throbber
United States Patent [19]
`Busak et al.
`
`lllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllll
`US005461372A
`5,461,372
`[11] Patent Number:
`[ 45] Date of Patent:
`Oct. 24, 1995
`
`[54] SYSTEM AND METHOD FOR MODIFYING
`SECURITY IN A SECURITY SYSTEM
`
`[75]
`
`Inventors: Steven J. Busak, Laguna Niguel; Allen
`F. V. Buskirk, Fountain Valley; Mark
`R. Walther, Laguna Hills, all of Calif.
`
`[73] Assignee: Honeywell Inc., Minneapolis, Minn.
`
`[21] Appl. No.: 6,223
`
`[22] Filed:
`
`Jan. 19, 1993
`
`Int. Cl.6
`.•.••.••.••.•.•...................................... G09B 13/00
`[51]
`[52] U.S. Cl ................................. 340/825.31; 340/825.32;
`379/95; 3791103
`[58] Field of Search ......................... 340/825.31, 825.32,
`340/825.22, 825.37, 541, 531, 825.36, 506,
`533, 538, 532, 542; 379/95, 103, 37, 39,
`42
`
`[56]
`
`References Cited
`
`U.S. PATENT DOCUMENTS
`
`4,287,939
`4,639;610
`4,755,792
`4,772,876
`4,808,995
`4,931,769
`
`. ........................ 340/825.22
`911981 Pohl et al.
`811987 Dietrich .................................. 340/515
`711988 Pezzolo et al .......................... 340/531
`911988 Laud ....................................... 340/531
`2/1989 Clark et al ......................... 340/825.32
`9/1990 Phillips et al ........................... 340/541
`
`FOREIGN PATENT DOCUMENTS
`
`2150333
`
`6/1985 United Kingdom .
`
`Primary Examiner-Michael Horabik
`Attorney, Agent, or Firm-Robert B. Leonard
`
`[57]
`
`ABSTRACT
`
`A system and method for modifying security levels within a
`security system. External modifications are allowed only if
`the security of a point is increased.
`
`3,925,763 1211975 Wadhwani et al ................. 340/825.36
`
`7 Claims, 10 Drawing Sheets
`
`,c __ ....,.14
`
`30
`
`I PRINTER I··············
`._ ____ -I
`35
`
`40
`
`. L
`,--·--·
`14
`:
`r ____ :__ -l
`ID ::::::::I
`: 14
`'-:J--_j-1
`1 LOW VOLTAGE I
`__ :..--:::!-,
`CONTROL
`I
`I
`14
`28
`1
`1 VIDEO 1 1
`SYSTEM
`I
`I SYSTEM I L---~--J
`L----~32
`26
`
`40
`
`84
`
`84
`
`84
`
`84
`
`ALARM
`POINTS AND
`OUTPUTS
`
`Petitioners - Exhibit 1010 Page 1
`
`

`

`/10
`
`14
`
`38
`
`~92
`
`I
`
`38
`
`I
`
`PRINCIPAL
`CONTROL
`SYSTEM
`(SECURITY)
`
`30
`.C---r14
`I PRINTER I··············
`L-----_J
`35
`PROGRAMMER ~) 4
`SYSTEM
`
`•
`
`PERSONAL
`COMPUTER
`/TOUCH
`MMI
`
`14
`1-----~
`
`38
`
`Jc
`:J-,
`14/cCOMPUl£~
`
`40
`
`24
`
`14
`:
`.--·----,
`/
`:
`:
`r ____ : __ _L_l
`ID ::::::::I
`~
`14
`~
`14~--_j_J
`I LOW VOLTAGE 1
`r __ :--/1
`CONTROL
`28
`I
`I
`I VIDEO 1 1
`SYSTEM
`I
`I SYSTEM I
`L ___ "' ____ j
`L----~32
`,26
`
`40
`
`FIG. 1
`
`ALARM
`POINTS AND
`OUTPUTS
`
`d •
`00.
`•
`~
`
`~ a
`
`0
`f4
`N
`... ,f;;.
`......
`~
`~
`til
`
`00. =(cid:173)
`I'D
`~
`......
`s,
`...... =
`
`._. .. 0'\
`
`01
`
`~ ._. w
`......:)
`N
`
`Petitioners - Exhibit 1010 Page 2
`
`

`

`40
`
`22
`
`CLASSIC
`TURBO RF/
`HARDWARE
`
`36
`
`52
`
`BUS
`INTERFACE
`
`..
`
`RAD STU/ I
`HSL
`300 BAUD I I l TEL LINE
`DIALER
`
`I
`
`I
`I
`I
`I
`
`I
`
`\._ 62
`
`...
`
`e •
`00
`•
`1-C
`~
`~
`
`~ = ~
`
`0 p.
`
`N
`~,f;;..
`
`....
`"' "' U1
`
`rJJ. =(cid:173)(!)
`~
`N
`
`s, ....
`
`0
`
`84
`
`35
`
`PC
`PROGRAMMER
`
`18
`
`LIGHTING
`INTERFACE
`
`I
`138
`I
`I
`I
`I
`I
`
`I
`
`L------------~-----------------J
`
`X
`
`I
`
`I
`
`VOICE MODULE/
`TEMP. SENSING
`r--, CARD
`
`L--J
`
`20
`
`Fig.2
`
`01
`-..
`~
`
`=" ~ -.. w
`
`""-l
`N
`
`Petitioners - Exhibit 1010 Page 3
`
`

`

`r---------~-------
`36
`
`BANK
`CONTROL
`
`11
`
`j
`
`POWER
`RESET &
`SUPPLy
`WATCHDOG
`L
`~-1
`CLOCK ~
`J
`50
`I X10 SERIAL~ RS232
`! ADDRESS
`l74 DRIVER/
`-
`RFCVR
`~
`I
`
`INTO-
`1
`INT1-
`I
`I
`INT2- 1
`FIRE
`I
`I
`
`1
`I
`
`1-
`
`I
`
`, -
`
`f-1 DATA
`.__
`CHIP
`r -
`SELECTS
`1--
`.___
`
`LIO~ :
`I
`. - - - - -
`I HORN
`~ : OUTPUT
`I TAMPER
`HLS
`I SIGNALS
`
`I
`64
`-
`
`r-
`
`r-
`
`1
`I
`:
`I
`I EPROM1
`I
`~
`L-t-r---
`CLOCK
`
`1
`I
`I
`
`:
`
`-
`
`t- r-
`
`48 7
`
`---------------------(cid:173)
`.~ 46 ~ t_--
`i
`66
`68
`68
`....... ~ 1-
`r::;:---, r-
`~ t2lJ ~I
`-
`-
`:
`EEPROM2
`RAM
`EEPROM1 1
`49 ~ I
`~
`RS232
`PC PORT 111 DRIVER/RCVR
`-L_j
`300B MODEM PORT (Fig.3b)
`
`I r
`
`2
`SERIAL
`PORTS
`
`PT ID, SERIAL PORT
`
`INT2- DTMF IN
`
`761
`-
`
`VOICE OUT
`(Fig.3b)
`MODULE
`CONNECTOR
`'--' (PT ID, VOICE)
`
`INT1-
`
`I
`I
`1
`I
`I
`PORT
`EXPAND~R
`L-,
`RF INPUT
`I
`I EPROM~ RAM I
`AND/OR
`:
`HARDWIRE 1
`LTC485 y -u~ I
`::st. BUS
`POINTS
`1
`~
`I
`2.4576 MHz CLK
`L----------------~~J=~==~~==~~====~
`62
`L------------------
`-----
`Fig. 3a
`
`44
`---~-i_
`.---.===:::::.._j
`INTO-
`CLOCK 52
`
`_B~=~~-~ORT
`
`54
`-
`
`RESETABLE
`FLOP
`
`1
`I
`l::!=:t=:=t.
`
`d •
`00
`•
`1-C
`
`~
`""'"
`
`0 p.
`~ ...
`
`N
`
`1-'
`I,C
`I,C
`01
`
`00. =-~
`~ .....
`w
`0 .....,
`1-'
`0
`
`Ol
`
`"' ~ ""' ~
`
`"' w
`....:J
`N
`
`Petitioners - Exhibit 1010 Page 4
`
`

`

`-------v~ciour----------------------------------------~
`I
`(Fig.3a) - - - - - - - - - - - - .
`I
`I DTMF IN
`I 36
`
`I
`
`lJ
`l
`
`I
`I
`I
`1
`: TELCO
`I
`I
`I
`I
`I
`I
`I PHONE
`
`LATCH
`
`DTMF
`GEN
`(Fig 30) 300 SERIAL 1/0
`.
`MODEM CONTROL
`
`I
`
`I
`
`100
`-
`MODEM
`
`DIFF.
`AMP
`
`HOOK
`SENSE
`r
`1
`T .....____,
`
`T
`
`1
`
`L
`HYBRID
`DAA
`
`TEL 1/F
`CONTROL
`REG
`(WRITE)
`
`CARRIER DETECT
`
`PHONE STATUS: RING DETECT,
`HOOK SENSE. LINE SNIFF
`PHOTOCELL RELAY INPUT
`(FUTURE ENHANCEMENT)
`
`RING LINE
`IND. SNIFF
`
`LINE
`SEIZE
`
`LOCAL
`MODE
`
`STATUS REG
`----------------------
`(READ)
`
`Fig. 3b
`--------------------------------~
`
`Cj
`•
`rJ1 •
`
`~ = i ~
`
`0 p.
`N
`... ~
`
`~
`\C
`\C
`U1
`
`00 =(cid:173)(!)
`~
`~ sa,
`
`~
`Q
`
`01
`....
`~
`0'\
`~ .... w
`-....}
`N
`
`Petitioners - Exhibit 1010 Page 5
`
`

`

`U.S. Patent
`
`Oct. 24, 1995
`
`Sheet 5 of 10
`
`5,461,372
`
`0
`0
`L{)
`
`_J
`0
`0:::::
`1-
`z
`0
`u
`
`<.n z
`0
`1-
`<(
`() -
`z
`::;)
`~
`~
`0
`(..)
`
`CD
`0
`L{)
`
`z
`0
`1-
`<(
`z
`~ u
`-
`0
`0:::::
`L{)
`u
`<.n
`0
`
`<.n
`z
`0
`1-
`<(
`Ct:
`w
`0..
`0
`
`<(
`0
`L{)
`
`t
`~I
`
`,...--.,
`
`C/1
`Z
`
`I
`I
`I
`
`I O t -oZ I
`I
`<(I
`~0..
`I
`0
`U
`I
`I
`
`r---------------l
`I
`_,~1
`w I
`101 ~o~ul
`I 01
`l
`l ooool
`I 01
`I
`:
`l
`~§]§JEll
`L __ J ~ §I ~ § l
`EJ~EJ81
`L _______________ J
`
`Petitioners - Exhibit 1010 Page 6
`
`

`

`U.S. Patent
`
`Oct. 24, 1995
`
`Sheet 6 of 10
`
`5,461,372
`
`~I
`
`0
`L{)
`
`_J
`<(~
`o:::z
`W:J
`(/)
`
`~I
`
`0:::
`0
`(/)
`z(J)
`-w
`<(o
`~0
`0::::
`a_
`
`(1)0::::
`::JO
`cnUJ
`(/)
`<(W
`I-()
`..:t:O
`oo:::
`0..
`
`_J
`o_ J
`
`o:::W
`1-Z
`z<
`00..
`u
`
`l!J
`•
`C))
`
`c:
`
`Petitioners - Exhibit 1010 Page 7
`
`

`

`1000
`
`1 015A
`
`G__.--1 o2s
`
`>-'-<
`v.__ 1 040A
`I
`.---1030A
`
`~1040C
`
`~
`1 0408
`1 0158 -........_
`)-l{
`' / ~
`
`Q_1 o2s
`
`1001
`
`CJ--10400
`
`10200
`
`1002
`
`10308
`
`1040F_)J
`1035A
`
`~1040G
`
`1003
`
`1040H_jj
`
`1025__D
`
`1025, 61025
`__,Q
`
`1 0150
`"----1 0208
`10401 ~ 1
`
`. 1100
`
`"----- 1 020A
`
`1 v--- 1040J
`
`1025
`
`"o
`
`105011055
`
`(
`
`Fig. 6
`
`d •
`rJ'J.
`•
`1-C
`~
`~ f"'f'-
`
`0
`~
`~ ...
`I:.,J
`
`1-0
`\C
`\C
`til
`
`rJ). =(cid:173)
`('!)
`~
`-...J
`0
`~
`1-0
`0
`
`01
`\..9 ,a:.
`0\
`~
`\..9
`t;J
`'I
`N
`
`Petitioners - Exhibit 1010 Page 8
`
`

`

`ADDR
`
`I-'
`
`Ag~C~EDSES~
`RD/WR LOGIC
`P-
`
`I-'
`
`SYSTEM
`8000
`MOTHER
`BOARD
`CONNECTOR
`
`VOICE
`
`VOICE
`AND AMP
`FILTER
`
`DATA BUS
`
`PTMF
`
`::>--
`DATA
`BUS
`
`DTMF
`RECEIVER
`
`-
`SPEECH
`PROCESSOR
`
`I
`
`HIGH
`ADDR
`
`DATA BUS
`
`VOICE OUTPUT
`
`ALE
`
`ADDRESS
`LATCH
`
`.....
`
`LOW ADDRESS
`
`,..
`
`VOICE
`MEMORY -
`
`BANK SELECT
`
`~
`CONTROL
`REGISTER
`-
`
`DATA BUS
`
`STATUS
`REGISTER
`
`: A/D ANALOG TEMP TEMP
`TEMP SENSOR
`&
`1/F
`BUS
`1/F
`
`COM
`
`-
`
`VIRO
`
`INT1
`
`INT
`LOGIC
`
`----------
`
`DTMF INTERRUPT 1
`
`VOICE INTERRUPT
`A/D INTERRUPT
`INTERRUPT ENABLES
`
`Fig. 6a
`
`d •
`00.
`•
`~
`
`~ = ~
`
`0 p.
`
`N
`
`~ .. .......
`
`\C)
`\C)
`til
`
`rJJ. ::r
`(tl
`~
`oe
`s,
`....... =
`
`Ol
`"' ~
`0\
`~
`"' w
`-....1
`N
`
`Petitioners - Exhibit 1010 Page 9
`
`

`

`POINT
`NO.
`1
`2
`3
`4
`5
`6
`7
`8
`9
`10
`11
`12
`13
`-14
`15
`16
`17
`18
`19
`20
`21
`
`LEAVE WAKE
`X
`X
`X
`X
`X
`X
`X
`0
`X
`0
`X
`0
`X
`0
`p-
`1)
`p
`0
`y
`p
`y
`0
`y
`0
`0
`0
`p
`y
`p
`0
`0
`0
`0
`0
`p
`p
`p
`p
`p
`F
`p
`
`FIGURE
`ID NO
`NAME
`1020A WINDOW 1
`WINDOW 2
`10208
`1020C WINDOW 3
`DOOR 1
`1015A
`DOOR 2
`10158
`DOOR 3
`1015C
`DOOR 4
`10150
`LIGHT 1
`1040A
`LIGHT 2
`10408
`1040C
`LIGHT 3
`10400
`LIGHT 4
`1040E
`LIGHT 5
`LIGHT 6
`1040F
`1040G
`LIGHT 7
`1040H
`LIGHT 8
`-11r,HT Q
`1040J
`LIGHT 10
`1040K
`1035A
`[THERMOSTAT 1
`10358 THERMOSTAT 2
`1035C THERMOSTAT 3
`1055
`OUTLET
`X= ARMED
`P=PROGRAMMEO
`O=OFF
`Y=ON
`OW=ON WATCH
`BLANK=NO EFFECT OVER PREVIOUS STATUS
`
`MODES
`
`POOL
`PARTY WORK
`X
`X
`X
`X
`X
`~
`ow
`X
`X
`X
`X
`X
`ON
`X
`y
`p
`0
`p
`0
`0
`CY
`u
`0
`0
`0
`p
`p
`p
`
`y
`u
`y
`0
`y
`y
`
`y
`
`SLEEP
`X
`X
`X
`X
`X
`X
`X
`0
`0
`0
`0
`0
`Q
`Q
`0
`0
`0
`p
`p
`p
`
`PLAY
`0
`0
`0
`0
`0
`0
`ON
`
`RETURN OPEN
`0
`0
`0
`0
`0
`0
`X
`0
`X
`0
`X
`0
`X
`0
`
`I
`
`p
`p
`p
`
`Fig. 7
`
`Cj
`•
`00
`•
`~
`
`~
`
`0 p.
`N
`... ~
`.....
`'-=
`'-=
`(JJ
`
`00. ::r
`ttl
`~
`'-=
`0
`'""'
`.....
`c
`
`01
`"' .a;.
`=" ~
`"' w
`"-l
`N
`
`Petitioners - Exhibit 1010 Page 10
`
`

`

`U.S. Patent
`
`Oct. 24, 1995
`
`Sheet 10 of 10
`
`5,461,372
`
`1210
`
`NO
`
`1225
`
`MAKE
`REQUIRED
`CHANGES
`
`1235
`
`MAKE
`REQUIRED
`CHANGES
`
`YES
`
`1245
`
`MAKE
`REQUIRED
`CHANGES
`
`NO
`
`NO
`
`NO
`
`YES
`
`1216
`
`YES
`
`Fig.B
`
`Petitioners - Exhibit 1010 Page 11
`
`

`

`5,461,372
`
`1
`SYSTEM AND METHOD FOR MODIFYING
`SECURITY IN A SECURITY SYSTEM
`
`BACKGROUND OF THE INVENTION
`
`2
`in favor of continuing application Ser. No. 08/216,783),
`entitled A SYSTEM AND METHOD FOR AUTOMATI(cid:173)
`CALLY CONTROLLING A SPACE, by Stanley-Arslanok
`et al. which is commonly owned by the assignee of the
`5 present application.
`In addition, recent improvements in telecommunications
`technology allows the building owner to use a telephone,
`either from inside or outside the protected building, to
`modify the status of the alarm system. This may cause the
`10 building owner some concern with the proliferation of
`hackers who attemp to break into computer systems to
`modify the programming of those systems. If a hacker were
`to break into the alarm system via the telecommunictions
`network, security of the protected building could be com-
`15 prised.
`
`SUMMARY OF THE INVENTION
`
`1. Field of the Invention
`The present invention includes a system for automatically
`controlling a space by integrating the control and function of
`a plurality of control systems and devices utilized within the
`space, by using a principal control system, such as a security
`system. These control systems and devices can include an
`environmental control system, a telecommunications sys(cid:173)
`tem, a lighting control system, and other electrical control
`systems including those which control individual electrical
`or electronic devices such as appliances, audio devices and
`video devices.
`The invention can be accessed by a user from within the
`space to be controlled, or remotely through the use of a
`telecommunications interface. The control systems may be 20
`separately operable, although not automated, when used
`without being connected to the principal control system, or
`when the principal control system has failed.
`2. Description of Related Art
`Small building security systems for sensing and reporting
`intrusions into a building are well known in the art. Typi(cid:173)
`cally, a plurality of sensors, such as motion sensors, door
`sensors, window sensors and other sensors are connected to
`a processor to provide the processor with an alarm indica(cid:173)
`tion, such as movement or the opening of a door or window.
`The processor is preprogrammed to initiate certain actions
`upon the receipt of an alarm indication, such as sounding an
`internal alarm signal or dialing a remote alarm monitoring
`station through a telecommunications interface. For the
`small building market (house, small retail store, restaurant)
`these systems have been relatively simple.
`Improvements in alarm systems include the ability to
`define in the processor, certain security levels which will
`cause the processor to handle alarm indications from a
`sensor in a predetermined way. For example, three levels of
`conditions for the handling of an alarm indication may be
`defined: 1) armed; 2) on watch; and 3) off. A sensor whose
`alarm indication is to be handled as armed, may cause the
`processor to initiate a call to the remote alarm monitoring 45
`station and to create a local alarm signal when an alarm
`indication occurs at the armed sensor. A sensor whose alarm
`indication is to be handled as on watch, may cause the
`processor to initiate a local alarm only when an alarm
`indication is received from that sensor. Lastly, a sensor
`whose alarm indication is to be handled as off may cause the
`processor to ignore any alarm indication received from that
`sensor. Typically, the highest level of security is armed, next
`is on watch, and the lowest is off.
`Typically, each sensor may be associated with any of the 55
`above identified levels. This is typically done through an
`operator interface which is connected to the processor. The
`processor may be programmed to identify each sensor with
`a level individually, or "modes" of operation may be defined
`where all sensors connected to the security system are set to 60
`one of the predefined levels upon the selection of a prepro(cid:173)
`grarnmed mode.
`As building control systems for small buildings have
`continued to evolve, integration of alarm systems with other
`building control systems, such as the HVAC and lighting 65
`systems has occurred. For description of a complete system,
`see U.S. patent application Ser. No. 07/811,508 (abandoned
`
`The present invention is a security system which prevents
`a lowering of the security level of the alarm system from a
`phone not located within the protected building. The security
`system can be operated via a plurality of input devices,
`including a security panel, or panels located in one or more
`locations within the home, telephones located within the
`25 home via a voice module, and remotely from a telephone or
`similar telecommunications device also via the voice mod(cid:173)
`ule. However, the security system may only increase the
`level of security through the use of an external phone. The
`security system may be connected to other control systems
`30 such as HVAC or lighting control systems.
`The security system includes a processor having memory,
`one or more sensors connected to the processor, and tele(cid:173)
`communications interface connected to the alarm processor.
`The processor includes a discrimination means for deter-
`35 mining where a phone is located which is initiating control
`actions for the security system. If the phone is determined to
`be outside the protected space, any control actions initiated
`through the phone which cause a decrease in security are
`ignored. Control actions of other control systems connected
`to the security system which are initiated through the
`external phone are allowed to occur.
`The discrimination means may be implemented by a
`routine performed by the processor. A flag may be set in
`memory which either allows or prohibits an operator from
`lowering the security level of a point when operating the
`system from outside the protected area.
`Other objects, features and advantages of the invention
`may be apparent to one of ordinary skill in the art, upon
`examination of the drawings and detailed description of the
`preferred embodiment.
`
`50
`
`40
`
`BRIEF DESCRIPTION OF THE DRAWINGS
`
`FIG. 1 is a block diagram of an embodiment of a system
`for automating the control of a space, featuring a security
`system as a principal control system, a plurality of control
`systems, and the interconnections between the security sys(cid:173)
`tem and the plurality of control systems.
`FIG. 2 is a block diagram of the security system of FIG.
`1, illustrating the general location and interrelation of certain
`principal elements.
`FIG. 3a is a more detailed functional block diagram of the
`security system of FIG. 2.
`FIG. 3b is a continuation of the functional block diagram
`of FIG. 3a.
`FIG. 4 is a front view of the home security panel.
`
`Petitioners - Exhibit 1010 Page 12
`
`

`

`5,461,372
`
`3
`FIG. 5 is a block diagram of a home security panel
`showing its interconnection to the control panel.
`FIG. 6 is a floor plan of a sample house using the
`inventive system.
`FIG. 6a is a block diagram of a voice access system of the
`present invention.
`FIG. 7 is a matrix of modes, statuses and points within the
`house of FIG. 7.
`FIG. 8 is a flow chart of the method of operation of the
`inventive system.
`FIG. 9 is a block diagram of the processor 50.
`
`DETAILED DESCRIPTION OF THE
`PREFERRED EMBODIMENT
`
`Referring now to FIG. 1, an automation system 10 for
`automatically controlling a space is illustrated. In a preferred
`embodiment of the invention as described herein, automa(cid:173)
`tion system 10 would be particularly suitable for automati(cid:173)
`cally controlling a building, such as a small commercial
`building, a home, or a similar building. Automation system
`10 comprises a principal control system 12 connected to a
`plurality of control systems 14. In a preferred embodiment
`of the invention, principal control system 12 is security
`system 16 electrically connected to plurality of control
`systems 14, including lighting system 18 and thermostat 22.
`Other control systems 14 could be electrically connected to
`security system 16, including personal computer system 24,
`low voltage control system 26, entertainment system 28,
`printer system 30, and video system 32, as well as any
`number of other systems which might be located in or near
`the building, and including systems which could be remote
`from the building and interconnected via telecommunica(cid:173)
`tions device 34 or otherwise. In a preferred embodiment of
`the invention, a control system 14 which could be remote
`from security system 16, could include programming system
`35. The following describes security system 16, plurality of
`control devices 14 and their interconnection.
`Referring now to FIG. 2, security system 16 includes
`several principal elements including control panel 36, inter(cid:173)
`connections 38, one or more home security panels (HSP) 40,
`and plurality of control points 84.
`Referring now to FIG. 3a, control panel 36 comprises
`processor means 44 and memory means 46 which are
`interconnected by address line 48 and data line 49. In a
`preferred embodiment, processor means 44 comprises a
`plurality of separate processors including main processor 50,
`data bus processor 52 and control point processor 54, 50
`however, processor means could also be implemented in a
`single device. In a preferred embodiment, the three proces(cid:173)
`sors are all 8-bit microprocessors or microcontrollers, and
`are all interconnected via address line 48 and data line 49.
`Main processor 50 is the principal data processing device
`for automation system 10 (not illustrated). It is capable of
`providing a plurality of output signals 38, for transmission
`to the plurality of control systems 14, in response to the
`receipt of a plurality of input signals 60 (not shown). Input
`signals 60 can be provided from systems and devices
`comprising control systems 14, HSP 40 and other systems
`and devices capable of providing input signals 60. Main
`processor 50 is capable of transmitting to, and receiving
`signals from, other processors, such as data bus processor 52
`and control point processor 54, and other devices.
`Referring now to FIGS. 2 and 3a, data bus processor 52
`controls the communication of information between main
`
`55
`
`5
`
`15
`
`4
`processor 50 of security system 16 and control systems 14,
`such as thermostat system 22, as well as other devices which
`are connected to data bus 62, such as HSP 40. The exchange
`of information between data bus processor 52, control
`systems 14, and devices such as HSP 40, is accomplished
`through the use of an encoded (4B-8B) data stream utilizing
`a code, and a method of receiving and transmitting the code
`described in the co-pending application, "A DC Balanced
`4B/8B Binary Block Code for Digital Communications",
`10 filed as U.S. application Ser. No. 07/811,508, now aban(cid:173)
`doned in favor of continuing application 08/216,783, by D.
`Myers, which is hereby incorporated by reference.
`Control point processor 54 is capable of receiving a
`plurality of inputs from control points 84, and transmitting
`the input information to main processor 50 via address line
`48 and data line 49.
`As described herein, in addition to processor means 44,
`control panel 36 also comprises memory means 46. In a
`preferred embodiment, memory means 46 comprises a com-
`20 bination including Electrically Programmable Read Only
`Memory (EPROM) 64, Random Access Memory (RAM) 66
`and Electrically Erasable Read Only Memory (EEPROM)
`68. Particularly, memory means 46 is capable of storing a
`preprogramrned set of instructions 70 relating to a set of
`25 control conditions or modes desired within the building, and
`providing these instructions to main processor 50 via
`address line 48 and data line 49 in response to a request
`made by an operator.
`Referring now to FIGS. 2 and 3a, having described the
`30 elements of control panel 36, automation system 10 also
`comprises plurality of interconnections 38 to provide for the
`connection of principal control system 12 and plurality of
`control systems 14. In a preferred embodiment, this arrange(cid:173)
`ment comprises security system 16 interconnected with
`35 control systems 14, such as lighting system 18, voice access
`system 20 and thermostat 22, via lighting interconnection
`74, voice access interconnection 76 and Hbus interconnec(cid:173)
`tion 78, respectively. In a preferred embodiment, these
`interconnections are all accomplished via digital data inter-
`40 faces.
`Referring now to FIG. 3a, lighting interconnection 74 is
`accomplished via a direct RS232 serial interface to main
`processor 50. Voice access interconnection 76 to main
`45 processor 50 is accomplished via address line 48 and data
`line 49, and thermostat interconnection is accomplished via
`a data bus using an RS485 serial interface to data bus
`processor 52, which is in tum connected via a serial interface
`to main processor 50.
`Referring now to FIG. 4, security system 16 also com(cid:173)
`prises an HSP 40, which is now further described. HSP 40
`is a man-machine interface (MMI). In a preferred embodi(cid:173)
`ment, the MMI comprises a touch key-pad 80 and a display
`· 82, such as a liquid crystal display. Display 82 is capable of
`identifying for an operator the available choices with respect
`to control of the security system 16, as well as displaying
`certain indications of system status, such as time, date,
`temperature, and current mode 82. In one embodiment,
`touch key-pad 80 has, on the key-pad, a combination of
`60 numeric keys, arrow symbol keys and word keys to facilitate
`operator selections, as discussed further herein, and as
`shown in FIG. 4.
`Referring now to FIG. 2, security system 16 also com(cid:173)
`prises control points 84. Control points 84 include two types
`65 of security points, RF points 86 and hardwire points 88.
`These control points are of a type well known in the art, such
`as those utilized in any one of the System 6000 series
`
`Petitioners - Exhibit 1010 Page 13
`
`

`

`5,461,372
`
`10
`
`25
`
`5
`security systems manufactured and sold by Honeywell Inc.,
`such as model 6400, and are interconnected to control panel
`36 through control point processor 54, using interconnection
`methods and materials known to those of ordinary skill in
`the art. The exact number of RF points 86 and hardwire 5
`points 88 is a function of the capabilities of control point
`processor 54. Various adapters are known to those of ordi(cid:173)
`nary skill in the art which can be utilized to expand the
`number of control points 84 which can be attached to control
`point processor 54. Control point processor 54 is capable of
`monitoring and exercising control over individual control
`points 84, and providing information about any individual
`control point 84 to main processor 50. Therefore, this
`information is available to security system 16, and particu(cid:173)
`larly so that modes can define desired states of control, such
`as armed, disarmed and on-watch, as further described 15
`herein, for either individual control points, or groups of
`control points, depending on the requirements of the par(cid:173)
`ticular mode.
`Automation system 10 comprises principal control system
`12 and a plurality of control systems 14. In a preferred
`embodiment, automation system 10 comprises security sys(cid:173)
`tem 16, the elements of which are described herein, and
`control systems 14, including lighting system 18, voice
`access system 20, thermostat system 22, and programmer
`system 35, and may also include individual devices such as
`telecommunication device 34, which are further discussed
`below.
`Lighting system 18 is a commercially available system
`sold by X-10 Powerhouse, as Model No. CP290, and is of
`a type known to those of ordinary skill in the art. Lighting
`system 18 uses powerline carrier based signal to automati(cid:173)
`cally switch power on or off to control modules, which can
`be used in conjunction with lights and other electrical
`appliances and devices. Its use is not limited to lighting
`devices only. For instance, lighting system 18 could be used
`to control appliances such as a coffee maker, electric heater,
`or other devices which can be operated by on/off switching
`of AC power. Lighting system 18 is connected to security
`system 16, using lighting interconnection 74, and is capable
`of receiving a control signal from security system 16. In a
`preferred embodiment, lighting system 18 is capable of
`operation independently of security system 16, in the event
`that security system 16 ceases to provide control signals as
`described above.
`Voice access system 20 is shown and described in FIGS.
`6a and 3b. Voice access system 20 incorporates speech
`synthesizer 90. Speech synthesizer 90 is combined with
`components known to those of ordinary skill in the art, as
`described in FIG. 6a, to produce a system which allows an
`operator to operate security system 16 remotely through the
`use of telecommunications device 34, such as a touch tone
`telephone 34. Voice access system 20 allows an operator to
`operate a security system 16 remotely, by selecting the same
`modes that are available to the operator through HSP 40.
`Touch tone telephone 34 can be a telephone located in the
`space to be controlled, such as one or more of touch tone
`telephones located in a building, or, touch tone telephone 34
`may be remote from the space which is to be controlled, such
`as a cellular telephone or telephone located in another
`building. Voice access module 20 also allows an operator to
`receive certain information from various control systems 14
`which are adapted to communicate information concerning
`their status. Voice access system 20 also may also incorpo(cid:173)
`rate security features which require that an operator enter 65
`certain passcodes before being able to effect changes to
`security system 16. In particular, passcode entry may be
`
`6
`required whenever the level of security is to be reduced.
`Note that FIG. 8 shows another security measure for pre(cid:173)
`venting some decreases in security. Voice access system 20
`also incorporates a voice-based menu scheme wherein voice
`access system 20 describes to an operator the various
`selections which are available, and provides the operator
`directions as to how to make a particular selection of choice.
`In a preferred embodiment, control may be exercised
`through voice access system 20 over various elements of an
`automation system 10, such as security system 16, lighting
`system 18, and thermostat system 22. Voice access system
`20 is connected to security system 16 as described herein,
`via voice access interconnection 76.
`Thermostat system 22 comprises a thermostat of the type
`described in U.S. Pat. No. 4,606,401 to Levine, et al., and
`U.S. Pat. No. 4,469,274 to Levine, et al., which are hereby
`incorporated by reference. Thermostat system 22 comprises
`a communicating thermostat, such as is described in the
`following copending applications: "Communicating Ther(cid:173)
`mostat", Ratz, et al., U.S. Pat. No. 5,197,668; and "Com-
`20 municating Thermostat", Ratz, et al., U.S. Pat. No. 5,203,
`497 and "Electronic Time Thermostat with a Temporary
`Next Period Adjustment Means", U.S. Pat. No. 5,230,482,
`all of which are commonly owned by the owner of the
`present application. Thermostat system 22 is capable of
`receiving control signals from security system 16, such that
`the features which are available to an operator from ther(cid:173)
`mostat system 22, such as the availability to define certain
`set-back and set-up times and temperatures, from security
`system 16. Thermostat system 22 is also capable of being
`interrupted by security system 16 to define a NOW and
`NEXT time and temperature, such that the control of secu(cid:173)
`rity system 16 may allow an operator to, upon invocation of
`certain modes, define a current control temperature which
`corresponds to "NOW' and a future control time and
`temperature which correspond to "NEXT". Thermostat sys(cid:173)
`tem 22 is also capable of transmitting status information to
`security system 16 regarding the status of the control con(cid:173)
`ditions of thermostat system 22, comprising current set(cid:173)
`points, current time settings and other parameters having to
`40 do with the schedule related to certain programmed set(cid:173)
`back/set-up schedules. Thermostat system 22 is connected to
`security system 16 via Hbus interconnection 78.
`Programmer system 35 may be utilized to define modes
`for security system 16, by programming instructions related
`to the control of security system 16 and various of control
`systems 14, into memory means 46. Programmer system
`comprises a computer, such as a computer which is capable
`of executing Disk Operating System (DOS) such as are
`50 known to those of ordinary skill in the art, and a program for
`defining a particular mode. The program converts certain
`menu options related to control conditions of the various
`elements of automation system 10 to define a particular
`mode. A plurality of modes can be defined by the program
`55 and can be transferred to memory means 46 using a single
`step, or series of steps.
`Having described security system 16 and control systems
`14, including lighting control system 18, voice access sys(cid:173)
`tem 20, thermostat system 22 and programmer system 35,
`the functions of these systems together is further described
`hereinbelow.
`Prior to utilization of security system 16, security system
`16 must have preprogrammed instructions 70 defining the
`control instructions necessary to operate security system 16
`and control systems 14, stored in memory means 46. These
`preprogrammed instructions 70 define certain modes as
`described herein. This can be accomplished by connecting
`
`30
`
`35
`
`45
`
`60
`
`Petitioners - Exhibit 1010 Page 14
`
`

`

`5,461,372
`
`20
`
`30
`
`35
`
`7
`programmer system 35 to security system 16 via a modem,
`or by connecting programmer system 36 directly to security
`system 16 through a serial digital interface, such as an
`RS232 serial interface. Once programmer system 35 has
`been connected to security system 16, preprogramrned 5
`instructions 70 can be stored in memory means 46. Once this
`has been accomplished, security system 16 is available for
`use by an operator.
`In order to operate security system 16, an operator must
`make a selection of a mode. This can be accomplished in one 10
`of several ways. First, selection of a mode can be accom(cid:173)
`plished by utilizing HSP 40. Secondly, a touch-tone tele(cid:173)
`phone 92 located within the building can be utilized. Also,
`a touch-tone telephone 92 located outside of the space to be
`controlled can be used.
`Referring now to FIG. 3a, once a mode has been selected,
`main processor 50 will retrieve preprogramrned instructions
`70, 71 from memory means 46, corresponding to the
`selected mode. Then main processor 50 will execute pre(cid:173)
`programmed instructions and provide control signals to
`control systems 14, for which preprogrammed instructions
`70, 71 have designated to provide a function in the mode
`selected. During the selection process, preprogramrned
`instructions 70 and 71 may also require either passcode
`entry from touch-key pad 80 in order to ensure that an
`operator has sufficient authority to implement the mode
`selected or that reduction in security level be denied because
`the operator has accessed the system from outside the
`protected area. Instructions 70, 71 perform the discrimina(cid:173)
`tion for determining whether a level reduction is requested
`from inside or outside the protected area.
`Once a mode has been selected and

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket