Takeover of security network
First Claim
Patent Images
1. A system comprising:
- a gateway device located at a first location;
a takeover component coupled to the gateway device, the takeover component configured to extract security data of a security system from a first controller coupled to the security system, the security system comprising security system components; and
a connection management component configured to facilitate access to a security network comprising a second controller and the gateway device, wherein the second controller is configured to communicate with the security system components to replace one or more functions of the first controller in management of the security system components, and wherein the security data extracted from the first controller is used to configure at least the second controller to enable the communication with the security system components.
1 Assignment
0 Petitions
Accused Products
Abstract
A security system is described for managing a premises. The security system comprises security system components and a first controller. A takeover component receives security data of the security system from the first controller. The security data is used to configure a second controller to communicate with the security system. The second controller communicates with the security system components and replaces the first controller in management of the security system.
1520 Citations
75 Claims
-
1. A system comprising:
-
a gateway device located at a first location; a takeover component coupled to the gateway device, the takeover component configured to extract security data of a security system from a first controller coupled to the security system, the security system comprising security system components; and a connection management component configured to facilitate access to a security network comprising a second controller and the gateway device, wherein the second controller is configured to communicate with the security system components to replace one or more functions of the first controller in management of the security system components, and wherein the security data extracted from the first controller is used to configure at least the second controller to enable the communication with the security system components. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 29, 30, 31, 32, 33, 34, 35, 36, 37, 38, 39, 40, 41, 42, 43, 44, 45, 46, 47, 48, 49, 50, 51, 52, 53, 54, 55, 56, 57, 58, 59, 60, 61, 62, 63, 64, 65, 66, 67, 68, 69, 70, 71, 72, 73)
-
-
74. A method comprising:
-
determining, by a takeover component coupled to a gateway device at a first location and from a first controller of a security system at the first location, security data stored by the first controller, wherein the security system comprises security system components; determining, based on the security data, a configuration for a second controller; and causing, based on the configuration, the second controller to replace one or more functions of the first controller in the management of the security system, wherein the second controller is configured to communicate, via a security network at the first location, with the security system components.
-
-
75. A device comprising:
-
one or more processors; and memory storing instructions that, when executed by the one or more processors, cause the device to; determine, from a first controller of a security system at a first location, security data stored by the first controller, wherein the security system comprises security system components; determine, based on the security data, a configuration for a second controller; and cause, based on the configuration, the second controller to replace one or more functions of the first controller in the management of the security system, wherein the second controller is configured to communicate, via a security network at the first location, with the security system components.
-
Specification