Configuration program for a security system
First Claim
1. A method for configuring a security system containing at least one controller function connected to a first telephone line, wherein the user calls a remote server from a first telephone connected to the said first telephone line, the said controller function provides first information regarding the security system to the remote server, the user and remote server engage in an exchange of second information, the remote server provides third information to the said controller function wherein the said third information is based upon the said first information and the said second information.
2 Assignments
0 Petitions
Accused Products
Abstract
A configuration program running on a remote server, used for configuring a security system. The server may exchange voice commands with the user of the security system on the same telephone line on which data is being exchanged. The configuration program obtains data regarding the security system and then, based upon the data, may alter the menu structure presented to the user. The said data may include a list of components installed in the security system. The user may record labels, voice or otherwise, which may then be downloaded to the security system. The security system may output any said voice labels through a speaker or audio transducer. The server and security system may authenticate each other prior to exchanging configuration data.
417 Citations
28 Claims
-
1. A method for configuring a security system containing at least one controller function connected to a first telephone line, wherein
the user calls a remote server from a first telephone connected to the said first telephone line, the said controller function provides first information regarding the security system to the remote server, the user and remote server engage in an exchange of second information, the remote server provides third information to the said controller function wherein the said third information is based upon the said first information and the said second information.
-
2. A configuration program operating on a server remote from a security system, wherein
the said configuration program can receive commands from the user, the said configuration program can receive system data from the security system, the said configuration program determines appropriate configuration data, and the said configuration program can send the said configuration data to the security system.
-
11. A server for configuring a security system, wherein the server is at a location remote from the security system, including
a first telecommunications interface for exchanging configuration information with the security system a second telecommunications interface for receiving commands from a user of the security system a program whereby the configuration information is changed based upon the commands received from the user of the security system.
-
12. The server in claim 111 wherein at least a portion of the commands received from the said user of the security system are voice based.
- 13. The server in claim 111 wherein the said first telecommunications interface and the said second telecommunications interface are logical interfaces within the server sharing a common physical telecommunications interface.
Specification