of any one of Examples 1 to 9 may include, wherein the sealed speaker enclosure defines a primary acoustic volume of air that extends away from the first side of the speaker.
- Example 11 the subject matter of any one of Examples 1 to 10 may include, wherein the portion of the speaker that defines the sealed speaker enclosure includes a diaphragm of the speaker.
- Example 12 the subject matter of any one of Examples 1 to 11 may include, wherein the housing has a front interior side, a rear interior side opposite the front interior side, a first interior side and a second interior side opposite the first interior side, wherein the second side of the speaker is positioned adjacent the second interior side of the housing, and wherein the sealed speaker enclosure defines a secondary acoustic volume of air that extends between the second side of the speaker and the second interior side of the housing.
- Example 13 the subject matter of any one of Examples 1 to 12 may include, wherein the housing has a front interior side, a rear interior side opposite the front interior side, a first interior side and a second interior side opposite the first interior side, wherein the second side of the speaker is positioned adjacent the second interior side of the housing, and wherein the primary acoustic volume of air extends away from the first side of the speaker toward the first interior side of the housing.
- Example 14 the subject matter of any one of Examples 1 to 13 may include, wherein the housing has a front interior side, a rear interior side opposite the front interior side, a first interior side and a second interior side opposite the first interior side, wherein the speaker has a rear portion adjacent the rear interior side of the housing, and wherein the sealed speaker enclosure extends across only a portion of the rear portion of the speaker.
- Example 15 the subject matter of any one of Examples 1 to 14 may include, a Bluetooth circuit configured to receive at least one Bluetooth signal from one or more Bluetooth-enabled devices; a processor configured to: store data identifying an authorized Bluetooth-enabled device in a memory; detect the authorized Bluetooth-enabled device; and disarm the security system control panel in response to the detection.
- a Bluetooth circuit configured to receive at least one Bluetooth signal from one or more Bluetooth-enabled devices
- a processor configured to: store data identifying an authorized Bluetooth-enabled device in a memory; detect the authorized Bluetooth-enabled device; and disarm the security system control panel in response to the detection.
- Example 16 the subject matter of any one of Examples 1 to 15 may include, a user interface including a display; and a home screen module configured to: receive an input from the end-user defining at least one screen depicted on the display; store data representing the at least one end-user-defined screen in a memory; and perform one or more actions previously associated by the user with the defined screen.
- Example 17 the subject matter of any one of Examples 1 to 16 may include, wherein the screen depicted on the display is a thermostat controller.
- Example 18 the subject matter of any one of Examples 1 to 17 may include, wherein the screen depicted on the display is a room controller that includes at least one of lighting and temperature controls.
- Example 19 the subject matter of any one of Examples 1 to 18 may include, a radio-frequency (RF) circuit configured to: when the control panel is in an unpowered state: receive power from an RF signal from an RF programming device; receive data embedded in the RF signal from the powered RF circuit; and using the received power from the RF signal store the data in a memory that is otherwise unpowered; and a processor configured to: when the control panel is in a powered state: receive the stored data; and configure at least one parameter using the received data.
- RF radio-frequency
- the terms “a” or “an” are used, as is common in patent documents, to include one or more than one, independent of any other instances or usages of “at least one” or “one or more.”
- the term “or” is used to refer to a nonexclusive or, such that “A or B” includes “A but not B,” “B but not A,” and “A and B,” unless otherwise indicated.
- Method examples described herein can be machine or computer-implemented at least in part. Some examples can include a computer-readable medium or machine-readable medium encoded with instructions operable to configure an electronic device to perform methods as described in the above examples.
- An implementation of such methods can include code, such as microcode, assembly language code, a higher-level language code, or the like. Such code can include computer readable instructions for performing various methods. The code may form portions of computer program products. Further, the code can be tangibly stored on one or more volatile or non-volatile tangible computer-readable media, such as during execution or at other times.
- Examples of these tangible computer-readable media can include, but are not limited to, hard disks, removable magnetic disks, removable optical disks (e.g., compact disks and digital video disks), magnetic cassettes, memory cards or sticks, random access memories (RAMs), read only memories (ROMs), and the like.
- Examples, as described herein, may include, or may operate on, logic or a number of components, modules, or mechanisms.
- Modules may be hardware, software, or firmware communicatively coupled to one or more processors in order to carry out the operations described herein.
- Modules may hardware modules, and as such modules may be considered tangible entities capable of performing specified operations and may be configured or arranged in a certain manner.
- circuits may be arranged (e.g., internally or with respect to external entities such as other circuits) in a specified manner as a module.
- the whole or part of one or more computer systems may be configured by firmware or software (e.g., instructions, an application portion, or an application) as a module that operates to perform specified operations.
- the software may reside on a machine-readable medium.
- the software when executed by the underlying hardware of the module, causes the hardware to perform the specified operations.
- the term hardware module is understood to encompass a tangible entity, be that an entity that is physically constructed, specifically configured (e.g., hardwired), or temporarily (e.g., transitorily) configured (e.g., programmed) to operate in a specified manner or to perform part or all of any operation described herein.
- each of the modules need not be instantiated at any one moment in time.
- the modules comprise a general-purpose hardware processor configured using software; the general-purpose hardware processor may be configured as respective different modules at different times.
- Software may accordingly configure a hardware processor, for example, to constitute a particular module at one instance of time and to constitute a different module at a different instance of time.
- Modules may also be software or firmware modules, which operate to perform the methodologies described herein.
Landscapes
- Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Computer Networks & Wireless Communication (AREA)
- Business, Economics & Management (AREA)
- Emergency Management (AREA)
- Human Computer Interaction (AREA)
- Signal Processing (AREA)
- Multimedia (AREA)
- Automation & Control Theory (AREA)
- Power Engineering (AREA)
- Computer Security & Cryptography (AREA)
- Electromagnetism (AREA)
- Selective Calling Equipment (AREA)
- Telephonic Communication Services (AREA)
- Alarm Systems (AREA)
- Telephone Set Structure (AREA)
Abstract
Description
- This application is a continuation of U.S. patent application Ser. No. 15/114,380, filed Jul. 26, 2016 by Christopher L. Acera et al. and titled “Building security and automation system,” which is a national-phase filing of, and claims priority benefit of, PCT Patent Application No. PCT/US2015/013036, filed Jan. 27, 2015 by Acera et al. and titled “Building security and automation system,” which claims the benefit of priority to U.S. Provisional Application No. 61/931,945, titled “Building security and automation system” by Acera et al. and filed on Jan. 27, 2014, the entire content of each of which being incorporated herein by reference.
- This application is related to the following U.S. patent applications filed on even date herewith:
- U.S. patent application Ser. No. 15/871,584, filed Jan. 15, 2018 by Christopher L. Acera et al. and titled “BUILDING SECURITY AND AUTOMATION SYSTEM DISARMING APPARATUS AND METHOD,”
U.S. patent application Ser. No. 15/871,771, filed Jan. 15, 2018 by Christopher L. Acera et al. and titled “BUILDING SECURITY AND AUTOMATION SYSTEM SPEAKER AND METHOD,” and
U.S. patent application Ser. No. 15/871,749, filed Jan. 15, 2018 by Christopher L. Acera et al. and titled “BUILDING SECURITY AND AUTOMATION SYSTEM WITH REMOTE-POWERED DATA STORE AND DELAYED DATA UPDATE AND METHOD”. - This document pertains generally, but not by way of limitation, to security and automation systems.
-
FIG. 1 is a conceptual diagram illustrating an example of a system that includes a building security and automation system and a central monitoring station. -
FIG. 2 is a conceptual diagram illustrating various examples of components of thesecurity system 12 ofFIG. 1 , including a control panel and various sensors. -
FIG. 3 is a functional block diagram illustrating an example of the control panel of the security system inFIG. 2 , in accordance with this disclosure. -
FIG. 4 is a perspective view of an example of the control panel ofFIG. 2 . -
FIG. 5 is a side view of the example control panel ofFIG. 4 . -
FIG. 6A is perspective front view of the example control panel ofFIG. 4 , illustrating a sealed speaker, in accordance with this disclosure. -
FIG. 6B is cross-sectional end view of the example control panel ofFIG. 4 , illustrating a sealed speaker, in accordance with this disclosure. -
FIG. 7 is perspective back view of the example control panel ofFIG. 6A , illustrating a replaceable cellular module, in accordance with this disclosure. -
FIGS. 8A and 8B are perspective views of the replaceable cellular module ofFIG. 7 , in accordance with this disclosure. -
FIG. 9 is a perspective view of a portion of a control panel. -
FIGS. 10A-10D are examples of screenshots of various portions depicting a user-defined home screen. - In one example, this disclosure is directed to a security system control panel or home automation control panel comprising an end-user replaceable cellular telephony module that is removable from the control panel without disassembling the control panel, the cellular module including a body; a cellular telephony circuit coupled to the body; a cellular telephony antenna coupled to the body and the cellular telephony circuit; and a first connector coupled to the cellular telephony circuit and the body, wherein the first connector is sized and shaped or otherwise configured to be removably engaged by the end-user with a second connector in the control panel.
- In one example, this disclosure is directed to a security system control panel or home automation control panel comprising a display; a housing configured to support the display; and a speaker having a front from which sound is projected, a rear opposite the front, a first side, and a second side opposite the first side; and a sealed speaker enclosure positioned within the housing, the sealed speaker enclosure including a speaker case, wherein a portion of the speaker case and a portion of the speaker define the sealed speaker enclosure.
- In one example, this disclosure is directed to a security system control panel or home automation control panel comprising a Bluetooth circuit configured to receive at least one Bluetooth signal from one or more Bluetooth-enabled devices; a processor configured to store data identifying an authorized Bluetooth-enabled device in a memory; detect the authorized Bluetooth-enabled device; and disarm the security system control panel in response to the detection.
- In one example, this disclosure is directed to security system control panel or home automation control panel comprising a user interface including a display; and a home screen module configured to: receive an input from the end-user defining at least one screen depicted on the display; store data representing the at least one end-user-defined screen in a memory; and perform one or more actions previously associated by the user with the defined screen.
- In one example, this disclosure is directed to a security system control panel or home automation control panel comprising an end-user replaceable cellular telephony module that is removable from the control panel without disassembling the control panel, the cellular module including a body; a cellular telephony circuit coupled to the body; a cellular telephony antenna coupled to the body and the cellular telephony circuit; and a first connector coupled to the cellular telephony circuit and the body, wherein the first connector is sized and shaped or otherwise configured to be removably engaged by the end-user with a second connector in the control panel. The control panel further includes a display; a housing configured to support the display; a speaker having a front from which sound is projected, a rear opposite the front, a first side, and a second side opposite the first side; and a sealed speaker enclosure positioned within the housing, the sealed speaker enclosure including a speaker case, wherein a portion of the speaker case and a portion of the speaker define the sealed speaker enclosure. The control panel further includes a user interface including the display; and a home screen module configured to: receive an input from the end-user defining at least one screen depicted on the display; store data representing the at least one end-user-defined screen in a memory; and perform one or more actions previously associated by the user with the defined screen; a Bluetooth circuit configured to receive at least one Bluetooth signal from one or more Bluetooth-enabled devices; a processor configured to: store data identifying an authorized Bluetooth-enabled device in a memory; detect the authorized Bluetooth-enabled device; and disarm the security system control panel in response to the detection. The control panel further includes a radio-frequency (RF) circuit configured to: when the control panel is in an unpowered state: receive power from an RF signal from an RF programming device; receive data embedded in the RF signal from the powered RF circuit; and using the received power from the RF signal store the data in a memory that is otherwise unpowered, wherein the processor is configured to: when the control panel is in a powered state: receive the stored data; and configure at least one parameter using the received data.
-
FIG. 1 is a conceptual diagram illustrating an example of asystem 10 that may include a building security andautomation system 12 and acentral monitoring station 14 that monitors received communications from one or more building security andautomation systems 12. As seen inFIG. 1 , the building security and automation system 12 (also referred to in this disclosure as “security system 12”) may transmit signals to and receive signals from thecentral monitoring station 14 via anetwork 16. For example, thesecurity system 12 may detect an unauthorized opening of a monitored building, e.g., home, door or window and transmit an alarm signal to thecentral monitoring station 14. In response, personnel at thecentral monitoring station 14 may attempt to contact a user by way of a control panel (depicted in detail inFIG. 3 ) of thesecurity system 12, e.g., using bidirectional communication techniques. - The
security system 12 may communicate with thecentral monitoring station 14 using wired or wireless communication techniques. In one example implementation, thenetwork 16 may utilize a traditional POTS (plain old telephone service) telephone line, or wired Ethernet. In another example implementation, thenetwork 16 may be a cellular telephone network for wireless communication. It may be desirable to communicate signals wirelessly to thecentral monitoring station 14 in order to eliminate an intruder's ability to cut or otherwise damage a wired phone line and thus disable communications. - The
security system 12 may also receive control signals via aremote device 18, e.g., a smartphone, tablet computer, or other computing device, that may control one or more aspects of thesecurity system 12. Also, theremote device 18 may receive status signals from thesecurity system 12 that indicate one or more statuses of thesecurity system 12. - For example, in the event that a user forgot to arm the
security system 12 at their premises, the user may remotely arm thesecurity system 12 using theremote device 18 via thenetwork 16. Initially, theremote device 18 may receive a status signal from thesecurity system 12 indicating that thesecurity system 12 is unarmed, and display the status, e.g., via an application executed on a smartphone. Then, after theremote device 18 transmits a control signal to arm thesecurity system 12, theremote device 18 may receive a status signal from thesecurity system 12 indicating that thesecurity system 12 is armed, and display the status. - In addition, the
security system 12 ofFIG. 1 may receive signals that may be used as part of an automation scheme to control various aspects of the building, e.g., home. For example, a user may use a control panel (depicted in detail inFIG. 3 ) of thesecurity system 12 to, for example, turn lights on/off in a home or other building, adjust a temperature, e.g., raise or lower a thermostat setting, and the like. - In another example, the user may use a
remote device 18, e.g., a smartphone, tablet computer, or other computing device, to transmit signals to the control panel of thesecurity system 12 via thenetwork 16 to turn lights on/off in a home or other building, adjust a temperature, e.g., raise or lower a thermostat setting, and the like. -
FIG. 2 is a conceptual diagram illustrating various examples of components of thesecurity system 12 ofFIG. 1 , including acontrol panel 20 and various sensors. As seen inFIG. 2 , thesecurity system 12 may include acontrol panel 20 for receiving status signals from various sensors, including, for example, awindow sensor 22, amotion sensor 24, and adoor sensor 26. Numerous other types of sensors may also be included as part of thesecurity system 12, which are not depictedFIG. 2 . For example, thesecurity system 12 may also include one or more of the following sensors: glass break sensors, smoke detection sensors, carbon monoxide detection sensors, and flooding sensors. - In addition, the
security system 12 may include akey fob 28 that may transmit control signals, e.g., RF control signals, to thecontrol panel 20 to control various aspects of thesecurity system 12. For example, a user may remotely arm/disarm thesecurity system 12 using thekey fob 28. - The
security system 12 may also include aremote keypad 30 that may transmit control signals to and receive status signals from thecontrol panel 20. For example, aremote keypad 30 may be located in a bedroom of a home, thereby allowing a user to arm/disarm thesecurity system 12 or view the status of thesecurity system 12 from the bedroom without having to use thecontrol panel 20, which may be located in another part of the home. - As mentioned above, the
security system 12 may also be used for automation purposes. As non-limiting examples, thecontrol panel 20 ofFIG. 2 (and/or the remote keypad 30) may depict alighting controller 32 and atemperature controller 34. Thecontrol panel 20 may be configured to transmit control signals to thelighting controller 32 that turns one or more lights in a building on/off. In some example implementations, thecontrol panel 20 may transmit the lighting control signals at programmed times, e.g., using a programmed daily schedule. - In addition, the
control panel 20 may be configured to transmit control signals to atemperature controller 34 that adjusts a temperature, e.g., raise or lower a thermostat setting, in a building. In some example implementations, thecontrol panel 20 may transmit the temperature control signals at programmed times, e.g., using a programmed daily schedule. - The
remote keypad 30 may be configured to transmit control signals to thecontrol panel 20, which can then transmit the signal(s) to thelighting controller 32 and/or thetemperature controller 34, e.g., using a programmed daily schedule. - Further, and as mentioned above, in some example implementations the
control panel 20 may receive signals from and/or transmit signals to aremote device 18, e.g., a smartphone, tablet computer, or other computing device. Theremote device 18 may receive status signals from thecontrol panel 20 that indicate one or more statuses of thesecurity system 12, e.g., whether the system is armed or disarmed. Theremote device 18 may also transmit control signals that control one or more aspects of thesecurity system 12. - In some example implementations, the
security system 12 may include one or more speakers (not depicted) as part of a home automation system, for example. Enunciations, signals, or other alerts from the security system may interrupt an audio stream playing through the speakers and transmit the enunciations, signals, or other alerts through the speakers. -
FIG. 3 is a functional block diagram illustrating an example of thecontrol panel 20 of the security system inFIG. 2 , in accordance with this disclosure. Thecontrol panel 20 ofFIG. 3 may include aprocessor 40, a power supply 42 (e.g., an AC powered source and a battery backup circuit), a memory circuit (or memory device) 44, auser interface 46 configured to receive input from a user, aspeaker circuit 48, and aspeaker 50. In some example implementations, thecontrol panel 20 can also include a piezoelectric siren circuit and piezoelectric transducer (not depicted). - The
processor 40 may be a microprocessor, general purpose controller, field-programmable gate array (FPGA), application-specific integrated circuit (ASIC), or other discrete or integrated logic circuitry, for example. - In some example implementations, the
user interface 46 may include a touchscreen display for receiving input, e.g., arming/disarming thesecurity system 12, or defining a home screen or bookmark. In such examples, the touchscreen display may display one or more buttons for controlling various aspects of the security system. In other examples, the user interface may include a display and one or more physical buttons for controlling various aspects of thesecurity system 12. - The
memory circuit 44 may include one or more volatile or non-volatile memory devices, e.g., Flash memory, RAM, EPROM, EEPROM, embedded MMC, etc. Thememory circuit 44 may store instructions that, when executed by theprocessor 40, configure theprocessor 40 to perform the functionality described in this disclosure. For example, upon receiving an input to arm thesecurity system 12, theprocessor 40 may execute instructions that cause thespeaker circuit 48 to output a signal to thespeaker 50 that announces that the security system will soon be armed. - In addition, the
control panel 20 may include acellular circuit 52 with an associatedantenna 54 for transmitting signals to and receiving signals from thecentral monitoring station 14 or theremote device 18, e.g., via acellular network 16. As described in more detail below, and in accordance with this disclosure, thecellular circuit 52 and theantenna 54 may be formed as part of a replaceable cellular module (shown at 110 inFIGS. 7, 8A, 8B ). This replaceable module may allow a customer or technician, for example, to replace a cellular module without disassembling thecontrol panel 20. - In accordance with this disclosure, and as described in more detail below, the
cellular circuit 52, e.g., radio, and theantenna 54 may be interchangeable on the replaceable cellular module. Theantenna 54 may be detachable so that a first antenna can be detached and replaced by a second antenna, e.g., an antenna extending outside the control panel (external), on the replaceable cellular module. This may allow the manufacturer, for example, to pair a radio and an antenna on the replaceable cellular module at the factory so that the customer does not have to connect the antenna and the radio. - Given that, in some examples, the
cellular circuit 52 and theantenna 54 may form the communication link to thecentral monitoring station 14, it may be desirable to detect whether an attempt has been made to remove or otherwise tamper with the replaceable cellular module. Hence, in accordance with this disclosure, thecontrol panel 20 may also include atamper detection circuit 56 for detecting when a door (shown inFIGS. 5 and 7 ) that allows the replaceable cellular module to be replaced has been opened and, if so, transmit an alarm signal to thecentral monitoring station 14 before the replaceable cellular module has been removed from thecontrol panel 20. - In order to transmit or receive control or status signals, e.g., to the
central monitoring station 14, thecellular circuit 52 can generally be powered when thecontrol panel 20 is powered. Removing the replaceable cellular module from thecontrol panel 20 while the replaceable cellular module is powered, however, may damage the replaceable cellular module and/or thecontrol panel 20. For example, removal of a powered cellular module from thecontrol panel 20 may cause electrical arcing at the connector pins, which may permanently damage thecontrol panel 20. Hence, in accordance with this disclosure and as described in detail below, theprocessor 40 may remove power from thecellular circuit 52 if thetamper detection circuit 56 detects that the door (shown inFIGS. 5 and 7 ) has been opened. - The
control panel 20 ofFIG. 3 may also include a radio-frequency identification (RFID)circuit 58, in accordance with this disclosure. TheRFID circuit 58 may allow a manufacturer, for example, to download configuration parameters into anonboard memory circuit 59 of theRFID circuit 58, for example, while thecontrol panel 20 is in a sealed box in the factory. TheRFID circuit 58 can write to theonboard memory 59 even when thecontrol panel 20 is not powered up. When the control panel is an unpowered state, theRFID circuit 58 can receive power from an RF signal from an RF programming device, receive data embedded in the RF signal from the powered RF circuit, and, using the received power from the RF signal, store the data in thememory 59 that is otherwise unpowered. When thecontrol panel 20 is powered up in a powered state, theprocessor 40 can read/receive the stored data from thememory 59 and configure the control panel 20 (and track other parameters and functions) using the received data and data stored inmemory circuit 44. - Upon receiving a signal from an RFID programmer unit, the
RFID circuit 58, which includes anantenna 60, powers up and begins receiving, for example, the configuration parameters that may then be stored directly to theonboard memory circuit 59 of theRFID circuit 58. This may allow a manufacturer or distributor, for example, to customize one or more packaged, unpowered control panels based on customer preferences before the control panels are shipped to the customer. For example, after the control panel is powered up, theprocessor 40 can read the stored configuration parameters from theonboard memory 59 and retrieve from thememory circuit 44 the instructions needed to configure the default language, e.g., English, Spanish, Portuguese, Italian, French, Japanese, etc., of thecontrol panel 20 based on the customer's geographic region. - The
control panel 20 ofFIG. 3 may also include a Wi-Fi circuit 62. In some example configurations, the Wi-Fi circuit 62 may include Wi-Fi Direct functionality, in accordance with this disclosure. Wi-Fi Direct may allow various Wi-Fi enabled components of thesecurity system 12 to communicate with one another without using a wireless access point, e.g., a wireless router. - In one example configuration, the
security system 12 may include one or moreremote keypads 30 that include Wi-Fi chips and are Wi-Fi enabled. Using the Wi-Fi Direct functionality of the Wi-Fi circuit 62 ofFIG. 3 , the one or more Wi-Fi enabledremote keypads 30 may establish a peer-to-peer connection with thecontrol panel 20, instead of using a wireless access point of a home network, for example. By allowing the remote keypad(s) to communicate directly with the control panel using Wi-Fi Direct may eliminate the need to use a proprietary wireless communication protocol or use wired communications techniques. In addition, using Wi-Fi Direct instead of Wi-Fi may simplify the setup for the user by eliminating the need for a wireless access point. - In some examples, the
control panel 20 can be configured to interface with a home automation controller using serial or TCP/IP protocols, for example. For example, thecontrol panel 20 can include a terminal block (not depicted) that can connect to the home automation controller using a wired connection, e.g., via RS-232 serial cable or via an Ethernet cable. In other examples, thecontrol panel 20 can connect using a wireless protocol, e.g., IEEE 802.11 standards. - In some examples, the
control panel 20 can receive signals from a Wi-Fi connected camera (not depicted) using the Wi-Fi circuit 62. The Wi-Fi connected camera can be used to detect motion. For example, the Wi-Fi connected camera can detected. In other examples, the panel can also receive camera signal over a wired Ethernet connection. - The
control panel 20 ofFIG. 3 may also include aBluetooth circuit 64 configured to receive at least one Bluetooth signal from one or more Bluetooth-enabled devices. In some example configurations, theBluetooth circuit 64 may be used by thecontrol panel 20 to automatically disarm thesecurity system 12 when an authorized Bluetooth-enabled device is within range of thecontrol panel 20. Bluetooth is a communications protocol standardized as IEEE 802.15.1. - For example, upon an initial pairing via the
Bluetooth circuit 64 with an authorized Bluetooth-enabled device, e.g., a user's smartphone, theprocessor 40 of thecontrol panel 20 may instruct thememory circuit 44 to store data identifying the authorized Bluetooth-enabled device(s), e.g., a user's smartphone. After thesecurity system 12 has been armed, each time the processor detects that a Bluetooth-enabled device is within range of theBluetooth circuit 64 of thecontrol panel 20, theprocessor 40 may retrieve the identifying data from thememory circuit 44, determine whether the Bluetooth-enabled device is an authorized device, and, if so, disarm thecontrol panel 20 automatically, e.g., without any action taken by the user. - In some example implementations, the
processor 40 may cause a confirmation message to be transmitted to an authorized user prior to disarming thesecurity system 12. Once the authorized user affirmatively responds to the confirmation message, theprocessor 40 may disarm thesecurity system 12. - The
control panel 20 ofFIG. 3 may also include a Universal Serial Bus (USB)circuit 66 connected to aUSB connector 68, e.g., micro-USB, mini-USB, or other USB compatible connector. TheUSB connector 68 andUSB circuit 66 may allow peripheral electronic component(s) to be added to thesecurity system 12. For example, a USB web-camera (not depicted) may be connected to thecontrol panel 20 using theUSB connector 68. Connecting a USB web-camera using theUSB connector 68 may be desirable as it allows the web-camera to be easily upgraded or otherwise replaced. In addition, the USB web-camera may be articulated to allow it to point at a particular location, in contrast to a camera that is integrated into thecontrol panel 20 and thus cannot turn. In some examples, a standard USB extension cable could be used to locate the camera a few feet away from the panel in almost any orientation. In some examples, the user may remotely control the articulation of the web-camera, e.g., using theremote device 18. In some examples, thecontrol panel 20 may include a camera integrated into the control panel (not depicted). - In some examples, a camera, e.g., USB camera or integrated camera, can be used to disarm or arm the alarm system using biometric authentication, e.g., retinal scan, face recognition, etc. Initially, the
control panel 20 can use the camera(s) to scan and store biometric information for one more users. Once armed, for example, thecontrol panel 20 can request that a user position a recognizable feature, e.g., eye, face, etc., close to the camera. Upon comparing the feature to the stored information, thecontrol panel 20 can disarm the system. - In some examples, the
control panel 20 can include a connector that can be connected to an accessory radio transceiver (not depicted). The accessory transceiver can be used to receive signals from one or more peripheral devices and increase the functionality of thecontrol panel 20. For example, the accessory radio transceiver can receive signal from a wireless camera or a wireless image sensor, e.g., motion detector with a camera to capture an image. In some implementations, the accessory transceiver can be placed behind the wall upon which the control panel is mounted to conserve space. - The
control panel 20 may also include a levelingvial 70 that is integrated into the housing of thecontrol panel 20. Anintegrated leveling vial 70 may allow a technician or other user to more quickly and accurately install thecontrol panel 20. - As mentioned above, the
control panel 20 may include aspeaker 50. In accordance with this disclosure and as described in more detail below with respect toFIGS. 6A-6B , thespeaker 50 may be enclosed within a sealed chamber. By enclosing thespeaker 50 within the sealed chamber, the sound volume may be increased, e.g., by about 10 decibels (dB), relative tospeaker 50 similarly positioned in a similar control panel, e.g., having dimensions of about 2 inches by about 5.5 inches by about 1.25 inches, and tested on a wall about 10 feet away from the control panel. In addition, the sealed chamber may improve the bass and midrange frequency response of thespeaker 50 and thus improve the sound quality. Another advantage of the sealed speaker design is to provide equivalent sound at a reduced the size and depth. As a result, the control panel can be smaller and thinner. - Finally, in accordance with this disclosure, the
control panel 20 may include ahome screen module 72 that can receive an input from a user defining one or more screens depicted on adisplay 46, store data representing the at least one user-defined screen in a memory, e.g.,memory circuit 44, and perform one or more actions previously associated by the user with the defined screen. Thehome screen module 72 may enable a user to associate one or more actions such as, for example, temperature settings, lighting settings, security settings, with the default or primary screen of the display of the user interface of theircontrol panel 20 orremote keypad 30, which can allow the user interface, without navigating beyond the nominal default screen, to be a home control panel, security panel, bed-side controller, room controller, thermostat controller or other type of panel. Defining a home screen or defining bookmarks, e.g., a customized screen that is not necessarily a default or primary screen, may reduce the number of keystrokes that the user must enter to reach a desired screen or prompt on the user interface. Thehome screen module 72 can then perform the one or more actions previously associated by the user with the defined screen. -
FIG. 4 is a perspective view of an example of the control panel ofFIG. 2 . Thecontrol panel 20 ofFIG. 4 includes ahousing 80, auser interface 46, e.g., a touchscreen display or other display, and, in some examples, one ormore buttons buttons remote keypad 30 ofFIG. 2 may be similar to thecontrol panel 20 ofFIG. 4 . For purposes of conciseness, theremote keypad 30 and thecontrol panel 20 will be described together. - The
control panel 20 may also include aUSB connector 68. In the non-limiting example shown inFIG. 4 , theUSB connector 68 is located at the top of thecontrol panel 20. In some example implementations, an external web-camera (not depicted) may be connected to thecontrol panel 20 via theUSB connector 68. - The
user interface 46 may be configured to display many different screens depending on the type of application, e.g., security or home automation. For example, thememory circuit 44 may store instructions that, when executed by theprocessor 40, cause the user interface to display a security panel, bed-side controller panel, home theater room controller panel, and/or a home automation panel. Aspects of home automation that may be displayed include, but are not limited to, a thermostat panel, a lighting panel, a door lock panel, a garage door panel, a home audio or other speaker system panel, or other type of panel. - Using various techniques of this disclosure, the
control panel 20 and theremote keypad 30 may include the ability for a user to define a home screen and/or bookmark one or more panels using thehome screen module 72. For example, a user may define aremote keypad 30 located in a home theater room to display a home theater room controller panel as a default home screen. As another example, a user may define aremote keypad 30 located in their bedroom to display a thermostat panel as a default home screen. As another example, the user may define a thermostat panel as a default home screen and may define the security panel using a bookmark to allow quick access. - As another example, the user may define a
remote keypad 30 in their bedroom to be a bedside controller and have an “all lights in room ON/OFF” default home screen. As another example, the user may build a customized home screen forremote keypad 30 designated as a bedside controller in their bedroom. For example, the user may build a “go to bed” home screen that may include thermostat control, security panel control (e.g., “arm stay”, and an “all lights OFF” control, or any other system control features that the user may use at bedtime. In some examples, each of these controls may be displayed on a single screen of the user interface of theremote keypad 30 for the user to individually control. That is, the user may individually turn down the thermostat, turn off all the lights, and arm the security system. In other examples, the “go to bed” home screen may allow a user to touch a single button on the user interface of theremote keypad 30 that initiates a sequence of events including, for example, turning down the thermostat, turning off all the lights, and arming the security system. - As another example, a user may build a customized home screen for a
remote keypad 30 located in a hallway. For example, the user may build a customized “return from work” home screen that allows a user to touch a single button on the user interface of theremote keypad 30 in the hallway that initiates a sequence of events including, for example, turning up the thermostat and turning on various lights in the house. Eachremote keypad 30 located about the house may have different home screens defined by the user. - In some example implementations, the user-defined home screens may display the status of various system components, e.g., a thermostat setting and an alarm status, and also display control icons to control the various system components, e.g., increase/decrease thermostat setting and arm/disarm the alarm system.
- In one example implementation, when setting or defining a default home screen, a user may navigate through various menus on the
control panel 20 until theuser interface 46 displays the preferred home screen. Thehome screen module 72 may cause the user interface to display a home screen or bookmark icon. Once on the preferred home screen, the user may touch a displayed home screen (or bookmark) icon to confirm that the displayed home screen is the preferred home screen or bookmark. Upon receiving the confirmation, thehome screen module 72 may store the settings in thememory circuit 44, e.g., in a user preferences or configuration file. Thehome screen module 72 may cause theuser interface 46 to display the preferred home screen as the default screen based on the stored settings. - Similarly, a user may again navigate through various menus until the
user interface 46 displays a panel that the user would like to bookmark as a favorite panel, e.g., a thermostat panel. Once on the desired screen, the user may touch a displayed home screen (or bookmark) icon to confirm that the displayed screen should be bookmarked as a favorite panel. Upon receiving the confirmation, thehome screen module 72 may store the settings in thememory circuit 44, e.g., in a configuration file. Thehome screen module 72 may cause theuser interface 46 to display the preferred home screen as the default screen based on the stored settings. - In another example implementation, rather than have the user navigate through various menus or screens until the
user interface 46 displays the desired screen (either for default as a home screen or for bookmarking as a favorite), theuser interface 46 may display thumbnail views or text, for example, of the various panels that can be selected as preferred panels. Thehome screen module 72 may prompt a user to select the desired screen, prompt the user to confirm that the displayed screen should be bookmarked as a favorite panel or as a default home screen, and then, upon receiving the confirmation, thehome screen module 72 may store the settings in thememory circuit 44, e.g., in a configuration file. -
FIGS. 10A-10D are examples of screenshots of various portions depicting a user-defined screen of a user-interface 46, e.g., display. As indicated above, thecontrol panel 20 may include ahome screen module 72 that can receive an input from a user defining one or more screens depicted on adisplay 46 and store data representing the at least one user-defined screen in a memory, e.g.,memory circuit 44. -
FIG. 10A is an example of ascreenshot 200 in which the user has yet to provide input to define a screen, e.g., set a bookmark. A bookmark icon is shown at 202. In the examples shown inFIGS. 10A-10D , the user can define a screen for the master bedroom. To begin the task of defining the screen, the user can select the “smart home controls”button 204 at the bottom of thescreen 200. Selecting the “smart home controls”button 204 can cause new buttons 206A-206F to appear on the screen, as seen inscreen 208 inFIG. 10B . To define a screen for the master bedroom, the user can select the “rooms”button 206F on thescreen 208. Selecting the “rooms”button 206F can cause one or more “room” buttons 210A-210B to appear on thescreen 212, as seen inFIG. 10C . As seen inFIG. 10C , thescreen 212 displays a “master bedroom” button 210A and an “add new room”button 210B, which can allow a user to define settings for a room other than the master bedroom. - To define a screen for the master bedroom, the user can select the “master bedroom” button 210A on the
screen 212 inFIG. 10C . Selecting the “master bedroom” button 210A can cause one or more control icons to appear on thescreen 214, as seen inFIG. 10D . As seen inFIG. 10D , the user can define, for example, the lighting and/or the thermostat settings. For example, the user can useslider control icon 216A to set the brightness of the lighting for the master bedroom. - The user can also define the thermostat settings. For example, the user can define the heating and cooling set point temperatures using the up/down arrows shown generally at 216B, 216C, respectively. In addition, the user can define the fan settings at 216D and the mode settings at 216E. After defining the lighting and/or temperature settings, for example, for the master bedroom, the user can select the
bookmark icon 202 to bookmark the screen for the master bedroom. - The
home screen module 72 may constitute either a software module, e.g., code embodied on a non-transitory machine-readable medium, or a hardware-implemented module. If embodied as a software module, thememory circuit 44 may include computer-readable instructions that, when executed by theprocessor 40, cause theprocessor 40 to perform various functions attributed throughout this disclosure to thehome screen module 72. - In various configurations, a hardware-implemented module may be implemented mechanically or electronically. For example, a hardware-implemented module may comprise dedicated circuitry or logic that is permanently configured, e.g., as a special-purpose processor, such as a field programmable gate array (FPGA) or an application-specific integrated circuit (ASIC), to perform certain operations. A hardware-implemented module may also comprise programmable logic or circuitry, e.g., as encompassed within a general-purpose processor or other programmable processor, that is temporarily configured by software to perform certain operations. It will be appreciated that the decision to implement a hardware-implemented module mechanically, in dedicated and permanently configured circuitry, or in temporarily configured circuitry, e.g., configured by software, may be driven by cost and time considerations.
- Accordingly, the term “hardware-implemented module” should be understood to encompass a tangible entity, be that an entity that is physically constructed, permanently configured, e.g., hardwired, or temporarily or transitorily configured, e.g., programmed, to operate in a certain manner and/or to perform certain operations described herein. Considering embodiments in which hardware-implemented modules are temporarily configured, e.g., programmed, each of the hardware-implemented modules need not be configured or instantiated at any one instance in time. For example, where the hardware-implemented modules comprise a general-purpose processor configured using software, the general-purpose processor may be configured as respective different hardware-implemented modules at different times. Software may accordingly configure a processor, for example, to constitute a particular hardware-implemented module at one instance of time and to constitute a different hardware-implemented module at a different instance of time.
-
FIG. 5 is a side view of the example control panel ofFIG. 4 . As mentioned above, thecontrol panel 20 may include a replaceable cellular module (depicted at 110 inFIGS. 7, 8A, 8B ) that includes thecellular circuit 52, e.g., cellular radio, and theantenna 54 ofFIG. 3 . An end-user, e.g., customer or technician, may install or replace the replaceable cellular module by opening thedoor 90 ofFIG. 5 , e.g., after removing a screw (shown at 116 inFIG. 9 ) and inserting the module through a slot defined by the housing (shown at 93 inFIG. 9 ). Thedoor 90 has an open state and a closed state, and the end-user replaceable cellular module is replaceable through the slot when the door is in the open state. In some examples, thedoor 90 can be snapped in place or snapped in place and secured with an optional screw. In some examples, the door can be removed and replaced without requiring a tool. In this manner, the replaceable cellular module is replaceable without disassembling the control panel or housing. After the replaceable cellular module is installed, thetamper detection circuit 56 ofFIG. 3 may detect when thedoor 90 is opened, as described in more detail below. - In addition to the techniques described above, the
control panel 20 includes an improved speaker design. Speaker designs of existing security systems utilize forward facing, rearward facing, or side facing speakers with grills. These designs, however, often result in thin, metallic (e.g., tinny), unintelligible sounds. As shown inFIGS. 6A-6B and as described below, the sound quality and volume of thespeaker 50 of thecontrol panel 20 may be improved by using a sealed speaker enclosure, e.g., a resonant speaker enclosure, thus resulting in a thinner, more desirable panel with comparable sound quality. Thecontrol panel 20 may be configured to provide two-way communication using a microphone (not depicted) and thespeaker 50. As such, the increase in bass and midrange frequency responses of thespeaker 50 may improve the intelligibility and sound quality of received communication, e.g., from thecentral monitoring station 14. - In addition, the
control panel 20 may be configured to provide sirens, signaling, and annunciation using thespeaker 50. The sealedspeaker enclosure 100 ofFIGS. 6A and 6B may increase the volume of thespeaker 50 over existing speaker designs. -
FIG. 6A is perspective front view of the example control panel ofFIG. 4 , illustrating a sealed speaker enclosure, in accordance with this disclosure. The front cover of thecontrol panel 20 has been removed inFIG. 6A in order to depict thespeaker 50 within a sealed speaker enclosure 100 (depicted by cross-hatching inFIG. 6A ). The sealedspeaker enclosure 100 may increase the bass and midrange frequency responses of thespeaker 50. As seen inFIGS. 6A-6B , thevolume 98 extending to the left of thespeaker 50 is the primary volume that forms the sealedspeaker enclosure 100. In addition, in some examples, thediaphragm 102 of thespeaker 50 may also form part of the sealedenclosure 100, which seals any air behind thediaphragm 102. The cross-hatching inFIG. 6A defines at least a portion of the boundary of the sealedspeaker enclosure 100. -
FIG. 6B is cross-sectional end view of the example control panel ofFIG. 4 , illustrating a sealed speaker, in accordance with this disclosure. Thespeaker 50 includes a front 120 from which sound is projected, a rear 122 opposite the front 120, afirst side 124, and asecond side 126 opposite the first side. Thehousing 80 can include a frontinterior side 130, a rearinterior side 132 opposite the frontinterior side 130, a firstinterior side 134, and a secondinterior side 136 opposite the firstinterior side 134. - The sealed speaker enclosure 100 (shown with hatching) is positioned within the
housing 80 and at least partially defined by a speaker case 103 positioned within the housing. In some example configurations, e.g., in a control panel having dimensions of about 2 inches by about 5.5 inches by about 1.25 inches, the volume of the sealedspeaker enclosure 100 can be between about 0.35 liters to about 0.45 liters to provide the improved performance characteristics described in this disclosure. - To ensure that that the speaker enclosure is sealed, a
sealant 105 can be applied, e.g., room-temperature vulcanization (RTV) silicone, resulting in a sealed sound box within thecontrol panel 20. In some examples, thediaphragm 102 of thespeaker 50 may also form part of the sealedenclosure 100, which seals any air behind thediaphragm 102. As seen inFIG. 6B , rather than extending behind thespeaker 50, the primary volume ofair 98 of the sealedspeaker enclosure 100 is adjacent to thefirst side 124 of thespeaker 50 and extends away from thefirst side 124 and, in some examples, behind other components within thecontrol panel 20, e.g.,piezoelectric element 104. A small, secondary volume ofair 101 of the sealedspeaker enclosure 100 may extend to the right of thespeaker 50 inFIG. 6B . - In some examples, the
second side 126 of thespeaker 50 is positioned adjacent the secondinterior side 136 of thehousing 80, and the sealedspeaker enclosure 100 defines the secondary acoustic volume ofair 101 that extends between thesecond side 126 of thespeaker 50 and the secondinterior side 136 of thehousing 80. - In some examples, the
second side 126 of thespeaker 50 is positioned adjacent the secondinterior side 136 of thehousing 80, and the primary acoustic volume of air extends away from thefirst side 124 of thespeaker 50 toward the firstinterior side 134 of thehousing 80. - In some examples, the
rear portion 122 of thespeaker 50 is adjacent the rearinterior side 132 of thehousing 80, and the sealedspeaker enclosure 100 extends across only a portion of therear portion 122 of thespeaker 50. For example, only a small portion of the sealedspeaker enclosure 100 is positioned directly behind thespeaker 50. - By taking advantage of spaces within the
control panel 20 that are too small or would otherwise obstruct placement of thespeaker 50, the design of the sealedspeaker enclosure 100 ofFIGS. 6A and 6B may result in a reduced profile of thecontrol panel 20. Without the design of the sealedspeaker enclosure 100 ofFIGS. 6A and 6B , the dimensions of thecontrol panel 20, e.g., the depth, may need to be increased in order to create an equivalent acoustic volume. - In some example implementations, the
control panel 20 with the sealedspeaker enclosure 100 may form part of an all-in-one home automation and security control panel, e.g., a control panel that includes all the radios of the home automation and security system without additional accessory boxes/panels. -
FIG. 7 is perspective back view of the example control panel ofFIG. 6A , illustrating a replaceable cellular module, in accordance with this disclosure. More particularly, thecontrol panel 20 ofFIG. 7 may include an end-user replaceablecellular telephony module 110, that is removable from thecontrol panel 20 without disassembling the control panel, having abody 112 that includes thecellular telephony circuit 52 and thecellular telephony antenna 54. Thecontrol panel 20 includes adoor 90 through which the replaceablecellular module 110 may be inserted for connection to the circuitry of thecontrol panel 20. For example, thecontrol panel 20 can include aconnector 113 sized and shaped or otherwise configured to be removably engaged by the end-user with aconnector 114 coupled to thecellular circuit 52 and thebody 112 of the replaceablecellular module 110. - In one example implementation, a customer or technician may open the
door 90, remove the replaceablecellular module 110, and install a new replaceablecellular module 110 through the slot 93 (or compartment) when thedoor 90 is in an open state or position, e.g., removed. In some examples, thedoor 90 is removable and not hinged and can be affixed to the housing when installed and removed when it is opened. At least a portion of the end-user replaceable cellular module is sized and shaped or otherwise configured to fit through thedoor 90 and/or theslot 93. For example, in the event that thecontrol panel 20 includes a replaceablecellular module 110 configured for an older cellular protocol, an updated replaceablecellular module 110, e.g., next generation protocol radios such as a 3G or a 4G protocol, may be shipped to and installed by the customer without having to disassemble thehousing 80. -
FIGS. 8A and 8B are perspective views of the replaceablecellular module 110 ofFIG. 7 , in accordance with this disclosure. For purposes of concisenessFIGS. 8A and 8B will be described together. - As seen in
FIGS. 8A and 8B , thecellular circuit 52, e.g., radio chip, and the antenna 54 (shown inFIG. 8B ) are attached to abody 112 and together form part of the replaceablecellular module 110. Theantenna 54 is electrically connected to thecellular circuit 52, and thecellular circuit 52 is connected to thecontrol panel 20 using amulti-pin connector 114. A pull-tab 55 can be included to assist the user in removing the replaceablecellular module 110 from thecontrol panel 20. - The
cellular circuit 52 and theantenna 54 may each be detached from the replaceablecellular module 110. For example, thecellular circuit 52 may be a circuit board that may be removed and replaced by another cellular circuit, e.g., radio chip, that snaps into position on thebody 112. As another example,antenna 54 may be detachable by the service professional or end-user and replaced by a different type of antenna that has one or more improved performance characteristics. For example, a paddle antenna may be replaced by another antenna type that has different performance characteristics in order to produce an optimized radiation pattern, e.g., an isotropic radiation pattern. As another example, to enhance signal strength, theantenna 54 can be unwound and re-routed, e.g., out of the replaceablecellular module 110 and behind the wall. To re-route theantenna 54, one end of theantenna 54 can remain connected to thecellular circuit 52 and be unwound. The unconnected end can be pulled out of the replaceablecellular module 110 and positioned to adjust the signal strength, e.g., behind the wall supporting thecontrol panel 20. -
FIG. 9 is a perspective view of a portion of thecontrol panel 20. InFIG. 9 , a faceplate covering thecontrol panel 20 has been removed to provide access the optionaldoor locking screw 116. Once thedoor locking screw 116 is removed, thedoor 90 can be removed. - As mentioned above, the
door 90 may be in communication with thetamper detection circuit 56. Using the techniques of this disclosure, tamper detection with thedoor 90 is a two-step process. In the first step, thetamper detection circuit 56 can detect tampering with thedoor 90. As one example, thetamper detection circuit 56 includes amicroswitch 94 held in a first state, e.g., closed, by aportion 106 of thedoor 90, e.g., a tab. A person attempting to remove the replaceablecellular module 110 may begin removing thescrew 116. Once thedoor 90 is removed, theportion 106 of thedoor 90 no longer holds themicroswitch 94 in the first state and, as a result, themicroswitch 94 may change to a second state, e.g., open. - In the second step, the
processor 40 may detect the change in state of themicroswitch 94, e.g., open. In response and prior to the removal of the replaceablecellular module 110 from thecontrol panel 20, theprocessor 40 can cause thecellular circuit 52 to transmit a signal to thecentral monitoring station 14 that indicates that tampering has been detected at thecontrol panel 20. - The time delay between the detection of tampering and removal of the replaceable
cellular module 110 is sufficient for theprocessor 40 and thecellular circuit 52 to transmit a tamper detect signal to thecentral monitoring station 14. In some examples, theprocessor 40 and thecellular circuit 52 may detect and transmit the tamper detect signal in about 100 milliseconds (ms) to about one second. - In addition, in some example implementations, after the
processor 40 and thecellular circuit 52 transmit the tamper detect signal to thecentral monitoring station 14, theprocessor 40 may power down thecellular circuit 52 to prevent damage to thecontrol panel 20. That is, removing the replaceablecellular module 110 from thecontrol panel 20 while the replaceablecellular module 110 is powered may damage the replaceablecellular module 110 and/or thecontrol panel 20. For example, removal of a powered cellular module from thecontrol panel 20 may cause electrical arcing at the connector pins, which may permanently damage thecontrol panel 20. Hence, the processor may remove power from thecellular circuit 52 if thetamper detection circuit 56 detects that thedoor 90 has been opened. - Example 1 includes subject matter (such as a device, apparatus, or machine) comprising: an end-user replaceable cellular telephony module that is removable from the control panel without disassembling the control panel, the cellular module including: a body; a cellular telephony circuit coupled to the body; a cellular telephony antenna coupled to the body and the cellular telephony circuit; and a first connector coupled to the cellular telephony circuit and the body, wherein the first connector is sized and shaped or otherwise configured to be removably engaged by the end-user with a second connector in the control panel.
- In Example 2, the subject matter of Example 1 may include, wherein the antenna is a first antenna, and wherein the module is configured such that the first antenna can be detached from the body by the end-user and replaced by a second antenna.
- In Example 3, the subject matter of any one of Examples 1 to 2 may include, wherein the second antenna is configured to have a different performance characteristic than the first antenna.
- In Example 4, the subject matter of any one of Examples 1 to 3 may include, a housing defining a slot, and wherein at least a portion of the end-user replaceable cellular module is sized and shaped or otherwise configured to fit through the slot.
- In Example 5, the subject matter of any one of Examples 1 to 4 may include, a door removably affixed to the housing, wherein at least a portion of the end-user replaceable cellular module is sized and shaped or otherwise configured to fit through the slot when the door is removed.
- In Example 6, the subject matter of any one of Examples 1 to 5 may include, a switch configured to detect an opening of the door affixed, wherein the switch is configured to change state upon detecting the opening; and a processor configured to: detect the changed state of the switch; and control transmission of a tamper detection signal to a central monitoring station upon detection of the changed state of the switch.
- In Example 7, the subject matter of any one of Examples 1 to 6 may include, a display; a housing configured to support the display; and a speaker having a front from which sound is projected, a rear opposite the front, a first side, and a second side opposite the first side; and a sealed speaker enclosure positioned within the housing, the sealed speaker enclosure including a speaker case, wherein a portion of the speaker case and a portion of the speaker define the sealed speaker enclosure.
- In Example 8, the subject matter of any one of Examples 1 to 7 may include, wherein the sealed speaker enclosure includes a speaker case.
- In Example 9, the subject matter of any one of Examples 1 to 8 may include, wherein the sealed speaker enclosure has a volume of between about 0.35 liters to about 0.45 liters.
- In Example 10, the subject matter of any one of Examples 1 to 9 may include, wherein the sealed speaker enclosure defines a primary acoustic volume of air that extends away from the first side of the speaker.
- In Example 11, the subject matter of any one of Examples 1 to 10 may include, wherein the portion of the speaker that defines the sealed speaker enclosure includes a diaphragm of the speaker.
- In Example 12, the subject matter of any one of Examples 1 to 11 may include, wherein the housing has a front interior side, a rear interior side opposite the front interior side, a first interior side and a second interior side opposite the first interior side, wherein the second side of the speaker is positioned adjacent the second interior side of the housing, and wherein the sealed speaker enclosure defines a secondary acoustic volume of air that extends between the second side of the speaker and the second interior side of the housing.
- In Example 13, the subject matter of any one of Examples 1 to 12 may include, wherein the housing has a front interior side, a rear interior side opposite the front interior side, a first interior side and a second interior side opposite the first interior side, wherein the second side of the speaker is positioned adjacent the second interior side of the housing, and wherein the primary acoustic volume of air extends away from the first side of the speaker toward the first interior side of the housing.
- In Example 14, the subject matter of any one of Examples 1 to 13 may include, wherein the housing has a front interior side, a rear interior side opposite the front interior side, a first interior side and a second interior side opposite the first interior side, wherein the speaker has a rear portion adjacent the rear interior side of the housing, and wherein the sealed speaker enclosure extends across only a portion of the rear portion of the speaker.
- In Example 15, the subject matter of any one of Examples 1 to 14 may include, a Bluetooth circuit configured to receive at least one Bluetooth signal from one or more Bluetooth-enabled devices; a processor configured to: store data identifying an authorized Bluetooth-enabled device in a memory; detect the authorized Bluetooth-enabled device; and disarm the security system control panel in response to the detection.
- In Example 16, the subject matter of any one of Examples 1 to 15 may include, a user interface including a display; and a home screen module configured to: receive an input from the end-user defining at least one screen depicted on the display; store data representing the at least one end-user-defined screen in a memory; and perform one or more actions previously associated by the user with the defined screen.
- In Example 17, the subject matter of any one of Examples 1 to 16 may include, wherein the screen depicted on the display is a thermostat controller.
- In Example 18, the subject matter of any one of Examples 1 to 17 may include, wherein the screen depicted on the display is a room controller that includes at least one of lighting and temperature controls.
- In Example 19, the subject matter of any one of Examples 1 to 18 may include, a radio-frequency (RF) circuit configured to: when the control panel is in an unpowered state: receive power from an RF signal from an RF programming device; receive data embedded in the RF signal from the powered RF circuit; and using the received power from the RF signal store the data in a memory that is otherwise unpowered; and a processor configured to: when the control panel is in a powered state: receive the stored data; and configure at least one parameter using the received data.
- The above detailed description includes references to the accompanying drawings, which form a part of the detailed description. The drawings show, by way of illustration, specific embodiments in which the invention can be practiced. These embodiments are also referred to herein as “examples.” Such examples can include elements in addition to those shown or described. However, the present inventors also contemplate examples in which only those elements shown or described are provided. Moreover, the present inventors also contemplate examples using any combination or permutation of those elements shown or described (or one or more aspects thereof), either with respect to a particular example (or one or more aspects thereof), or with respect to other examples (or one or more aspects thereof) shown or described herein.
- All publications, patents, and patent documents referred to in this document are incorporated by reference herein in their entirety, as though individually incorporated by reference. In the event of inconsistent usages between this document and those documents so incorporated by reference, the usage in the incorporated reference(s) should be considered supplementary to that of this document; for irreconcilable inconsistencies, the usage in this document controls.
- In this document, the terms “a” or “an” are used, as is common in patent documents, to include one or more than one, independent of any other instances or usages of “at least one” or “one or more.” In this document, the term “or” is used to refer to a nonexclusive or, such that “A or B” includes “A but not B,” “B but not A,” and “A and B,” unless otherwise indicated. In this document, the terms “including” and “in which” are used as the plain-English equivalents of the respective terms “comprising” and “wherein.” Also, in the following claims, the terms “including” and “comprising” are open-ended, that is, a system, device, article, or process that includes elements in addition to those listed after such a term in a claim are still deemed to fall within the scope of that claim. Moreover, in the following claims, the terms “first,” “second,” and “third,” etc. are used merely as labels, and are not intended to impose numerical requirements on their objects.
- Method examples described herein can be machine or computer-implemented at least in part. Some examples can include a computer-readable medium or machine-readable medium encoded with instructions operable to configure an electronic device to perform methods as described in the above examples. An implementation of such methods can include code, such as microcode, assembly language code, a higher-level language code, or the like. Such code can include computer readable instructions for performing various methods. The code may form portions of computer program products. Further, the code can be tangibly stored on one or more volatile or non-volatile tangible computer-readable media, such as during execution or at other times. Examples of these tangible computer-readable media can include, but are not limited to, hard disks, removable magnetic disks, removable optical disks (e.g., compact disks and digital video disks), magnetic cassettes, memory cards or sticks, random access memories (RAMs), read only memories (ROMs), and the like.
- Examples, as described herein, may include, or may operate on, logic or a number of components, modules, or mechanisms. Modules may be hardware, software, or firmware communicatively coupled to one or more processors in order to carry out the operations described herein. Modules may hardware modules, and as such modules may be considered tangible entities capable of performing specified operations and may be configured or arranged in a certain manner. In an example, circuits may be arranged (e.g., internally or with respect to external entities such as other circuits) in a specified manner as a module. In an example, the whole or part of one or more computer systems (e.g., a standalone, client or server computer system) or one or more hardware processors may be configured by firmware or software (e.g., instructions, an application portion, or an application) as a module that operates to perform specified operations. In an example, the software may reside on a machine-readable medium. In an example, the software, when executed by the underlying hardware of the module, causes the hardware to perform the specified operations. Accordingly, the term hardware module is understood to encompass a tangible entity, be that an entity that is physically constructed, specifically configured (e.g., hardwired), or temporarily (e.g., transitorily) configured (e.g., programmed) to operate in a specified manner or to perform part or all of any operation described herein. Considering examples in which modules are temporarily configured, each of the modules need not be instantiated at any one moment in time. For example, where the modules comprise a general-purpose hardware processor configured using software; the general-purpose hardware processor may be configured as respective different modules at different times. Software may accordingly configure a hardware processor, for example, to constitute a particular module at one instance of time and to constitute a different module at a different instance of time. Modules may also be software or firmware modules, which operate to perform the methodologies described herein.
- The above description is intended to be illustrative, and not restrictive. For example, the above-described examples (or one or more aspects thereof) may be used in combination with each other. Other embodiments can be used, such as by one of ordinary skill in the art upon reviewing the above description. Also, in the above Detailed Description, various features may be grouped together to streamline the disclosure. This should not be interpreted as intending that an unclaimed disclosed feature is essential to any claim. Rather, inventive subject matter may lie in less than all features of a particular disclosed embodiment. Thus, the following claims are hereby incorporated into the Detailed Description, with each claim standing on its own as a separate embodiment, and it is contemplated that such embodiments can be combined with each other in various combinations or permutations. The scope of the invention should be determined with reference to the appended claims, along with the full scope of equivalents to which such claims are entitled.
- Various aspects of the disclosure have been described. These and other aspects are within the scope of the following claims.
Claims (20)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US15/871,764 US20180158294A1 (en) | 2014-01-27 | 2018-01-15 | Building security and automation system having user-defined screens and associated method |
Applications Claiming Priority (4)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US201461931945P | 2014-01-27 | 2014-01-27 | |
PCT/US2015/013036 WO2015160414A2 (en) | 2014-01-27 | 2015-01-27 | Building security and automation system |
US201615114380A | 2016-07-26 | 2016-07-26 | |
US15/871,764 US20180158294A1 (en) | 2014-01-27 | 2018-01-15 | Building security and automation system having user-defined screens and associated method |
Related Parent Applications (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US15/114,380 Continuation US20170084143A1 (en) | 2014-01-27 | 2015-01-27 | Building security and automation system |
PCT/US2015/013036 Continuation WO2015160414A2 (en) | 2014-01-27 | 2015-01-27 | Building security and automation system |
Publications (1)
Publication Number | Publication Date |
---|---|
US20180158294A1 true US20180158294A1 (en) | 2018-06-07 |
Family
ID=53783892
Family Applications (5)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US15/114,380 Abandoned US20170084143A1 (en) | 2014-01-27 | 2015-01-27 | Building security and automation system |
US15/871,764 Abandoned US20180158294A1 (en) | 2014-01-27 | 2018-01-15 | Building security and automation system having user-defined screens and associated method |
US15/871,584 Abandoned US20180137725A1 (en) | 2014-01-27 | 2018-01-15 | Building security and automation system disarming apparatus and method |
US15/871,771 Expired - Fee Related US10553089B2 (en) | 2014-01-27 | 2018-01-15 | Building security and automation system speaker and method |
US15/871,749 Abandoned US20180137726A1 (en) | 2014-01-27 | 2018-01-15 | Building security and automation system with remote-powered data store and delayed data update and method |
Family Applications Before (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US15/114,380 Abandoned US20170084143A1 (en) | 2014-01-27 | 2015-01-27 | Building security and automation system |
Family Applications After (3)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US15/871,584 Abandoned US20180137725A1 (en) | 2014-01-27 | 2018-01-15 | Building security and automation system disarming apparatus and method |
US15/871,771 Expired - Fee Related US10553089B2 (en) | 2014-01-27 | 2018-01-15 | Building security and automation system speaker and method |
US15/871,749 Abandoned US20180137726A1 (en) | 2014-01-27 | 2018-01-15 | Building security and automation system with remote-powered data store and delayed data update and method |
Country Status (4)
Country | Link |
---|---|
US (5) | US20170084143A1 (en) |
EP (1) | EP3100246A2 (en) |
CN (1) | CN106463031A (en) |
WO (1) | WO2015160414A2 (en) |
Families Citing this family (36)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
USD793888S1 (en) * | 2015-08-25 | 2017-08-08 | Panasonic Intellectual Property Management Co., Ltd. | Control panel |
US20170063568A1 (en) * | 2015-08-31 | 2017-03-02 | Grand Mate Co., Ltd. | Method For Controlling Multiple Electric Appliances |
US10257256B2 (en) * | 2016-01-20 | 2019-04-09 | Google Llc | IOT interaction system |
US9997054B2 (en) * | 2016-06-07 | 2018-06-12 | Ecolink Intelligent Technology, Inc. | Method and apparatus for disarming a security system |
FR3054341B1 (en) * | 2016-07-22 | 2020-01-17 | Overkiz | METHOD FOR CONFIGURING AND SUPERVISING A HOME AUTOMATION |
FR3054397B1 (en) | 2016-07-22 | 2020-01-17 | Overkiz | HOUSEHOLD INSTALLATION INCIDENT MANAGEMENT PROCESS |
US10496048B2 (en) * | 2016-11-02 | 2019-12-03 | Edison Labs, Inc. | Switch terminal methods with wiring components secured to circuitry wiring without external live points of contact |
US10394194B2 (en) * | 2016-11-02 | 2019-08-27 | Edison Labs, Inc. | Adaptive control methods for buildings with security |
US10481563B2 (en) | 2016-11-02 | 2019-11-19 | Edison Labs, Inc. | Adaptive control methods for buildings with dual band slot antenna |
US20190033798A1 (en) * | 2016-11-02 | 2019-01-31 | Edison Labs, Inc. | Adaptive control systems for buildings with redundant circuitry |
US10496047B2 (en) * | 2016-11-02 | 2019-12-03 | Edison Labs, Inc. | Adaptive control systems methods for buildings with security |
US10474112B2 (en) | 2016-11-02 | 2019-11-12 | Edison Labs, Inc. | Adaptive control systems for buildings with dual band slot antenna |
US10254722B2 (en) | 2016-11-02 | 2019-04-09 | Edison Labs, Inc. | Switch terminal system with display |
CN108665933B (en) | 2016-11-02 | 2020-10-16 | 旺宏电子股份有限公司 | Method for operating a non-volatile memory element and use thereof |
US10401805B1 (en) * | 2016-11-02 | 2019-09-03 | Edison Labs, Inc. | Switch terminal system with third party access |
US10642231B1 (en) * | 2016-11-02 | 2020-05-05 | Edison Labs, Inc. | Switch terminal system with an activity assistant |
US10146191B2 (en) | 2016-11-02 | 2018-12-04 | Edison Labs, Inc. | Switch terminal system with spatial relationship information |
US10241477B2 (en) * | 2016-11-02 | 2019-03-26 | Edison Labs, Inc. | Adaptive control methods for buildings with redundant circuitry |
US10067484B2 (en) * | 2016-11-02 | 2018-09-04 | Edison Labs, Inc. | Adaptive control systems for buildings with redundant circuitry |
WO2018127954A1 (en) * | 2017-01-05 | 2018-07-12 | 三菱電機株式会社 | Radio communication system |
EP3625780B1 (en) * | 2017-05-16 | 2021-12-15 | Tyco Fire & Security GmbH | System and method for automatically disarming an intrusion detection system |
EP3631777B1 (en) | 2017-05-30 | 2023-09-06 | Tyco Fire & Security GmbH | System and method for automatically disarming an intrusion detection system |
US10169984B1 (en) * | 2017-11-13 | 2019-01-01 | Grand Mate Co., Ltd. | Method for transmitting data in wireless system |
US10809682B2 (en) * | 2017-11-15 | 2020-10-20 | Johnson Controls Technology Company | Building management system with optimized processing of building system data |
US10733872B2 (en) * | 2018-03-05 | 2020-08-04 | Ademco Inc. | Systems and methods for preventing remote disarming of a portion of a monitored region |
FR3084235B1 (en) * | 2018-07-19 | 2020-11-06 | Verisure Sarl | USER INTERFACE FOR ALARM SYSTEM |
US10403251B1 (en) * | 2018-08-08 | 2019-09-03 | Joseph Robert Escamilla | System and method of collectively producing music |
US11163434B2 (en) | 2019-01-24 | 2021-11-02 | Ademco Inc. | Systems and methods for using augmenting reality to control a connected home system |
CN113748318A (en) | 2019-04-25 | 2021-12-03 | 惠普发展公司,有限责任合伙企业 | Sensor device attachable to an electronic device |
US10778274B1 (en) | 2019-05-01 | 2020-09-15 | Honeywell International Inc. | Wall mountable security case |
US11158174B2 (en) | 2019-07-12 | 2021-10-26 | Carrier Corporation | Security system with distributed audio and video sources |
US20220269388A1 (en) | 2021-02-19 | 2022-08-25 | Johnson Controls Tyco IP Holdings LLP | Security / automation system control panel graphical user interface |
US11961377B2 (en) | 2021-02-19 | 2024-04-16 | Johnson Controls Tyco IP Holdings LLP | Security / automation system control panel with acoustic signature detection |
US12046121B2 (en) * | 2021-02-19 | 2024-07-23 | Johnson Controls Tyco IP Holdings LLP | Security / automation system control panel with short range communication disarming |
US12022574B2 (en) | 2021-02-19 | 2024-06-25 | Johnson Controls Tyco IP Holdings LLP | Security / automation system with cloud-communicative sensor devices |
US12026243B2 (en) | 2021-02-19 | 2024-07-02 | Johnson Controls Tyco IP Holdings LLP | Facial recognition by a security / automation system control panel |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20100240417A1 (en) * | 2009-03-23 | 2010-09-23 | Marianna Wickman | Multifunction mobile device having a movable element, such as a display, and associated functions |
US20120062370A1 (en) * | 2010-09-14 | 2012-03-15 | Crestron Electronics, Inc. | Control System for Augmenting a Portable Touch Screen Device |
US20120221149A1 (en) * | 2011-02-28 | 2012-08-30 | Honeywell International Inc. | Method and apparatus for configuring scheduling on a wall module |
Family Cites Families (30)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4591020A (en) * | 1980-02-04 | 1986-05-27 | Hruby Jr John O | Loudspeaker enclosure with isolation of loudspeaker vibration |
US5680144A (en) * | 1996-03-13 | 1997-10-21 | Nokia Mobile Phones Limited | Wideband, stacked double C-patch antenna having gap-coupled parasitic elements |
US5974238A (en) * | 1996-08-07 | 1999-10-26 | Compaq Computer Corporation | Automatic data synchronization between a handheld and a host computer using pseudo cache including tags and logical data elements |
US6105136A (en) * | 1998-02-13 | 2000-08-15 | International Business Machines Corporation | Computer system which is disabled when it is disconnected from a network |
GB2338811B (en) * | 1998-06-26 | 2002-10-02 | Nokia Mobile Phones Ltd | A cardholder |
US20020107042A1 (en) * | 2001-02-08 | 2002-08-08 | Murnaghan Matthew J. | Handheld wireless communication device |
US20020140966A1 (en) * | 2001-04-02 | 2002-10-03 | Meade William K. | Systems and methods for managing software updates for printing systems |
SE0300252D0 (en) * | 2003-02-03 | 2003-02-03 | Hamid Delalat | Blue Guards |
US20040260407A1 (en) * | 2003-04-08 | 2004-12-23 | William Wimsatt | Home automation control architecture |
US20060090079A1 (en) * | 2004-10-21 | 2006-04-27 | Honeywell International, Inc. | Voice authenticated alarm exit and entry interface system |
US7487499B2 (en) * | 2004-10-29 | 2009-02-03 | Caterpillar Inc. | Location based software flashing system |
US8234220B2 (en) * | 2007-02-21 | 2012-07-31 | Weiss Kenneth P | Universal secure registry |
US7757543B2 (en) * | 2006-07-13 | 2010-07-20 | Advanced Cardiovascular Systems, Inc. | Radio frequency identification monitoring of stents |
IES20060715A2 (en) * | 2006-10-02 | 2008-06-11 | Europlex Technologies Ireland | A security system and method |
US8848951B2 (en) * | 2008-03-13 | 2014-09-30 | Koninklijke Philips N.V. | Speaker array and driver arrangement therefor |
CN100587751C (en) * | 2008-03-14 | 2010-02-03 | 清华大学 | Wireless switch device, system and its communication control method |
CN101447120A (en) * | 2008-12-23 | 2009-06-03 | 天津大学 | Remote control system without standby power consumption based on radio frequency identification and remote control method |
US8638211B2 (en) * | 2009-04-30 | 2014-01-28 | Icontrol Networks, Inc. | Configurable controller and interface for home SMA, phone and multimedia |
US8319652B2 (en) * | 2009-12-02 | 2012-11-27 | Honeywell International Inc. | Image notification on security panel for protected assets |
US8558708B2 (en) * | 2010-02-09 | 2013-10-15 | Innovalarm Corporation | Supplemental alert generation device with speaker enclosure assembly |
WO2012132446A1 (en) * | 2011-03-31 | 2012-10-04 | パナソニック株式会社 | Rfid device, host, apparatus with rfid device mounted thereon, and method of controlling rfid device |
US9300344B2 (en) * | 2011-06-13 | 2016-03-29 | Treefrog Developments, Inc. | Protective encasement for mobile computing device |
US20130113606A1 (en) * | 2011-11-08 | 2013-05-09 | International Business Machines Corporation | Passive Wireless Article with Passcode Touch Sensor Array |
US8754634B2 (en) * | 2011-11-14 | 2014-06-17 | General Electric Company | System and method for tamper detection in a utility meter |
CN102843449B (en) * | 2012-08-16 | 2016-05-11 | 惠州Tcl移动通信有限公司 | The detection method of a kind of mobile communication equipment and SIM hot plug |
CN203135402U (en) * | 2012-09-14 | 2013-08-14 | 深圳市金正方科技有限公司 | Protective circuit and device for SIM card replacement of smart power grid |
CN203025904U (en) * | 2012-12-18 | 2013-06-26 | 深圳市华宝电子科技有限公司 | Alarming device and monitoring system |
CN103108268B (en) * | 2013-02-07 | 2016-08-24 | 歌尔声学股份有限公司 | Speaker module and use the electronic installation of this speaker module |
CN203167200U (en) * | 2013-04-17 | 2013-08-28 | 广东欧珀移动通信有限公司 | Sealed loudspeaker sound chamber structure |
US20140365073A1 (en) * | 2013-06-05 | 2014-12-11 | Ford Global Technologies, Llc | System and method of communicating with vehicle passengers |
-
2015
- 2015-01-27 CN CN201580015072.6A patent/CN106463031A/en active Pending
- 2015-01-27 WO PCT/US2015/013036 patent/WO2015160414A2/en active Application Filing
- 2015-01-27 US US15/114,380 patent/US20170084143A1/en not_active Abandoned
- 2015-01-27 EP EP15747588.0A patent/EP3100246A2/en not_active Withdrawn
-
2018
- 2018-01-15 US US15/871,764 patent/US20180158294A1/en not_active Abandoned
- 2018-01-15 US US15/871,584 patent/US20180137725A1/en not_active Abandoned
- 2018-01-15 US US15/871,771 patent/US10553089B2/en not_active Expired - Fee Related
- 2018-01-15 US US15/871,749 patent/US20180137726A1/en not_active Abandoned
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20100240417A1 (en) * | 2009-03-23 | 2010-09-23 | Marianna Wickman | Multifunction mobile device having a movable element, such as a display, and associated functions |
US20120062370A1 (en) * | 2010-09-14 | 2012-03-15 | Crestron Electronics, Inc. | Control System for Augmenting a Portable Touch Screen Device |
US20120221149A1 (en) * | 2011-02-28 | 2012-08-30 | Honeywell International Inc. | Method and apparatus for configuring scheduling on a wall module |
Also Published As
Publication number | Publication date |
---|---|
WO2015160414A2 (en) | 2015-10-22 |
US20180137726A1 (en) | 2018-05-17 |
US20180158295A1 (en) | 2018-06-07 |
US10553089B2 (en) | 2020-02-04 |
US20170084143A1 (en) | 2017-03-23 |
EP3100246A2 (en) | 2016-12-07 |
US20180137725A1 (en) | 2018-05-17 |
WO2015160414A3 (en) | 2016-01-28 |
CN106463031A (en) | 2017-02-22 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10553089B2 (en) | Building security and automation system speaker and method | |
CN109219279B (en) | Intelligent control panel, control method thereof, intelligent home system and control method thereof | |
US9691207B2 (en) | Electronic lock with user interface | |
CA2888971C (en) | Electronic lock having a mobile device user interface | |
US10554432B2 (en) | Home automation via voice control | |
EP2930705B1 (en) | Method and apparatus for controlling smart terminal | |
US9680982B2 (en) | Emergency communication device | |
US20150088283A1 (en) | Touch-less swipe control | |
US10484196B1 (en) | System component installation | |
CN104485552B (en) | Socket on-off control method and device | |
US10455271B1 (en) | Voice control component installation | |
KR20210000811U (en) | Multi-Function Remote Control | |
EP2698774B1 (en) | A method and a device for controlling a security system | |
US20220030342A1 (en) | Intrinsically-safe microphone assembly | |
CN104678770A (en) | Displacement accident detection method and system | |
US20140277609A1 (en) | Monitoring removal of an automation control panel | |
EP3258326B1 (en) | Automated control system for homes | |
US20160065910A1 (en) | Video gateway device | |
KR20160008897A (en) | monitering apparatus for inside of a safe | |
EP3889936A1 (en) | System and method for upgrading an alarm system | |
CN106506175A (en) | The control method of device power supply (DPS) and device | |
US20150142135A1 (en) | Door/window sensor | |
CN105554269A (en) | Terminal positioning method and device | |
TWM473576U (en) | Detachable type sensing device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: LINEAR LLC, CALIFORNIA Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:ACERA, CHRISTOPHER LAGUER;EHLERS, BRUCE JAMES;HISAMOTO, KAORU;AND OTHERS;SIGNING DATES FROM 20150123 TO 20150127;REEL/FRAME:044628/0469 Owner name: NORTEK SECURITY & CONTROL LLC, CALIFORNIA Free format text: CHANGE OF NAME;ASSIGNOR:LINEAR LLC;REEL/FRAME:045075/0606 Effective date: 20141202 |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: DOCKETED NEW CASE - READY FOR EXAMINATION |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: NON FINAL ACTION MAILED |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: RESPONSE TO NON-FINAL OFFICE ACTION ENTERED AND FORWARDED TO EXAMINER |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: FINAL REJECTION MAILED |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: ADVISORY ACTION MAILED |
|
STCB | Information on status: application discontinuation |
Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION |