Hybrid mesh network monitoring signaling environment
First Claim
Patent Images
1. An electronic system comprising:
- at least one processor; and
at least one computer-readable medium coupled to the at least one processor having instructions stored therein which, when executed by the at least one processor, causes the at least one processor to perform operations comprising;
receiving, by a monitoring server and through a first communication pathway between the monitoring server and a first communication device associated with a first monitoring system of a first property, one or more data transmissions related to detection of events at the first property by the first monitoring system;
based on the one or more data transmissions, determining, by the monitoring server, that the first communication pathway does not presently satisfy one or more transmission standards;
based on the determination that the first communication pathway does not presently satisfy the one or more transmission standards, identifying a second communication device that is configured to exchange data transmissions with the monitoring server through a second communication pathway and that is configured to exchange data transmissions with the first communication device through a peer communication pathway, the second communication device being associated with a second monitoring system of a second property that is distinct from the first property;
generating, by the monitoring server, an encryption code for the monitoring system data detected by the first monitoring system at the first property;
transmitting, by the monitoring server, an instruction to the first communication device, to encrypt the monitoring system data detected by the first monitoring system at the first property based on the generated encrypted code; and
reconfiguring, by the monitoring server, the first communication device to transmit encrypted monitoring system data detected by the first monitoring system at the first property through the peer communication pathway to the second communication device associated with the second monitoring system of the second property, the second communication device being configured to relay the encrypted monitoring system data received through the peer communication pathway to the monitoring server through the second communication pathway,wherein the encrypted monitoring system data detected by the first monitoring system at the first property is inaccessible to the second communication device associated with the second monitoring system of the second property when the second communication device relays the encrypted monitoring system data through the second communication pathway.
1 Assignment
0 Petitions
Accused Products
Abstract
Techniques are described to improve the robustness of communication of critical life safety data when broadband networks are used as uphaul networks. Monitoring systems are examples of critical monitoring appliances, but the techniques described throughout this disclosure may be applied to any type of critical monitoring appliances, such as life-support devices, fire detectors, smoke detectors, and the like.
-
Citations
20 Claims
-
1. An electronic system comprising:
-
at least one processor; and at least one computer-readable medium coupled to the at least one processor having instructions stored therein which, when executed by the at least one processor, causes the at least one processor to perform operations comprising; receiving, by a monitoring server and through a first communication pathway between the monitoring server and a first communication device associated with a first monitoring system of a first property, one or more data transmissions related to detection of events at the first property by the first monitoring system; based on the one or more data transmissions, determining, by the monitoring server, that the first communication pathway does not presently satisfy one or more transmission standards; based on the determination that the first communication pathway does not presently satisfy the one or more transmission standards, identifying a second communication device that is configured to exchange data transmissions with the monitoring server through a second communication pathway and that is configured to exchange data transmissions with the first communication device through a peer communication pathway, the second communication device being associated with a second monitoring system of a second property that is distinct from the first property; generating, by the monitoring server, an encryption code for the monitoring system data detected by the first monitoring system at the first property; transmitting, by the monitoring server, an instruction to the first communication device, to encrypt the monitoring system data detected by the first monitoring system at the first property based on the generated encrypted code; and reconfiguring, by the monitoring server, the first communication device to transmit encrypted monitoring system data detected by the first monitoring system at the first property through the peer communication pathway to the second communication device associated with the second monitoring system of the second property, the second communication device being configured to relay the encrypted monitoring system data received through the peer communication pathway to the monitoring server through the second communication pathway, wherein the encrypted monitoring system data detected by the first monitoring system at the first property is inaccessible to the second communication device associated with the second monitoring system of the second property when the second communication device relays the encrypted monitoring system data through the second communication pathway. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A method performed by one or more computers, the method comprising:
-
receiving, by a monitoring server and through a first communication pathway between the monitoring server and a first communication device associated with a first monitoring system of a first property, one or more data transmissions related to detection of events at the first property by the first monitoring system; based on the one or more data transmissions, determining, by the monitoring server, that the first communication pathway does not presently satisfy the one or more transmission standards; based on the determination that the first communication pathway does not presently satisfy the one or more transmission standards, identifying a second communication device that is configured to exchange data transmissions with the monitoring server through a second communication pathway and that is configured to exchange data transmissions with the first communication device through a peer communication pathway, the second communication device being associated with a second monitoring system of a second property that is distinct from the first property; and generating, by the monitoring server, an encryption code for the monitoring system data detected by the first monitoring system at the first property; transmitting, by the monitoring server, an instruction to the first communication device, to encrypt the monitoring system data detected by the first monitoring system at the first property based on the generated encrypted code; and reconfiguring, by the monitoring server, the first communication device to transmit encrypted monitoring system data detected by the first monitoring system at the first property through the peer communication pathway to the second communication device associated with the second monitoring system of the second property, the second communication device being configured to relay the encrypted monitoring system data received through the peer communication pathway to the monitoring server through the second communication pathway, wherein the encrypted monitoring system data detected by the first monitoring system at the first property is inaccessible to the second communication device associated with the second monitoring system of the second property when the second communication device relays the encrypted monitoring system data through the second communication pathway. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19, 20)
-
Specification