Systems and methods for controlling a building management system
First Claim
1. A processor-implemented method for controlling a building management system, wherein the building management system includes a plurality of building systems, wherein each building system functions on the basis of a respective set of currently applied configuration data, the method comprising:
- maintaining data indicative of a plurality of threat level identifiers;
enabling a user to associate sets of building system configuration data with the threat level identifiers, wherein each set of building system configuration data relates to a respective building system, such that for a given one of the building systems, there are a plurality of sets of configuration data each associated with a respective one of the threat level identifiers, including a currently applied set of configuration data and at least one non-applied set of configuration data;
receiving an instruction to implement a threat level defined by a specified one of the threat level identifiers;
identifying the sets of configuration data associated with the specified one of the threat level identifiers; and
for each of the sets of configuration data associated with the specified one of the threat level identifiers;
(i) determining the building system to which the set of configuration data relates; and
(ii) instructing the building system to which the set of configuration data relates to apply the set of configuration data as its currently applied configuration data.
1 Assignment
0 Petitions
Accused Products
Abstract
A method and apparatus, often implemented in a building management system, may include receiving data indicative of a threat level identifier, and subsequently receiving a user instruction to associate one or more sets of building system configuration data with the threat level identifier. Each set of building system configuration data may relate to a respective building system. The instruction may be processed to selectively associate the one or more sets of building system configuration data with the threat level identifier. Subsequently, in response to an instruction to implement a threat level corresponding to the threat level identifier, signals may be generated and transmitted thereby to instruct the relevant building systems to apply configuration data corresponding to the one or more data sets associated with the threat level identifier.
-
Citations
14 Claims
-
1. A processor-implemented method for controlling a building management system, wherein the building management system includes a plurality of building systems, wherein each building system functions on the basis of a respective set of currently applied configuration data, the method comprising:
-
maintaining data indicative of a plurality of threat level identifiers; enabling a user to associate sets of building system configuration data with the threat level identifiers, wherein each set of building system configuration data relates to a respective building system, such that for a given one of the building systems, there are a plurality of sets of configuration data each associated with a respective one of the threat level identifiers, including a currently applied set of configuration data and at least one non-applied set of configuration data; receiving an instruction to implement a threat level defined by a specified one of the threat level identifiers; identifying the sets of configuration data associated with the specified one of the threat level identifiers; and for each of the sets of configuration data associated with the specified one of the threat level identifiers; (i) determining the building system to which the set of configuration data relates; and (ii) instructing the building system to which the set of configuration data relates to apply the set of configuration data as its currently applied configuration data. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A processor-implemented method for controlling a building management system, wherein the building management system includes a plurality of building systems, wherein each building system functions on the basis of a respective set of currently applied configuration data, the method comprising:
-
maintaining data indicative of a plurality of threat level identifiers and associated sets of configuration data, wherein each set of building system configuration data relates to a respective building system, such that for a given one of the building systems, there are a plurality of sets of configuration data each associated with a respective one of the threat level identifiers, including a currently applied set of configuration data and at least one non-applied set of configuration data; receiving an instruction to implement a threat level defined by a specified one of the threat level identifiers; identifying the sets of configuration data associated with the specified one of the threat level identifiers; and for each of the sets of configuration data associated with the specified one of the threat level identifiers; (i) determining the building system to which the set of configuration data relates; and (ii) instructing the building system to which the set of configuration data relates to apply the set of configuration data as its currently applied configuration data. - View Dependent Claims (9)
-
-
10. A building management system includes a plurality of building systems, wherein each building system functions on the basis of a respective set of currently applied configuration data, the building management system comprising:
-
a memory for storing building system configuration data for each of the building systems, and for storing a plurality of threat level identifiers; a controller coupled to the memory, the controller configured to; allow a user to associate sets of building system configuration data with the threat level identifiers, wherein each set of building system configuration data relates to a respective building system, such that for a given one of the building systems, there are a plurality of sets of configuration data each associated with a respective one of the threat level identifiers, including a currently applied set of configuration data and at least one non-applied set of configuration data; receive an instruction to implement a threat level defined by a specified one of the threat level identifiers, and once received, the controller identifying the sets of configuration data associated with the specified one of the threat level identifiers, and for each of the sets of configuration data associated with the specified one of the threat level identifiers, determine the building system to which the set of configuration data relates; and instruct the building system to which the set of configuration data relates to apply the set of configuration data as its currently applied configuration data. - View Dependent Claims (11, 12, 13, 14)
-
Specification