WO1998025243A1 - Improvements relating to security systems - Google Patents
Improvements relating to security systems Download PDFInfo
- Publication number
- WO1998025243A1 WO1998025243A1 PCT/GB1997/003277 GB9703277W WO9825243A1 WO 1998025243 A1 WO1998025243 A1 WO 1998025243A1 GB 9703277 W GB9703277 W GB 9703277W WO 9825243 A1 WO9825243 A1 WO 9825243A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- master
- slave
- security system
- interrogation
- normality
- Prior art date
Links
Classifications
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B13/00—Burglar, theft or intruder alarms
- G08B13/02—Mechanical actuation
- G08B13/14—Mechanical actuation by lifting or attempted removal of hand-portable articles
- G08B13/1409—Mechanical actuation by lifting or attempted removal of hand-portable articles for removal detection of electrical appliances by detecting their physical disconnection from an electrical system, e.g. using a switch incorporated in the plug connector
- G08B13/1418—Removal detected by failure in electrical connection between the appliance and a control centre, home control panel or a power supply
Definitions
- This invention relates to security systems. It is particularly concerned with the security of computer installations where the components may be spread around different rooms and different floors m a building. They will of course be interconnected by cables, and one aim is to use where possible the existing cables as part of the security network, without the need to provide further lnter- component wiring. It should therefore be fairly non-disrup- tive to instal such a system.
- the system could also be applied to other combinations of electrical/electronic components, for example hi-fi systems with tuners, amplifiers, CD players, turntables, tape recorders and speakers, or TV sets and video recorders. It is also applicable to non-electrical items, such as a set of filing cabinets, although of course dedicated cabling will then have to be provided. But generally reference will be made just to computer systems.
- Such known devices also have the disadvantage that, if separately powered, they can remain primed while the component is in use, and can therefore be triggered if the user makes an adjustment or simply knocks it accidentally, or shifts his desk for example. This system should avoid such faults .
- a security system for a plurality of components linked by cable such as a computer system
- one component is equipped with a master monitoring device (the master) and the other components are equipped with slave monitoring devices (the slaves) individually identifiable to the master
- the master is programmed to interrogate the slaves on a cyclic basis via cable and wherein if there is a response (or lack of response) indicating a departure from normality, the relevant slave is noted by the master.
- the interrogation should be by existing cabling linking the components, provided that is non- interfering with other functions. But it may be necessary occasionally to use dedicated cabling for the interrogation.
- the interrogation has two modes, the first being the cyclic interrogation of the slaves which will give a basic yes/no indication of normality, and the second being a more detailed interrogation of a slave that produces a no indication. In other words, a basic interrogation may simply indicate that something is wrong with a particular component.
- the master goes into the second interrogation mode, in which it targets this component and determines the fault in more detail . This switch into the second mode will preferably be automatic, although it could be done by the supervisor.
- the network may be capable of having further components connected. The interrogation can be extended to cover nodes where such connections may be made, whereby the addition of a component to the network is signalled to the master.
- the master should be re-programmable to note a slave which has an authorised departure from normality, and not to register an alarm while that departure lasts.
- the master is conveniently programmable with details of each slave and is equipped with display means enabling a supervisor at the master to review such details at least in the event of that slave departing from normality.
- the supervisor can have a screen on which information relating to the system can be displayed, conveniently in graphic form.
- In memory can be stored information on each monitored component, such as the name of the normal user, his telephone or extension number, similar details on any back-up user, the location of the component, its description (printer, for example) , possibly with more details such as maker and model number, and any other relevant data. Should attention be brought to that compo- nent, the supervisor can then immediately call up this information.
- the detectable departures from normality may include a selection of disconnection, physical movement, at least partial dismantling, use, and whether the slave is switched on or off.
- the most basic fault to detect is a slave disconnection, as when an electrical/electronic component is unplugged or its cable is cut so that it can be removed. When this happens, there will of course be no "OK" response to the master when that component is interrogated, and so a problem there is identified. While this could be arranged to raise a general external alarm, it might well be preferred quietly to alert the person overseeing the system (the supervisor) , and possibly also automatically to bring security cameras to bear, and to lock doors, all with a view to identifying and trapping a thief. The supervisor could choose the type of response required.
- the master will continue at each cycle to interrogate the disconnected or otherwise faulty or interfered-with component after the initial alarm is raised. If the unplugged cable is re-connected, or the lid re-fitted, there is affirmative feedback and the alarm may be arranged to stop, although a record of the fault may remain at the master, to be investigated if necessary. If the disconnec- tion or lid removal is repeated, the alarm trips on again. Provision will also generally be made for the supervisor to suppress the alarm, once it has been raised.
- the system could be adapted to monitor combinations of articles or structures other than electrical/electronic components of a portable nature.
- it could serve a group of buildings, each building being a slave station except for one accommodating the master.
- Each building would have its own security system reporting in to its slave, and the slaves would be cyclical - ly checked by the master.
- intruder sensing there could be smoke and heat sensing, to give early warning to the master of fire.
- Figure 1 is a diagram of a simple computer network
- FIG. 2 is a block diagram of a security system control card for a master station
- FIG. 3 is a more detailed circuit diagram of the master control card, particularly in relation to the microprocessor and memory,
- Figure 4 is a more detailed circuit diagram of a network control and interface of the master control card
- FIG. 5 is a more detailed circuit diagram of an output control and interface of the master control card
- FIG. 6 is a more detailed circuit diagram of a "watchdog" timer of the master control card with an over - current timer not apparent in Figure 3,
- FIG. 7 is a more detailed circuit diagram of a bus interface of the master control card
- FIG 8 is a block diagram of a security system control card for a slave station
- Figure 9 is a more detailed circuit diagram of the slave station card
- Figure 10 is a flow chart associated with a slave station.
- the network of Figure 1 has a master computer 1 and several other computers 2 (the slaves) at various workstations, all interconnected by cable 3 through which they can communicate. Generally, these computers will be individually powered, so that they can be switched on and off, or plugged in and unplugged, separately.
- each slave card is energised from the master 1 via the cable 3.
- the master card 4 has a microprocessor 6 with an associated memory 7, the microprocessor communicating with the cable 3 via a network control and interface 8 and operating an alarm system 9 through an output control and interface 10.
- the alarm system 9 may be both remote and local and include more than simply audible and/or visible indications of abnormality.
- the card also has a watchdog circuit 11, to be described later, and is shown with an interface 12 for connecting to a bus 13.
- a watchdog circuit 11 to be described later, and is shown with an interface 12 for connecting to a bus 13.
- broad arrows indicate multi-channel communication, while the single line arrows represent single channels .
- FIG 3 shows this card in more detail .
- Suitable components and their terminals are identified here and in other figures by code numbers and abbreviations that will be known to those familiar with computer construction.
- the various connections are also shown in conventional form and so detailed description will not be given.
- Further details on circuits 8, 10, 11 and 12 are shown in Figures 4 to 7 respectively. Again, conventions are followed and they will not be described in detail.
- the network control and interface circuit 8 of Figure 4 has a power control sub-circuit 14 and network ports 15 with a precautionary over-current sensing circuit 16. A short in a cable would cause a current surge, and this circuit will react immediately to protect the network ports 15, closing them down as necessary.
- Figure 6 shows the watchdog timer circuit 11 in conjunction with an over-current timer 17. This is not shown separately in Figure 2, being shared by the microprocessor 6 and the interface 8.
- the watchdog circuit 11 is provided as a check on the microprocessor 6 and the rest of the main card. Unless neutralised by the microprocessor working normally, it issues a reset signal at regular intervals. In other words it sets the microprocessor going again should it suffer "lock up". Should the sensing circuit 16 have cut in, it will allow time for the system to settle down and then it will allow re-energisation.
- each slave card 8 has a microprocessor 18, memory 19, address selector 20, network interface 21 and power sensing interface 22. There is also at least one auxiliary port interface 23.
- the interface 21 connects to the cable 3, and the interface 22 (which is optional) to the bus 13.
- a lid detector 24 will send a signal directly to the microprocessor 18 should a lid, back panel or other part of the associated computer 2 be removed.
- the port interface 23 receives a signal from any connected peripheral 25, such as a printer, that is required to be monitored.
- Figure 9 shows the card 8 m more detail, Figures 8 and 9 following the conventions and style of Figures 2 and 3.
- switch-on at the master 1 initialises the card 4. Then that sends out its first interrogation to an identifiable node (where usually a computer 2 is connected) A timer is set and the master stays dormant. When data is returned from the first node, it is re-activated and checks whether that data is correct or not. If it is correct, then interrogation of the second node is carried out similarly, and so on. But if there is a return signal signifying something wrong the alarm system 9 will be triggered. If there is no signal back by the end of the timer period, this triggers a check against the memory 7, which might have been programmed to record that there is nothing at the node m question and that a null response is to be expected. In that case, the interrogation of the next node continues as normal. But if a null response is incorrect, the alarm 9 is activated.
- the interrogation puts m tram the events of the flow chart of Figure 10.
- the address m the interrogation signal is checked against the home address and if there is no match, the slave card remains dormant. But when the right signal does arrive a set of checks is carried out and a reply sent back to the master. If the master is unplugged or incapacitated, this will trigger an external alarm. Obviously, there can be no detailed diagnosis of the fault but at least someone should be alerted. Also if the cable between the interface 10 on the card 4 and the alarm system 9 is cut or unplugged, an alarm will be generated by that system.
Abstract
A security system, particularly for a computer network, carries out surveillance of slave components (2) from a master (1), conveniently through existing cabling (3). The slaves (2) are interrogated on a cyclic basis and a signal goes back to the master to determine if there is any departure from normality. A supervisor at the master can identify the component and can interrogate in more detail to determine what has happened at that component, for example whether it has been disconnected, moved or partially dismantled, or is being used illicitly. An alarm (9) may be triggered by an abnormal response, and security measures brought into action.
Description
"Improvements relating to Security Systems"
This invention relates to security systems. It is particularly concerned with the security of computer installations where the components may be spread around different rooms and different floors m a building. They will of course be interconnected by cables, and one aim is to use where possible the existing cables as part of the security network, without the need to provide further lnter- component wiring. It should therefore be fairly non-disrup- tive to instal such a system.
The system could also be applied to other combinations of electrical/electronic components, for example hi-fi systems with tuners, amplifiers, CD players, turntables, tape recorders and speakers, or TV sets and video recorders. It is also applicable to non-electrical items, such as a set of filing cabinets, although of course dedicated cabling will then have to be provided. But generally reference will be made just to computer systems.
There are various security devices already m use . Some employ tremblers so that when a component is physically disturbed a circuit is closed and an alarm is generated. But this requires power always to be available at that component, and if it is switched off (as it is likely to be at a time when someone is attempting to remove it) then there has to be separate provision, mams or battery, for the alarm device. Th s is not ideal. Therefore another aim of the present system is to be able to monitor switched-off
components without local, auxiliary powered devices.
Such known devices also have the disadvantage that, if separately powered, they can remain primed while the component is in use, and can therefore be triggered if the user makes an adjustment or simply knocks it accidentally, or shifts his desk for example. This system should avoid such faults .
According to the present invention there is provided a security system for a plurality of components linked by cable, such as a computer system, wherein one component is equipped with a master monitoring device (the master) and the other components are equipped with slave monitoring devices (the slaves) individually identifiable to the master, wherein the master is programmed to interrogate the slaves on a cyclic basis via cable and wherein if there is a response (or lack of response) indicating a departure from normality, the relevant slave is noted by the master.
Conveniently, the interrogation should be by existing cabling linking the components, provided that is non- interfering with other functions. But it may be necessary occasionally to use dedicated cabling for the interrogation. Conveniently, the interrogation has two modes, the first being the cyclic interrogation of the slaves which will give a basic yes/no indication of normality, and the second being a more detailed interrogation of a slave that produces a no indication. In other words, a basic interrogation may simply indicate that something is wrong with a particular component. For further details, the master goes
into the second interrogation mode, in which it targets this component and determines the fault in more detail . This switch into the second mode will preferably be automatic, although it could be done by the supervisor. The network may be capable of having further components connected. The interrogation can be extended to cover nodes where such connections may be made, whereby the addition of a component to the network is signalled to the master.
The master should be re-programmable to note a slave which has an authorised departure from normality, and not to register an alarm while that departure lasts.
This is to cater for occasions when unplugging or lid removal is quite in order, as when an office is re-arranged or when servicing is carried out. An unnecessary alarm is suppressed if the master is temporarily re-programmed effectively with the knowledge that a certain component is to be disrupted in a certain way. The interrogation procedure is modified accordingly to ignore the predicted fault signal . The master is conveniently programmable with details of each slave and is equipped with display means enabling a supervisor at the master to review such details at least in the event of that slave departing from normality.
In more detail, the supervisor can have a screen on which information relating to the system can be displayed, conveniently in graphic form. In memory can be stored information on each monitored component, such as the name of the normal user, his telephone or extension number, similar
details on any back-up user, the location of the component, its description (printer, for example) , possibly with more details such as maker and model number, and any other relevant data. Should attention be brought to that compo- nent, the supervisor can then immediately call up this information.
The detectable departures from normality may include a selection of disconnection, physical movement, at least partial dismantling, use, and whether the slave is switched on or off.
The most basic fault to detect is a slave disconnection, as when an electrical/electronic component is unplugged or its cable is cut so that it can be removed. When this happens, there will of course be no "OK" response to the master when that component is interrogated, and so a problem there is identified. While this could be arranged to raise a general external alarm, it might well be preferred quietly to alert the person overseeing the system (the supervisor) , and possibly also automatically to bring security cameras to bear, and to lock doors, all with a view to identifying and trapping a thief. The supervisor could choose the type of response required.
Often, it is not the whole component in which a thief is interested; it might be just a chip in a P.C. for example. Access to it requires a lid or backing to be removed, and this can be linked to the slave within the P.C. so that, on interrogation, the message will be passed back to the master that such lid removal has been effected.
Another use could simply be to determine whether a component is switched on or not . While this would not excite remark during normal office hours, it would be interesting outside them. It could simply mean that the component was accidentally left switched on, wasting power, but it could also indicate illicit out-of-hours use, perhaps by someone trying to obtain sensitive information.
The master will continue at each cycle to interrogate the disconnected or otherwise faulty or interfered-with component after the initial alarm is raised. If the unplugged cable is re-connected, or the lid re-fitted, there is affirmative feedback and the alarm may be arranged to stop, although a record of the fault may remain at the master, to be investigated if necessary. If the disconnec- tion or lid removal is repeated, the alarm trips on again. Provision will also generally be made for the supervisor to suppress the alarm, once it has been raised.
It is envisaged that the system could be adapted to monitor combinations of articles or structures other than electrical/electronic components of a portable nature. For example, it could serve a group of buildings, each building being a slave station except for one accommodating the master. Each building would have its own security system reporting in to its slave, and the slaves would be cyclical - ly checked by the master. As well as intruder sensing, there could be smoke and heat sensing, to give early warning to the master of fire.
For a better understanding of the invention, one
embodiment will now be described, by way of example, with reference to the accompanying drawings, in which:
Figure 1 is a diagram of a simple computer network,
Figure 2 is a block diagram of a security system control card for a master station,
Figure 3 is a more detailed circuit diagram of the master control card, particularly in relation to the microprocessor and memory,
Figure 4 is a more detailed circuit diagram of a network control and interface of the master control card,
Figure 5 is a more detailed circuit diagram of an output control and interface of the master control card,
Figure 6 is a more detailed circuit diagram of a "watchdog" timer of the master control card with an over - current timer not apparent in Figure 3,
Figure 7 is a more detailed circuit diagram of a bus interface of the master control card,
Figure 8 is a block diagram of a security system control card for a slave station, Figure 9 is a more detailed circuit diagram of the slave station card, and
Figure 10 is a flow chart associated with a slave station.
The network of Figure 1 has a master computer 1 and several other computers 2 (the slaves) at various workstations, all interconnected by cable 3 through which they can communicate. Generally, these computers will be individually powered, so that they can be switched on and
off, or plugged in and unplugged, separately.
In addition to the circuitry and components that make the computers perform their ordinary functions, they will be equipped with circuit boards (or cards for brevity) for the security system, the master 1 having the card 4 of Figure 2 and the slaves each having the card 5 of Figure 8. These slave cards are not reliant on the associated computer being plugged in to a power socket and switched on: each slave card is energised from the master 1 via the cable 3. The master card 4 has a microprocessor 6 with an associated memory 7, the microprocessor communicating with the cable 3 via a network control and interface 8 and operating an alarm system 9 through an output control and interface 10. The alarm system 9 may be both remote and local and include more than simply audible and/or visible indications of abnormality. There could be CCTV cameras to activate, or door closures to lock, for example. The card also has a watchdog circuit 11, to be described later, and is shown with an interface 12 for connecting to a bus 13. In the conventional way, broad arrows indicate multi-channel communication, while the single line arrows represent single channels .
Figure 3 shows this card in more detail . Suitable components and their terminals are identified here and in other figures by code numbers and abbreviations that will be known to those familiar with computer construction. The various connections are also shown in conventional form and so detailed description will not be given.
Further details on circuits 8, 10, 11 and 12 are shown in Figures 4 to 7 respectively. Again, conventions are followed and they will not be described in detail.
The network control and interface circuit 8 of Figure 4 has a power control sub-circuit 14 and network ports 15 with a precautionary over-current sensing circuit 16. A short in a cable would cause a current surge, and this circuit will react immediately to protect the network ports 15, closing them down as necessary. Figure 6 shows the watchdog timer circuit 11 in conjunction with an over-current timer 17. This is not shown separately in Figure 2, being shared by the microprocessor 6 and the interface 8. The watchdog circuit 11 is provided as a check on the microprocessor 6 and the rest of the main card. Unless neutralised by the microprocessor working normally, it issues a reset signal at regular intervals. In other words it sets the microprocessor going again should it suffer "lock up". Should the sensing circuit 16 have cut in, it will allow time for the system to settle down and then it will allow re-energisation.
Referring now to Figure 8, each slave card 8 has a microprocessor 18, memory 19, address selector 20, network interface 21 and power sensing interface 22. There is also at least one auxiliary port interface 23. The interface 21 connects to the cable 3, and the interface 22 (which is optional) to the bus 13. A lid detector 24 will send a signal directly to the microprocessor 18 should a lid, back panel or other part of the associated computer 2 be removed.
The port interface 23 receives a signal from any connected peripheral 25, such as a printer, that is required to be monitored.
Figure 9 shows the card 8 m more detail, Figures 8 and 9 following the conventions and style of Figures 2 and 3.
In operation, switch-on at the master 1 initialises the card 4. Then that sends out its first interrogation to an identifiable node (where usually a computer 2 is connected) A timer is set and the master stays dormant. When data is returned from the first node, it is re-activated and checks whether that data is correct or not. If it is correct, then interrogation of the second node is carried out similarly, and so on. But if there is a return signal signifying something wrong the alarm system 9 will be triggered. If there is no signal back by the end of the timer period, this triggers a check against the memory 7, which might have been programmed to record that there is nothing at the node m question and that a null response is to be expected. In that case, the interrogation of the next node continues as normal. But if a null response is incorrect, the alarm 9 is activated.
At each slave, the interrogation puts m tram the events of the flow chart of Figure 10. Each time, the address m the interrogation signal is checked against the home address and if there is no match, the slave card remains dormant. But when the right signal does arrive a set of checks is carried out and a reply sent back to the master.
If the master is unplugged or incapacitated, this will trigger an external alarm. Obviously, there can be no detailed diagnosis of the fault but at least someone should be alerted. Also if the cable between the interface 10 on the card 4 and the alarm system 9 is cut or unplugged, an alarm will be generated by that system.
Claims
1. A security system for a plurality of components linked by cable, such as a computer network, wherein one component is equipped with a master monitoring device (the master) and the other components are equipped with slave monitoring devices (the slaves) individually identifiable to the master, wherein the master is programmed to interrogate the slaves on a cyclic basis via cable, and wherein if there is a response (or lack of response) indicating a departure from normality, the relevant slave is noted by the master.
2. A security system as claimed in Claim 1, wherein the interrogation is via existing cabling linking the components .
3. A security system as claimed in Claim 1 or 2 , wherein the interrogation has two modes, the first being the cyclic interrogation of the slaves which will give a basic yes/no indication of normality, and the second being a more detailed interrogation of a slave that produces a no indication.
4. A security system as claimed in Claim 1, 2 or 3, wherein the network is capable of having further components connected, and wherein the interrogation covers nodes where such connections may be made, whereby the addition of a component to the network is signalled to the master.
5. A security system as claimed in any preceding claim, wherein the master is re-programmable to note a slave which has an authorised departure from normality, and not to register an alarm while that departure lasts.
6. A security system as claimed in any preceding claim, wherein the master is programmable with details of each slave and is equipped with display means enabling a supervisor at the master to review such details at least in the event of that slave departing from normality.
7. A security system as claimed in any preceding claim, wherein the detectable departures from normality include a selection of disconnection, physical movement, at least partial dismantling, use, and whether the slave is switched on or off.
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
GBGB9624981.8A GB9624981D0 (en) | 1996-11-30 | 1996-11-30 | Improvements relating to security systems |
GB9624981.8 | 1996-11-30 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO1998025243A1 true WO1998025243A1 (en) | 1998-06-11 |
Family
ID=10803765
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/GB1997/003277 WO1998025243A1 (en) | 1996-11-30 | 1997-11-28 | Improvements relating to security systems |
Country Status (2)
Country | Link |
---|---|
GB (1) | GB9624981D0 (en) |
WO (1) | WO1998025243A1 (en) |
Cited By (87)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
GB2350704A (en) * | 1999-06-02 | 2000-12-06 | Nicholas Peter Carter | Security system |
US6308272B1 (en) * | 1998-12-21 | 2001-10-23 | International Business Machines Corporation | Security system using existing network and personal computers |
US6690411B2 (en) | 1999-07-20 | 2004-02-10 | @Security Broadband Corp. | Security system |
WO2005119613A1 (en) * | 2004-05-31 | 2005-12-15 | Jason Andrew Roper | Computer network security |
US7015806B2 (en) | 1999-07-20 | 2006-03-21 | @Security Broadband Corporation | Distributed monitoring for a video security system |
US7103152B2 (en) | 2002-02-01 | 2006-09-05 | @Security Broadband Corp. | Lifestyle multimedia security system |
US9300921B2 (en) | 1999-07-20 | 2016-03-29 | Comcast Cable Communications, Llc | Video security systems and methods |
US20160274759A1 (en) | 2008-08-25 | 2016-09-22 | Paul J. Dawes | Security system with networked touchscreen and gateway |
US10051078B2 (en) | 2007-06-12 | 2018-08-14 | Icontrol Networks, Inc. | WiFi-to-serial encapsulation in systems |
US10062273B2 (en) | 2010-09-28 | 2018-08-28 | Icontrol Networks, Inc. | Integrated security system with parallel processing architecture |
US10062245B2 (en) | 2005-03-16 | 2018-08-28 | Icontrol Networks, Inc. | Cross-client sensor user interface in an integrated security network |
US10079839B1 (en) | 2007-06-12 | 2018-09-18 | Icontrol Networks, Inc. | Activation of gateway device |
US10078958B2 (en) | 2010-12-17 | 2018-09-18 | Icontrol Networks, Inc. | Method and system for logging security event data |
US10091014B2 (en) | 2005-03-16 | 2018-10-02 | Icontrol Networks, Inc. | Integrated security network with security alarm signaling system |
US10127801B2 (en) | 2005-03-16 | 2018-11-13 | Icontrol Networks, Inc. | Integrated security system with parallel processing architecture |
US10142394B2 (en) | 2007-06-12 | 2018-11-27 | Icontrol Networks, Inc. | Generating risk profile using data of home monitoring and security system |
US10140840B2 (en) | 2007-04-23 | 2018-11-27 | Icontrol Networks, Inc. | Method and system for providing alternate network access |
US10142392B2 (en) | 2007-01-24 | 2018-11-27 | Icontrol Networks, Inc. | Methods and systems for improved system performance |
US10142166B2 (en) | 2004-03-16 | 2018-11-27 | Icontrol Networks, Inc. | Takeover of security network |
US10156959B2 (en) | 2005-03-16 | 2018-12-18 | Icontrol Networks, Inc. | Cross-client sensor user interface in an integrated security network |
US10156831B2 (en) | 2004-03-16 | 2018-12-18 | Icontrol Networks, Inc. | Automation system with mobile interface |
US10200504B2 (en) | 2007-06-12 | 2019-02-05 | Icontrol Networks, Inc. | Communication protocols over internet protocol (IP) networks |
US10237237B2 (en) | 2007-06-12 | 2019-03-19 | Icontrol Networks, Inc. | Communication protocols in integrated systems |
US10237806B2 (en) | 2009-04-30 | 2019-03-19 | Icontrol Networks, Inc. | Activation of a home automation controller |
US10313303B2 (en) | 2007-06-12 | 2019-06-04 | Icontrol Networks, Inc. | Forming a security network including integrated security system components and network devices |
US10339791B2 (en) | 2007-06-12 | 2019-07-02 | Icontrol Networks, Inc. | Security network integrated with premise security system |
US10348575B2 (en) | 2013-06-27 | 2019-07-09 | Icontrol Networks, Inc. | Control system user interface |
US10365810B2 (en) | 2007-06-12 | 2019-07-30 | Icontrol Networks, Inc. | Control system user interface |
US10382452B1 (en) | 2007-06-12 | 2019-08-13 | Icontrol Networks, Inc. | Communication protocols in integrated systems |
US10380871B2 (en) | 2005-03-16 | 2019-08-13 | Icontrol Networks, Inc. | Control system user interface |
US10389736B2 (en) | 2007-06-12 | 2019-08-20 | Icontrol Networks, Inc. | Communication protocols in integrated systems |
US10423309B2 (en) | 2007-06-12 | 2019-09-24 | Icontrol Networks, Inc. | Device integration framework |
US10498830B2 (en) | 2007-06-12 | 2019-12-03 | Icontrol Networks, Inc. | Wi-Fi-to-serial encapsulation in systems |
US10523689B2 (en) | 2007-06-12 | 2019-12-31 | Icontrol Networks, Inc. | Communication protocols over internet protocol (IP) networks |
US10522026B2 (en) | 2008-08-11 | 2019-12-31 | Icontrol Networks, Inc. | Automation system user interface with three-dimensional display |
US10530839B2 (en) | 2008-08-11 | 2020-01-07 | Icontrol Networks, Inc. | Integrated cloud system with lightweight gateway for premises automation |
US10616075B2 (en) | 2007-06-12 | 2020-04-07 | Icontrol Networks, Inc. | Communication protocols in integrated systems |
US10666523B2 (en) | 2007-06-12 | 2020-05-26 | Icontrol Networks, Inc. | Communication protocols in integrated systems |
US10721087B2 (en) | 2005-03-16 | 2020-07-21 | Icontrol Networks, Inc. | Method for networked touchscreen with integrated interfaces |
US10747216B2 (en) | 2007-02-28 | 2020-08-18 | Icontrol Networks, Inc. | Method and system for communicating with and controlling an alarm system from a remote server |
US10785319B2 (en) | 2006-06-12 | 2020-09-22 | Icontrol Networks, Inc. | IP device discovery systems and methods |
US10841381B2 (en) | 2005-03-16 | 2020-11-17 | Icontrol Networks, Inc. | Security system with networked touchscreen |
US10979389B2 (en) | 2004-03-16 | 2021-04-13 | Icontrol Networks, Inc. | Premises management configuration and control |
US10999254B2 (en) | 2005-03-16 | 2021-05-04 | Icontrol Networks, Inc. | System for data routing in networks |
US11089122B2 (en) | 2007-06-12 | 2021-08-10 | Icontrol Networks, Inc. | Controlling data routing among networks |
US11113950B2 (en) | 2005-03-16 | 2021-09-07 | Icontrol Networks, Inc. | Gateway integrated with premises security system |
US11146637B2 (en) | 2014-03-03 | 2021-10-12 | Icontrol Networks, Inc. | Media content management |
US11153266B2 (en) | 2004-03-16 | 2021-10-19 | Icontrol Networks, Inc. | Gateway registry methods and systems |
US11182060B2 (en) | 2004-03-16 | 2021-11-23 | Icontrol Networks, Inc. | Networked touchscreen with integrated interfaces |
US11201755B2 (en) | 2004-03-16 | 2021-12-14 | Icontrol Networks, Inc. | Premises system management using status signal |
US11212192B2 (en) | 2007-06-12 | 2021-12-28 | Icontrol Networks, Inc. | Communication protocols in integrated systems |
US11218878B2 (en) | 2007-06-12 | 2022-01-04 | Icontrol Networks, Inc. | Communication protocols in integrated systems |
US11237714B2 (en) | 2007-06-12 | 2022-02-01 | Control Networks, Inc. | Control system user interface |
US11240059B2 (en) | 2010-12-20 | 2022-02-01 | Icontrol Networks, Inc. | Defining and implementing sensor triggered response rules |
US11244545B2 (en) | 2004-03-16 | 2022-02-08 | Icontrol Networks, Inc. | Cross-client sensor user interface in an integrated security network |
US11258625B2 (en) | 2008-08-11 | 2022-02-22 | Icontrol Networks, Inc. | Mobile premises automation platform |
US11277465B2 (en) | 2004-03-16 | 2022-03-15 | Icontrol Networks, Inc. | Generating risk profile using data of home monitoring and security system |
US11310199B2 (en) | 2004-03-16 | 2022-04-19 | Icontrol Networks, Inc. | Premises management configuration and control |
US11316753B2 (en) | 2007-06-12 | 2022-04-26 | Icontrol Networks, Inc. | Communication protocols in integrated systems |
US11316958B2 (en) | 2008-08-11 | 2022-04-26 | Icontrol Networks, Inc. | Virtual device systems and methods |
US11343380B2 (en) | 2004-03-16 | 2022-05-24 | Icontrol Networks, Inc. | Premises system automation |
US11368327B2 (en) | 2008-08-11 | 2022-06-21 | Icontrol Networks, Inc. | Integrated cloud system for premises automation |
US11398147B2 (en) | 2010-09-28 | 2022-07-26 | Icontrol Networks, Inc. | Method, system and apparatus for automated reporting of account and sensor zone information to a central station |
US11405463B2 (en) | 2014-03-03 | 2022-08-02 | Icontrol Networks, Inc. | Media content management |
US11424980B2 (en) | 2005-03-16 | 2022-08-23 | Icontrol Networks, Inc. | Forming a security network including integrated security system components |
US11423756B2 (en) | 2007-06-12 | 2022-08-23 | Icontrol Networks, Inc. | Communication protocols in integrated systems |
US11451409B2 (en) | 2005-03-16 | 2022-09-20 | Icontrol Networks, Inc. | Security network integrating security system and network devices |
US11489812B2 (en) | 2004-03-16 | 2022-11-01 | Icontrol Networks, Inc. | Forming a security network including integrated security system components and network devices |
US11496568B2 (en) | 2005-03-16 | 2022-11-08 | Icontrol Networks, Inc. | Security system with networked touchscreen |
US11582065B2 (en) | 2007-06-12 | 2023-02-14 | Icontrol Networks, Inc. | Systems and methods for device communication |
US11601810B2 (en) | 2007-06-12 | 2023-03-07 | Icontrol Networks, Inc. | Communication protocols in integrated systems |
US11615697B2 (en) | 2005-03-16 | 2023-03-28 | Icontrol Networks, Inc. | Premise management systems and methods |
US11646907B2 (en) | 2007-06-12 | 2023-05-09 | Icontrol Networks, Inc. | Communication protocols in integrated systems |
US11677577B2 (en) | 2004-03-16 | 2023-06-13 | Icontrol Networks, Inc. | Premises system management using status signal |
US11700142B2 (en) | 2005-03-16 | 2023-07-11 | Icontrol Networks, Inc. | Security network integrating security system and network devices |
US11706279B2 (en) | 2007-01-24 | 2023-07-18 | Icontrol Networks, Inc. | Methods and systems for data communication |
US11706045B2 (en) | 2005-03-16 | 2023-07-18 | Icontrol Networks, Inc. | Modular electronic display platform |
US11729255B2 (en) | 2008-08-11 | 2023-08-15 | Icontrol Networks, Inc. | Integrated cloud system with lightweight gateway for premises automation |
US11750414B2 (en) | 2010-12-16 | 2023-09-05 | Icontrol Networks, Inc. | Bidirectional security sensor communication for a premises security system |
US11758026B2 (en) | 2008-08-11 | 2023-09-12 | Icontrol Networks, Inc. | Virtual device systems and methods |
US11792036B2 (en) | 2008-08-11 | 2023-10-17 | Icontrol Networks, Inc. | Mobile premises automation platform |
US11792330B2 (en) | 2005-03-16 | 2023-10-17 | Icontrol Networks, Inc. | Communication and automation in a premises management system |
US11811845B2 (en) | 2004-03-16 | 2023-11-07 | Icontrol Networks, Inc. | Communication protocols over internet protocol (IP) networks |
US11816323B2 (en) | 2008-06-25 | 2023-11-14 | Icontrol Networks, Inc. | Automation system user interface |
US11831462B2 (en) | 2007-08-24 | 2023-11-28 | Icontrol Networks, Inc. | Controlling data routing in premises management systems |
US11916928B2 (en) | 2008-01-24 | 2024-02-27 | Icontrol Networks, Inc. | Communication protocols over internet protocol (IP) networks |
US11916870B2 (en) | 2004-03-16 | 2024-02-27 | Icontrol Networks, Inc. | Gateway registry methods and systems |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
GB2262372A (en) * | 1991-12-03 | 1993-06-16 | Bache Hugh Robert Ian | Security system for electrical and electronic equipment |
US5268668A (en) * | 1992-01-07 | 1993-12-07 | Detection Systems, Inc. | Security/fire alarm system with group-addressing remote sensors |
WO1994017503A1 (en) * | 1993-01-19 | 1994-08-04 | Honeywell Inc. | Remote control of a control system |
FR2719689A1 (en) * | 1994-05-06 | 1995-11-10 | Contract Services Business Hol | Anti-theft or cable connection detector for electric equipment plug on mains supply e.g computer |
EP0734005A1 (en) * | 1995-03-24 | 1996-09-25 | Bticino S.P.A. | Reception/management system for digital signals from electronic devices, capable of learning the zone configuration data, in particular for alarm systems |
-
1996
- 1996-11-30 GB GBGB9624981.8A patent/GB9624981D0/en active Pending
-
1997
- 1997-11-28 WO PCT/GB1997/003277 patent/WO1998025243A1/en active Application Filing
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
GB2262372A (en) * | 1991-12-03 | 1993-06-16 | Bache Hugh Robert Ian | Security system for electrical and electronic equipment |
US5268668A (en) * | 1992-01-07 | 1993-12-07 | Detection Systems, Inc. | Security/fire alarm system with group-addressing remote sensors |
WO1994017503A1 (en) * | 1993-01-19 | 1994-08-04 | Honeywell Inc. | Remote control of a control system |
FR2719689A1 (en) * | 1994-05-06 | 1995-11-10 | Contract Services Business Hol | Anti-theft or cable connection detector for electric equipment plug on mains supply e.g computer |
EP0734005A1 (en) * | 1995-03-24 | 1996-09-25 | Bticino S.P.A. | Reception/management system for digital signals from electronic devices, capable of learning the zone configuration data, in particular for alarm systems |
Cited By (166)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6308272B1 (en) * | 1998-12-21 | 2001-10-23 | International Business Machines Corporation | Security system using existing network and personal computers |
GB2350704A (en) * | 1999-06-02 | 2000-12-06 | Nicholas Peter Carter | Security system |
US6690411B2 (en) | 1999-07-20 | 2004-02-10 | @Security Broadband Corp. | Security system |
US7015806B2 (en) | 1999-07-20 | 2006-03-21 | @Security Broadband Corporation | Distributed monitoring for a video security system |
US9300921B2 (en) | 1999-07-20 | 2016-03-29 | Comcast Cable Communications, Llc | Video security systems and methods |
US9600945B2 (en) | 2002-02-01 | 2017-03-21 | Comcast Cable Communications, Llc | Lifestyle multimedia security system |
US10559193B2 (en) | 2002-02-01 | 2020-02-11 | Comcast Cable Communications, Llc | Premises management systems |
US7103152B2 (en) | 2002-02-01 | 2006-09-05 | @Security Broadband Corp. | Lifestyle multimedia security system |
US7119609B2 (en) | 2002-02-01 | 2006-10-10 | @Seurity Broadband Corp. | Lifestyle multimedia security system |
US8953749B2 (en) | 2002-02-01 | 2015-02-10 | Comcast Cable Communications, Llc | Lifestyle multimedia security system |
US10979389B2 (en) | 2004-03-16 | 2021-04-13 | Icontrol Networks, Inc. | Premises management configuration and control |
US10992784B2 (en) | 2004-03-16 | 2021-04-27 | Control Networks, Inc. | Communication protocols over internet protocol (IP) networks |
US11277465B2 (en) | 2004-03-16 | 2022-03-15 | Icontrol Networks, Inc. | Generating risk profile using data of home monitoring and security system |
US11310199B2 (en) | 2004-03-16 | 2022-04-19 | Icontrol Networks, Inc. | Premises management configuration and control |
US11343380B2 (en) | 2004-03-16 | 2022-05-24 | Icontrol Networks, Inc. | Premises system automation |
US11811845B2 (en) | 2004-03-16 | 2023-11-07 | Icontrol Networks, Inc. | Communication protocols over internet protocol (IP) networks |
US11201755B2 (en) | 2004-03-16 | 2021-12-14 | Icontrol Networks, Inc. | Premises system management using status signal |
US11184322B2 (en) | 2004-03-16 | 2021-11-23 | Icontrol Networks, Inc. | Communication protocols in integrated systems |
US11810445B2 (en) | 2004-03-16 | 2023-11-07 | Icontrol Networks, Inc. | Cross-client sensor user interface in an integrated security network |
US11182060B2 (en) | 2004-03-16 | 2021-11-23 | Icontrol Networks, Inc. | Networked touchscreen with integrated interfaces |
US11175793B2 (en) | 2004-03-16 | 2021-11-16 | Icontrol Networks, Inc. | User interface in a premises network |
US11159484B2 (en) | 2004-03-16 | 2021-10-26 | Icontrol Networks, Inc. | Forming a security network including integrated security system components and network devices |
US10142166B2 (en) | 2004-03-16 | 2018-11-27 | Icontrol Networks, Inc. | Takeover of security network |
US11153266B2 (en) | 2004-03-16 | 2021-10-19 | Icontrol Networks, Inc. | Gateway registry methods and systems |
US10156831B2 (en) | 2004-03-16 | 2018-12-18 | Icontrol Networks, Inc. | Automation system with mobile interface |
US11782394B2 (en) | 2004-03-16 | 2023-10-10 | Icontrol Networks, Inc. | Automation system with mobile interface |
US11449012B2 (en) | 2004-03-16 | 2022-09-20 | Icontrol Networks, Inc. | Premises management networking |
US11757834B2 (en) | 2004-03-16 | 2023-09-12 | Icontrol Networks, Inc. | Communication protocols in integrated systems |
US11378922B2 (en) | 2004-03-16 | 2022-07-05 | Icontrol Networks, Inc. | Automation system with mobile interface |
US11082395B2 (en) | 2004-03-16 | 2021-08-03 | Icontrol Networks, Inc. | Premises management configuration and control |
US11043112B2 (en) | 2004-03-16 | 2021-06-22 | Icontrol Networks, Inc. | Integrated security system with parallel processing architecture |
US11677577B2 (en) | 2004-03-16 | 2023-06-13 | Icontrol Networks, Inc. | Premises system management using status signal |
US11037433B2 (en) | 2004-03-16 | 2021-06-15 | Icontrol Networks, Inc. | Management of a security system at a premises |
US11656667B2 (en) | 2004-03-16 | 2023-05-23 | Icontrol Networks, Inc. | Integrated security system with parallel processing architecture |
US11626006B2 (en) | 2004-03-16 | 2023-04-11 | Icontrol Networks, Inc. | Management of a security system at a premises |
US11625008B2 (en) | 2004-03-16 | 2023-04-11 | Icontrol Networks, Inc. | Premises management networking |
US11893874B2 (en) | 2004-03-16 | 2024-02-06 | Icontrol Networks, Inc. | Networked touchscreen with integrated interfaces |
US11601397B2 (en) | 2004-03-16 | 2023-03-07 | Icontrol Networks, Inc. | Premises management configuration and control |
US11244545B2 (en) | 2004-03-16 | 2022-02-08 | Icontrol Networks, Inc. | Cross-client sensor user interface in an integrated security network |
US10890881B2 (en) | 2004-03-16 | 2021-01-12 | Icontrol Networks, Inc. | Premises management networking |
US11916870B2 (en) | 2004-03-16 | 2024-02-27 | Icontrol Networks, Inc. | Gateway registry methods and systems |
US10447491B2 (en) | 2004-03-16 | 2019-10-15 | Icontrol Networks, Inc. | Premises system management using status signal |
US11588787B2 (en) | 2004-03-16 | 2023-02-21 | Icontrol Networks, Inc. | Premises management configuration and control |
US11410531B2 (en) | 2004-03-16 | 2022-08-09 | Icontrol Networks, Inc. | Automation system user interface with three-dimensional display |
US10796557B2 (en) | 2004-03-16 | 2020-10-06 | Icontrol Networks, Inc. | Automation system user interface with three-dimensional display |
US11489812B2 (en) | 2004-03-16 | 2022-11-01 | Icontrol Networks, Inc. | Forming a security network including integrated security system components and network devices |
US10754304B2 (en) | 2004-03-16 | 2020-08-25 | Icontrol Networks, Inc. | Automation system with mobile interface |
US10735249B2 (en) | 2004-03-16 | 2020-08-04 | Icontrol Networks, Inc. | Management of a security system at a premises |
US10691295B2 (en) | 2004-03-16 | 2020-06-23 | Icontrol Networks, Inc. | User interface in a premises network |
US11368429B2 (en) | 2004-03-16 | 2022-06-21 | Icontrol Networks, Inc. | Premises management configuration and control |
US11537186B2 (en) | 2004-03-16 | 2022-12-27 | Icontrol Networks, Inc. | Integrated security system with parallel processing architecture |
US10692356B2 (en) | 2004-03-16 | 2020-06-23 | Icontrol Networks, Inc. | Control system user interface |
WO2005119613A1 (en) * | 2004-05-31 | 2005-12-15 | Jason Andrew Roper | Computer network security |
US11496568B2 (en) | 2005-03-16 | 2022-11-08 | Icontrol Networks, Inc. | Security system with networked touchscreen |
US10062245B2 (en) | 2005-03-16 | 2018-08-28 | Icontrol Networks, Inc. | Cross-client sensor user interface in an integrated security network |
US10091014B2 (en) | 2005-03-16 | 2018-10-02 | Icontrol Networks, Inc. | Integrated security network with security alarm signaling system |
US10721087B2 (en) | 2005-03-16 | 2020-07-21 | Icontrol Networks, Inc. | Method for networked touchscreen with integrated interfaces |
US11824675B2 (en) | 2005-03-16 | 2023-11-21 | Icontrol Networks, Inc. | Networked touchscreen with integrated interfaces |
US11367340B2 (en) | 2005-03-16 | 2022-06-21 | Icontrol Networks, Inc. | Premise management systems and methods |
US10999254B2 (en) | 2005-03-16 | 2021-05-04 | Icontrol Networks, Inc. | System for data routing in networks |
US11792330B2 (en) | 2005-03-16 | 2023-10-17 | Icontrol Networks, Inc. | Communication and automation in a premises management system |
US11706045B2 (en) | 2005-03-16 | 2023-07-18 | Icontrol Networks, Inc. | Modular electronic display platform |
US11424980B2 (en) | 2005-03-16 | 2022-08-23 | Icontrol Networks, Inc. | Forming a security network including integrated security system components |
US11451409B2 (en) | 2005-03-16 | 2022-09-20 | Icontrol Networks, Inc. | Security network integrating security system and network devices |
US10841381B2 (en) | 2005-03-16 | 2020-11-17 | Icontrol Networks, Inc. | Security system with networked touchscreen |
US11595364B2 (en) | 2005-03-16 | 2023-02-28 | Icontrol Networks, Inc. | System for data routing in networks |
US10930136B2 (en) | 2005-03-16 | 2021-02-23 | Icontrol Networks, Inc. | Premise management systems and methods |
US10380871B2 (en) | 2005-03-16 | 2019-08-13 | Icontrol Networks, Inc. | Control system user interface |
US11615697B2 (en) | 2005-03-16 | 2023-03-28 | Icontrol Networks, Inc. | Premise management systems and methods |
US10156959B2 (en) | 2005-03-16 | 2018-12-18 | Icontrol Networks, Inc. | Cross-client sensor user interface in an integrated security network |
US11113950B2 (en) | 2005-03-16 | 2021-09-07 | Icontrol Networks, Inc. | Gateway integrated with premises security system |
US11700142B2 (en) | 2005-03-16 | 2023-07-11 | Icontrol Networks, Inc. | Security network integrating security system and network devices |
US10127801B2 (en) | 2005-03-16 | 2018-11-13 | Icontrol Networks, Inc. | Integrated security system with parallel processing architecture |
US10785319B2 (en) | 2006-06-12 | 2020-09-22 | Icontrol Networks, Inc. | IP device discovery systems and methods |
US10616244B2 (en) | 2006-06-12 | 2020-04-07 | Icontrol Networks, Inc. | Activation of gateway device |
US11418518B2 (en) | 2006-06-12 | 2022-08-16 | Icontrol Networks, Inc. | Activation of gateway device |
US10225314B2 (en) | 2007-01-24 | 2019-03-05 | Icontrol Networks, Inc. | Methods and systems for improved system performance |
US11412027B2 (en) | 2007-01-24 | 2022-08-09 | Icontrol Networks, Inc. | Methods and systems for data communication |
US11418572B2 (en) | 2007-01-24 | 2022-08-16 | Icontrol Networks, Inc. | Methods and systems for improved system performance |
US11706279B2 (en) | 2007-01-24 | 2023-07-18 | Icontrol Networks, Inc. | Methods and systems for data communication |
US10142392B2 (en) | 2007-01-24 | 2018-11-27 | Icontrol Networks, Inc. | Methods and systems for improved system performance |
US10747216B2 (en) | 2007-02-28 | 2020-08-18 | Icontrol Networks, Inc. | Method and system for communicating with and controlling an alarm system from a remote server |
US10657794B1 (en) | 2007-02-28 | 2020-05-19 | Icontrol Networks, Inc. | Security, monitoring and automation controller access and use of legacy security control panel information |
US11194320B2 (en) | 2007-02-28 | 2021-12-07 | Icontrol Networks, Inc. | Method and system for managing communication connectivity |
US11809174B2 (en) | 2007-02-28 | 2023-11-07 | Icontrol Networks, Inc. | Method and system for managing communication connectivity |
US11132888B2 (en) | 2007-04-23 | 2021-09-28 | Icontrol Networks, Inc. | Method and system for providing alternate network access |
US10140840B2 (en) | 2007-04-23 | 2018-11-27 | Icontrol Networks, Inc. | Method and system for providing alternate network access |
US11663902B2 (en) | 2007-04-23 | 2023-05-30 | Icontrol Networks, Inc. | Method and system for providing alternate network access |
US10672254B2 (en) | 2007-04-23 | 2020-06-02 | Icontrol Networks, Inc. | Method and system for providing alternate network access |
US10423309B2 (en) | 2007-06-12 | 2019-09-24 | Icontrol Networks, Inc. | Device integration framework |
US11601810B2 (en) | 2007-06-12 | 2023-03-07 | Icontrol Networks, Inc. | Communication protocols in integrated systems |
US11237714B2 (en) | 2007-06-12 | 2022-02-01 | Control Networks, Inc. | Control system user interface |
US10237237B2 (en) | 2007-06-12 | 2019-03-19 | Icontrol Networks, Inc. | Communication protocols in integrated systems |
US10339791B2 (en) | 2007-06-12 | 2019-07-02 | Icontrol Networks, Inc. | Security network integrated with premise security system |
US11646907B2 (en) | 2007-06-12 | 2023-05-09 | Icontrol Networks, Inc. | Communication protocols in integrated systems |
US10051078B2 (en) | 2007-06-12 | 2018-08-14 | Icontrol Networks, Inc. | WiFi-to-serial encapsulation in systems |
US11218878B2 (en) | 2007-06-12 | 2022-01-04 | Icontrol Networks, Inc. | Communication protocols in integrated systems |
US11316753B2 (en) | 2007-06-12 | 2022-04-26 | Icontrol Networks, Inc. | Communication protocols in integrated systems |
US11632308B2 (en) | 2007-06-12 | 2023-04-18 | Icontrol Networks, Inc. | Communication protocols in integrated systems |
US11212192B2 (en) | 2007-06-12 | 2021-12-28 | Icontrol Networks, Inc. | Communication protocols in integrated systems |
US11894986B2 (en) | 2007-06-12 | 2024-02-06 | Icontrol Networks, Inc. | Communication protocols in integrated systems |
US11625161B2 (en) | 2007-06-12 | 2023-04-11 | Icontrol Networks, Inc. | Control system user interface |
US10365810B2 (en) | 2007-06-12 | 2019-07-30 | Icontrol Networks, Inc. | Control system user interface |
US11611568B2 (en) | 2007-06-12 | 2023-03-21 | Icontrol Networks, Inc. | Communication protocols over internet protocol (IP) networks |
US10382452B1 (en) | 2007-06-12 | 2019-08-13 | Icontrol Networks, Inc. | Communication protocols in integrated systems |
US11722896B2 (en) | 2007-06-12 | 2023-08-08 | Icontrol Networks, Inc. | Communication protocols in integrated systems |
US10079839B1 (en) | 2007-06-12 | 2018-09-18 | Icontrol Networks, Inc. | Activation of gateway device |
US10142394B2 (en) | 2007-06-12 | 2018-11-27 | Icontrol Networks, Inc. | Generating risk profile using data of home monitoring and security system |
US11089122B2 (en) | 2007-06-12 | 2021-08-10 | Icontrol Networks, Inc. | Controlling data routing among networks |
US10313303B2 (en) | 2007-06-12 | 2019-06-04 | Icontrol Networks, Inc. | Forming a security network including integrated security system components and network devices |
US10200504B2 (en) | 2007-06-12 | 2019-02-05 | Icontrol Networks, Inc. | Communication protocols over internet protocol (IP) networks |
US10389736B2 (en) | 2007-06-12 | 2019-08-20 | Icontrol Networks, Inc. | Communication protocols in integrated systems |
US10666523B2 (en) | 2007-06-12 | 2020-05-26 | Icontrol Networks, Inc. | Communication protocols in integrated systems |
US11423756B2 (en) | 2007-06-12 | 2022-08-23 | Icontrol Networks, Inc. | Communication protocols in integrated systems |
US10616075B2 (en) | 2007-06-12 | 2020-04-07 | Icontrol Networks, Inc. | Communication protocols in integrated systems |
US10444964B2 (en) | 2007-06-12 | 2019-10-15 | Icontrol Networks, Inc. | Control system user interface |
US11582065B2 (en) | 2007-06-12 | 2023-02-14 | Icontrol Networks, Inc. | Systems and methods for device communication |
US10523689B2 (en) | 2007-06-12 | 2019-12-31 | Icontrol Networks, Inc. | Communication protocols over internet protocol (IP) networks |
US10498830B2 (en) | 2007-06-12 | 2019-12-03 | Icontrol Networks, Inc. | Wi-Fi-to-serial encapsulation in systems |
US11815969B2 (en) | 2007-08-10 | 2023-11-14 | Icontrol Networks, Inc. | Integrated security system with parallel processing architecture |
US11831462B2 (en) | 2007-08-24 | 2023-11-28 | Icontrol Networks, Inc. | Controlling data routing in premises management systems |
US11916928B2 (en) | 2008-01-24 | 2024-02-27 | Icontrol Networks, Inc. | Communication protocols over internet protocol (IP) networks |
US11816323B2 (en) | 2008-06-25 | 2023-11-14 | Icontrol Networks, Inc. | Automation system user interface |
US11792036B2 (en) | 2008-08-11 | 2023-10-17 | Icontrol Networks, Inc. | Mobile premises automation platform |
US11711234B2 (en) | 2008-08-11 | 2023-07-25 | Icontrol Networks, Inc. | Integrated cloud system for premises automation |
US11368327B2 (en) | 2008-08-11 | 2022-06-21 | Icontrol Networks, Inc. | Integrated cloud system for premises automation |
US11758026B2 (en) | 2008-08-11 | 2023-09-12 | Icontrol Networks, Inc. | Virtual device systems and methods |
US11616659B2 (en) | 2008-08-11 | 2023-03-28 | Icontrol Networks, Inc. | Integrated cloud system for premises automation |
US11258625B2 (en) | 2008-08-11 | 2022-02-22 | Icontrol Networks, Inc. | Mobile premises automation platform |
US11190578B2 (en) | 2008-08-11 | 2021-11-30 | Icontrol Networks, Inc. | Integrated cloud system with lightweight gateway for premises automation |
US11729255B2 (en) | 2008-08-11 | 2023-08-15 | Icontrol Networks, Inc. | Integrated cloud system with lightweight gateway for premises automation |
US10530839B2 (en) | 2008-08-11 | 2020-01-07 | Icontrol Networks, Inc. | Integrated cloud system with lightweight gateway for premises automation |
US11316958B2 (en) | 2008-08-11 | 2022-04-26 | Icontrol Networks, Inc. | Virtual device systems and methods |
US11641391B2 (en) | 2008-08-11 | 2023-05-02 | Icontrol Networks Inc. | Integrated cloud system with lightweight gateway for premises automation |
US10522026B2 (en) | 2008-08-11 | 2019-12-31 | Icontrol Networks, Inc. | Automation system user interface with three-dimensional display |
US20160274759A1 (en) | 2008-08-25 | 2016-09-22 | Paul J. Dawes | Security system with networked touchscreen and gateway |
US10375253B2 (en) | 2008-08-25 | 2019-08-06 | Icontrol Networks, Inc. | Security system with networked touchscreen and gateway |
US10813034B2 (en) | 2009-04-30 | 2020-10-20 | Icontrol Networks, Inc. | Method, system and apparatus for management of applications for an SMA controller |
US10332363B2 (en) | 2009-04-30 | 2019-06-25 | Icontrol Networks, Inc. | Controller and interface for home security, monitoring and automation having customizable audio alerts for SMA events |
US10275999B2 (en) | 2009-04-30 | 2019-04-30 | Icontrol Networks, Inc. | Server-based notification of alarm event subsequent to communication failure with armed security system |
US10237806B2 (en) | 2009-04-30 | 2019-03-19 | Icontrol Networks, Inc. | Activation of a home automation controller |
US11665617B2 (en) | 2009-04-30 | 2023-05-30 | Icontrol Networks, Inc. | Server-based notification of alarm event subsequent to communication failure with armed security system |
US11223998B2 (en) | 2009-04-30 | 2022-01-11 | Icontrol Networks, Inc. | Security, monitoring and automation controller access and use of legacy security control panel information |
US11601865B2 (en) | 2009-04-30 | 2023-03-07 | Icontrol Networks, Inc. | Server-based notification of alarm event subsequent to communication failure with armed security system |
US11553399B2 (en) | 2009-04-30 | 2023-01-10 | Icontrol Networks, Inc. | Custom content for premises management |
US11284331B2 (en) | 2009-04-30 | 2022-03-22 | Icontrol Networks, Inc. | Server-based notification of alarm event subsequent to communication failure with armed security system |
US10674428B2 (en) | 2009-04-30 | 2020-06-02 | Icontrol Networks, Inc. | Hardware configurable security, monitoring and automation controller having modular communication protocol interfaces |
US11856502B2 (en) | 2009-04-30 | 2023-12-26 | Icontrol Networks, Inc. | Method, system and apparatus for automated inventory reporting of security, monitoring and automation hardware and software at customer premises |
US11778534B2 (en) | 2009-04-30 | 2023-10-03 | Icontrol Networks, Inc. | Hardware configurable security, monitoring and automation controller having modular communication protocol interfaces |
US11356926B2 (en) | 2009-04-30 | 2022-06-07 | Icontrol Networks, Inc. | Hardware configurable security, monitoring and automation controller having modular communication protocol interfaces |
US11129084B2 (en) | 2009-04-30 | 2021-09-21 | Icontrol Networks, Inc. | Notification of event subsequent to communication failure with security system |
US10127802B2 (en) | 2010-09-28 | 2018-11-13 | Icontrol Networks, Inc. | Integrated security system with parallel processing architecture |
US11398147B2 (en) | 2010-09-28 | 2022-07-26 | Icontrol Networks, Inc. | Method, system and apparatus for automated reporting of account and sensor zone information to a central station |
US11900790B2 (en) | 2010-09-28 | 2024-02-13 | Icontrol Networks, Inc. | Method, system and apparatus for automated reporting of account and sensor zone information to a central station |
US10062273B2 (en) | 2010-09-28 | 2018-08-28 | Icontrol Networks, Inc. | Integrated security system with parallel processing architecture |
US10223903B2 (en) | 2010-09-28 | 2019-03-05 | Icontrol Networks, Inc. | Integrated security system with parallel processing architecture |
US11750414B2 (en) | 2010-12-16 | 2023-09-05 | Icontrol Networks, Inc. | Bidirectional security sensor communication for a premises security system |
US11341840B2 (en) | 2010-12-17 | 2022-05-24 | Icontrol Networks, Inc. | Method and system for processing security event data |
US10078958B2 (en) | 2010-12-17 | 2018-09-18 | Icontrol Networks, Inc. | Method and system for logging security event data |
US10741057B2 (en) | 2010-12-17 | 2020-08-11 | Icontrol Networks, Inc. | Method and system for processing security event data |
US11240059B2 (en) | 2010-12-20 | 2022-02-01 | Icontrol Networks, Inc. | Defining and implementing sensor triggered response rules |
US11296950B2 (en) | 2013-06-27 | 2022-04-05 | Icontrol Networks, Inc. | Control system user interface |
US10348575B2 (en) | 2013-06-27 | 2019-07-09 | Icontrol Networks, Inc. | Control system user interface |
US11146637B2 (en) | 2014-03-03 | 2021-10-12 | Icontrol Networks, Inc. | Media content management |
US11405463B2 (en) | 2014-03-03 | 2022-08-02 | Icontrol Networks, Inc. | Media content management |
US11943301B2 (en) | 2014-03-03 | 2024-03-26 | Icontrol Networks, Inc. | Media content management |
Also Published As
Publication number | Publication date |
---|---|
GB9624981D0 (en) | 1997-01-15 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO1998025243A1 (en) | Improvements relating to security systems | |
US7444208B2 (en) | Electrical system wiring diagram generating system, and power supply device and program used for the same | |
US8310365B2 (en) | Control system, security system, and method of monitoring a location | |
US4887291A (en) | System for annunciating emergencies | |
US9472078B2 (en) | Method and apparatus for integration of electrical fire sensor with fire panel | |
EP3343314B1 (en) | Handling power failures in a mains powered gateway | |
JP2002319082A (en) | Controller for data center | |
JP2001160190A (en) | Monitor terminal, communication module, and home control system | |
CN114466169A (en) | Monitoring system of fire door magnet and camera | |
EP0084685B1 (en) | Alarm control center | |
SE504715C2 (en) | Monitoring system for registration of theft-demanding equipment via the electricity grid | |
US10139891B2 (en) | Systems and methods of power-safe control panel installation | |
TWI505238B (en) | Security system for selecting input-type | |
WO2022193876A1 (en) | Communication device and remote monitoring system | |
TW202405766A (en) | Smart disaster prevention system | |
JP2847216B2 (en) | Fire alarm system with trouble transmission stop function | |
JP3608387B2 (en) | Security intercom device and alarm monitoring system provided with the same | |
CN110018725B (en) | Method and system for remotely resetting baseboard management controller of computer system | |
JP2001243573A (en) | Security system | |
JPS635496A (en) | Housing complex managing system | |
JPH09245279A (en) | Access control system | |
JP6652790B2 (en) | Fire receiver | |
CN115497246A (en) | Intelligent disaster prevention system | |
JPH02123500A (en) | Apartment house information device | |
JP2000339555A (en) | Burglar preventing tag equipment |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AK | Designated states |
Kind code of ref document: A1 Designated state(s): CN JP RU US |
|
AL | Designated countries for regional patents |
Kind code of ref document: A1 Designated state(s): AT BE CH DE DK ES FI FR GB GR IE IT LU MC NL PT SE |
|
DFPE | Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed before 20040101) | ||
121 | Ep: the epo has been informed by wipo that ep was designated in this application | ||
122 | Ep: pct application non-entry in european phase |