Sensor bypass
First Claim
Patent Images
1. A computer-implemented method performed by a data processing apparatus, the method comprising:
- receiving, at an entry point sensor of a security system, an activation at a bypass input while the entry point sensor is in an armed mode;
detecting, by the entry point sensor, that the entry point monitored by the entry point sensor is closed;
entering, by the entry point sensor, into a bypass mode, wherein detection by the entry point sensor of an opening of the entry point while the entry point sensor is in the bypass mode does not result in the generation of an alarm by the security system;
after entering the bypass mode, detecting, by the entry point sensor, an opening of the entry point;
generating, by the entry point sensor, a trip signal based on the detected opening of the entry point;
sending, by the entry point sensor, the trip signal and a bypass status indicating that the entry point sensor is in the bypass mode to a hub computing device for the security system;
determining by the entry point sensor that a second timeout period has elapsed before the entry point sensor detects a closing of the entry point and before the entry point sensor receives a subsequent second activation of the bypass input, or receiving at the entry point sensor the subsequent second activation of the bypass input before the second timeout period has elapsed and before the entry point sensor detects a closing of the entry point;
exiting, by the entry point sensor, the bypass mode; and
reentering, by the entry point sensor, the armed mode;
receiving at the entry point sensor a subsequent third activation of the bypass input before detecting a closing of the entry point;
remaining, by the entry point sensor, in the armed mode; and
sending, by the entry point sensor, a report of the subsequent third activation of the bypass input to the hub computing device of the security system.
2 Assignments
0 Petitions
Accused Products
Abstract
Systems and techniques are provided for sensor bypass. Activation may be received at a bypass input of an entry point sensor of a security system while the entry point sensor is in an armed mode. The entry point sensor may detect that the entry point monitored by the entry point sensor is closed. The entry point sensor may enter into a bypass mode. Detection by the entry point sensor of an opening of the entry point while the entry point sensor is in the bypass mode may not result in the generation of an alarm by the security system.
-
Citations
20 Claims
-
1. A computer-implemented method performed by a data processing apparatus, the method comprising:
-
receiving, at an entry point sensor of a security system, an activation at a bypass input while the entry point sensor is in an armed mode; detecting, by the entry point sensor, that the entry point monitored by the entry point sensor is closed; entering, by the entry point sensor, into a bypass mode, wherein detection by the entry point sensor of an opening of the entry point while the entry point sensor is in the bypass mode does not result in the generation of an alarm by the security system; after entering the bypass mode, detecting, by the entry point sensor, an opening of the entry point; generating, by the entry point sensor, a trip signal based on the detected opening of the entry point; sending, by the entry point sensor, the trip signal and a bypass status indicating that the entry point sensor is in the bypass mode to a hub computing device for the security system; determining by the entry point sensor that a second timeout period has elapsed before the entry point sensor detects a closing of the entry point and before the entry point sensor receives a subsequent second activation of the bypass input, or receiving at the entry point sensor the subsequent second activation of the bypass input before the second timeout period has elapsed and before the entry point sensor detects a closing of the entry point; exiting, by the entry point sensor, the bypass mode; and reentering, by the entry point sensor, the armed mode; receiving at the entry point sensor a subsequent third activation of the bypass input before detecting a closing of the entry point; remaining, by the entry point sensor, in the armed mode; and sending, by the entry point sensor, a report of the subsequent third activation of the bypass input to the hub computing device of the security system. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. An entry point sensor apparatus comprising:
-
a sensor that detects one or more characteristics of an entry point; a bypass input that receives an activation and generates an activation signal based on the received activation; a communications chipset that communicates with a hub computing device of a security system; and a processor that receives the activation signal from the bypass input while the entry point sensor is in an armed mode, detects that the entry point is closed based on the one or more characteristics of the entry point detected by the sensor, causes the entry point sensor to enter a bypass mode based on the activation signal wherein detection by the entry point sensor of an opening of the entry point while the entry point sensor is in the bypass mode does not result in the generation of an alarm by the security system, detects an opening of the entry point based on the sensor after causing the entry point sensor to entry the bypass mode, generates a trip signal based on the detected opening of the entry point, sends, using the communications chipset, the trip signal and a bypass status indicating that the entry point sensor is in the bypass mode to the hub computing device of the security system, determines that a second timeout period has elapsed before a closing of the entry point is detected and before a second activation signal based on a subsequent second activation of the bypass input is received or receives the second activation signal based on the subsequent second activation of the bypass input before the second timeout period has elapsed and before a closing of the entry point is detected, causes the entry point sensor to exit the bypass mode, causes the entry point sensor to reenter the armed mode, receives a third activation signal indicating a subsequent third activation of the bypass input before detecting a closing of the entry point, causes the entry point sensor to remain in the armed mode, and sends, using the communications chipset, a report of the subsequent third activation of the bypass input to the hub computing device of the security system. - View Dependent Claims (11, 12, 13, 14, 15)
-
-
16. A computer-implemented system for sensor bypass comprising:
-
an entry point sensor comprising a bypass input and a communications chipset that communicates with a hub computing device, that receives an activation at the bypass input, detects that the entry point monitored by the entry point sensor is closed, enters into a bypass mode, detects an opening of the entry point after entering the bypass mode, generates a trip signal based on the detected opening of the entry point, sends the trip signal and a bypass status to the hub computing device, determines that a second timeout period has elapsed before the entry point sensor detects a closing of the entry point and before the entry point sensor receives a subsequent second activation of the bypass input or receives at the entry point sensor the subsequent second activation of the bypass input before the second timeout period has elapsed and before the entry point sensor detects a closing of the entry point, exits the bypass mode, reenters the armed mode, receives a subsequent third activation of the bypass input before detecting a closing of the entry point, remains in the armed mode, and sends, using the communications chipset, a report of the subsequent third activation of the bypass input to the hub computing device; and the hub computing device that receives the trip signal and the bypass status from the entry point sensor, generates an alarm when the bypass status received with the trip signal indicates that the entry point sensor is not in the bypass mode, and does not generate an alarm when the bypass status received with the trip signal indicates that the entry point sensor is in the bypass mode. - View Dependent Claims (17, 18, 19)
-
-
20. A system comprising:
- one or more computers and one or more storage devices storing instructions which are operable, when executed by the one or more computers, to cause the one or more computers to perform operations comprising;
receiving, at an entry point sensor of a security system, an activation at a bypass input while the entry point sensor is in an armed mode; detecting, by the entry point sensor, that the entry point monitored by the entry point sensor is closed; entering, by the entry point sensor, into a bypass mode, wherein detection by the entry point sensor of an opening of the entry point while the entry point sensor is in the bypass mode does not result in the generation of an alarm by the security system; after entering the bypass mode, detecting, by the entry point sensor, an opening of the entry point; generating, by the entry point sensor, a trip signal based on the detected opening of the entry point; sending, by the entry point sensor, the trip signal and a bypass status indicating that the entry point sensor is in the bypass mode to a hub computing device for the security system; determining by the entry point sensor that a second timeout period has elapsed before the entry point sensor detects a closing of the entry point and before the entry point sensor receives a subsequent second activation of the bypass input, or receiving at the entry point sensor the subsequent second activation of the bypass input before the second timeout period has elapsed and before the entry point sensor detects a closing of the entry point; exiting, by the entry point sensor, the bypass mode; and reentering, by the entry point sensor, the armed mode; receiving at the entry point sensor a subsequent third activation of the bypass input before detecting a closing of the entry point; remaining, by the entry point sensor, in the armed mode; and sending, by the entry point sensor, a report of the subsequent third activation of the bypass input to the hub computing device of the security system.
- one or more computers and one or more storage devices storing instructions which are operable, when executed by the one or more computers, to cause the one or more computers to perform operations comprising;
Specification