Takeover processes in security network integrated with premise security system
First Claim
Patent Images
1. A method comprising:
- establishing a coupling between a security system and a gateway that includes a takeover component, the gateway and the security system located in a first location;
automatically establishing a wireless coupling between the takeover component and a first controller that is a component of the security system, the security system including security system components coupled to the first controller;
automatically extracting security data of the security system from the first controller, wherein the security data running on the first controller controls basic operation of the security system components; and
automatically transferring the security data extracted from the first controller to a second controller and replacing the first controller with the second controller, wherein the second controller is a component of the gateway and is coupled to the security system components.
1 Assignment
0 Petitions
Accused Products
Abstract
An integrated security system is described comprising a gateway located at a first location. The gateway includes a takeover component that establishes a coupling with a first controller of a security system installed at the first location. The security system includes security system components coupled to the first controller. The takeover component automatically extracts security data of the security system from the first controller. The gateway automatically transfers the security data extracted from the controller to a second controller. The second controller is coupled to the security system components and replaces the first controller.
-
Citations
73 Claims
-
1. A method comprising:
-
establishing a coupling between a security system and a gateway that includes a takeover component, the gateway and the security system located in a first location; automatically establishing a wireless coupling between the takeover component and a first controller that is a component of the security system, the security system including security system components coupled to the first controller; automatically extracting security data of the security system from the first controller, wherein the security data running on the first controller controls basic operation of the security system components; and automatically transferring the security data extracted from the first controller to a second controller and replacing the first controller with the second controller, wherein the second controller is a component of the gateway and is coupled to the security system components. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 29, 30, 31, 32, 33, 34, 35, 36, 37, 38, 39, 40, 41, 42, 43, 44, 45, 46, 47, 48, 49, 50, 51, 52, 53, 54, 55, 56, 57, 58, 59, 60, 61, 62, 63, 64, 65, 66, 67, 68, 69, 70)
-
-
71. A method comprising:
-
automatically establishing a coupling between a takeover component of a gateway and a first controller that is a component in a security system installed at a first location, the security system including security system components coupled to the first controller; automatically extracting security data of the security system from the first controller; and replacing the first controller with a second controller by automatically transferring the security data extracted from the first controller to the second controller, wherein the second controller is a component of the gateway and is coupled to the security system components.
-
-
72. A method comprising:
-
establishing a wireless coupling between a takeover component running under a processor and a first controller that is a component in a security system installed at a first location, the security system including security system components coupled to the first controller; automatically extracting security data of the security system from the first controller via the takeover component, wherein the security data controls basic operation of the security system and transferring the security data to a second controller and controlling loading of the security data into the second controller, wherein the second controller is coupled to the security system components and replaces the first controller following the loading of the security data.
-
-
73. A method comprising:
-
automatically establishing a wireless coupling between a takeover component and a first controller that is a component in a security system installed at a first location, the security system including security system components coupled to the first controller; automatically extracting security data of the security system from the first controller, wherein the security data controls basic operation of the security system; storing the security data at a security server located at a second location different from the first location; and replacing the first controller with a second controller by automatically transferring the security data extracted from the first controller to the second controller.
-
Specification