Multi-controller security network
First Claim
1. A security network having a plurality of components for monitoring at least a first opening for intrusion, the security network including:
- a first controller function comprising both program code and configuration data whereby each of the components are identified, enrolled, and placed under control of the first controller function; and
at least one second controller function comprising both the program code and the configuration data,wherein the second controller function is in wireless communication with the first controller function and the first and second controller functions share configuration data and component-specific code or parameters.
16 Assignments
0 Petitions
Accused Products
Abstract
A security network containing multiple controller functions that communicate using wireless communications. The controller functions are contained within base units. One controller function may be the master controller. Other controller functions may receive a copy of the configuration data contained within the master controller. If the master controller fails, another controller function may become the master controller. The controller functions may use encryption keys to encrypt and/or authenticate communications. Some base units may contain a telecommunications interface. Controller units may relay communications between themselves to reach a telecommunications interface. Controller functions located in different buildings may communicate. Controller functions may each receive wireless communications from a transponder and combine the received communications to reduce errors.
437 Citations
21 Claims
-
1. A security network having a plurality of components for monitoring at least a first opening for intrusion, the security network including:
-
a first controller function comprising both program code and configuration data whereby each of the components are identified, enrolled, and placed under control of the first controller function; and at least one second controller function comprising both the program code and the configuration data, wherein the second controller function is in wireless communication with the first controller function and the first and second controller functions share configuration data and component-specific code or parameters. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18)
-
-
19. A security network for monitoring at least a first opening for intrusion, the security network including:
-
at least a first controller function and a second controller function, wherein the second controller function is in wireless communication with the first controller function; and a first transponder, wherein the first transponder transmits a first transmitted message using wireless communications, the second controller function receives a first received message, derived from the first transmitted message, and the second controller function sends the first received message to the first controller function, and wherein the first controller function receives a second received message, derived from the first transmitted message, and the first controller function combines the first received message and the second received message to produce a third received message. - View Dependent Claims (20)
-
-
21. A security network for monitoring at least a first opening for intrusion, including at least a first controller function and a second controller function, wherein the second controller function is in wireless communication with the first controller function and wherein the second controller function receives wireless communications from the first controller function and adjusts a timing means within the second controller function based upon the wireless communications from the first controller function.
Specification