Security system with serial number coding and methods therefor
First Claim
1. A method for configuring a security system, comprising:
- a) programming a plurality of security devices with a unique identification number, comprising the steps ofgenerating a series of initial serial numbers;
for each of said serial numbers,applying a masking algorithm to said serial number;
programming a security device with said serial number if said masking application provides a true result; and
discarding said serial number if said masking application provides a false result; and
b) installing at least one of the plurality of security devices in a security system, comprising the steps ofreading the serial number from the security device;
applying the masking algorithm to said serial number;
allowing registration of the security device with the security system if said masking algorithm application provides a true result;
disallowing registration of the security device with the security system if said masking algorithm application provides a false result.
5 Assignments
0 Petitions
Accused Products
Abstract
Using an existing system of formatting for RF message transmission and receiving, additional information can be sent to an alarm control panel to sort classes of messages (and hence equipment) without changing hardware, RF or baseband timing, power levels, etc., and therefore not affect FCC rules and registration of many individual products. A plurality of security devices are programmed with a unique identification number by generating a series of initial serial numbers, and then applying a masking algorithm to the serial number. Only if the masking application provides a true result will the security device be programmed with that serial number. At installation, the serial number is obtained from the security device, and the masking algorithm is applied to the serial number. Depending on its use in the security system, registration is allowed only if the masking algorithm application provides a true result.
-
Citations
18 Claims
-
1. A method for configuring a security system, comprising:
-
a) programming a plurality of security devices with a unique identification number, comprising the steps of generating a series of initial serial numbers; for each of said serial numbers, applying a masking algorithm to said serial number; programming a security device with said serial number if said masking application provides a true result; and discarding said serial number if said masking application provides a false result; and b) installing at least one of the plurality of security devices in a security system, comprising the steps of reading the serial number from the security device; applying the masking algorithm to said serial number; allowing registration of the security device with the security system if said masking algorithm application provides a true result; disallowing registration of the security device with the security system if said masking algorithm application provides a false result. - View Dependent Claims (3, 4)
-
-
2. The method of claim wherein the step of generating a series of serial numbers is implemented by a serial counter.
-
5. A method for configuring a security device with an identification number, comprising:
programming a plurality of security devices with a unique identification number, comprising; generating a series of initial serial numbers; for each of said serial numbers, applying a masking algorithm to said serial number; programming a security device with said serial number if said masking application provides a true result; and discarding said serial number if said masking application provides a false result. - View Dependent Claims (6, 7, 8)
-
9. A method for configuring a security system, comprising:
installing at least one of a plurality of security devices in a security system, comprising the steps of reading a serial number from the security device; applying a masking algorithm to said serial number; allowing registration of the security device with the security system if said masking algorithm application provides a true result; disallowing registration of the security device with the security system if said masking algorithm application provides a false result. - View Dependent Claims (10, 11, 12)
-
13. A method for configuring a security system with a plurality of different device types, comprising:
-
a) programming a plurality of security devices with a unique identification number, comprising the steps of generating a series of initial serial numbers; for each of said serial numbers, applying a first masking algorithm to said serial number; programming a security device of a first type with said serial number if said first masking application provides a true result; applying a second masking algorithm to said serial number; programming a security device of a second type with said serial number if said second masking application provides a true result; and b) installing at least one of the plurality of security devices in a security system, comprising the steps of reading the serial number from the security device; applying the first masking algorithm to said serial number; allowing registration of the security device with the security system as a first device type if said first masking algorithm application provides a true result; applying the second masking algorithm to said serial number; and allowing registration of the security device with the security system as a second device type if said second masking algorithm application provides a true result. - View Dependent Claims (14)
-
-
15. A security system comprising:
-
a) a plurality of security devices programmed with a unique identification number; and b) means for registering selected ones of the security devices comprising; i) means for reading the serial number from the security device; ii) means for applying a masking algorithm to said serial number; and iii) means for allowing registration of the security device with the security system if said masking algorithm application provides a true result, and for disallowing registration of the security device with the security system if said masking algorithm application provides a false result. - View Dependent Claims (16, 17, 18)
-
Specification