WO1998025243A1 - Improvements relating to security systems - Google Patents

Improvements relating to security systems Download PDF

Info

Publication number
WO1998025243A1
WO1998025243A1 PCT/GB1997/003277 GB9703277W WO9825243A1 WO 1998025243 A1 WO1998025243 A1 WO 1998025243A1 GB 9703277 W GB9703277 W GB 9703277W WO 9825243 A1 WO9825243 A1 WO 9825243A1
Authority
WO
WIPO (PCT)
Prior art keywords
master
slave
security system
interrogation
normality
Prior art date
Application number
PCT/GB1997/003277
Other languages
French (fr)
Inventor
Richard Watkins
Original Assignee
Watkins, Daryl, Joclyn
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Watkins, Daryl, Joclyn filed Critical Watkins, Daryl, Joclyn
Publication of WO1998025243A1 publication Critical patent/WO1998025243A1/en

Links

Classifications

    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms
    • G08B13/02Mechanical actuation
    • G08B13/14Mechanical actuation by lifting or attempted removal of hand-portable articles
    • G08B13/1409Mechanical actuation by lifting or attempted removal of hand-portable articles for removal detection of electrical appliances by detecting their physical disconnection from an electrical system, e.g. using a switch incorporated in the plug connector
    • G08B13/1418Removal detected by failure in electrical connection between the appliance and a control centre, home control panel or a power supply

Definitions

  • This invention relates to security systems. It is particularly concerned with the security of computer installations where the components may be spread around different rooms and different floors m a building. They will of course be interconnected by cables, and one aim is to use where possible the existing cables as part of the security network, without the need to provide further lnter- component wiring. It should therefore be fairly non-disrup- tive to instal such a system.
  • the system could also be applied to other combinations of electrical/electronic components, for example hi-fi systems with tuners, amplifiers, CD players, turntables, tape recorders and speakers, or TV sets and video recorders. It is also applicable to non-electrical items, such as a set of filing cabinets, although of course dedicated cabling will then have to be provided. But generally reference will be made just to computer systems.
  • Such known devices also have the disadvantage that, if separately powered, they can remain primed while the component is in use, and can therefore be triggered if the user makes an adjustment or simply knocks it accidentally, or shifts his desk for example. This system should avoid such faults .
  • a security system for a plurality of components linked by cable such as a computer system
  • one component is equipped with a master monitoring device (the master) and the other components are equipped with slave monitoring devices (the slaves) individually identifiable to the master
  • the master is programmed to interrogate the slaves on a cyclic basis via cable and wherein if there is a response (or lack of response) indicating a departure from normality, the relevant slave is noted by the master.
  • the interrogation should be by existing cabling linking the components, provided that is non- interfering with other functions. But it may be necessary occasionally to use dedicated cabling for the interrogation.
  • the interrogation has two modes, the first being the cyclic interrogation of the slaves which will give a basic yes/no indication of normality, and the second being a more detailed interrogation of a slave that produces a no indication. In other words, a basic interrogation may simply indicate that something is wrong with a particular component.
  • the master goes into the second interrogation mode, in which it targets this component and determines the fault in more detail . This switch into the second mode will preferably be automatic, although it could be done by the supervisor.
  • the network may be capable of having further components connected. The interrogation can be extended to cover nodes where such connections may be made, whereby the addition of a component to the network is signalled to the master.
  • the master should be re-programmable to note a slave which has an authorised departure from normality, and not to register an alarm while that departure lasts.
  • the master is conveniently programmable with details of each slave and is equipped with display means enabling a supervisor at the master to review such details at least in the event of that slave departing from normality.
  • the supervisor can have a screen on which information relating to the system can be displayed, conveniently in graphic form.
  • In memory can be stored information on each monitored component, such as the name of the normal user, his telephone or extension number, similar details on any back-up user, the location of the component, its description (printer, for example) , possibly with more details such as maker and model number, and any other relevant data. Should attention be brought to that compo- nent, the supervisor can then immediately call up this information.
  • the detectable departures from normality may include a selection of disconnection, physical movement, at least partial dismantling, use, and whether the slave is switched on or off.
  • the most basic fault to detect is a slave disconnection, as when an electrical/electronic component is unplugged or its cable is cut so that it can be removed. When this happens, there will of course be no "OK" response to the master when that component is interrogated, and so a problem there is identified. While this could be arranged to raise a general external alarm, it might well be preferred quietly to alert the person overseeing the system (the supervisor) , and possibly also automatically to bring security cameras to bear, and to lock doors, all with a view to identifying and trapping a thief. The supervisor could choose the type of response required.
  • the master will continue at each cycle to interrogate the disconnected or otherwise faulty or interfered-with component after the initial alarm is raised. If the unplugged cable is re-connected, or the lid re-fitted, there is affirmative feedback and the alarm may be arranged to stop, although a record of the fault may remain at the master, to be investigated if necessary. If the disconnec- tion or lid removal is repeated, the alarm trips on again. Provision will also generally be made for the supervisor to suppress the alarm, once it has been raised.
  • the system could be adapted to monitor combinations of articles or structures other than electrical/electronic components of a portable nature.
  • it could serve a group of buildings, each building being a slave station except for one accommodating the master.
  • Each building would have its own security system reporting in to its slave, and the slaves would be cyclical - ly checked by the master.
  • intruder sensing there could be smoke and heat sensing, to give early warning to the master of fire.
  • Figure 1 is a diagram of a simple computer network
  • FIG. 2 is a block diagram of a security system control card for a master station
  • FIG. 3 is a more detailed circuit diagram of the master control card, particularly in relation to the microprocessor and memory,
  • Figure 4 is a more detailed circuit diagram of a network control and interface of the master control card
  • FIG. 5 is a more detailed circuit diagram of an output control and interface of the master control card
  • FIG. 6 is a more detailed circuit diagram of a "watchdog" timer of the master control card with an over - current timer not apparent in Figure 3,
  • FIG. 7 is a more detailed circuit diagram of a bus interface of the master control card
  • FIG 8 is a block diagram of a security system control card for a slave station
  • Figure 9 is a more detailed circuit diagram of the slave station card
  • Figure 10 is a flow chart associated with a slave station.
  • the network of Figure 1 has a master computer 1 and several other computers 2 (the slaves) at various workstations, all interconnected by cable 3 through which they can communicate. Generally, these computers will be individually powered, so that they can be switched on and off, or plugged in and unplugged, separately.
  • each slave card is energised from the master 1 via the cable 3.
  • the master card 4 has a microprocessor 6 with an associated memory 7, the microprocessor communicating with the cable 3 via a network control and interface 8 and operating an alarm system 9 through an output control and interface 10.
  • the alarm system 9 may be both remote and local and include more than simply audible and/or visible indications of abnormality.
  • the card also has a watchdog circuit 11, to be described later, and is shown with an interface 12 for connecting to a bus 13.
  • a watchdog circuit 11 to be described later, and is shown with an interface 12 for connecting to a bus 13.
  • broad arrows indicate multi-channel communication, while the single line arrows represent single channels .
  • FIG 3 shows this card in more detail .
  • Suitable components and their terminals are identified here and in other figures by code numbers and abbreviations that will be known to those familiar with computer construction.
  • the various connections are also shown in conventional form and so detailed description will not be given.
  • Further details on circuits 8, 10, 11 and 12 are shown in Figures 4 to 7 respectively. Again, conventions are followed and they will not be described in detail.
  • the network control and interface circuit 8 of Figure 4 has a power control sub-circuit 14 and network ports 15 with a precautionary over-current sensing circuit 16. A short in a cable would cause a current surge, and this circuit will react immediately to protect the network ports 15, closing them down as necessary.
  • Figure 6 shows the watchdog timer circuit 11 in conjunction with an over-current timer 17. This is not shown separately in Figure 2, being shared by the microprocessor 6 and the interface 8.
  • the watchdog circuit 11 is provided as a check on the microprocessor 6 and the rest of the main card. Unless neutralised by the microprocessor working normally, it issues a reset signal at regular intervals. In other words it sets the microprocessor going again should it suffer "lock up". Should the sensing circuit 16 have cut in, it will allow time for the system to settle down and then it will allow re-energisation.
  • each slave card 8 has a microprocessor 18, memory 19, address selector 20, network interface 21 and power sensing interface 22. There is also at least one auxiliary port interface 23.
  • the interface 21 connects to the cable 3, and the interface 22 (which is optional) to the bus 13.
  • a lid detector 24 will send a signal directly to the microprocessor 18 should a lid, back panel or other part of the associated computer 2 be removed.
  • the port interface 23 receives a signal from any connected peripheral 25, such as a printer, that is required to be monitored.
  • Figure 9 shows the card 8 m more detail, Figures 8 and 9 following the conventions and style of Figures 2 and 3.
  • switch-on at the master 1 initialises the card 4. Then that sends out its first interrogation to an identifiable node (where usually a computer 2 is connected) A timer is set and the master stays dormant. When data is returned from the first node, it is re-activated and checks whether that data is correct or not. If it is correct, then interrogation of the second node is carried out similarly, and so on. But if there is a return signal signifying something wrong the alarm system 9 will be triggered. If there is no signal back by the end of the timer period, this triggers a check against the memory 7, which might have been programmed to record that there is nothing at the node m question and that a null response is to be expected. In that case, the interrogation of the next node continues as normal. But if a null response is incorrect, the alarm 9 is activated.
  • the interrogation puts m tram the events of the flow chart of Figure 10.
  • the address m the interrogation signal is checked against the home address and if there is no match, the slave card remains dormant. But when the right signal does arrive a set of checks is carried out and a reply sent back to the master. If the master is unplugged or incapacitated, this will trigger an external alarm. Obviously, there can be no detailed diagnosis of the fault but at least someone should be alerted. Also if the cable between the interface 10 on the card 4 and the alarm system 9 is cut or unplugged, an alarm will be generated by that system.

Abstract

A security system, particularly for a computer network, carries out surveillance of slave components (2) from a master (1), conveniently through existing cabling (3). The slaves (2) are interrogated on a cyclic basis and a signal goes back to the master to determine if there is any departure from normality. A supervisor at the master can identify the component and can interrogate in more detail to determine what has happened at that component, for example whether it has been disconnected, moved or partially dismantled, or is being used illicitly. An alarm (9) may be triggered by an abnormal response, and security measures brought into action.

Description

"Improvements relating to Security Systems"
This invention relates to security systems. It is particularly concerned with the security of computer installations where the components may be spread around different rooms and different floors m a building. They will of course be interconnected by cables, and one aim is to use where possible the existing cables as part of the security network, without the need to provide further lnter- component wiring. It should therefore be fairly non-disrup- tive to instal such a system.
The system could also be applied to other combinations of electrical/electronic components, for example hi-fi systems with tuners, amplifiers, CD players, turntables, tape recorders and speakers, or TV sets and video recorders. It is also applicable to non-electrical items, such as a set of filing cabinets, although of course dedicated cabling will then have to be provided. But generally reference will be made just to computer systems.
There are various security devices already m use . Some employ tremblers so that when a component is physically disturbed a circuit is closed and an alarm is generated. But this requires power always to be available at that component, and if it is switched off (as it is likely to be at a time when someone is attempting to remove it) then there has to be separate provision, mams or battery, for the alarm device. Th s is not ideal. Therefore another aim of the present system is to be able to monitor switched-off components without local, auxiliary powered devices.
Such known devices also have the disadvantage that, if separately powered, they can remain primed while the component is in use, and can therefore be triggered if the user makes an adjustment or simply knocks it accidentally, or shifts his desk for example. This system should avoid such faults .
According to the present invention there is provided a security system for a plurality of components linked by cable, such as a computer system, wherein one component is equipped with a master monitoring device (the master) and the other components are equipped with slave monitoring devices (the slaves) individually identifiable to the master, wherein the master is programmed to interrogate the slaves on a cyclic basis via cable and wherein if there is a response (or lack of response) indicating a departure from normality, the relevant slave is noted by the master.
Conveniently, the interrogation should be by existing cabling linking the components, provided that is non- interfering with other functions. But it may be necessary occasionally to use dedicated cabling for the interrogation. Conveniently, the interrogation has two modes, the first being the cyclic interrogation of the slaves which will give a basic yes/no indication of normality, and the second being a more detailed interrogation of a slave that produces a no indication. In other words, a basic interrogation may simply indicate that something is wrong with a particular component. For further details, the master goes into the second interrogation mode, in which it targets this component and determines the fault in more detail . This switch into the second mode will preferably be automatic, although it could be done by the supervisor. The network may be capable of having further components connected. The interrogation can be extended to cover nodes where such connections may be made, whereby the addition of a component to the network is signalled to the master.
The master should be re-programmable to note a slave which has an authorised departure from normality, and not to register an alarm while that departure lasts.
This is to cater for occasions when unplugging or lid removal is quite in order, as when an office is re-arranged or when servicing is carried out. An unnecessary alarm is suppressed if the master is temporarily re-programmed effectively with the knowledge that a certain component is to be disrupted in a certain way. The interrogation procedure is modified accordingly to ignore the predicted fault signal . The master is conveniently programmable with details of each slave and is equipped with display means enabling a supervisor at the master to review such details at least in the event of that slave departing from normality.
In more detail, the supervisor can have a screen on which information relating to the system can be displayed, conveniently in graphic form. In memory can be stored information on each monitored component, such as the name of the normal user, his telephone or extension number, similar details on any back-up user, the location of the component, its description (printer, for example) , possibly with more details such as maker and model number, and any other relevant data. Should attention be brought to that compo- nent, the supervisor can then immediately call up this information.
The detectable departures from normality may include a selection of disconnection, physical movement, at least partial dismantling, use, and whether the slave is switched on or off.
The most basic fault to detect is a slave disconnection, as when an electrical/electronic component is unplugged or its cable is cut so that it can be removed. When this happens, there will of course be no "OK" response to the master when that component is interrogated, and so a problem there is identified. While this could be arranged to raise a general external alarm, it might well be preferred quietly to alert the person overseeing the system (the supervisor) , and possibly also automatically to bring security cameras to bear, and to lock doors, all with a view to identifying and trapping a thief. The supervisor could choose the type of response required.
Often, it is not the whole component in which a thief is interested; it might be just a chip in a P.C. for example. Access to it requires a lid or backing to be removed, and this can be linked to the slave within the P.C. so that, on interrogation, the message will be passed back to the master that such lid removal has been effected. Another use could simply be to determine whether a component is switched on or not . While this would not excite remark during normal office hours, it would be interesting outside them. It could simply mean that the component was accidentally left switched on, wasting power, but it could also indicate illicit out-of-hours use, perhaps by someone trying to obtain sensitive information.
The master will continue at each cycle to interrogate the disconnected or otherwise faulty or interfered-with component after the initial alarm is raised. If the unplugged cable is re-connected, or the lid re-fitted, there is affirmative feedback and the alarm may be arranged to stop, although a record of the fault may remain at the master, to be investigated if necessary. If the disconnec- tion or lid removal is repeated, the alarm trips on again. Provision will also generally be made for the supervisor to suppress the alarm, once it has been raised.
It is envisaged that the system could be adapted to monitor combinations of articles or structures other than electrical/electronic components of a portable nature. For example, it could serve a group of buildings, each building being a slave station except for one accommodating the master. Each building would have its own security system reporting in to its slave, and the slaves would be cyclical - ly checked by the master. As well as intruder sensing, there could be smoke and heat sensing, to give early warning to the master of fire.
For a better understanding of the invention, one embodiment will now be described, by way of example, with reference to the accompanying drawings, in which:
Figure 1 is a diagram of a simple computer network,
Figure 2 is a block diagram of a security system control card for a master station,
Figure 3 is a more detailed circuit diagram of the master control card, particularly in relation to the microprocessor and memory,
Figure 4 is a more detailed circuit diagram of a network control and interface of the master control card,
Figure 5 is a more detailed circuit diagram of an output control and interface of the master control card,
Figure 6 is a more detailed circuit diagram of a "watchdog" timer of the master control card with an over - current timer not apparent in Figure 3,
Figure 7 is a more detailed circuit diagram of a bus interface of the master control card,
Figure 8 is a block diagram of a security system control card for a slave station, Figure 9 is a more detailed circuit diagram of the slave station card, and
Figure 10 is a flow chart associated with a slave station.
The network of Figure 1 has a master computer 1 and several other computers 2 (the slaves) at various workstations, all interconnected by cable 3 through which they can communicate. Generally, these computers will be individually powered, so that they can be switched on and off, or plugged in and unplugged, separately.
In addition to the circuitry and components that make the computers perform their ordinary functions, they will be equipped with circuit boards (or cards for brevity) for the security system, the master 1 having the card 4 of Figure 2 and the slaves each having the card 5 of Figure 8. These slave cards are not reliant on the associated computer being plugged in to a power socket and switched on: each slave card is energised from the master 1 via the cable 3. The master card 4 has a microprocessor 6 with an associated memory 7, the microprocessor communicating with the cable 3 via a network control and interface 8 and operating an alarm system 9 through an output control and interface 10. The alarm system 9 may be both remote and local and include more than simply audible and/or visible indications of abnormality. There could be CCTV cameras to activate, or door closures to lock, for example. The card also has a watchdog circuit 11, to be described later, and is shown with an interface 12 for connecting to a bus 13. In the conventional way, broad arrows indicate multi-channel communication, while the single line arrows represent single channels .
Figure 3 shows this card in more detail . Suitable components and their terminals are identified here and in other figures by code numbers and abbreviations that will be known to those familiar with computer construction. The various connections are also shown in conventional form and so detailed description will not be given. Further details on circuits 8, 10, 11 and 12 are shown in Figures 4 to 7 respectively. Again, conventions are followed and they will not be described in detail.
The network control and interface circuit 8 of Figure 4 has a power control sub-circuit 14 and network ports 15 with a precautionary over-current sensing circuit 16. A short in a cable would cause a current surge, and this circuit will react immediately to protect the network ports 15, closing them down as necessary. Figure 6 shows the watchdog timer circuit 11 in conjunction with an over-current timer 17. This is not shown separately in Figure 2, being shared by the microprocessor 6 and the interface 8. The watchdog circuit 11 is provided as a check on the microprocessor 6 and the rest of the main card. Unless neutralised by the microprocessor working normally, it issues a reset signal at regular intervals. In other words it sets the microprocessor going again should it suffer "lock up". Should the sensing circuit 16 have cut in, it will allow time for the system to settle down and then it will allow re-energisation.
Referring now to Figure 8, each slave card 8 has a microprocessor 18, memory 19, address selector 20, network interface 21 and power sensing interface 22. There is also at least one auxiliary port interface 23. The interface 21 connects to the cable 3, and the interface 22 (which is optional) to the bus 13. A lid detector 24 will send a signal directly to the microprocessor 18 should a lid, back panel or other part of the associated computer 2 be removed. The port interface 23 receives a signal from any connected peripheral 25, such as a printer, that is required to be monitored.
Figure 9 shows the card 8 m more detail, Figures 8 and 9 following the conventions and style of Figures 2 and 3.
In operation, switch-on at the master 1 initialises the card 4. Then that sends out its first interrogation to an identifiable node (where usually a computer 2 is connected) A timer is set and the master stays dormant. When data is returned from the first node, it is re-activated and checks whether that data is correct or not. If it is correct, then interrogation of the second node is carried out similarly, and so on. But if there is a return signal signifying something wrong the alarm system 9 will be triggered. If there is no signal back by the end of the timer period, this triggers a check against the memory 7, which might have been programmed to record that there is nothing at the node m question and that a null response is to be expected. In that case, the interrogation of the next node continues as normal. But if a null response is incorrect, the alarm 9 is activated.
At each slave, the interrogation puts m tram the events of the flow chart of Figure 10. Each time, the address m the interrogation signal is checked against the home address and if there is no match, the slave card remains dormant. But when the right signal does arrive a set of checks is carried out and a reply sent back to the master. If the master is unplugged or incapacitated, this will trigger an external alarm. Obviously, there can be no detailed diagnosis of the fault but at least someone should be alerted. Also if the cable between the interface 10 on the card 4 and the alarm system 9 is cut or unplugged, an alarm will be generated by that system.

Claims

1. A security system for a plurality of components linked by cable, such as a computer network, wherein one component is equipped with a master monitoring device (the master) and the other components are equipped with slave monitoring devices (the slaves) individually identifiable to the master, wherein the master is programmed to interrogate the slaves on a cyclic basis via cable, and wherein if there is a response (or lack of response) indicating a departure from normality, the relevant slave is noted by the master.
2. A security system as claimed in Claim 1, wherein the interrogation is via existing cabling linking the components .
3. A security system as claimed in Claim 1 or 2 , wherein the interrogation has two modes, the first being the cyclic interrogation of the slaves which will give a basic yes/no indication of normality, and the second being a more detailed interrogation of a slave that produces a no indication.
4. A security system as claimed in Claim 1, 2 or 3, wherein the network is capable of having further components connected, and wherein the interrogation covers nodes where such connections may be made, whereby the addition of a component to the network is signalled to the master.
5. A security system as claimed in any preceding claim, wherein the master is re-programmable to note a slave which has an authorised departure from normality, and not to register an alarm while that departure lasts.
6. A security system as claimed in any preceding claim, wherein the master is programmable with details of each slave and is equipped with display means enabling a supervisor at the master to review such details at least in the event of that slave departing from normality.
7. A security system as claimed in any preceding claim, wherein the detectable departures from normality include a selection of disconnection, physical movement, at least partial dismantling, use, and whether the slave is switched on or off.
PCT/GB1997/003277 1996-11-30 1997-11-28 Improvements relating to security systems WO1998025243A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
GBGB9624981.8A GB9624981D0 (en) 1996-11-30 1996-11-30 Improvements relating to security systems
GB9624981.8 1996-11-30

Publications (1)

Publication Number Publication Date
WO1998025243A1 true WO1998025243A1 (en) 1998-06-11

Family

ID=10803765

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/GB1997/003277 WO1998025243A1 (en) 1996-11-30 1997-11-28 Improvements relating to security systems

Country Status (2)

Country Link
GB (1) GB9624981D0 (en)
WO (1) WO1998025243A1 (en)

Cited By (87)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB2350704A (en) * 1999-06-02 2000-12-06 Nicholas Peter Carter Security system
US6308272B1 (en) * 1998-12-21 2001-10-23 International Business Machines Corporation Security system using existing network and personal computers
US6690411B2 (en) 1999-07-20 2004-02-10 @Security Broadband Corp. Security system
WO2005119613A1 (en) * 2004-05-31 2005-12-15 Jason Andrew Roper Computer network security
US7015806B2 (en) 1999-07-20 2006-03-21 @Security Broadband Corporation Distributed monitoring for a video security system
US7103152B2 (en) 2002-02-01 2006-09-05 @Security Broadband Corp. Lifestyle multimedia security system
US9300921B2 (en) 1999-07-20 2016-03-29 Comcast Cable Communications, Llc Video security systems and methods
US20160274759A1 (en) 2008-08-25 2016-09-22 Paul J. Dawes Security system with networked touchscreen and gateway
US10051078B2 (en) 2007-06-12 2018-08-14 Icontrol Networks, Inc. WiFi-to-serial encapsulation in systems
US10062273B2 (en) 2010-09-28 2018-08-28 Icontrol Networks, Inc. Integrated security system with parallel processing architecture
US10062245B2 (en) 2005-03-16 2018-08-28 Icontrol Networks, Inc. Cross-client sensor user interface in an integrated security network
US10079839B1 (en) 2007-06-12 2018-09-18 Icontrol Networks, Inc. Activation of gateway device
US10078958B2 (en) 2010-12-17 2018-09-18 Icontrol Networks, Inc. Method and system for logging security event data
US10091014B2 (en) 2005-03-16 2018-10-02 Icontrol Networks, Inc. Integrated security network with security alarm signaling system
US10127801B2 (en) 2005-03-16 2018-11-13 Icontrol Networks, Inc. Integrated security system with parallel processing architecture
US10142394B2 (en) 2007-06-12 2018-11-27 Icontrol Networks, Inc. Generating risk profile using data of home monitoring and security system
US10140840B2 (en) 2007-04-23 2018-11-27 Icontrol Networks, Inc. Method and system for providing alternate network access
US10142392B2 (en) 2007-01-24 2018-11-27 Icontrol Networks, Inc. Methods and systems for improved system performance
US10142166B2 (en) 2004-03-16 2018-11-27 Icontrol Networks, Inc. Takeover of security network
US10156959B2 (en) 2005-03-16 2018-12-18 Icontrol Networks, Inc. Cross-client sensor user interface in an integrated security network
US10156831B2 (en) 2004-03-16 2018-12-18 Icontrol Networks, Inc. Automation system with mobile interface
US10200504B2 (en) 2007-06-12 2019-02-05 Icontrol Networks, Inc. Communication protocols over internet protocol (IP) networks
US10237237B2 (en) 2007-06-12 2019-03-19 Icontrol Networks, Inc. Communication protocols in integrated systems
US10237806B2 (en) 2009-04-30 2019-03-19 Icontrol Networks, Inc. Activation of a home automation controller
US10313303B2 (en) 2007-06-12 2019-06-04 Icontrol Networks, Inc. Forming a security network including integrated security system components and network devices
US10339791B2 (en) 2007-06-12 2019-07-02 Icontrol Networks, Inc. Security network integrated with premise security system
US10348575B2 (en) 2013-06-27 2019-07-09 Icontrol Networks, Inc. Control system user interface
US10365810B2 (en) 2007-06-12 2019-07-30 Icontrol Networks, Inc. Control system user interface
US10382452B1 (en) 2007-06-12 2019-08-13 Icontrol Networks, Inc. Communication protocols in integrated systems
US10380871B2 (en) 2005-03-16 2019-08-13 Icontrol Networks, Inc. Control system user interface
US10389736B2 (en) 2007-06-12 2019-08-20 Icontrol Networks, Inc. Communication protocols in integrated systems
US10423309B2 (en) 2007-06-12 2019-09-24 Icontrol Networks, Inc. Device integration framework
US10498830B2 (en) 2007-06-12 2019-12-03 Icontrol Networks, Inc. Wi-Fi-to-serial encapsulation in systems
US10523689B2 (en) 2007-06-12 2019-12-31 Icontrol Networks, Inc. Communication protocols over internet protocol (IP) networks
US10522026B2 (en) 2008-08-11 2019-12-31 Icontrol Networks, Inc. Automation system user interface with three-dimensional display
US10530839B2 (en) 2008-08-11 2020-01-07 Icontrol Networks, Inc. Integrated cloud system with lightweight gateway for premises automation
US10616075B2 (en) 2007-06-12 2020-04-07 Icontrol Networks, Inc. Communication protocols in integrated systems
US10666523B2 (en) 2007-06-12 2020-05-26 Icontrol Networks, Inc. Communication protocols in integrated systems
US10721087B2 (en) 2005-03-16 2020-07-21 Icontrol Networks, Inc. Method for networked touchscreen with integrated interfaces
US10747216B2 (en) 2007-02-28 2020-08-18 Icontrol Networks, Inc. Method and system for communicating with and controlling an alarm system from a remote server
US10785319B2 (en) 2006-06-12 2020-09-22 Icontrol Networks, Inc. IP device discovery systems and methods
US10841381B2 (en) 2005-03-16 2020-11-17 Icontrol Networks, Inc. Security system with networked touchscreen
US10979389B2 (en) 2004-03-16 2021-04-13 Icontrol Networks, Inc. Premises management configuration and control
US10999254B2 (en) 2005-03-16 2021-05-04 Icontrol Networks, Inc. System for data routing in networks
US11089122B2 (en) 2007-06-12 2021-08-10 Icontrol Networks, Inc. Controlling data routing among networks
US11113950B2 (en) 2005-03-16 2021-09-07 Icontrol Networks, Inc. Gateway integrated with premises security system
US11146637B2 (en) 2014-03-03 2021-10-12 Icontrol Networks, Inc. Media content management
US11153266B2 (en) 2004-03-16 2021-10-19 Icontrol Networks, Inc. Gateway registry methods and systems
US11182060B2 (en) 2004-03-16 2021-11-23 Icontrol Networks, Inc. Networked touchscreen with integrated interfaces
US11201755B2 (en) 2004-03-16 2021-12-14 Icontrol Networks, Inc. Premises system management using status signal
US11212192B2 (en) 2007-06-12 2021-12-28 Icontrol Networks, Inc. Communication protocols in integrated systems
US11218878B2 (en) 2007-06-12 2022-01-04 Icontrol Networks, Inc. Communication protocols in integrated systems
US11237714B2 (en) 2007-06-12 2022-02-01 Control Networks, Inc. Control system user interface
US11240059B2 (en) 2010-12-20 2022-02-01 Icontrol Networks, Inc. Defining and implementing sensor triggered response rules
US11244545B2 (en) 2004-03-16 2022-02-08 Icontrol Networks, Inc. Cross-client sensor user interface in an integrated security network
US11258625B2 (en) 2008-08-11 2022-02-22 Icontrol Networks, Inc. Mobile premises automation platform
US11277465B2 (en) 2004-03-16 2022-03-15 Icontrol Networks, Inc. Generating risk profile using data of home monitoring and security system
US11310199B2 (en) 2004-03-16 2022-04-19 Icontrol Networks, Inc. Premises management configuration and control
US11316753B2 (en) 2007-06-12 2022-04-26 Icontrol Networks, Inc. Communication protocols in integrated systems
US11316958B2 (en) 2008-08-11 2022-04-26 Icontrol Networks, Inc. Virtual device systems and methods
US11343380B2 (en) 2004-03-16 2022-05-24 Icontrol Networks, Inc. Premises system automation
US11368327B2 (en) 2008-08-11 2022-06-21 Icontrol Networks, Inc. Integrated cloud system for premises automation
US11398147B2 (en) 2010-09-28 2022-07-26 Icontrol Networks, Inc. Method, system and apparatus for automated reporting of account and sensor zone information to a central station
US11405463B2 (en) 2014-03-03 2022-08-02 Icontrol Networks, Inc. Media content management
US11424980B2 (en) 2005-03-16 2022-08-23 Icontrol Networks, Inc. Forming a security network including integrated security system components
US11423756B2 (en) 2007-06-12 2022-08-23 Icontrol Networks, Inc. Communication protocols in integrated systems
US11451409B2 (en) 2005-03-16 2022-09-20 Icontrol Networks, Inc. Security network integrating security system and network devices
US11489812B2 (en) 2004-03-16 2022-11-01 Icontrol Networks, Inc. Forming a security network including integrated security system components and network devices
US11496568B2 (en) 2005-03-16 2022-11-08 Icontrol Networks, Inc. Security system with networked touchscreen
US11582065B2 (en) 2007-06-12 2023-02-14 Icontrol Networks, Inc. Systems and methods for device communication
US11601810B2 (en) 2007-06-12 2023-03-07 Icontrol Networks, Inc. Communication protocols in integrated systems
US11615697B2 (en) 2005-03-16 2023-03-28 Icontrol Networks, Inc. Premise management systems and methods
US11646907B2 (en) 2007-06-12 2023-05-09 Icontrol Networks, Inc. Communication protocols in integrated systems
US11677577B2 (en) 2004-03-16 2023-06-13 Icontrol Networks, Inc. Premises system management using status signal
US11700142B2 (en) 2005-03-16 2023-07-11 Icontrol Networks, Inc. Security network integrating security system and network devices
US11706279B2 (en) 2007-01-24 2023-07-18 Icontrol Networks, Inc. Methods and systems for data communication
US11706045B2 (en) 2005-03-16 2023-07-18 Icontrol Networks, Inc. Modular electronic display platform
US11729255B2 (en) 2008-08-11 2023-08-15 Icontrol Networks, Inc. Integrated cloud system with lightweight gateway for premises automation
US11750414B2 (en) 2010-12-16 2023-09-05 Icontrol Networks, Inc. Bidirectional security sensor communication for a premises security system
US11758026B2 (en) 2008-08-11 2023-09-12 Icontrol Networks, Inc. Virtual device systems and methods
US11792036B2 (en) 2008-08-11 2023-10-17 Icontrol Networks, Inc. Mobile premises automation platform
US11792330B2 (en) 2005-03-16 2023-10-17 Icontrol Networks, Inc. Communication and automation in a premises management system
US11811845B2 (en) 2004-03-16 2023-11-07 Icontrol Networks, Inc. Communication protocols over internet protocol (IP) networks
US11816323B2 (en) 2008-06-25 2023-11-14 Icontrol Networks, Inc. Automation system user interface
US11831462B2 (en) 2007-08-24 2023-11-28 Icontrol Networks, Inc. Controlling data routing in premises management systems
US11916928B2 (en) 2008-01-24 2024-02-27 Icontrol Networks, Inc. Communication protocols over internet protocol (IP) networks
US11916870B2 (en) 2004-03-16 2024-02-27 Icontrol Networks, Inc. Gateway registry methods and systems

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB2262372A (en) * 1991-12-03 1993-06-16 Bache Hugh Robert Ian Security system for electrical and electronic equipment
US5268668A (en) * 1992-01-07 1993-12-07 Detection Systems, Inc. Security/fire alarm system with group-addressing remote sensors
WO1994017503A1 (en) * 1993-01-19 1994-08-04 Honeywell Inc. Remote control of a control system
FR2719689A1 (en) * 1994-05-06 1995-11-10 Contract Services Business Hol Anti-theft or cable connection detector for electric equipment plug on mains supply e.g computer
EP0734005A1 (en) * 1995-03-24 1996-09-25 Bticino S.P.A. Reception/management system for digital signals from electronic devices, capable of learning the zone configuration data, in particular for alarm systems

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB2262372A (en) * 1991-12-03 1993-06-16 Bache Hugh Robert Ian Security system for electrical and electronic equipment
US5268668A (en) * 1992-01-07 1993-12-07 Detection Systems, Inc. Security/fire alarm system with group-addressing remote sensors
WO1994017503A1 (en) * 1993-01-19 1994-08-04 Honeywell Inc. Remote control of a control system
FR2719689A1 (en) * 1994-05-06 1995-11-10 Contract Services Business Hol Anti-theft or cable connection detector for electric equipment plug on mains supply e.g computer
EP0734005A1 (en) * 1995-03-24 1996-09-25 Bticino S.P.A. Reception/management system for digital signals from electronic devices, capable of learning the zone configuration data, in particular for alarm systems

Cited By (166)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6308272B1 (en) * 1998-12-21 2001-10-23 International Business Machines Corporation Security system using existing network and personal computers
GB2350704A (en) * 1999-06-02 2000-12-06 Nicholas Peter Carter Security system
US6690411B2 (en) 1999-07-20 2004-02-10 @Security Broadband Corp. Security system
US7015806B2 (en) 1999-07-20 2006-03-21 @Security Broadband Corporation Distributed monitoring for a video security system
US9300921B2 (en) 1999-07-20 2016-03-29 Comcast Cable Communications, Llc Video security systems and methods
US9600945B2 (en) 2002-02-01 2017-03-21 Comcast Cable Communications, Llc Lifestyle multimedia security system
US10559193B2 (en) 2002-02-01 2020-02-11 Comcast Cable Communications, Llc Premises management systems
US7103152B2 (en) 2002-02-01 2006-09-05 @Security Broadband Corp. Lifestyle multimedia security system
US7119609B2 (en) 2002-02-01 2006-10-10 @Seurity Broadband Corp. Lifestyle multimedia security system
US8953749B2 (en) 2002-02-01 2015-02-10 Comcast Cable Communications, Llc Lifestyle multimedia security system
US10979389B2 (en) 2004-03-16 2021-04-13 Icontrol Networks, Inc. Premises management configuration and control
US10992784B2 (en) 2004-03-16 2021-04-27 Control Networks, Inc. Communication protocols over internet protocol (IP) networks
US11277465B2 (en) 2004-03-16 2022-03-15 Icontrol Networks, Inc. Generating risk profile using data of home monitoring and security system
US11310199B2 (en) 2004-03-16 2022-04-19 Icontrol Networks, Inc. Premises management configuration and control
US11343380B2 (en) 2004-03-16 2022-05-24 Icontrol Networks, Inc. Premises system automation
US11811845B2 (en) 2004-03-16 2023-11-07 Icontrol Networks, Inc. Communication protocols over internet protocol (IP) networks
US11201755B2 (en) 2004-03-16 2021-12-14 Icontrol Networks, Inc. Premises system management using status signal
US11184322B2 (en) 2004-03-16 2021-11-23 Icontrol Networks, Inc. Communication protocols in integrated systems
US11810445B2 (en) 2004-03-16 2023-11-07 Icontrol Networks, Inc. Cross-client sensor user interface in an integrated security network
US11182060B2 (en) 2004-03-16 2021-11-23 Icontrol Networks, Inc. Networked touchscreen with integrated interfaces
US11175793B2 (en) 2004-03-16 2021-11-16 Icontrol Networks, Inc. User interface in a premises network
US11159484B2 (en) 2004-03-16 2021-10-26 Icontrol Networks, Inc. Forming a security network including integrated security system components and network devices
US10142166B2 (en) 2004-03-16 2018-11-27 Icontrol Networks, Inc. Takeover of security network
US11153266B2 (en) 2004-03-16 2021-10-19 Icontrol Networks, Inc. Gateway registry methods and systems
US10156831B2 (en) 2004-03-16 2018-12-18 Icontrol Networks, Inc. Automation system with mobile interface
US11782394B2 (en) 2004-03-16 2023-10-10 Icontrol Networks, Inc. Automation system with mobile interface
US11449012B2 (en) 2004-03-16 2022-09-20 Icontrol Networks, Inc. Premises management networking
US11757834B2 (en) 2004-03-16 2023-09-12 Icontrol Networks, Inc. Communication protocols in integrated systems
US11378922B2 (en) 2004-03-16 2022-07-05 Icontrol Networks, Inc. Automation system with mobile interface
US11082395B2 (en) 2004-03-16 2021-08-03 Icontrol Networks, Inc. Premises management configuration and control
US11043112B2 (en) 2004-03-16 2021-06-22 Icontrol Networks, Inc. Integrated security system with parallel processing architecture
US11677577B2 (en) 2004-03-16 2023-06-13 Icontrol Networks, Inc. Premises system management using status signal
US11037433B2 (en) 2004-03-16 2021-06-15 Icontrol Networks, Inc. Management of a security system at a premises
US11656667B2 (en) 2004-03-16 2023-05-23 Icontrol Networks, Inc. Integrated security system with parallel processing architecture
US11626006B2 (en) 2004-03-16 2023-04-11 Icontrol Networks, Inc. Management of a security system at a premises
US11625008B2 (en) 2004-03-16 2023-04-11 Icontrol Networks, Inc. Premises management networking
US11893874B2 (en) 2004-03-16 2024-02-06 Icontrol Networks, Inc. Networked touchscreen with integrated interfaces
US11601397B2 (en) 2004-03-16 2023-03-07 Icontrol Networks, Inc. Premises management configuration and control
US11244545B2 (en) 2004-03-16 2022-02-08 Icontrol Networks, Inc. Cross-client sensor user interface in an integrated security network
US10890881B2 (en) 2004-03-16 2021-01-12 Icontrol Networks, Inc. Premises management networking
US11916870B2 (en) 2004-03-16 2024-02-27 Icontrol Networks, Inc. Gateway registry methods and systems
US10447491B2 (en) 2004-03-16 2019-10-15 Icontrol Networks, Inc. Premises system management using status signal
US11588787B2 (en) 2004-03-16 2023-02-21 Icontrol Networks, Inc. Premises management configuration and control
US11410531B2 (en) 2004-03-16 2022-08-09 Icontrol Networks, Inc. Automation system user interface with three-dimensional display
US10796557B2 (en) 2004-03-16 2020-10-06 Icontrol Networks, Inc. Automation system user interface with three-dimensional display
US11489812B2 (en) 2004-03-16 2022-11-01 Icontrol Networks, Inc. Forming a security network including integrated security system components and network devices
US10754304B2 (en) 2004-03-16 2020-08-25 Icontrol Networks, Inc. Automation system with mobile interface
US10735249B2 (en) 2004-03-16 2020-08-04 Icontrol Networks, Inc. Management of a security system at a premises
US10691295B2 (en) 2004-03-16 2020-06-23 Icontrol Networks, Inc. User interface in a premises network
US11368429B2 (en) 2004-03-16 2022-06-21 Icontrol Networks, Inc. Premises management configuration and control
US11537186B2 (en) 2004-03-16 2022-12-27 Icontrol Networks, Inc. Integrated security system with parallel processing architecture
US10692356B2 (en) 2004-03-16 2020-06-23 Icontrol Networks, Inc. Control system user interface
WO2005119613A1 (en) * 2004-05-31 2005-12-15 Jason Andrew Roper Computer network security
US11496568B2 (en) 2005-03-16 2022-11-08 Icontrol Networks, Inc. Security system with networked touchscreen
US10062245B2 (en) 2005-03-16 2018-08-28 Icontrol Networks, Inc. Cross-client sensor user interface in an integrated security network
US10091014B2 (en) 2005-03-16 2018-10-02 Icontrol Networks, Inc. Integrated security network with security alarm signaling system
US10721087B2 (en) 2005-03-16 2020-07-21 Icontrol Networks, Inc. Method for networked touchscreen with integrated interfaces
US11824675B2 (en) 2005-03-16 2023-11-21 Icontrol Networks, Inc. Networked touchscreen with integrated interfaces
US11367340B2 (en) 2005-03-16 2022-06-21 Icontrol Networks, Inc. Premise management systems and methods
US10999254B2 (en) 2005-03-16 2021-05-04 Icontrol Networks, Inc. System for data routing in networks
US11792330B2 (en) 2005-03-16 2023-10-17 Icontrol Networks, Inc. Communication and automation in a premises management system
US11706045B2 (en) 2005-03-16 2023-07-18 Icontrol Networks, Inc. Modular electronic display platform
US11424980B2 (en) 2005-03-16 2022-08-23 Icontrol Networks, Inc. Forming a security network including integrated security system components
US11451409B2 (en) 2005-03-16 2022-09-20 Icontrol Networks, Inc. Security network integrating security system and network devices
US10841381B2 (en) 2005-03-16 2020-11-17 Icontrol Networks, Inc. Security system with networked touchscreen
US11595364B2 (en) 2005-03-16 2023-02-28 Icontrol Networks, Inc. System for data routing in networks
US10930136B2 (en) 2005-03-16 2021-02-23 Icontrol Networks, Inc. Premise management systems and methods
US10380871B2 (en) 2005-03-16 2019-08-13 Icontrol Networks, Inc. Control system user interface
US11615697B2 (en) 2005-03-16 2023-03-28 Icontrol Networks, Inc. Premise management systems and methods
US10156959B2 (en) 2005-03-16 2018-12-18 Icontrol Networks, Inc. Cross-client sensor user interface in an integrated security network
US11113950B2 (en) 2005-03-16 2021-09-07 Icontrol Networks, Inc. Gateway integrated with premises security system
US11700142B2 (en) 2005-03-16 2023-07-11 Icontrol Networks, Inc. Security network integrating security system and network devices
US10127801B2 (en) 2005-03-16 2018-11-13 Icontrol Networks, Inc. Integrated security system with parallel processing architecture
US10785319B2 (en) 2006-06-12 2020-09-22 Icontrol Networks, Inc. IP device discovery systems and methods
US10616244B2 (en) 2006-06-12 2020-04-07 Icontrol Networks, Inc. Activation of gateway device
US11418518B2 (en) 2006-06-12 2022-08-16 Icontrol Networks, Inc. Activation of gateway device
US10225314B2 (en) 2007-01-24 2019-03-05 Icontrol Networks, Inc. Methods and systems for improved system performance
US11412027B2 (en) 2007-01-24 2022-08-09 Icontrol Networks, Inc. Methods and systems for data communication
US11418572B2 (en) 2007-01-24 2022-08-16 Icontrol Networks, Inc. Methods and systems for improved system performance
US11706279B2 (en) 2007-01-24 2023-07-18 Icontrol Networks, Inc. Methods and systems for data communication
US10142392B2 (en) 2007-01-24 2018-11-27 Icontrol Networks, Inc. Methods and systems for improved system performance
US10747216B2 (en) 2007-02-28 2020-08-18 Icontrol Networks, Inc. Method and system for communicating with and controlling an alarm system from a remote server
US10657794B1 (en) 2007-02-28 2020-05-19 Icontrol Networks, Inc. Security, monitoring and automation controller access and use of legacy security control panel information
US11194320B2 (en) 2007-02-28 2021-12-07 Icontrol Networks, Inc. Method and system for managing communication connectivity
US11809174B2 (en) 2007-02-28 2023-11-07 Icontrol Networks, Inc. Method and system for managing communication connectivity
US11132888B2 (en) 2007-04-23 2021-09-28 Icontrol Networks, Inc. Method and system for providing alternate network access
US10140840B2 (en) 2007-04-23 2018-11-27 Icontrol Networks, Inc. Method and system for providing alternate network access
US11663902B2 (en) 2007-04-23 2023-05-30 Icontrol Networks, Inc. Method and system for providing alternate network access
US10672254B2 (en) 2007-04-23 2020-06-02 Icontrol Networks, Inc. Method and system for providing alternate network access
US10423309B2 (en) 2007-06-12 2019-09-24 Icontrol Networks, Inc. Device integration framework
US11601810B2 (en) 2007-06-12 2023-03-07 Icontrol Networks, Inc. Communication protocols in integrated systems
US11237714B2 (en) 2007-06-12 2022-02-01 Control Networks, Inc. Control system user interface
US10237237B2 (en) 2007-06-12 2019-03-19 Icontrol Networks, Inc. Communication protocols in integrated systems
US10339791B2 (en) 2007-06-12 2019-07-02 Icontrol Networks, Inc. Security network integrated with premise security system
US11646907B2 (en) 2007-06-12 2023-05-09 Icontrol Networks, Inc. Communication protocols in integrated systems
US10051078B2 (en) 2007-06-12 2018-08-14 Icontrol Networks, Inc. WiFi-to-serial encapsulation in systems
US11218878B2 (en) 2007-06-12 2022-01-04 Icontrol Networks, Inc. Communication protocols in integrated systems
US11316753B2 (en) 2007-06-12 2022-04-26 Icontrol Networks, Inc. Communication protocols in integrated systems
US11632308B2 (en) 2007-06-12 2023-04-18 Icontrol Networks, Inc. Communication protocols in integrated systems
US11212192B2 (en) 2007-06-12 2021-12-28 Icontrol Networks, Inc. Communication protocols in integrated systems
US11894986B2 (en) 2007-06-12 2024-02-06 Icontrol Networks, Inc. Communication protocols in integrated systems
US11625161B2 (en) 2007-06-12 2023-04-11 Icontrol Networks, Inc. Control system user interface
US10365810B2 (en) 2007-06-12 2019-07-30 Icontrol Networks, Inc. Control system user interface
US11611568B2 (en) 2007-06-12 2023-03-21 Icontrol Networks, Inc. Communication protocols over internet protocol (IP) networks
US10382452B1 (en) 2007-06-12 2019-08-13 Icontrol Networks, Inc. Communication protocols in integrated systems
US11722896B2 (en) 2007-06-12 2023-08-08 Icontrol Networks, Inc. Communication protocols in integrated systems
US10079839B1 (en) 2007-06-12 2018-09-18 Icontrol Networks, Inc. Activation of gateway device
US10142394B2 (en) 2007-06-12 2018-11-27 Icontrol Networks, Inc. Generating risk profile using data of home monitoring and security system
US11089122B2 (en) 2007-06-12 2021-08-10 Icontrol Networks, Inc. Controlling data routing among networks
US10313303B2 (en) 2007-06-12 2019-06-04 Icontrol Networks, Inc. Forming a security network including integrated security system components and network devices
US10200504B2 (en) 2007-06-12 2019-02-05 Icontrol Networks, Inc. Communication protocols over internet protocol (IP) networks
US10389736B2 (en) 2007-06-12 2019-08-20 Icontrol Networks, Inc. Communication protocols in integrated systems
US10666523B2 (en) 2007-06-12 2020-05-26 Icontrol Networks, Inc. Communication protocols in integrated systems
US11423756B2 (en) 2007-06-12 2022-08-23 Icontrol Networks, Inc. Communication protocols in integrated systems
US10616075B2 (en) 2007-06-12 2020-04-07 Icontrol Networks, Inc. Communication protocols in integrated systems
US10444964B2 (en) 2007-06-12 2019-10-15 Icontrol Networks, Inc. Control system user interface
US11582065B2 (en) 2007-06-12 2023-02-14 Icontrol Networks, Inc. Systems and methods for device communication
US10523689B2 (en) 2007-06-12 2019-12-31 Icontrol Networks, Inc. Communication protocols over internet protocol (IP) networks
US10498830B2 (en) 2007-06-12 2019-12-03 Icontrol Networks, Inc. Wi-Fi-to-serial encapsulation in systems
US11815969B2 (en) 2007-08-10 2023-11-14 Icontrol Networks, Inc. Integrated security system with parallel processing architecture
US11831462B2 (en) 2007-08-24 2023-11-28 Icontrol Networks, Inc. Controlling data routing in premises management systems
US11916928B2 (en) 2008-01-24 2024-02-27 Icontrol Networks, Inc. Communication protocols over internet protocol (IP) networks
US11816323B2 (en) 2008-06-25 2023-11-14 Icontrol Networks, Inc. Automation system user interface
US11792036B2 (en) 2008-08-11 2023-10-17 Icontrol Networks, Inc. Mobile premises automation platform
US11711234B2 (en) 2008-08-11 2023-07-25 Icontrol Networks, Inc. Integrated cloud system for premises automation
US11368327B2 (en) 2008-08-11 2022-06-21 Icontrol Networks, Inc. Integrated cloud system for premises automation
US11758026B2 (en) 2008-08-11 2023-09-12 Icontrol Networks, Inc. Virtual device systems and methods
US11616659B2 (en) 2008-08-11 2023-03-28 Icontrol Networks, Inc. Integrated cloud system for premises automation
US11258625B2 (en) 2008-08-11 2022-02-22 Icontrol Networks, Inc. Mobile premises automation platform
US11190578B2 (en) 2008-08-11 2021-11-30 Icontrol Networks, Inc. Integrated cloud system with lightweight gateway for premises automation
US11729255B2 (en) 2008-08-11 2023-08-15 Icontrol Networks, Inc. Integrated cloud system with lightweight gateway for premises automation
US10530839B2 (en) 2008-08-11 2020-01-07 Icontrol Networks, Inc. Integrated cloud system with lightweight gateway for premises automation
US11316958B2 (en) 2008-08-11 2022-04-26 Icontrol Networks, Inc. Virtual device systems and methods
US11641391B2 (en) 2008-08-11 2023-05-02 Icontrol Networks Inc. Integrated cloud system with lightweight gateway for premises automation
US10522026B2 (en) 2008-08-11 2019-12-31 Icontrol Networks, Inc. Automation system user interface with three-dimensional display
US20160274759A1 (en) 2008-08-25 2016-09-22 Paul J. Dawes Security system with networked touchscreen and gateway
US10375253B2 (en) 2008-08-25 2019-08-06 Icontrol Networks, Inc. Security system with networked touchscreen and gateway
US10813034B2 (en) 2009-04-30 2020-10-20 Icontrol Networks, Inc. Method, system and apparatus for management of applications for an SMA controller
US10332363B2 (en) 2009-04-30 2019-06-25 Icontrol Networks, Inc. Controller and interface for home security, monitoring and automation having customizable audio alerts for SMA events
US10275999B2 (en) 2009-04-30 2019-04-30 Icontrol Networks, Inc. Server-based notification of alarm event subsequent to communication failure with armed security system
US10237806B2 (en) 2009-04-30 2019-03-19 Icontrol Networks, Inc. Activation of a home automation controller
US11665617B2 (en) 2009-04-30 2023-05-30 Icontrol Networks, Inc. Server-based notification of alarm event subsequent to communication failure with armed security system
US11223998B2 (en) 2009-04-30 2022-01-11 Icontrol Networks, Inc. Security, monitoring and automation controller access and use of legacy security control panel information
US11601865B2 (en) 2009-04-30 2023-03-07 Icontrol Networks, Inc. Server-based notification of alarm event subsequent to communication failure with armed security system
US11553399B2 (en) 2009-04-30 2023-01-10 Icontrol Networks, Inc. Custom content for premises management
US11284331B2 (en) 2009-04-30 2022-03-22 Icontrol Networks, Inc. Server-based notification of alarm event subsequent to communication failure with armed security system
US10674428B2 (en) 2009-04-30 2020-06-02 Icontrol Networks, Inc. Hardware configurable security, monitoring and automation controller having modular communication protocol interfaces
US11856502B2 (en) 2009-04-30 2023-12-26 Icontrol Networks, Inc. Method, system and apparatus for automated inventory reporting of security, monitoring and automation hardware and software at customer premises
US11778534B2 (en) 2009-04-30 2023-10-03 Icontrol Networks, Inc. Hardware configurable security, monitoring and automation controller having modular communication protocol interfaces
US11356926B2 (en) 2009-04-30 2022-06-07 Icontrol Networks, Inc. Hardware configurable security, monitoring and automation controller having modular communication protocol interfaces
US11129084B2 (en) 2009-04-30 2021-09-21 Icontrol Networks, Inc. Notification of event subsequent to communication failure with security system
US10127802B2 (en) 2010-09-28 2018-11-13 Icontrol Networks, Inc. Integrated security system with parallel processing architecture
US11398147B2 (en) 2010-09-28 2022-07-26 Icontrol Networks, Inc. Method, system and apparatus for automated reporting of account and sensor zone information to a central station
US11900790B2 (en) 2010-09-28 2024-02-13 Icontrol Networks, Inc. Method, system and apparatus for automated reporting of account and sensor zone information to a central station
US10062273B2 (en) 2010-09-28 2018-08-28 Icontrol Networks, Inc. Integrated security system with parallel processing architecture
US10223903B2 (en) 2010-09-28 2019-03-05 Icontrol Networks, Inc. Integrated security system with parallel processing architecture
US11750414B2 (en) 2010-12-16 2023-09-05 Icontrol Networks, Inc. Bidirectional security sensor communication for a premises security system
US11341840B2 (en) 2010-12-17 2022-05-24 Icontrol Networks, Inc. Method and system for processing security event data
US10078958B2 (en) 2010-12-17 2018-09-18 Icontrol Networks, Inc. Method and system for logging security event data
US10741057B2 (en) 2010-12-17 2020-08-11 Icontrol Networks, Inc. Method and system for processing security event data
US11240059B2 (en) 2010-12-20 2022-02-01 Icontrol Networks, Inc. Defining and implementing sensor triggered response rules
US11296950B2 (en) 2013-06-27 2022-04-05 Icontrol Networks, Inc. Control system user interface
US10348575B2 (en) 2013-06-27 2019-07-09 Icontrol Networks, Inc. Control system user interface
US11146637B2 (en) 2014-03-03 2021-10-12 Icontrol Networks, Inc. Media content management
US11405463B2 (en) 2014-03-03 2022-08-02 Icontrol Networks, Inc. Media content management
US11943301B2 (en) 2014-03-03 2024-03-26 Icontrol Networks, Inc. Media content management

Also Published As

Publication number Publication date
GB9624981D0 (en) 1997-01-15

Similar Documents

Publication Publication Date Title
WO1998025243A1 (en) Improvements relating to security systems
US7444208B2 (en) Electrical system wiring diagram generating system, and power supply device and program used for the same
US8310365B2 (en) Control system, security system, and method of monitoring a location
US4887291A (en) System for annunciating emergencies
US9472078B2 (en) Method and apparatus for integration of electrical fire sensor with fire panel
EP3343314B1 (en) Handling power failures in a mains powered gateway
JP2002319082A (en) Controller for data center
JP2001160190A (en) Monitor terminal, communication module, and home control system
CN114466169A (en) Monitoring system of fire door magnet and camera
EP0084685B1 (en) Alarm control center
SE504715C2 (en) Monitoring system for registration of theft-demanding equipment via the electricity grid
US10139891B2 (en) Systems and methods of power-safe control panel installation
TWI505238B (en) Security system for selecting input-type
WO2022193876A1 (en) Communication device and remote monitoring system
TW202405766A (en) Smart disaster prevention system
JP2847216B2 (en) Fire alarm system with trouble transmission stop function
JP3608387B2 (en) Security intercom device and alarm monitoring system provided with the same
CN110018725B (en) Method and system for remotely resetting baseboard management controller of computer system
JP2001243573A (en) Security system
JPS635496A (en) Housing complex managing system
JPH09245279A (en) Access control system
JP6652790B2 (en) Fire receiver
CN115497246A (en) Intelligent disaster prevention system
JPH02123500A (en) Apartment house information device
JP2000339555A (en) Burglar preventing tag equipment

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A1

Designated state(s): CN JP RU US

AL Designated countries for regional patents

Kind code of ref document: A1

Designated state(s): AT BE CH DE DK ES FI FR GB GR IE IT LU MC NL PT SE

DFPE Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed before 20040101)
121 Ep: the epo has been informed by wipo that ep was designated in this application
122 Ep: pct application non-entry in european phase