`Busak et al.
`
`lllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllll
`US005461372A
`1111 Patent Number:
`5,461,372
`[45] Date of Patent:
`Oct. 24, 1995
`
`[54] SYSTEM AND METHOD FOR MODIFYING
`SECURITY IN A SECURITY SYSTEM
`
`4,287,939
`4,639;610
`4,755,792
`
`9/1981 Pohl et a1. ....................... .. 340/82522
`8/1987 Dietrich ................ .. 340/515
`7/1988 PeZZolo et al. .
`340/531
`
`[75] Inventors: Steven J. Busak, Laguna Niguel; Allen
`
`4,772,876
`
`9/1988 Laud . . . . . . . . . . . . . . .
`
`. . . . . . .. 340/531
`
`F. V. Buskirk, Fountain Valley; Mark
`R. Walther, Laguna Hills, all of Calif
`
`4,808,995
`4,931,769
`
`2/1989 Clark et a1. . . . . .
`. . . _ . .. IMO/825.32
`9/1990 Phillips et a1. ........................ .. 340/541
`
`[73] Assignee: Honeywell Inc., Minneapolis, Minn.
`
`FQREIGN PATENT DOCUMENTS
`
`NO‘:
`
`2150333
`
`United Kingdom .
`
`[22] Filed:
`
`Jan. 19, 1993
`
`1111. C1.6 ................................................... .. G09B 13/00
`[51]
`[52] US. Cl. .............................. .. 340/825.31; 340/825.32;
`379/95; 379/103
`[58] Field of Search ....................... .. 340/825.31, 825.32,
`340/825.22, 825.37, 541, 531, 825.36, 506,
`533, 538, 532, 542; 379/95, 103, 37, 39,
`42
`
`[56]
`
`References Cited
`
`11s. PATENT DOCUMENTS
`
`Primary Examiner-—Michael Horabik
`Niamey, Agent, 0, Fi,m_RObm B_ Leonard
`
`[57]
`
`ABSTRACT
`.
`.
`.
`.
`.
`A system and method for modifying security levels withm a
`security system. External modi?cations are allowed only if
`the security of a point is increased.
`
`3,925,763 12/1975 Wadhwani et a1. .............. .. 340/825.36
`
`7 Claims, 10 Drawing Sheets
`
`12
`
`10
`1s // 34
`/
`\44
`L'GHHNG
`
`ggg
`
`92
`
`PCs-{+14
`I PRlNTER I -----------
`16
`\——--——I
`1
`K38
`’
`/35 5
`38
`14
`""""""""" " PRINCIPAL
`PROGRAMMER /
`CONTROL /
`SYSTEM
`/ SYSTEM
`38
`38
`(SECURITY) w
`
`35
`
`PERSONAL 14
`COMPUTER ’
`/TOUCH
`MM1
`
`8
`f3
`
`?
`
`22
`1:1 .0
`f
`THERMOSTAT /14 fggFéUzTglg MW’
`1____..__.
`24
`
`e
`"
`I-*-.3::.*1
`
`14
`
`28
`
`s
`
`T
`
`f 14
`:1
`11 [1511751111111
`MM1
`[___2_Z_| 1
`CONTROL :
`\
`[VIDEO |
`L
`SYSTEM
`LSYSTEMI --- "" 40
`——-—>1\32
`2e
`
`‘5/84
`
`6-34
`
`84-
`
`84
`
`84
`
`ALARM
`
`84 POINTS AND
`OUTPUTS
`
`Page 1 of 17
`
`PETITIONERS' EXHIBIT 1005
`
`
`
`US. Patent
`
`Oct. 24, 1995
`
`Sheet 1 of 10
`
`5,461,372
`
`
`
`|I.I02:10:égozaa....................I3mmm:mmm
`
`.3”\\2.NFm..............”Imaging
`OP.v—Von
`
`Lilli
`
`mm.nl'mm556555
`
`nunmmJoEzoo:muzzéoomn.
`
`
`
`EAEmzommvmm
`
`mm8#11114
`
`fi_llnal..|alu.__\i_.258_-w-a:$9....ng250%.:_mo<So>26.._WIn-“3:11:EIIIIIL.1Wflan“UH.
`
`
`o¢1..-:-1-265%:E_55$_".855."muuuuuwfii
`
`\:u.lllilLNN:WWm
`
`m...
`
`izommmu
`
`$5;on
`
`£50K
`
`.22
`
`32.2
`
`oz<22.8¢m—¢m—E—3w—3w—5—N©\h\
`.
`€250.
`
`
`
`Page 2 of 17
`
`PETITIONERS' EXHIBIT 1005
`
`Page 2 of 17
`
`PETITIONERS' EXHIBIT 1005
`
`
`
`
`US. Patent
`
`Oct. 24, 1995
`
`Sheet 2 of 10
`
`5,461,372
`
`
`
`.®\920{LN.h\omozmzmmaim:
`
`_u.l|.|_
`
`NN
`
`N
`
`250235Eu“FlllllllllllIIIIIIIIIIIIIII
`
`
`_0mmmméomé_muzzéoommJ//Ex09::Ion_0.850nn_mm
`Imm“__m2:d:I3<m8m_moEmEz
`lllllllL9.9\....em
`_llllllllllllllllllllllllllllllll________I330
`
`
` _Iommmoomn.02:10:_I22__4m:__359Eu_____mnf
`8a8HmmH8_
`
`Eon.“E
`
`
`
`$.58:mo_o>
`
`Page 3 of 17
`
`PETITIONERS' EXHIBIT 1005
`
`Page 3 of 17
`
`PETITIONERS' EXHIBIT 1005
`
`
`
`
`US. Patent
`
`Oct. 24, 1995
`
`Sheet 3 of 10
`
`5,461,372
`
`~58}szmic
`33$Eon.zmoozmoonoswmm“.Bodmzmo:_.
`
`
`mEomSE20_I
`
`
`momma.Eon.onWowx030_“<55-_ammo.“
`2.1.351.092.
`
`IIIIIIIII_IiIN._.Z_
`
` NoummEmmmEx_I82.1mm!_x0040I49:28owonwwma5&8
`
`
`Home:
`
`
`95>.9F:1:2.Eon.“SmomIrlifluwfiu:14iozéxm
`
`.Imom..Eno.9...onP._<Emo.
`mosmzzood__Eon
`..mézgm__ So8.9m4:_”maxi__
`
`IIIIII1!.
`
`
`
`_n-u—In5:_mgwfifimm
`595mm”.__I_m0\oz<
`“1IE;¢mH482.mm
`-uwmoimelmnwwmIIJ
`
`__1:2.
`
`_
`
`xz<mom
`
`
`
`1lllllllllIIIiiIllllllll|||lllIllrllllillllllHUVIlllllllll;
`
`Egon
`
`
`
`Page 4 of 17
`
`PETITIONERS' EXHIBIT 1005
`
`Page 4 of 17
`
`PETITIONERS' EXHIBIT 1005
`
`
`
`
`5W14a2
`
`4mhS
`
`m0m.
`
`2739164a5
`
`3U
`
`_
`
`mem
`
`Pmm
`
`O
`
`aCod—H
`
`MZOIQ
`
`_
`
`
`
`_szzmoz<xzm$55.:_moo::52.Eda3.8511
`
`
`
`n..mama---“QMDEHE825
`
`_9mm»:"mmflI582JoEzoo582mnv50:2:o>EmmmconAonEn25_.35:83uII"ta.38n2EBI902“;
`
`_Hemm2:m._m<zm_"<36528L_mzoza
`
`_.._..__zmm2:.._\_.EnI-mmzmmx8:
`‘GEE““Ezm.230:25 ".203..:_zmm2:mmzmmxoo:"-.Smfio02.xumEEmmzoza_Sumo”GEES"mwmm
`
`
`x00:8m-m2:022m8:353SE28
`
`
`
`
`
`
`
`H30mo_o>
`
`Page 5 of 17
`
`PETITIONERS' EXHIBIT 1005
`
`Page 5 of 17
`
`PETITIONERS' EXHIBIT 1005
`
`
`
`
`US. Patent
`
`Oct. 24, 1995
`
`Sheet 5 of 10
`
`5,461,372
`
`
`
`zQZziEomE wzoiwmmo
`
`8m <8
`
`
`
`SE28 mzoigznzzoo
`
`0% mom
`
`Q .mm
`
`Page 6 of 17
`
`PETITIONERS' EXHIBIT 1005
`
`
`
`US. Patent
`
`0a. 24, 1995
`
`Sheet 6 0f 10
`
`5,461,372
`
`no ml
`
`
`
`1|. v2: | 8 125m S
`
`49:28
`
`Uzi
`
`m .mt
`
`
`
`mowwmooma mowmwooma
`
`Z22 mam 52
`
`mm
`
`mm
`
`n_wI
`
`momwmooma
`
`Page 7 of 17
`
`PETITIONERS' EXHIBIT 1005
`
`
`
`US. Patent
`
`Oct. 24, 1995
`
`Sheet 7 of 10
`
`5,461,372
`
`@ .3
`
`\ \ 82
`
`on E
`
`_ ?n?
`
`
`
`mmow one? y
`
`JKG/ [6+9 meme MEET/D
`
`
`
`@\ SN?
`
`P HT 5: 22d
`82 \A
`
`
`
`85.3% HQ $8? 857%
`
`<on2/\
`@876 $28
`537% <E2VA 89
`
`
`
`. f
`
`TIQ .Il fomnE
`
`:32
`
`<39 W mONEW QEOTVA
`
`22 £2
`33, /\Q. 8: WO/\ 6::
`
`
`mu Of O\/mw2
`a _ _ oogrg
`
`S2 082
`
`Page 8 of 17
`
`PETITIONERS' EXHIBIT 1005
`
`
`
`US. Patent
`
`Oct. 24, 1995
`
`Sheet 8 of 10
`
`5,461,372
`
`
`
`m0:y>
`
`>m02u2
`
`FDQHDOm20>
`
`mam<h<o
`
`
`
`mommmoomm
`
`
`
`Ioummmomwmmoo<
`
`m2<oz<
`
`ESE
`
`
`..B”.a.82515mme
`I.”Lmam<P<o
`
`
`momzmwgimp
`
`InEEm2”:o8<z<
`
`“658m
`
`-E355.EB
`HQDKmMHz_m05>
`EDEEZo\<0”me
`
`
`
`mm4m<zmhmzmmwpz_
`
`:z_
`
`KOHOmzzoo
`
`2mpm>m
`
`Doom
`
`mthoz
`
`om<om
`
`Page 9 of 17
`
`PETITIONERS' EXHIBIT 1005
`
`Page 9 of 17
`
`PETITIONERS' EXHIBIT 1005
`
`
`
`
`
`
`
`
`
`
`US. Patent
`
`Oct. 24, 1995
`
`Sheet 9 of 10
`
`5,461,1572
`
`
`
`
`
`
`
`Fig.7
`
`
`
`
`
`
`
`
`
`BLANK=NOEFFECTOVERPREVIOUSSTATUS
`
`Page 10 of 17
`
`PETITIONERS' EXHIBIT 1005
`
`
`
`RETURNOPEN
`
`PLAY
`
`
`
`
`
`
`
`m
`2
`<
`z
`
`mt
`
`o
`DZ
`‘3
`
`IIIIIIIIIIIIIIIIIIIII
`WORKSLEEP
`
`
`IIIIIIIIIIIIIIIIIIII
`
`IIIIIIIIIIIIIIIIIIIIII
`POOL PARTY
`
`IIIIIIIIIIIIIIIIIIIIII
`LEAVEWAKE
`
`IIIIIIIIIIIIIIIIIIIIII
`IIIIIIIIIIIIIIIIIIII
`PGNT N0
`
`
`
`
`F n+mwhw.
`F HHHHPH
`I IIIIIII I
`9 999999
`4 444444
`
`I
`
`NM
`HP
`_ <<
`559
`m
`Q
`OOO_l
`I
`52}— Lu
`O
`““93 2
`E
`-%%0
`E
`3
`I—I—
`8%
`<mo ggtzg
`oommor
`oooooo--mmmm<m00“
`Eggggg-ogggg II
`II
`n n;
`
`
`
`
`
`
`
`
`Page 10 of 17
`
`PETITIONERS' EXHIBIT 1005
`
`
`
`U.S. Patent
`
`0a. 24, 1995
`
`Sheet 10 of 10
`
`5,461,372
`
`1210
`
`1220
`
`REDUCTION N0
`IN SECURIT
`II
`'-’
`
`ORIGINATED
`INTERNALLY
`I;
`
`Fl’ 8
`9.
`
`LIGHTING
`SYSTEM CHANGES YES
`REQUIRED
`'?
`
`1225
`I, (
`MAKE
`REQU'RED
`CHANGES
`
`NO
`
`THERMOSTAT
`CH ANGES
`REQU'RED
`?
`
`NO
`
`I
`
`40
`
`1235
`" /
`MAKE
`REQUIRED
`CHANGES
`I
`
`SECURITY
`CHANGES
`EQUIRED
`?
`NO
`
`1245
`I /
`MAKE
`REQUIRED
`CHANGES
`__—_l
`
`Page 11 of 17
`
`PETITIONERS' EXHIBIT 1005
`
`
`
`5,461,372
`
`1
`SYSTEM AND METHOD FOR MODIFYING
`SECURITY IN A SECURITY SYSTEM
`
`BACKGROUND OF THE INVENTION
`
`5
`
`2
`in favor of continuing application Ser. No. 08/216,783),
`entitled A SYSTEM AND METHOD FOR AUTOMATI
`CALLY CONTROLLING A SPACE, by Stanley-Arslanok
`et al. which is commonly owned by the assignee of the
`present application.
`In addition, recent improvements in telecommunications
`technology allows the building owner to use a telephone,
`either from inside or outside the protected building, to
`modify the status of the alarm system. This may cause the
`building owner some concern with the proliferation of
`hackers who attemp to break into computer systems to
`modify the programming of those systems. If a hacker were
`to break into the alarm system via the telecornrnunictions
`network, security of the protected building could be com
`prised.
`
`SUMMARY OF THE INVENTION
`
`The present invention is a security system which prevents
`a lowering of the security level of the alarm system from a
`phone not located within the protected building. The security
`system can be operated via a plurality of input devices,
`including a security panel, or panels located in one or more
`locations within the home, telephones located within the
`home via a voice module, and remotely from a telephone or
`similar telecommunications device also via the voice mod
`ule. However, the security system may only increase the
`level of security through the use of an external phone. The
`security system may be connected to other control systems
`such as HVAC or lighting control systems.
`The security system includes a processor having memory,
`one or more sensors connected to the processor, and tele
`communications interface connected to the alarm processor.
`The processor includes a discrimination means for deter
`mining where a phone is located which is initiating control
`actions for the security system. If the phone is determined to
`be outside the protected space, any control actions initiated
`through the phone which cause a decrease in security are
`ignored. Control actions of other control systems connected
`to the security system which are initiated through the
`external phone are allowed to occur.
`The discrimination means may be implemented by a
`routine performed by the processor. A ?ag may be set in
`memory which either allows or prohibits an operator from
`lowering the security level of a point when operating the
`system from outside the protected area.
`Other objects, features and advantages of the invention
`may be apparent to one of ordinary skill in the art, upon
`examination of the drawings and detailed description of the
`preferred embodiment.
`
`BRIEF DESCRIPTION OF THE DRAWINGS
`
`55
`
`65
`
`FIG. 1 is a block diagram of an embodiment of a system
`for automating the control of a space, featuring a security
`system as a principal control system, a plurality of control
`systems, and the interconnections between the security sys
`tem and the plurality of control systems.
`FIG. 2 is a block diagram of the security system of FIG.
`1, illustrating the general location and interrelation of certain
`principal elements.
`FIG. 3a is a more detailed functional block diagram of the
`security system of FIG. 2.
`FIG. 3b is a continuation of the functional block diagram
`of FIG. 3a.
`FIG. 4 is a front view of the home security panel.
`
`15
`
`25
`
`35
`
`40
`
`45
`
`1. Field of the Invention
`The present invention includes a system for automatically
`controlling a space by integrating the control and function of
`a plurality of control systems and devices utilized within the
`space, by using a principal control system, such as a security
`system. These control systems and devices can include an
`environmental control system, a telecommunications sys
`tem, a lighting control system, and other electrical control
`systems including those which control individual electrical
`or electronic devices such as appliances, audio devices and
`video devices.
`The invention can be accessed by a user from within the
`space to be controlled, or remotely through the use of a
`telecommunications interface. The control systems may be
`separately operable, although not automated, when used
`without being connected to the principal control system, or
`when the principal control system has failed.
`2. Description of Related Art
`Small building security systems for sensing and reporting
`intrusions into a building are well known in the art. Typi
`cally, a plurality of sensors, such as motion sensors, door
`sensors, window sensors and other sensors are connected to
`a processor to provide the processor with an alarm indica
`tion, such as movement or the opening of a door or window.
`The processor is preprograrnmed to initiate certain actions
`upon the receipt of an alarm indication, such as sounding an
`internal alarm signal or dialing a remote alarm monitoring
`station through a telecommunications interface. For the
`small building market (house, small retail store, restaurant)
`these systems have been relatively simple.
`Improvements in alarm systems include the ability to
`de?ne in the processor, certain security levels which will
`cause the processor to handle alarm indications from a
`sensor in a predetermined way. For example, three levels of
`conditions for the handling of an alarm indication may be
`de?ned: l) armed; 2) on watch; and 3) off. A sensor whose
`alarm indication is to be handled as armed, may cause the
`processor to initiate a call to the remote alarm monitoring
`station and to create a local alarm signal when an alarm
`indication occurs at the armed sensor. A sensor whose alarm
`indication is to be handled as on watch, may cause the
`processor to initiate a local alarm only when an alarm
`indication is received from that sensor. Lastly, a sensor
`whose alarm indication is to be handled as off may cause the
`processor to ignore any alarm indication received from that
`sensor. Typically, the highest level of security is armed, next
`is on watch, and the lowest is off.
`Typically, each sensor may be associated with any of the
`above identi?ed levels. This is typically done through an
`operator interface which is connected to the processor. The
`processor may be programmed to identify each sensor with
`a level individually, or “modes” of operation may be de?ned
`where all sensors connected to the security system are set to
`one of the prede?ned levels upon the selection of a prepro
`grammed mode.
`As building control systems for small buildings have
`continued to evolve, integration of alarm systems with other
`building control systems, such as the HVAC and lighting
`systems has occurred. For description of a complete system,
`see US. patent application Ser. No. 07/811,508 (abandoned
`
`Page 12 of 17
`
`PETITIONERS' EXHIBIT 1005
`
`
`
`3
`FIG. 5 is a block diagram of a home security panel
`showing its interconnection to the control panel.
`FIG. 6 is a ?oor plan of a sample house using the
`inventive system.
`FIG. 6a is a block diagram of a voice access system of the
`present invention.
`FIG. 7 is a matrix of modes, statuses and points within the
`house of FIG. 7.
`FIG. 8 is a ?ow chart of the method of operation of the
`inventive system.
`FIG. 9 is a block diagram of the processor 50.
`
`DETAILED DESCRIPTION OF THE
`PREFERRED EMBODIMENT
`
`Referring now to FIG. 1, an automation system 10 for
`automatically controlling a space is illustrated. In a preferred
`embodiment of the invention as described herein, automa
`tion system 10 would be particularly suitable for automati
`cally controlling a building, such as a small commercial
`building, a home, or a similar building. Automation system
`10 comprises a principal control system 12 connected to a
`plurality of control systems 14. In a preferred embodiment
`of the invention, principal control system 12 is security
`system 16 electrically connected to plurality of control
`systems 14, including lighting system 18 and thermostat 22.
`Other control systems 14 could be electrically connected to
`security system 16, including personal computer system 24,
`low voltage control system 26, entertainment system 28,
`printer system 30, and video system 32, as well as any
`number of other systems which might be located in or near
`the building, and including systems whichv could be remote
`from the building and interconnected via telecommunica
`tions device 34 or otherwise. In a preferred embodiment of
`the invention, a control system 14 which could be remote
`from security system 16, could include programming system
`35. The following describes security system 16, plurality of
`control devices 14 and their interconnection.
`Referring now to FIG. 2, security system 16 includes
`several principal elements including control panel 36, inter
`connections 38, one or more home security panels (HSP) 40,
`and plurality of control points 84.
`Referring now to FIG. 3a, control panel 36 comprises
`processor means 44 and memory means 46 which are
`interconnected by address line 48 and data line 49. In a
`preferred embodiment, processor means 44 comprises a
`plurality of separate processors including main processor 50,
`data bus processor 52 and control point processor 54,
`however, processor means could also be implemented in a
`single device. In a preferred embodiment, the three proces
`sors are all 8-bit microprocessors or microcontrollers, and
`are all interconnected via address line 48 and data line 49.
`Main processor 50 is the principal data processing device
`for automation system 10 (not illustrated). It is capable of
`providing a plurality of output signals 38, for transmission
`to the plurality of control systems 14, in response to the
`receipt of a plurality of input signals 60 (not shown). Input
`signals 60 can be provided from systems and devices
`comprising control systems 14, HSP 40 and other systems
`and devices capable of providing input signals 60. Main
`processor 50 is capable of transmitting to, and receiving
`signals from, other processors, such as data bus processor 52
`and control point processor 54, and other devices.
`Referring now to FIGS. 2 and 3a, data bus processor 52
`controls the communication of information between main
`
`4
`processor 50 of security system 16 and control systems 14,
`such as thermostat system 22, as well as other devices which
`are connected to data bus 62, such as HSP 40. The exchange
`of information between data bus processor 52, control
`systems 14, and devices such as HSP 40, is accomplished
`through the use of an encoded (4B-8B) data stream utilizing
`a code, and a method‘of receiving and transmitting the code
`described in the co-pending application, “A DC Balanced
`4B/8B Binary Block Code for Digital Communications”,
`?led as U.S. application Ser. No. 07/811,508, now aban
`doned in favor of continuing application 08/216,783, by D.
`Myers, which is hereby incorporated by reference.
`Control point processor 54 is capable of receiving a
`plurality of inputs from control points 84, and transmitting
`the input information to main processor 50 via address line
`48 and data line 49.
`As described herein, in addition to processor means 44,
`control panel 36 also comprises memory means 46. In a
`preferred embodiment, memory means 46 comprises a com
`bination including Electrically Programmable Read Only
`Memory (EPROM) 64, Random Access Memory (RAM) 66
`and Electrically Erasable Read Only Memory (EEPROM)
`68. Particularly, memory means 46 is capable of storing a
`preprograrnmed set of instructions 70 relating to a set of
`control conditions or modes desired within the building, and
`providing these instructions to main processor 50 via
`address line 48 and data line 49 in response to a request
`made by an operator.
`Referring now to FIGS. 2 and 3a, having described the
`elements of control panel 36, automation system 10 also
`comprises plurality of interconnections 38 to provide for the
`connection of principal control system 12 and plurality of
`control systems 14. In a preferred embodiment, this arrange
`ment comprises security system 16 interconnected with
`control systems 14, such as lighting system 18, voice access
`system 20 and thermostat 22, via lighting interconnection
`74, voice access interconnection 76 and Hbus interconnec
`tion 78, respectively. In a preferred embodiment, these
`interconnections are all accomplished via digital data inter
`faces.
`Referring now to FIG. 3a, lighting interconnection 74 is
`accomplished via a direct RS232 serial interface to main
`processor 50. Voice access interconnection 76 to main
`processor 50 is accomplished via address line 48 and data
`line 49, and thermostat interconnection is accomplished via
`a data bus using an RS485 serial interface to data bus
`processor 52, which is in turn connected via a serial interface
`to main processor 50.
`Referring now to FIG. 4, security system 16 also com
`prises an HSP 40, which is now further described. HSP 40
`is a man-machine interface (MMI). In a preferred embodi
`ment, the MMI comprises a touch key-pad 80 and a display
`' 82, such as a liquid crystal display. Display 82 is capable of
`identifying for an operator the available choices with respect
`to control of the security system 16, as well as displaying
`certain indications of system status, such as time, date,
`temperature, and current mode 82. In one embodiment,
`touch key-pad 80 has, on the key-pad, a combination of
`numeric keys, arrow symbol keys and word keys to facilitate
`operator selections, as discussed further herein, and as
`shown in FIG. 4.
`Referring now to FIG. 2, security system 16 also com
`prises control points 84. Control points 84 include two types
`of security points, RF points 86 and hardwire points 88.
`These control points are of a type well known in the art, such
`as those utilized in any one of the System 6000 series
`
`5,461,372
`
`15
`
`25
`
`40
`
`45
`
`50
`
`60
`
`65
`
`Page 13 of 17
`
`PETITIONERS' EXHIBIT 1005
`
`
`
`5,461,372
`
`5
`security systems manufactured and sold by Honeywell Inc.,
`such as model 6400, and are interconnected to control panel
`36 through control point processor 54, using interconnection
`methods and materials known to those of ordinary skill in
`the art. The exact number of RF points 86 and hardwire
`points 88 is a function of the capabilities of control point
`processor 54. Various adapters are known to those of ordi
`nary skill in the art which can be utilized to expand the
`number of control points 84 which can be attached to control
`point processor 54. Control point processor 54 is capable of
`monitoring and exercising control over individual control
`points 84, and providing infonnation about any individual
`control point 84 to main processor 50. Therefore, this
`information is available to security system 16, and particu
`larly so that modes can de?ne desired states of control, such
`as armed, disarmed and on-watch, as further described
`herein, for either individual control points, or groups of
`control points, depending on the requirements of the par
`ticular mode.
`Automation system 10 comprises principal control system
`12 and a plurality of control systems 14. In a preferred
`embodiment, automation system 10 comprises security sys
`tem 16, the elements of which are described herein, and
`control systems 14, including lighting system 18, voice
`access system 20, thermostat system 22, and programmer
`system 35, and may also include individual devices such as
`telecommunication device 34, which are further discussed
`below.
`Lighting system 18 is a commercially available system
`sold by X-lO Powerhouse, as Model No. CP290, and is of
`a type known to those of ordinary skill in the art. Lighting
`system 18 uses powerline carrier based signal to automati
`cally switch power on or off to control modules, which can
`be used in conjunction with lights and other electrical
`appliances and devices. Its use is not limited to lighting
`devices only. For instance, lighting system 18 could be used
`to control appliances such as a coffee maker, electric heater,
`or other devices which can be operated by on/o?C switching
`of AC power. Lighting system 18 is connected to security
`system 16, using lighting interconnection 74, and is capable
`of receiving a control signal from security system 16. In a
`preferred embodiment, lighting system 18 is capable of
`operation independently of security system 16, in the event
`that security system 16 ceases to provide control signals as
`described above.
`Voice access system 20 is shown and described in FIGS.
`6a and 3b. Voice access system 20 incorporates speech
`synthesizer 90. Speech synthesizer 90 is combined with
`components known to those of ordinary skill in the art, as
`described in FIG. 6a, to produce a system which allows an
`operator to operate security system 16 remotely through the
`use of telecommunications device 34, such as a touch tone
`telephone 34. Voice access system 20 allows an operator to
`operate a security system 16 remotely, by selecting the same
`modes that are available to the operator through HSP 40.
`Touch tone telephone 34 can be a telephone located in the
`space to be controlled, such as one or more of touch tone
`telephones located in a building, or, touch tone telephone 34
`may be remote from the space which is to be controlled, such
`as a cellular telephone or telephone located in another
`building. Voice access module 20 also allows an operator to
`receive certain information from various control systems 14
`which are adapted to communicate information concerning
`their status. Voice access system 20 also may also incorpo
`rate security features which require that an operator enter
`certain passcodes before being able to effect changes to
`security system 16. In particular, passcode entry may be
`
`10
`
`20
`
`25
`
`30
`
`35
`
`45
`
`50
`
`55
`
`60
`
`65
`
`6
`required whenever the level of security is to be reduced.
`Note that FIG. 8 shows another security measure for pre
`venting some decreases in security. Voice access system 20
`also incorporates a voice-based menu scheme wherein voice
`access system 20 describes to an operator the various
`selections which are available, and provides the operator
`directions as to how to make a particular selection of choice.
`In a preferred embodiment, control may be exercised
`through voice access system 20 over various elements of an
`automation system 10, such as security system 16, lighting
`system 18, and thermostat system 22. Voice access system
`20 is connected to security system 16 as described herein,
`via voice access interconnection 76.
`Thermostat system 22 comprises a thermostat of the type
`described in U.S. Pat. No. 4,606,401 to Levine, et al., and
`U.S. Pat. No. 4,469,274 to Levine, et al., which are hereby
`incorporated by reference. Thermostat system 22 comprises
`a communicating thermostat, such as is described in the
`following copending applications: “Communicating Ther
`mostat”, Ratz, et al., U.S. Pat. No. 5,197,668; and “Com
`municating Thermostat”, Ratz, et al., U.S. Pat. No. 5,203,
`497 and “Electronic Time Thermostat with a Temporary
`Next Period Adjustment Means”, U.S. Pat. No. 5,230,482,
`all of which are commonly owned by the owner of the
`present application. Thermostat system 22 is capable of
`receiving control signals from security system 16, such that
`the features which are available to an operator from ther
`mostat system 22, such as the availability to de?ne certain
`set-back and set-up times and temperatures, from security
`system 16. Thermostat system 22 is also capable of being
`interrupted by security system 16 to de?ne a NOW and
`NEXT time and temperature, such that the control of secu
`rity system 16 may allow an operator to, upon invocation of
`certain modes, de?ne a current control temperature which
`corresponds to “NOW” and a future control time and
`temperature which correspond to “NEX Thermostat sys
`tem 22 is also capable of transmitting status information to
`security system 16 regarding the status of the control con
`ditions of thermostat system 22, comprising current set
`points, current time settings and other parameters having to
`do with the schedule related to certain programmed set
`back/set-up schedules. Thermostat system 22 is connected to
`security system 16 via Hbus interconnection 78.
`Programmer system 35 may be utilized to de?ne modes
`for security system 16, by programming instructions related
`to the control of security system 16 and various of control
`systems 14, into memory means 46. Programmer system
`comprises a computer, such as a computer which is capable
`of executing Disk Operating System (DOS) such as are
`known to those of ordinary skill in the art, and a program for
`de?ning a particular mode. The program converts certain
`menu options related to control conditions of the various
`elements of automation system 10 to de?ne a particular
`mode. A plurality of modes can be de?ned by the program
`and can be transferred to memory means 46 using a single
`step, or series of steps.
`Having described security system 16 and control systems
`14, including lighting control system 18, voice access sys
`tem 20, thermostat system 22 and programmer system 35,
`the functions of these systems together is further described
`hereinbelow.
`Prior to utilization of security system 16, security system
`16 must have preprograrnrned instructions 70 de?ning the
`control instructions necessary to operate security system 16
`and control systems 14, stored in memory means 46. These
`preprogrammed instructions 70 de?ne certain modes as
`described herein. This can be accomplished by connecting
`
`Page 14 of 17
`
`PETITIONERS' EXHIBIT 1005
`
`
`
`5,461,372
`
`7
`programmer system 35 to security system 16 via a modem,
`or by connecting programmer system 36 directly to security
`system 16 through a serial digital interface, such as an
`RS232 serial interface. Once programmer system 35 has
`been connected to security system 16, preprogrammed
`instructions 70 can be stored in memory means 46. Once this
`has been accomplished, security system 16 is available for
`use by an operator.
`In order to operate security system 16, an operator must
`make a selection of a mode. This can be accomplished in one
`of several ways. First, selection of a mode can be accom
`plished by utilizing HSP 40. Secondly, a touch-tone tele
`phone 92 located within the building can be utilized. Also,
`, a touch-tone telephone 92 located outside of the space to be
`controlled can be used.
`Referring now to FIG. 3a, once a mode has been selected,
`main processor 50 will retrieve preprogrammed instructions
`70, 71 from memory means 46, corresponding to the
`selected mode. Then main processor 50 will execute pre
`programmed instructions and provide control signals to
`control systems 14, for which preprogrammed instructions
`70, 71 have designated to provide a function in the mode
`selected. During the selection process, preprogrammed
`instructions 70 and 71 may also require either passcode
`entry from touch-key pad 80 in order to ensure that an
`operator has su?icient authority to implement the mode
`selected or that reduction in security level be denied because
`the operator has accessed the system from outside the
`protected area. Instructions 70, 71 perform the discrimina~
`tion for determining whether a level reduction is requested
`from inside or outside the protected area.
`Once a mode has been selected and control signals have
`been provided to security system 16 and effected control
`systems 14, the systems perform their control functions until
`a different mode is selected by an operator. This method of
`operation centers utilization of automation system 10 on
`certain security-based events. It is important to note, how
`ever, that control systems 14 may also incorporate time
`based programming. For example, lighting system 18 may
`have certain time-based program instructions, such that
`while lights may be turned on or off intially upon execution
`of a mode, subsequent programming instructions within
`lighting system 18 may direct subsequent changes to the
`on/oif condition of lights affected at the outset of this mode,
`or other lights or appliances which are capable of being
`controlled by lighting system 18. Similarly, thermostat sys
`tem 22 may exercise time~based program events such as
`set-back of the temperature or set-up of the temperature
`based on local program instructions after a particular mode
`has been initiated. Further discussion regarding the imple
`mentation of modes is set forth hereinbelow.
`When programmer system 35 accesses system 16
`remotely via modem 100 shown in FIG. 3b, it is ?rst may be
`necessary to ensure that the call into modern 100 is from
`programmer 35. In order to ensure this fact, security system
`16 may incorporate a methodology known as the “pizza”
`principle, wherein when system 16 receives a telephone call,
`system 16 does not allow direct access to the calling device.
`Rather, security system 16 has resident in memory means
`46, a preprogrammed instruction corresponding to a call
`back telephone number. Upon receipt of a call by modern
`100, security system 16, places a call through modem 100
`using the telephone number which has been preprogrammed
`into memory means 46. In this way, it can be ensured that
`access for the purpose of programming security system 16
`can only come from authorized locations.
`This presents a problem, however, during the initial
`
`10
`
`20
`
`25
`
`30
`
`35
`
`45
`
`55
`
`60
`
`65
`
`8
`programming of memory means 46, as described herein,
`because one of the items of information that must be
`programmed in is the preprogrammed instruction 70 related
`to the callback telephone number. Therefore, initial pro
`gramming would not normally be possible from a remote
`location. However, security system 16 also incorporates in
`memory means 46, an authorization code related to the
`call-back feature. The code has associated with it a set of
`preprogrammed instructions 70, which instruct security sys
`tem 16 to accept telephone calls fro