×

Sensor bypass

  • US 9,589,446 B1
  • Filed: 01/28/2016
  • Issued: 03/07/2017
  • Est. Priority Date: 01/28/2016
  • Status: Active Grant
First Claim
Patent Images

1. A computer-implemented method performed by a data processing apparatus, the method comprising:

  • receiving, at an entry point sensor of a security system, an activation at a bypass input while the entry point sensor is in an armed mode;

    detecting, by the entry point sensor, that the entry point monitored by the entry point sensor is closed;

    entering, by the entry point sensor, into a bypass mode, wherein detection by the entry point sensor of an opening of the entry point while the entry point sensor is in the bypass mode does not result in the generation of an alarm by the security system;

    after entering the bypass mode, detecting, by the entry point sensor, an opening of the entry point;

    generating, by the entry point sensor, a trip signal based on the detected opening of the entry point;

    sending, by the entry point sensor, the trip signal and a bypass status indicating that the entry point sensor is in the bypass mode to a hub computing device for the security system;

    determining by the entry point sensor that a second timeout period has elapsed before the entry point sensor detects a closing of the entry point and before the entry point sensor receives a subsequent second activation of the bypass input, or receiving at the entry point sensor the subsequent second activation of the bypass input before the second timeout period has elapsed and before the entry point sensor detects a closing of the entry point;

    exiting, by the entry point sensor, the bypass mode; and

    reentering, by the entry point sensor, the armed mode;

    receiving at the entry point sensor a subsequent third activation of the bypass input before detecting a closing of the entry point;

    remaining, by the entry point sensor, in the armed mode; and

    sending, by the entry point sensor, a report of the subsequent third activation of the bypass input to the hub computing device of the security system.

View all claims
  • 2 Assignments
Timeline View
Assignment View
    ×
    ×