Security System and Alarm Activation Control
First Claim
1. A method comprising:
- initially arming an a security system to activate an alarm in response to detecting motion of free-to-roam entities in a monitored location;
monitoring the location for a disarming device; and
at times of detecting presence of the disarming device at the monitored location, preventing activation of the alarm.
5 Assignments
0 Petitions
Accused Products
Abstract
A controller arms an alarm aspect of a corresponding security system. The corresponding security system is initially configured to audibly activate an alarm in response to detecting motion of free-to-roam entities in a monitored location. The free-to-roam entities can be provided unrestricted access into the monitored location. In addition to monitoring for presence of motion at the monitored location, the security system monitors the location for presence of a disarming device. At times of detecting presence of the disarming device at the monitored location, the security system prevents activation of the alarm based on detecting the motion of the free-to-roam entities.
9 Citations
33 Claims
-
1. A method comprising:
-
initially arming an a security system to activate an alarm in response to detecting motion of free-to-roam entities in a monitored location; monitoring the location for a disarming device; and at times of detecting presence of the disarming device at the monitored location, preventing activation of the alarm. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12)
-
-
13. A method comprising:
-
receiving input to operate a security system in a first mode in which the security system conditionally activates an alarm to indicate occurrence of motion in a monitored domain; monitoring the domain for presence of a disarming device; in response to detecting presence of the disarming device in the monitored domain, operating the security system in a second mode in which the security system prevents activation of the alarm at times of detecting motion in the domain; and subsequent to detecting presence of the disarming device, in response to detecting absence of the disarming device from the monitored domain, operating the security system in the first mode again. - View Dependent Claims (14, 15, 16, 17, 18, 19, 20)
-
-
21. A computer system comprising:
-
computer processor hardware; and a hardware storage resource coupled to the computer processor hardware, the hardware storage resource storing instructions that, when executed by the computer processor hardware, causes the computer processor hardware to perform operations of; initially arming an a security system to activate an alarm in response to detecting motion of free-to-roam entities in a monitored location; monitoring the location for a disarming device; and at times of detecting presence of the disarming device at the monitored location, preventing activation of the alarm. - View Dependent Claims (22, 23, 24, 25, 26, 27, 28, 29, 30, 31, 32)
-
-
33. Computer-readable hardware storage having instructions stored thereon, the instructions, when carried out by computer processor hardware, causes the computer processor hardware to perform operations of:
-
providing unrestricted access into a monitored domain; operating a security system to conditionally activate an alarm depending on detection of an intrusion into the monitored domain; monitoring the domain for a disarming device; and while the disarming device is detected as being present in the monitored domain, preventing activation of the alarm.
-
Specification