`Busak et al.
`
`lllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllll
`US005461372A
`5,461,372
`[11] Patent Number:
`[ 45] Date of Patent:
`Oct. 24, 1995
`
`[54] SYSTEM AND METHOD FOR MODIFYING
`SECURITY IN A SECURITY SYSTEM
`
`[75]
`
`Inventors: Steven J. Busak, Laguna Niguel; Allen
`F. V. Buskirk, Fountain Valley; Mark
`R. Walther, Laguna Hills, all of Calif.
`
`[73] Assignee: Honeywell Inc., Minneapolis, Minn.
`
`[21] Appl. No.: 6,223
`
`[22] Filed:
`
`Jan. 19, 1993
`
`Int. Cl.6
`.•.••.••.••.•.•...................................... G09B 13/00
`[51]
`[52] U.S. Cl ................................. 340/825.31; 340/825.32;
`379/95; 3791103
`[58] Field of Search ......................... 340/825.31, 825.32,
`340/825.22, 825.37, 541, 531, 825.36, 506,
`533, 538, 532, 542; 379/95, 103, 37, 39,
`42
`
`[56]
`
`References Cited
`
`U.S. PATENT DOCUMENTS
`
`4,287,939
`4,639;610
`4,755,792
`4,772,876
`4,808,995
`4,931,769
`
`. ........................ 340/825.22
`911981 Pohl et al.
`811987 Dietrich .................................. 340/515
`711988 Pezzolo et al .......................... 340/531
`911988 Laud ....................................... 340/531
`2/1989 Clark et al ......................... 340/825.32
`9/1990 Phillips et al ........................... 340/541
`
`FOREIGN PATENT DOCUMENTS
`
`2150333
`
`6/1985 United Kingdom .
`
`Primary Examiner-Michael Horabik
`Attorney, Agent, or Firm-Robert B. Leonard
`
`[57]
`
`ABSTRACT
`
`A system and method for modifying security levels within a
`security system. External modifications are allowed only if
`the security of a point is increased.
`
`3,925,763 1211975 Wadhwani et al ................. 340/825.36
`
`7 Claims, 10 Drawing Sheets
`
`,c __ ....,.14
`
`30
`
`I PRINTER I··············
`._ ____ -I
`35
`
`40
`
`. L
`,--·--·
`14
`:
`r ____ :__ -l
`ID ::::::::I
`: 14
`'-:J--_j-1
`1 LOW VOLTAGE I
`__ :..--:::!-,
`CONTROL
`I
`I
`14
`28
`1
`1 VIDEO 1 1
`SYSTEM
`I
`I SYSTEM I L---~--J
`L----~32
`26
`
`40
`
`84
`
`84
`
`84
`
`84
`
`ALARM
`POINTS AND
`OUTPUTS
`
`Petitioners - Exhibit 1010 Page 1
`
`
`
`/10
`
`14
`
`38
`
`~92
`
`I
`
`38
`
`I
`
`PRINCIPAL
`CONTROL
`SYSTEM
`(SECURITY)
`
`30
`.C---r14
`I PRINTER I··············
`L-----_J
`35
`PROGRAMMER ~) 4
`SYSTEM
`
`•
`
`PERSONAL
`COMPUTER
`/TOUCH
`MMI
`
`14
`1-----~
`
`38
`
`Jc
`:J-,
`14/cCOMPUl£~
`
`40
`
`24
`
`14
`:
`.--·----,
`/
`:
`:
`r ____ : __ _L_l
`ID ::::::::I
`~
`14
`~
`14~--_j_J
`I LOW VOLTAGE 1
`r __ :--/1
`CONTROL
`28
`I
`I
`I VIDEO 1 1
`SYSTEM
`I
`I SYSTEM I
`L ___ "' ____ j
`L----~32
`,26
`
`40
`
`FIG. 1
`
`ALARM
`POINTS AND
`OUTPUTS
`
`d •
`00.
`•
`~
`
`~ a
`
`0
`f4
`N
`... ,f;;.
`......
`~
`~
`til
`
`00. =(cid:173)
`I'D
`~
`......
`s,
`...... =
`
`._. .. 0'\
`
`01
`
`~ ._. w
`......:)
`N
`
`Petitioners - Exhibit 1010 Page 2
`
`
`
`40
`
`22
`
`CLASSIC
`TURBO RF/
`HARDWARE
`
`36
`
`52
`
`BUS
`INTERFACE
`
`..
`
`RAD STU/ I
`HSL
`300 BAUD I I l TEL LINE
`DIALER
`
`I
`
`I
`I
`I
`I
`
`I
`
`\._ 62
`
`...
`
`e •
`00
`•
`1-C
`~
`~
`
`~ = ~
`
`0 p.
`
`N
`~,f;;..
`
`....
`"' "' U1
`
`rJJ. =(cid:173)(!)
`~
`N
`
`s, ....
`
`0
`
`84
`
`35
`
`PC
`PROGRAMMER
`
`18
`
`LIGHTING
`INTERFACE
`
`I
`138
`I
`I
`I
`I
`I
`
`I
`
`L------------~-----------------J
`
`X
`
`I
`
`I
`
`VOICE MODULE/
`TEMP. SENSING
`r--, CARD
`
`L--J
`
`20
`
`Fig.2
`
`01
`-..
`~
`
`=" ~ -.. w
`
`""-l
`N
`
`Petitioners - Exhibit 1010 Page 3
`
`
`
`r---------~-------
`36
`
`BANK
`CONTROL
`
`11
`
`j
`
`POWER
`RESET &
`SUPPLy
`WATCHDOG
`L
`~-1
`CLOCK ~
`J
`50
`I X10 SERIAL~ RS232
`! ADDRESS
`l74 DRIVER/
`-
`RFCVR
`~
`I
`
`INTO-
`1
`INT1-
`I
`I
`INT2- 1
`FIRE
`I
`I
`
`1
`I
`
`1-
`
`I
`
`, -
`
`f-1 DATA
`.__
`CHIP
`r -
`SELECTS
`1--
`.___
`
`LIO~ :
`I
`. - - - - -
`I HORN
`~ : OUTPUT
`I TAMPER
`HLS
`I SIGNALS
`
`I
`64
`-
`
`r-
`
`r-
`
`1
`I
`:
`I
`I EPROM1
`I
`~
`L-t-r---
`CLOCK
`
`1
`I
`I
`
`:
`
`-
`
`t- r-
`
`48 7
`
`---------------------(cid:173)
`.~ 46 ~ t_--
`i
`66
`68
`68
`....... ~ 1-
`r::;:---, r-
`~ t2lJ ~I
`-
`-
`:
`EEPROM2
`RAM
`EEPROM1 1
`49 ~ I
`~
`RS232
`PC PORT 111 DRIVER/RCVR
`-L_j
`300B MODEM PORT (Fig.3b)
`
`I r
`
`2
`SERIAL
`PORTS
`
`PT ID, SERIAL PORT
`
`INT2- DTMF IN
`
`761
`-
`
`VOICE OUT
`(Fig.3b)
`MODULE
`CONNECTOR
`'--' (PT ID, VOICE)
`
`INT1-
`
`I
`I
`1
`I
`I
`PORT
`EXPAND~R
`L-,
`RF INPUT
`I
`I EPROM~ RAM I
`AND/OR
`:
`HARDWIRE 1
`LTC485 y -u~ I
`::st. BUS
`POINTS
`1
`~
`I
`2.4576 MHz CLK
`L----------------~~J=~==~~==~~====~
`62
`L------------------
`-----
`Fig. 3a
`
`44
`---~-i_
`.---.===:::::.._j
`INTO-
`CLOCK 52
`
`_B~=~~-~ORT
`
`54
`-
`
`RESETABLE
`FLOP
`
`1
`I
`l::!=:t=:=t.
`
`d •
`00
`•
`1-C
`
`~
`""'"
`
`0 p.
`~ ...
`
`N
`
`1-'
`I,C
`I,C
`01
`
`00. =-~
`~ .....
`w
`0 .....,
`1-'
`0
`
`Ol
`
`"' ~ ""' ~
`
`"' w
`....:J
`N
`
`Petitioners - Exhibit 1010 Page 4
`
`
`
`-------v~ciour----------------------------------------~
`I
`(Fig.3a) - - - - - - - - - - - - .
`I
`I DTMF IN
`I 36
`
`I
`
`lJ
`l
`
`I
`I
`I
`1
`: TELCO
`I
`I
`I
`I
`I
`I
`I PHONE
`
`LATCH
`
`DTMF
`GEN
`(Fig 30) 300 SERIAL 1/0
`.
`MODEM CONTROL
`
`I
`
`I
`
`100
`-
`MODEM
`
`DIFF.
`AMP
`
`HOOK
`SENSE
`r
`1
`T .....____,
`
`T
`
`1
`
`L
`HYBRID
`DAA
`
`TEL 1/F
`CONTROL
`REG
`(WRITE)
`
`CARRIER DETECT
`
`PHONE STATUS: RING DETECT,
`HOOK SENSE. LINE SNIFF
`PHOTOCELL RELAY INPUT
`(FUTURE ENHANCEMENT)
`
`RING LINE
`IND. SNIFF
`
`LINE
`SEIZE
`
`LOCAL
`MODE
`
`STATUS REG
`----------------------
`(READ)
`
`Fig. 3b
`--------------------------------~
`
`Cj
`•
`rJ1 •
`
`~ = i ~
`
`0 p.
`N
`... ~
`
`~
`\C
`\C
`U1
`
`00 =(cid:173)(!)
`~
`~ sa,
`
`~
`Q
`
`01
`....
`~
`0'\
`~ .... w
`-....}
`N
`
`Petitioners - Exhibit 1010 Page 5
`
`
`
`U.S. Patent
`
`Oct. 24, 1995
`
`Sheet 5 of 10
`
`5,461,372
`
`0
`0
`L{)
`
`_J
`0
`0:::::
`1-
`z
`0
`u
`
`<.n z
`0
`1-
`<(
`() -
`z
`::;)
`~
`~
`0
`(..)
`
`CD
`0
`L{)
`
`z
`0
`1-
`<(
`z
`~ u
`-
`0
`0:::::
`L{)
`u
`<.n
`0
`
`<.n
`z
`0
`1-
`<(
`Ct:
`w
`0..
`0
`
`<(
`0
`L{)
`
`t
`~I
`
`,...--.,
`
`C/1
`Z
`
`I
`I
`I
`
`I O t -oZ I
`I
`<(I
`~0..
`I
`0
`U
`I
`I
`
`r---------------l
`I
`_,~1
`w I
`101 ~o~ul
`I 01
`l
`l ooool
`I 01
`I
`:
`l
`~§]§JEll
`L __ J ~ §I ~ § l
`EJ~EJ81
`L _______________ J
`
`Petitioners - Exhibit 1010 Page 6
`
`
`
`U.S. Patent
`
`Oct. 24, 1995
`
`Sheet 6 of 10
`
`5,461,372
`
`~I
`
`0
`L{)
`
`_J
`<(~
`o:::z
`W:J
`(/)
`
`~I
`
`0:::
`0
`(/)
`z(J)
`-w
`<(o
`~0
`0::::
`a_
`
`(1)0::::
`::JO
`cnUJ
`(/)
`<(W
`I-()
`..:t:O
`oo:::
`0..
`
`_J
`o_ J
`
`o:::W
`1-Z
`z<
`00..
`u
`
`l!J
`•
`C))
`
`c:
`
`Petitioners - Exhibit 1010 Page 7
`
`
`
`1000
`
`1 015A
`
`G__.--1 o2s
`
`>-'-<
`v.__ 1 040A
`I
`.---1030A
`
`~1040C
`
`~
`1 0408
`1 0158 -........_
`)-l{
`' / ~
`
`Q_1 o2s
`
`1001
`
`CJ--10400
`
`10200
`
`1002
`
`10308
`
`1040F_)J
`1035A
`
`~1040G
`
`1003
`
`1040H_jj
`
`1025__D
`
`1025, 61025
`__,Q
`
`1 0150
`"----1 0208
`10401 ~ 1
`
`. 1100
`
`"----- 1 020A
`
`1 v--- 1040J
`
`1025
`
`"o
`
`105011055
`
`(
`
`Fig. 6
`
`d •
`rJ'J.
`•
`1-C
`~
`~ f"'f'-
`
`0
`~
`~ ...
`I:.,J
`
`1-0
`\C
`\C
`til
`
`rJ). =(cid:173)
`('!)
`~
`-...J
`0
`~
`1-0
`0
`
`01
`\..9 ,a:.
`0\
`~
`\..9
`t;J
`'I
`N
`
`Petitioners - Exhibit 1010 Page 8
`
`
`
`ADDR
`
`I-'
`
`Ag~C~EDSES~
`RD/WR LOGIC
`P-
`
`I-'
`
`SYSTEM
`8000
`MOTHER
`BOARD
`CONNECTOR
`
`VOICE
`
`VOICE
`AND AMP
`FILTER
`
`DATA BUS
`
`PTMF
`
`::>--
`DATA
`BUS
`
`DTMF
`RECEIVER
`
`-
`SPEECH
`PROCESSOR
`
`I
`
`HIGH
`ADDR
`
`DATA BUS
`
`VOICE OUTPUT
`
`ALE
`
`ADDRESS
`LATCH
`
`.....
`
`LOW ADDRESS
`
`,..
`
`VOICE
`MEMORY -
`
`BANK SELECT
`
`~
`CONTROL
`REGISTER
`-
`
`DATA BUS
`
`STATUS
`REGISTER
`
`: A/D ANALOG TEMP TEMP
`TEMP SENSOR
`&
`1/F
`BUS
`1/F
`
`COM
`
`-
`
`VIRO
`
`INT1
`
`INT
`LOGIC
`
`----------
`
`DTMF INTERRUPT 1
`
`VOICE INTERRUPT
`A/D INTERRUPT
`INTERRUPT ENABLES
`
`Fig. 6a
`
`d •
`00.
`•
`~
`
`~ = ~
`
`0 p.
`
`N
`
`~ .. .......
`
`\C)
`\C)
`til
`
`rJJ. ::r
`(tl
`~
`oe
`s,
`....... =
`
`Ol
`"' ~
`0\
`~
`"' w
`-....1
`N
`
`Petitioners - Exhibit 1010 Page 9
`
`
`
`POINT
`NO.
`1
`2
`3
`4
`5
`6
`7
`8
`9
`10
`11
`12
`13
`-14
`15
`16
`17
`18
`19
`20
`21
`
`LEAVE WAKE
`X
`X
`X
`X
`X
`X
`X
`0
`X
`0
`X
`0
`X
`0
`p-
`1)
`p
`0
`y
`p
`y
`0
`y
`0
`0
`0
`p
`y
`p
`0
`0
`0
`0
`0
`p
`p
`p
`p
`p
`F
`p
`
`FIGURE
`ID NO
`NAME
`1020A WINDOW 1
`WINDOW 2
`10208
`1020C WINDOW 3
`DOOR 1
`1015A
`DOOR 2
`10158
`DOOR 3
`1015C
`DOOR 4
`10150
`LIGHT 1
`1040A
`LIGHT 2
`10408
`1040C
`LIGHT 3
`10400
`LIGHT 4
`1040E
`LIGHT 5
`LIGHT 6
`1040F
`1040G
`LIGHT 7
`1040H
`LIGHT 8
`-11r,HT Q
`1040J
`LIGHT 10
`1040K
`1035A
`[THERMOSTAT 1
`10358 THERMOSTAT 2
`1035C THERMOSTAT 3
`1055
`OUTLET
`X= ARMED
`P=PROGRAMMEO
`O=OFF
`Y=ON
`OW=ON WATCH
`BLANK=NO EFFECT OVER PREVIOUS STATUS
`
`MODES
`
`POOL
`PARTY WORK
`X
`X
`X
`X
`X
`~
`ow
`X
`X
`X
`X
`X
`ON
`X
`y
`p
`0
`p
`0
`0
`CY
`u
`0
`0
`0
`p
`p
`p
`
`y
`u
`y
`0
`y
`y
`
`y
`
`SLEEP
`X
`X
`X
`X
`X
`X
`X
`0
`0
`0
`0
`0
`Q
`Q
`0
`0
`0
`p
`p
`p
`
`PLAY
`0
`0
`0
`0
`0
`0
`ON
`
`RETURN OPEN
`0
`0
`0
`0
`0
`0
`X
`0
`X
`0
`X
`0
`X
`0
`
`I
`
`p
`p
`p
`
`Fig. 7
`
`Cj
`•
`00
`•
`~
`
`~
`
`0 p.
`N
`... ~
`.....
`'-=
`'-=
`(JJ
`
`00. ::r
`ttl
`~
`'-=
`0
`'""'
`.....
`c
`
`01
`"' .a;.
`=" ~
`"' w
`"-l
`N
`
`Petitioners - Exhibit 1010 Page 10
`
`
`
`U.S. Patent
`
`Oct. 24, 1995
`
`Sheet 10 of 10
`
`5,461,372
`
`1210
`
`NO
`
`1225
`
`MAKE
`REQUIRED
`CHANGES
`
`1235
`
`MAKE
`REQUIRED
`CHANGES
`
`YES
`
`1245
`
`MAKE
`REQUIRED
`CHANGES
`
`NO
`
`NO
`
`NO
`
`YES
`
`1216
`
`YES
`
`Fig.B
`
`Petitioners - Exhibit 1010 Page 11
`
`
`
`5,461,372
`
`1
`SYSTEM AND METHOD FOR MODIFYING
`SECURITY IN A SECURITY SYSTEM
`
`BACKGROUND OF THE INVENTION
`
`2
`in favor of continuing application Ser. No. 08/216,783),
`entitled A SYSTEM AND METHOD FOR AUTOMATI(cid:173)
`CALLY CONTROLLING A SPACE, by Stanley-Arslanok
`et al. which is commonly owned by the assignee of the
`5 present application.
`In addition, recent improvements in telecommunications
`technology allows the building owner to use a telephone,
`either from inside or outside the protected building, to
`modify the status of the alarm system. This may cause the
`10 building owner some concern with the proliferation of
`hackers who attemp to break into computer systems to
`modify the programming of those systems. If a hacker were
`to break into the alarm system via the telecommunictions
`network, security of the protected building could be com-
`15 prised.
`
`SUMMARY OF THE INVENTION
`
`1. Field of the Invention
`The present invention includes a system for automatically
`controlling a space by integrating the control and function of
`a plurality of control systems and devices utilized within the
`space, by using a principal control system, such as a security
`system. These control systems and devices can include an
`environmental control system, a telecommunications sys(cid:173)
`tem, a lighting control system, and other electrical control
`systems including those which control individual electrical
`or electronic devices such as appliances, audio devices and
`video devices.
`The invention can be accessed by a user from within the
`space to be controlled, or remotely through the use of a
`telecommunications interface. The control systems may be 20
`separately operable, although not automated, when used
`without being connected to the principal control system, or
`when the principal control system has failed.
`2. Description of Related Art
`Small building security systems for sensing and reporting
`intrusions into a building are well known in the art. Typi(cid:173)
`cally, a plurality of sensors, such as motion sensors, door
`sensors, window sensors and other sensors are connected to
`a processor to provide the processor with an alarm indica(cid:173)
`tion, such as movement or the opening of a door or window.
`The processor is preprogrammed to initiate certain actions
`upon the receipt of an alarm indication, such as sounding an
`internal alarm signal or dialing a remote alarm monitoring
`station through a telecommunications interface. For the
`small building market (house, small retail store, restaurant)
`these systems have been relatively simple.
`Improvements in alarm systems include the ability to
`define in the processor, certain security levels which will
`cause the processor to handle alarm indications from a
`sensor in a predetermined way. For example, three levels of
`conditions for the handling of an alarm indication may be
`defined: 1) armed; 2) on watch; and 3) off. A sensor whose
`alarm indication is to be handled as armed, may cause the
`processor to initiate a call to the remote alarm monitoring 45
`station and to create a local alarm signal when an alarm
`indication occurs at the armed sensor. A sensor whose alarm
`indication is to be handled as on watch, may cause the
`processor to initiate a local alarm only when an alarm
`indication is received from that sensor. Lastly, a sensor
`whose alarm indication is to be handled as off may cause the
`processor to ignore any alarm indication received from that
`sensor. Typically, the highest level of security is armed, next
`is on watch, and the lowest is off.
`Typically, each sensor may be associated with any of the 55
`above identified levels. This is typically done through an
`operator interface which is connected to the processor. The
`processor may be programmed to identify each sensor with
`a level individually, or "modes" of operation may be defined
`where all sensors connected to the security system are set to 60
`one of the predefined levels upon the selection of a prepro(cid:173)
`grarnmed mode.
`As building control systems for small buildings have
`continued to evolve, integration of alarm systems with other
`building control systems, such as the HVAC and lighting 65
`systems has occurred. For description of a complete system,
`see U.S. patent application Ser. No. 07/811,508 (abandoned
`
`The present invention is a security system which prevents
`a lowering of the security level of the alarm system from a
`phone not located within the protected building. The security
`system can be operated via a plurality of input devices,
`including a security panel, or panels located in one or more
`locations within the home, telephones located within the
`25 home via a voice module, and remotely from a telephone or
`similar telecommunications device also via the voice mod(cid:173)
`ule. However, the security system may only increase the
`level of security through the use of an external phone. The
`security system may be connected to other control systems
`30 such as HVAC or lighting control systems.
`The security system includes a processor having memory,
`one or more sensors connected to the processor, and tele(cid:173)
`communications interface connected to the alarm processor.
`The processor includes a discrimination means for deter-
`35 mining where a phone is located which is initiating control
`actions for the security system. If the phone is determined to
`be outside the protected space, any control actions initiated
`through the phone which cause a decrease in security are
`ignored. Control actions of other control systems connected
`to the security system which are initiated through the
`external phone are allowed to occur.
`The discrimination means may be implemented by a
`routine performed by the processor. A flag may be set in
`memory which either allows or prohibits an operator from
`lowering the security level of a point when operating the
`system from outside the protected area.
`Other objects, features and advantages of the invention
`may be apparent to one of ordinary skill in the art, upon
`examination of the drawings and detailed description of the
`preferred embodiment.
`
`50
`
`40
`
`BRIEF DESCRIPTION OF THE DRAWINGS
`
`FIG. 1 is a block diagram of an embodiment of a system
`for automating the control of a space, featuring a security
`system as a principal control system, a plurality of control
`systems, and the interconnections between the security sys(cid:173)
`tem and the plurality of control systems.
`FIG. 2 is a block diagram of the security system of FIG.
`1, illustrating the general location and interrelation of certain
`principal elements.
`FIG. 3a is a more detailed functional block diagram of the
`security system of FIG. 2.
`FIG. 3b is a continuation of the functional block diagram
`of FIG. 3a.
`FIG. 4 is a front view of the home security panel.
`
`Petitioners - Exhibit 1010 Page 12
`
`
`
`5,461,372
`
`3
`FIG. 5 is a block diagram of a home security panel
`showing its interconnection to the control panel.
`FIG. 6 is a floor plan of a sample house using the
`inventive system.
`FIG. 6a is a block diagram of a voice access system of the
`present invention.
`FIG. 7 is a matrix of modes, statuses and points within the
`house of FIG. 7.
`FIG. 8 is a flow chart of the method of operation of the
`inventive system.
`FIG. 9 is a block diagram of the processor 50.
`
`DETAILED DESCRIPTION OF THE
`PREFERRED EMBODIMENT
`
`Referring now to FIG. 1, an automation system 10 for
`automatically controlling a space is illustrated. In a preferred
`embodiment of the invention as described herein, automa(cid:173)
`tion system 10 would be particularly suitable for automati(cid:173)
`cally controlling a building, such as a small commercial
`building, a home, or a similar building. Automation system
`10 comprises a principal control system 12 connected to a
`plurality of control systems 14. In a preferred embodiment
`of the invention, principal control system 12 is security
`system 16 electrically connected to plurality of control
`systems 14, including lighting system 18 and thermostat 22.
`Other control systems 14 could be electrically connected to
`security system 16, including personal computer system 24,
`low voltage control system 26, entertainment system 28,
`printer system 30, and video system 32, as well as any
`number of other systems which might be located in or near
`the building, and including systems which could be remote
`from the building and interconnected via telecommunica(cid:173)
`tions device 34 or otherwise. In a preferred embodiment of
`the invention, a control system 14 which could be remote
`from security system 16, could include programming system
`35. The following describes security system 16, plurality of
`control devices 14 and their interconnection.
`Referring now to FIG. 2, security system 16 includes
`several principal elements including control panel 36, inter(cid:173)
`connections 38, one or more home security panels (HSP) 40,
`and plurality of control points 84.
`Referring now to FIG. 3a, control panel 36 comprises
`processor means 44 and memory means 46 which are
`interconnected by address line 48 and data line 49. In a
`preferred embodiment, processor means 44 comprises a
`plurality of separate processors including main processor 50,
`data bus processor 52 and control point processor 54, 50
`however, processor means could also be implemented in a
`single device. In a preferred embodiment, the three proces(cid:173)
`sors are all 8-bit microprocessors or microcontrollers, and
`are all interconnected via address line 48 and data line 49.
`Main processor 50 is the principal data processing device
`for automation system 10 (not illustrated). It is capable of
`providing a plurality of output signals 38, for transmission
`to the plurality of control systems 14, in response to the
`receipt of a plurality of input signals 60 (not shown). Input
`signals 60 can be provided from systems and devices
`comprising control systems 14, HSP 40 and other systems
`and devices capable of providing input signals 60. Main
`processor 50 is capable of transmitting to, and receiving
`signals from, other processors, such as data bus processor 52
`and control point processor 54, and other devices.
`Referring now to FIGS. 2 and 3a, data bus processor 52
`controls the communication of information between main
`
`55
`
`5
`
`15
`
`4
`processor 50 of security system 16 and control systems 14,
`such as thermostat system 22, as well as other devices which
`are connected to data bus 62, such as HSP 40. The exchange
`of information between data bus processor 52, control
`systems 14, and devices such as HSP 40, is accomplished
`through the use of an encoded (4B-8B) data stream utilizing
`a code, and a method of receiving and transmitting the code
`described in the co-pending application, "A DC Balanced
`4B/8B Binary Block Code for Digital Communications",
`10 filed as U.S. application Ser. No. 07/811,508, now aban(cid:173)
`doned in favor of continuing application 08/216,783, by D.
`Myers, which is hereby incorporated by reference.
`Control point processor 54 is capable of receiving a
`plurality of inputs from control points 84, and transmitting
`the input information to main processor 50 via address line
`48 and data line 49.
`As described herein, in addition to processor means 44,
`control panel 36 also comprises memory means 46. In a
`preferred embodiment, memory means 46 comprises a com-
`20 bination including Electrically Programmable Read Only
`Memory (EPROM) 64, Random Access Memory (RAM) 66
`and Electrically Erasable Read Only Memory (EEPROM)
`68. Particularly, memory means 46 is capable of storing a
`preprogramrned set of instructions 70 relating to a set of
`25 control conditions or modes desired within the building, and
`providing these instructions to main processor 50 via
`address line 48 and data line 49 in response to a request
`made by an operator.
`Referring now to FIGS. 2 and 3a, having described the
`30 elements of control panel 36, automation system 10 also
`comprises plurality of interconnections 38 to provide for the
`connection of principal control system 12 and plurality of
`control systems 14. In a preferred embodiment, this arrange(cid:173)
`ment comprises security system 16 interconnected with
`35 control systems 14, such as lighting system 18, voice access
`system 20 and thermostat 22, via lighting interconnection
`74, voice access interconnection 76 and Hbus interconnec(cid:173)
`tion 78, respectively. In a preferred embodiment, these
`interconnections are all accomplished via digital data inter-
`40 faces.
`Referring now to FIG. 3a, lighting interconnection 74 is
`accomplished via a direct RS232 serial interface to main
`processor 50. Voice access interconnection 76 to main
`45 processor 50 is accomplished via address line 48 and data
`line 49, and thermostat interconnection is accomplished via
`a data bus using an RS485 serial interface to data bus
`processor 52, which is in tum connected via a serial interface
`to main processor 50.
`Referring now to FIG. 4, security system 16 also com(cid:173)
`prises an HSP 40, which is now further described. HSP 40
`is a man-machine interface (MMI). In a preferred embodi(cid:173)
`ment, the MMI comprises a touch key-pad 80 and a display
`· 82, such as a liquid crystal display. Display 82 is capable of
`identifying for an operator the available choices with respect
`to control of the security system 16, as well as displaying
`certain indications of system status, such as time, date,
`temperature, and current mode 82. In one embodiment,
`touch key-pad 80 has, on the key-pad, a combination of
`60 numeric keys, arrow symbol keys and word keys to facilitate
`operator selections, as discussed further herein, and as
`shown in FIG. 4.
`Referring now to FIG. 2, security system 16 also com(cid:173)
`prises control points 84. Control points 84 include two types
`65 of security points, RF points 86 and hardwire points 88.
`These control points are of a type well known in the art, such
`as those utilized in any one of the System 6000 series
`
`Petitioners - Exhibit 1010 Page 13
`
`
`
`5,461,372
`
`10
`
`25
`
`5
`security systems manufactured and sold by Honeywell Inc.,
`such as model 6400, and are interconnected to control panel
`36 through control point processor 54, using interconnection
`methods and materials known to those of ordinary skill in
`the art. The exact number of RF points 86 and hardwire 5
`points 88 is a function of the capabilities of control point
`processor 54. Various adapters are known to those of ordi(cid:173)
`nary skill in the art which can be utilized to expand the
`number of control points 84 which can be attached to control
`point processor 54. Control point processor 54 is capable of
`monitoring and exercising control over individual control
`points 84, and providing information about any individual
`control point 84 to main processor 50. Therefore, this
`information is available to security system 16, and particu(cid:173)
`larly so that modes can define desired states of control, such
`as armed, disarmed and on-watch, as further described 15
`herein, for either individual control points, or groups of
`control points, depending on the requirements of the par(cid:173)
`ticular mode.
`Automation system 10 comprises principal control system
`12 and a plurality of control systems 14. In a preferred
`embodiment, automation system 10 comprises security sys(cid:173)
`tem 16, the elements of which are described herein, and
`control systems 14, including lighting system 18, voice
`access system 20, thermostat system 22, and programmer
`system 35, and may also include individual devices such as
`telecommunication device 34, which are further discussed
`below.
`Lighting system 18 is a commercially available system
`sold by X-10 Powerhouse, as Model No. CP290, and is of
`a type known to those of ordinary skill in the art. Lighting
`system 18 uses powerline carrier based signal to automati(cid:173)
`cally switch power on or off to control modules, which can
`be used in conjunction with lights and other electrical
`appliances and devices. Its use is not limited to lighting
`devices only. For instance, lighting system 18 could be used
`to control appliances such as a coffee maker, electric heater,
`or other devices which can be operated by on/off switching
`of AC power. Lighting system 18 is connected to security
`system 16, using lighting interconnection 74, and is capable
`of receiving a control signal from security system 16. In a
`preferred embodiment, lighting system 18 is capable of
`operation independently of security system 16, in the event
`that security system 16 ceases to provide control signals as
`described above.
`Voice access system 20 is shown and described in FIGS.
`6a and 3b. Voice access system 20 incorporates speech
`synthesizer 90. Speech synthesizer 90 is combined with
`components known to those of ordinary skill in the art, as
`described in FIG. 6a, to produce a system which allows an
`operator to operate security system 16 remotely through the
`use of telecommunications device 34, such as a touch tone
`telephone 34. Voice access system 20 allows an operator to
`operate a security system 16 remotely, by selecting the same
`modes that are available to the operator through HSP 40.
`Touch tone telephone 34 can be a telephone located in the
`space to be controlled, such as one or more of touch tone
`telephones located in a building, or, touch tone telephone 34
`may be remote from the space which is to be controlled, such
`as a cellular telephone or telephone located in another
`building. Voice access module 20 also allows an operator to
`receive certain information from various control systems 14
`which are adapted to communicate information concerning
`their status. Voice access system 20 also may also incorpo(cid:173)
`rate security features which require that an operator enter 65
`certain passcodes before being able to effect changes to
`security system 16. In particular, passcode entry may be
`
`6
`required whenever the level of security is to be reduced.
`Note that FIG. 8 shows another security measure for pre(cid:173)
`venting some decreases in security. Voice access system 20
`also incorporates a voice-based menu scheme wherein voice
`access system 20 describes to an operator the various
`selections which are available, and provides the operator
`directions as to how to make a particular selection of choice.
`In a preferred embodiment, control may be exercised
`through voice access system 20 over various elements of an
`automation system 10, such as security system 16, lighting
`system 18, and thermostat system 22. Voice access system
`20 is connected to security system 16 as described herein,
`via voice access interconnection 76.
`Thermostat system 22 comprises a thermostat of the type
`described in U.S. Pat. No. 4,606,401 to Levine, et al., and
`U.S. Pat. No. 4,469,274 to Levine, et al., which are hereby
`incorporated by reference. Thermostat system 22 comprises
`a communicating thermostat, such as is described in the
`following copending applications: "Communicating Ther(cid:173)
`mostat", Ratz, et al., U.S. Pat. No. 5,197,668; and "Com-
`20 municating Thermostat", Ratz, et al., U.S. Pat. No. 5,203,
`497 and "Electronic Time Thermostat with a Temporary
`Next Period Adjustment Means", U.S. Pat. No. 5,230,482,
`all of which are commonly owned by the owner of the
`present application. Thermostat system 22 is capable of
`receiving control signals from security system 16, such that
`the features which are available to an operator from ther(cid:173)
`mostat system 22, such as the availability to define certain
`set-back and set-up times and temperatures, from security
`system 16. Thermostat system 22 is also capable of being
`interrupted by security system 16 to define a NOW and
`NEXT time and temperature, such that the control of secu(cid:173)
`rity system 16 may allow an operator to, upon invocation of
`certain modes, define a current control temperature which
`corresponds to "NOW' and a future control time and
`temperature which correspond to "NEXT". Thermostat sys(cid:173)
`tem 22 is also capable of transmitting status information to
`security system 16 regarding the status of the control con(cid:173)
`ditions of thermostat system 22, comprising current set(cid:173)
`points, current time settings and other parameters having to
`40 do with the schedule related to certain programmed set(cid:173)
`back/set-up schedules. Thermostat system 22 is connected to
`security system 16 via Hbus interconnection 78.
`Programmer system 35 may be utilized to define modes
`for security system 16, by programming instructions related
`to the control of security system 16 and various of control
`systems 14, into memory means 46. Programmer system
`comprises a computer, such as a computer which is capable
`of executing Disk Operating System (DOS) such as are
`50 known to those of ordinary skill in the art, and a program for
`defining a particular mode. The program converts certain
`menu options related to control conditions of the various
`elements of automation system 10 to define a particular
`mode. A plurality of modes can be defined by the program
`55 and can be transferred to memory means 46 using a single
`step, or series of steps.
`Having described security system 16 and control systems
`14, including lighting control system 18, voice access sys(cid:173)
`tem 20, thermostat system 22 and programmer system 35,
`the functions of these systems together is further described
`hereinbelow.
`Prior to utilization of security system 16, security system
`16 must have preprogrammed instructions 70 defining the
`control instructions necessary to operate security system 16
`and control systems 14, stored in memory means 46. These
`preprogrammed instructions 70 define certain modes as
`described herein. This can be accomplished by connecting
`
`30
`
`35
`
`45
`
`60
`
`Petitioners - Exhibit 1010 Page 14
`
`
`
`5,461,372
`
`20
`
`30
`
`35
`
`7
`programmer system 35 to security system 16 via a modem,
`or by connecting programmer system 36 directly to security
`system 16 through a serial digital interface, such as an
`RS232 serial interface. Once programmer system 35 has
`been connected to security system 16, preprogramrned 5
`instructions 70 can be stored in memory means 46. Once this
`has been accomplished, security system 16 is available for
`use by an operator.
`In order to operate security system 16, an operator must
`make a selection of a mode. This can be accomplished in one 10
`of several ways. First, selection of a mode can be accom(cid:173)
`plished by utilizing HSP 40. Secondly, a touch-tone tele(cid:173)
`phone 92 located within the building can be utilized. Also,
`a touch-tone telephone 92 located outside of the space to be
`controlled can be used.
`Referring now to FIG. 3a, once a mode has been selected,
`main processor 50 will retrieve preprogramrned instructions
`70, 71 from memory means 46, corresponding to the
`selected mode. Then main processor 50 will execute pre(cid:173)
`programmed instructions and provide control signals to
`control systems 14, for which preprogrammed instructions
`70, 71 have designated to provide a function in the mode
`selected. During the selection process, preprogramrned
`instructions 70 and 71 may also require either passcode
`entry from touch-key pad 80 in order to ensure that an
`operator has sufficient authority to implement the mode
`selected or that reduction in security level be denied because
`the operator has accessed the system from outside the
`protected area. Instructions 70, 71 perform the discrimina(cid:173)
`tion for determining whether a level reduction is requested
`from inside or outside the protected area.
`Once a mode has been selected and control signal