Integrated security system with parallel processing architecture
First Claim
Patent Images
1. An apparatus comprising:
- one or more processors; and
memory storing instructions that, when executed by the one or more processors, cause the apparatus to;
determine a first computing resource usage of the apparatus, wherein the first computing resource usage is associated with a first subset of a plurality of devices of a security, monitoring, and automation (SMA) network, wherein the apparatus is in communication with the plurality of devices, and wherein the SMA network and the apparatus are located at a premises;
determine a second computing resource usage of the apparatus, wherein the second computing resource usage is associated with a second subset of the plurality of devices;
compare the first computing resource usage and the second computing resource usage; and
modify, based on the comparing the first computing resource usage and the second computing resource usage, one or more operations associated with the first subset of the plurality of devices without modifying operations associated with the second subset of the plurality of devices.
2 Assignments
0 Petitions
Accused Products
Abstract
An integrated security system that includes a security coprocessor coupled to a conventional security system panel and an interactive security system. The integrated security system enables conventional security system features as well as the consumer-oriented interactive features and functions of an interactive security system without sacrificing reliability or the significant burden and cost associated with frequent software updates associated with conventional security systems. The integrated security system also minimizes or eliminates the need for new battery backup circuitry or larger batteries.
1583 Citations
77 Claims
-
1. An apparatus comprising:
-
one or more processors; and memory storing instructions that, when executed by the one or more processors, cause the apparatus to; determine a first computing resource usage of the apparatus, wherein the first computing resource usage is associated with a first subset of a plurality of devices of a security, monitoring, and automation (SMA) network, wherein the apparatus is in communication with the plurality of devices, and wherein the SMA network and the apparatus are located at a premises; determine a second computing resource usage of the apparatus, wherein the second computing resource usage is associated with a second subset of the plurality of devices; compare the first computing resource usage and the second computing resource usage; and modify, based on the comparing the first computing resource usage and the second computing resource usage, one or more operations associated with the first subset of the plurality of devices without modifying operations associated with the second subset of the plurality of devices. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12)
-
-
13. An apparatus comprising:
-
one or more processors; and memory storing instructions that, when executed by the one or more processors, cause the apparatus to; determine a first computing resource usage of the apparatus, wherein the first computing resource usage is associated with transmissions between the apparatus and a first subset of a plurality of devices of a security, monitoring, and automation (SMA) network, wherein the SMA network and the apparatus are located at a premises; determine a second computing resource usage of the apparatus, wherein the second computing resource usage is associated with transmissions between the apparatus and a second subset of the plurality of devices; compare the first computing resource usage and the second computing resource usage; and modify, based on the comparing the first computing resource usage and the second computing resource usage, operations of the apparatus associated with the transmissions between the apparatus and the first subset of the plurality of devices without modifying operations of the apparatus associated with the transmissions between the apparatus and the second subset of the plurality of devices. - View Dependent Claims (14, 15, 16, 17, 18)
-
-
19. A method comprising:
-
determining, by an apparatus, a first computing resource usage of the apparatus, wherein the first computing resource usage is associated with a first subset of a plurality of devices of a security, monitoring, and automation (SMA) network, wherein the apparatus is in communication with the plurality of devices, and wherein the SMA network and the apparatus are located at a premises; determining, by the apparatus, a second computing resource usage of the apparatus, wherein the second computing resource usage is associated with a second subset of the plurality of devices; comparing the first computing resource usage and the second computing resource usage; and modifying, based on the comparing the first computing resource usage and the second computing resource usage, one or more operations associated with the first subset of the plurality of devices without modifying operations associated with the second subset of the plurality of devices. - View Dependent Claims (20, 21, 22, 23, 24, 25, 26, 27, 28)
-
-
29. A system, comprising:
-
a security, monitoring, and automation (SMA) network comprising a plurality of devices located at a premises; and an apparatus located at the premises and in communication with the plurality of devices, wherein the apparatus is configured to; control operations associated with the plurality of devices; determine a first computing resource usage of the apparatus, wherein the first computing resource usage is associated with a first subset of the plurality of devices; determine a second computing resource usage of the apparatus, wherein the second computing resource usage is associated with a second subset of the plurality of devices; compare the first computing resource usage and the second computing resource usage; and modify, based on the comparing the first computing resource usage and the second computing resource usage, one or more operations associated with the first subset of the plurality of devices without modifying operations associated with the second subset of the plurality of devices. - View Dependent Claims (30, 31, 32, 33, 34, 35, 36, 37, 38, 39)
-
-
40. An apparatus comprising:
-
one or more processors; and memory storing instructions that, when executed by the one or more processors, cause the apparatus to; determine a first computing resource usage of the apparatus, wherein the first computing resource usage is associated with a first subset of a plurality of devices of a security, monitoring, and automation (SMA) network, wherein the apparatus is in communication with the plurality of devices, and wherein the SMA network and apparatus are located at a premises; determine a second computing resource usage of the apparatus, wherein the second computing resource usage is associated with a second subset of the plurality of devices; compare the first computing resource usage and the second computing resource usage; and modify, based on the comparing the first computing resource usage and the second computing resource usage, one or more operations of the first subset of the plurality of devices without modifying operations of the second subset of the plurality of devices. - View Dependent Claims (41, 42, 43, 44, 45, 46)
-
-
47. A method comprising:
-
determining, by an apparatus, a first computing resource usage of the apparatus, wherein the first computing resource usage is associated with transmissions between the apparatus and a first subset of a plurality of devices of a security, monitoring, and automation (SMA) network, wherein the apparatus is in communication with the plurality of devices, and wherein the SMA network and the apparatus are located at a premises; determining, by the apparatus, a second computing resource usage of the apparatus, wherein the second computing resource usage is associated with transmissions between the apparatus and a second subset of the plurality of devices; comparing the first computing resource usage and the second computing resource usage; and modifying, based on the comparing the first computing resource usage and the second computing resource usage, operations of the apparatus associated with the transmissions between the apparatus and the first subset of the plurality of devices without modifying operations of the apparatus associated with the transmissions between the apparatus and the second subset of a plurality of devices. - View Dependent Claims (48, 49, 50, 51, 52, 53)
-
-
54. An apparatus comprising:
-
one or more processors; and memory storing instructions that, when executed by the one or more processors, cause the apparatus to; determine a first computing resource usage of the apparatus, wherein the first computing resource usage is associated with a first subset of a plurality of devices of a security, monitoring, and automation (SMA) network, wherein a security subnetwork of the SMA network comprises the first subset of the plurality of devices, wherein the apparatus is in communication with the first subset of the plurality of devices, and wherein the SMA network and apparatus are located at a premises, determine a second computing resource usage of the apparatus, wherein the second computing resource usage is associated with a second subset of the plurality of devices of the SMA network, wherein the apparatus is in communication with the first subset of the plurality of devices, and wherein the second subset of the plurality of devices is external to the security subnetwork, compare the first computing resource usage and the second computing resource usage, and modify, based on the comparing the first computing resource usage and the second computing resource usage, one or more operations associated with the first subset of the plurality of devices without modifying operations associated with the second subset of the plurality of devices. - View Dependent Claims (55, 56, 57, 58, 59)
-
-
60. A system, comprising:
-
a security, monitoring, and automation (SMA) network comprising a plurality of devices located at a premises; and an apparatus located at the premises and in communication with the plurality of devices, wherein the apparatus is configured to; control operations associated with the plurality of devices; determine a first computing resource usage of the apparatus, wherein the first computing resource usage is associated with transmissions between the apparatus and a first subset of the plurality of devices; determine a second computing resource usage of the apparatus, wherein the second computing resource usage is associated with transmissions between the apparatus and a second subset of the plurality of devices; compare the first computing resource usage and the second computing resource usage; and modify, based on the comparing the first computing resource usage and the second computing resource usage, one or more operations of the apparatus associated with the transmissions between the apparatus and the first subset of the plurality of devices without modifying operations of the apparatus associated with the transmissions between the apparatus and the second subset of the plurality of devices. - View Dependent Claims (61, 62, 63, 64, 65)
-
-
66. A system, comprising:
-
a security, monitoring, and automation (SMA) network comprising a plurality of devices located at a premises; and an apparatus located at the premises and in communication with the plurality of devices, wherein the apparatus is configured to; control operations associated with the plurality of devices; determine a first computing resource usage of the apparatus, wherein the first computing resource usage is associated with a first subset of the plurality of devices, wherein a security subnetwork of the SMA network comprises the first subset of the plurality of devices; determine a second computing resource usage of the apparatus, wherein the second computing resource usage is associated with a second subset of the plurality of devices, wherein the second subset of the plurality of devices is external to the security subnetwork; compare the first computing resource usage and the second computing resource usage; and modify, based on the comparing the first computing resource usage and the second computing resource usage, one or more operations associated with the first subset of the plurality of devices without modifying operations associated with the second subset of the plurality of devices. - View Dependent Claims (67, 68, 69, 70, 71)
-
-
72. A method comprising:
-
determining, by an apparatus, a first computing resource usage of the apparatus, wherein the first computing resource usage is associated with a first subset of a plurality of devices of a security, monitoring, and automation (SMA) network, wherein a security subnetwork of the SMA network comprises the first subset of the plurality of devices, wherein the apparatus is in communication with the first subset of the plurality of devices, and wherein the SMA network and apparatus are located at a premises; determining, by the apparatus, a second computing resource usage of the apparatus, wherein the second computing resource usage is associated with a second subset of the plurality of devices of the SMA network, wherein the apparatus is in communication with the first subset of the plurality of devices, and wherein the second subset of the plurality of devices is external to the security subnetwork; comparing the first computing resource usage and the second computing resource usage; and modifying, based on the comparing the first computing resource usage and the second computing resource usage, one or more operations associated with the first subset of the plurality of devices without modifying operations associated with the second subset of the plurality of devices. - View Dependent Claims (73, 74, 75, 76, 77)
-
Specification