TECHNICAL FIELDThis application claims the benefit of priority to U.S. Provisional Application No. 61/931,945, titled “BUILDING SECURITY AND AUTOMATION SYSTEM” to Acera et al. and filed on Jan. 27, 2014, the entire content of which being incorporated herein by reference.
TECHNICAL FIELDThis document pertains generally, but not by way of limitation, to security and automation systems.
BRIEF DESCRIPTION OF DRAWINGSFIG. 1 is a conceptual diagram illustrating an example of a system that includes a building security and automation system and a central monitoring station.
FIG. 2 is a conceptual diagram illustrating various examples of components of thesecurity system12 ofFIG. 1, including a control panel and various sensors.
FIG. 3 is a functional block diagram illustrating an example of the control panel of the security system inFIG. 2, in accordance with this disclosure.
FIG. 4 is a perspective view of an example of the control panel ofFIG. 2.
FIG. 5 is a side view of the example control panel ofFIG. 4.
FIG. 6A is perspective front view of the example control panel ofFIG. 4, illustrating a sealed speaker, in accordance with this disclosure.
FIG. 6B is cross-sectional end view of the example control panel ofFIG. 4, illustrating a sealed speaker, in accordance with this disclosure.
FIG. 7 is perspective back view of the example control panel ofFIG. 6A, illustrating a replaceable cellular module, in accordance with this disclosure.
FIGS. 8A and 8B are perspective views of the replaceable cellular module ofFIG. 7, in accordance with this disclosure.
FIG. 9 is a perspective view of a portion of a control panel.
FIGS. 10A-10D are examples of screenshots of various portions depicting a user-defined home screen.
SUMMARYIn one example, this disclosure is directed to a security system control panel or home automation control panel comprising an end-user replaceable cellular telephony module that is removable from the control panel without disassembling the control panel, the cellular module including a body; a cellular telephony circuit coupled to the body; a cellular telephony antenna coupled to the body and the cellular telephony circuit; and a first connector coupled to the cellular telephony circuit and the body, wherein the first connector is sized and shaped or otherwise configured to be removably engaged by the end-user with a second connector in the control panel.
In one example, this disclosure is directed to a security system control panel or home automation control panel comprising a display; a housing configured to support the display; and a speaker having a front from which sound is projected, a rear opposite the front, a first side, and a second side opposite the first side; and a sealed speaker enclosure positioned within the housing, the sealed speaker enclosure including a speaker case, wherein a portion of the speaker case and a portion of the speaker define the sealed speaker enclosure.
In one example, this disclosure is directed to a security system control panel or home automation control panel comprising a Bluetooth circuit configured to receive at least one Bluetooth signal from one or more Bluetooth-enabled devices; a processor configured to store data identifying an authorized Bluetooth-enabled device in a memory; detect the authorized Bluetooth-enabled device; and disarm the security system control panel in response to the detection.
In one example, this disclosure is directed to security system control panel or home automation control panel comprising a user interface including a display; and a home screen module configured to: receive an input from the end-user defining at least one screen depicted on the display; store data representing the at least one end-user-defined screen in a memory; and perform one or more actions previously associated by the user with the defined screen.
In one example, this disclosure is directed to a security system control panel or home automation control panel comprising an end-user replaceable cellular telephony module that is removable from the control panel without disassembling the control panel, the cellular module including a body; a cellular telephony circuit coupled to the body; a cellular telephony antenna coupled to the body and the cellular telephony circuit; and a first connector coupled to the cellular telephony circuit and the body, wherein the first connector is sized and shaped or otherwise configured to be removably engaged by the end-user with a second connector in the control panel. The control panel further includes a display; a housing configured to support the display; a speaker having a front from which sound is projected, a rear opposite the front, a first side, and a second side opposite the first side; and a sealed speaker enclosure positioned within the housing, the sealed speaker enclosure including a speaker case, wherein a portion of the speaker case and a portion of the speaker define the sealed speaker enclosure. The control panel further includes a user interface including the display; and a home screen module configured to: receive an input from the end-user defining at least one screen depicted on the display; store data representing the at least one end-user-defined screen in a memory; and perform one or more actions previously associated by the user with the defined screen; a Bluetooth circuit configured to receive at least one Bluetooth signal from one or more Bluetooth-enabled devices; a processor configured to: store data identifying an authorized Bluetooth-enabled device in a memory; detect the authorized Bluetooth-enabled device; and disarm the security system control panel in response to the detection. The control panel further includes a radio-frequency (RF) circuit configured to: when the control panel is in an unpowered state: receive power from an RF signal from an RF programming device; receive data embedded in the RF signal from the powered RF circuit; and using the received power from the RF signal store the data in a memory that is otherwise unpowered, wherein the processor is configured to: when the control panel is in a powered state: receive the stored data; and configure at least one parameter using the received data.
DETAILED DESCRIPTIONFIG. 1 is a conceptual diagram illustrating an example of asystem10 that may include a building security andautomation system12 and acentral monitoring station14 that monitors received communications from one or more building security andautomation systems12. As seen inFIG. 1, the building security and automation system12 (also referred to in this disclosure as “security system12”) may transmit signals to and receive signals from thecentral monitoring station14 via anetwork16. For example, thesecurity system12 may detect an unauthorized opening of a monitored building, e.g., home, door or window and transmit an alarm signal to thecentral monitoring station14. In response, personnel at thecentral monitoring station14 may attempt to contact a user by way of a control panel (depicted in detail inFIG. 3) of thesecurity system12, e.g., using bidirectional communication techniques.
Thesecurity system12 may communicate with thecentral monitoring station14 using wired or wireless communication techniques. In one example implementation, thenetwork16 may utilize a traditional POTS (plain old telephone service) telephone line, or wired Ethernet. In another example implementation, thenetwork16 may be a cellular telephone network for wireless communication. It may be desirable to communicate signals wirelessly to thecentral monitoring station14 in order to eliminate an intruder's ability to cut or otherwise damage a wired phone line and thus disable communications.
Thesecurity system12 may also receive control signals via aremote device18, e.g., a smartphone, tablet computer, or other computing device, that may control one or more aspects of thesecurity system12. Also, theremote device18 may receive status signals from thesecurity system12 that indicate one or more statuses of thesecurity system12.
For example, in the event that a user forgot to arm thesecurity system12 at their premises, the user may remotely arm thesecurity system12 using theremote device18 via thenetwork16. Initially, theremote device18 may receive a status signal from thesecurity system12 indicating that thesecurity system12 is unarmed, and display the status, e.g., via an application executed on a smartphone. Then, after theremote device18 transmits a control signal to arm thesecurity system12, theremote device18 may receive a status signal from thesecurity system12 indicating that thesecurity system12 is armed, and display the status.
In addition, thesecurity system12 ofFIG. 1 may receive signals that may be used as part of an automation scheme to control various aspects of the building, e.g., home. For example, a user may use a control panel (depicted in detail inFIG. 3) of thesecurity system12 to, for example, turn lights on/off in a home or other building, adjust a temperature, e.g., raise or lower a thermostat setting, and the like.
In another example, the user may use aremote device18, e.g., a smartphone, tablet computer, or other computing device, to transmit signals to the control panel of thesecurity system12 via thenetwork16 to turn lights on/off in a home or other building, adjust a temperature, e.g., raise or lower a thermostat setting, and the like.
FIG. 2 is a conceptual diagram illustrating various examples of components of thesecurity system12 ofFIG. 1, including acontrol panel20 and various sensors. As seen inFIG. 2, thesecurity system12 may include acontrol panel20 for receiving status signals from various sensors, including, for example, awindow sensor22, amotion sensor24, and adoor sensor26. Numerous other types of sensors may also be included as part of thesecurity system12, which are not depictedFIG. 2. For example, thesecurity system12 may also include one or more of the following sensors: glass break sensors, smoke detection sensors, carbon monoxide detection sensors, and flooding sensors.
In addition, thesecurity system12 may include akey fob28 that may transmit control signals, e.g., RF control signals, to thecontrol panel20 to control various aspects of thesecurity system12. For example, a user may remotely arm/disarm thesecurity system12 using thekey fob28.
Thesecurity system12 may also include aremote keypad30 that may transmit control signals to and receive status signals from thecontrol panel20. For example, aremote keypad30 may be located in a bedroom of a home, thereby allowing a user to arm/disarm thesecurity system12 or view the status of thesecurity system12 from the bedroom without having to use thecontrol panel20, which may be located in another part of the home.
As mentioned above, thesecurity system12 may also be used for automation purposes. As non-limiting examples, thecontrol panel20 ofFIG. 2 (and/or the remote keypad30) may depict alighting controller32 and atemperature controller34. Thecontrol panel20 may be configured to transmit control signals to thelighting controller32 that turns one or more lights in a building on/off. In some example implementations, thecontrol panel20 may transmit the lighting control signals at programmed times, e.g., using a programmed daily schedule.
In addition, thecontrol panel20 may be configured to transmit control signals to atemperature controller34 that adjusts a temperature, e.g., raise or lower a thermostat setting, in a building. In some example implementations, thecontrol panel20 may transmit the temperature control signals at programmed times, e.g., using a programmed daily schedule.
Theremote keypad30 may be configured to transmit control signals to thecontrol panel20, which can then transmit the signal(s) to thelighting controller32 and/or thetemperature controller34, e.g., using a programmed daily schedule.
Further, and as mentioned above, in some example implementations thecontrol panel20 may receive signals from and/or transmit signals to aremote device18, e.g., a smartphone, tablet computer, or other computing device. Theremote device18 may receive status signals from thecontrol panel20 that indicate one or more statuses of thesecurity system12, e.g., whether the system is armed or disarmed. Theremote device18 may also transmit control signals that control one or more aspects of thesecurity system12.
In some example implementations, thesecurity system12 may include one or more speakers (not depicted) as part of a home automation system, for example. Enunciations, signals, or other alerts from the security system may interrupt an audio stream playing through the speakers and transmit the enunciations, signals, or other alerts through the speakers.
FIG. 3 is a functional block diagram illustrating an example of thecontrol panel20 of the security system inFIG. 2, in accordance with this disclosure. Thecontrol panel20 ofFIG. 3 may include aprocessor40, a power supply42 (e.g., an AC powered source and a battery backup circuit), a memory circuit (or memory device)44, auser interface46 configured to receive input from a user, aspeaker circuit48, and aspeaker50. In some example implementations, thecontrol panel20 can also include a piezoelectric siren circuit and piezoelectric transducer (not depicted).
Theprocessor40 may be a microprocessor, general purpose controller, field-programmable gate array (FPGA), application-specific integrated circuit (ASIC), or other discrete or integrated logic circuitry, for example.
In some example implementations, theuser interface46 may include a touchscreen display for receiving input, e.g., arming/disarming thesecurity system12, or defining a home screen or bookmark. In such examples, the touchscreen display may display one or more buttons for controlling various aspects of the security system. In other examples, the user interface may include a display and one or more physical buttons for controlling various aspects of thesecurity system12.
The memory circuit44 may include one or more volatile or non-volatile memory devices, e.g., Flash memory, RAM, EPROM, EEPROM, embedded MMC, etc. The memory circuit44 may store instructions that, when executed by theprocessor40, configure theprocessor40 to perform the functionality described in this disclosure. For example, upon receiving an input to arm thesecurity system12, theprocessor40 may execute instructions that cause thespeaker circuit48 to output a signal to thespeaker50 that announces that the security system will soon be armed.
In addition, thecontrol panel20 may include acellular circuit52 with an associatedantenna54 for transmitting signals to and receiving signals from thecentral monitoring station14 or theremote device18, e.g., via acellular network16. As described in more detail below, and in accordance with this disclosure, thecellular circuit52 and theantenna54 may be formed as part of a replaceable cellular module (shown at110 inFIGS. 7, 8A, 8B). This replaceable module may allow a customer or technician, for example, to replace a cellular module without disassembling thecontrol panel20.
In accordance with this disclosure, and as described in more detail below, thecellular circuit52, e.g., radio, and theantenna54 may be interchangeable on the replaceable cellular module. Theantenna54 may be detachable so that a first antenna can be detached and replaced by a second antenna, e.g., an antenna extending outside the control panel (external), on the replaceable cellular module. This may allow the manufacturer, for example, to pair a radio and an antenna on the replaceable cellular module at the factory so that the customer does not have to connect the antenna and the radio.
Given that, in some examples, thecellular circuit52 and theantenna54 may form the communication link to thecentral monitoring station14, it may be desirable to detect whether an attempt has been made to remove or otherwise tamper with the replaceable cellular module. Hence, in accordance with this disclosure, thecontrol panel20 may also include atamper detection circuit56 for detecting when a door (shown inFIGS. 5 and 7) that allows the replaceable cellular module to be replaced has been opened and, if so, transmit an alarm signal to thecentral monitoring station14 before the replaceable cellular module has been removed from thecontrol panel20.
In order to transmit or receive control or status signals, e.g., to thecentral monitoring station14, thecellular circuit52 can generally be powered when thecontrol panel20 is powered. Removing the replaceable cellular module from thecontrol panel20 while the replaceable cellular module is powered, however, may damage the replaceable cellular module and/or thecontrol panel20. For example, removal of a powered cellular module from thecontrol panel20 may cause electrical arcing at the connector pins, which may permanently damage thecontrol panel20. Hence, in accordance with this disclosure and as described in detail below, theprocessor40 may remove power from thecellular circuit52 if thetamper detection circuit56 detects that the door (shown inFIGS. 5 and 7) has been opened.
Thecontrol panel20 ofFIG. 3 may also include a radio-frequency identification (RFID)circuit58, in accordance with this disclosure. TheRFID circuit58 may allow a manufacturer, for example, to download configuration parameters into anonboard memory circuit59 of theRFID circuit58, for example, while thecontrol panel20 is in a sealed box in the factory. TheRFID circuit58 can write to theonboard memory59 even when thecontrol panel20 is not powered up. When the control panel is an unpowered state, theRFID circuit58 can receive power from an RF signal from an RF programming device, receive data embedded in the RF signal from the powered RF circuit, and, using the received power from the RF signal, store the data in thememory59 that is otherwise unpowered. When thecontrol panel20 is powered up in a powered state, theprocessor40 can read/receive the stored data from thememory59 and configure the control panel20 (and track other parameters and functions) using the received data and data stored in memory circuit44.
Upon receiving a signal from the an RFID programmer unit, theRFID circuit58, which includes anantenna60, powers up and begins receiving, for example, the configuration parameters that may then be stored directly to theonboard memory circuit59 of theRFID circuit58. This may allow a manufacturer or distributor, for example, to customize one or more packaged, unpowered control panels based on customer preferences before the control panels are shipped to the customer. For example, after the control panel is powered up, theprocessor40 can read the stored configuration parameters from theonboard memory59 and retrieve from the memory circuit44 the instructions needed to configure the default language, e.g., English, Spanish, Portuguese, Italian, French, Japanese, etc., of thecontrol panel20 based on the customer's geographic region.
Thecontrol panel20 ofFIG. 3 may also include a Wi-Fi circuit62. In some example configurations, the Wi-Fi circuit62 may include Wi-Fi Direct functionality, in accordance with this disclosure. Wi-Fi Direct may allow various Wi-Fi enabled components of thesecurity system12 to communicate with one another without using a wireless access point, e.g., a wireless router.
In one example configuration, thesecurity system12 may include one or moreremote keypads30 that include Wi-Fi chips and are Wi-Fi enabled. Using the Wi-Fi Direct functionality of the Wi-Fi circuit62 ofFIG. 3, the one or more Wi-Fi enabledremote keypads30 may establish a peer-to-peer connection with thecontrol panel20, instead of using a wireless access point of a home network, for example. By allowing the remote keypad(s) to communicate directly with the control panel using Wi-Fi Direct may eliminate the need to use a proprietary wireless communication protocol or use wired communications techniques. In addition, using Wi-Fi Direct instead of Wi-Fi may simplify the setup for the user by eliminating the need for a wireless access point.
In some examples, thecontrol panel20 can be configured to interface with a home automation controller using serial or TCP/IP protocols, for example. For example, thecontrol panel20 can include a terminal block (not depicted) that can connect to the home automation controller using a wired connection, e.g., via RS-232 serial cable or via an Ethernet cable. In other examples, thecontrol panel20 can connect using a wireless protocol, e.g., IEEE 802.11 standards.
In some examples, thecontrol panel20 can receive signals from a Wi-Fi connected camera (not depicted) using the Wi-Fi circuit62. The Wi-Fi connected camera can be used to detect motion. For example, the Wi-Fi connected camera can detected. In other examples, the panel can also receive camera signal over a wired Ethernet connection.
Thecontrol panel20 ofFIG. 3 may also include aBluetooth circuit64 configured to receive at least one Bluetooth signal from one or more Bluetooth-enabled devices. In some example configurations, theBluetooth circuit64 may be used by thecontrol panel20 to automatically disarm thesecurity system12 when an authorized Bluetooth-enabled device is within range of thecontrol panel20. Bluetooth is a communications protocol standardized as IEEE 802.15.1.
For example, upon an initial pairing via theBluetooth circuit64 with an authorized Bluetooth-enabled device, e.g., a user's smartphone, theprocessor40 of thecontrol panel20 may instruct the memory circuit44 to store data identifying the authorized Bluetooth-enabled device(s), e.g., a user's smartphone. After thesecurity system12 has been armed, each time the processor detects that a Bluetooth-enabled device is within range of theBluetooth circuit64 of thecontrol panel20, theprocessor40 may retrieve the identifying data from the memory circuit44, determine whether the Bluetooth-enabled device is an authorized device, and, if so, disarm thecontrol panel20 automatically, e.g., without any action taken by the user.
In some example implementations, theprocessor40 may cause a confirmation message to be transmitted to an authorized user prior to disarming thesecurity system12. Once the authorized user affirmatively responds to the confirmation message, theprocessor40 may disarm thesecurity system12.
Thecontrol panel20 ofFIG. 3 may also include a Universal Serial Bus (USB)circuit66 connected to aUSB connector68, e.g., micro-USB, mini-USB, or other USB compatible connector. TheUSB connector68 andUSB circuit66 may allow peripheral electronic component(s) to be added to thesecurity system12. For example, a USB web-camera (not depicted) may be connected to thecontrol panel20 using theUSB connector68. Connecting a USB web-camera using theUSB connector68 may be desirable as it allows the web-camera to be easily upgraded or otherwise replaced. In addition, the USB web-camera may be articulated to allow it to point at a particular location, in contrast to a camera that is integrated into thecontrol panel20 and thus cannot turn. In some examples, a standard USB extension cable could be used to locate the camera a few feet away from the panel in almost any orientation. In some examples, the user may remotely control the articulation of the web-camera, e.g., using theremote device18. In some examples, thecontrol panel20 may include a camera integrated into the control panel (not depicted).
In some examples, a camera, e.g., USB camera or integrated camera, can be used to disarm or arm the alarm system using biometric authentication, e.g., retinal scan, face recognition, etc. Initially, thecontrol panel20 can use the camera(s) to scan and store biometric information for one more users. Once armed, for example, thecontrol panel20 can request that a user position a recognizable feature, e.g., eye, face, etc., close to the camera. Upon comparing the feature to the stored information, thecontrol panel20 can disarm the system.
In some examples, thecontrol panel20 can include a connector that can be connected to an accessory radio transceiver (not depicted). The accessory transceiver can be used to receive signals from one or more peripheral devices and increase the functionality of thecontrol panel20. For example, the accessory radio transceiver can receive signal from a wireless camera or a wireless image sensor, e.g., motion detector with a camera to capture an image. In some implementations, the accessory transceiver can be placed behind the wall upon which the control panel is mounted to conserve space.
Thecontrol panel20 may also include a levelingvial70 that is integrated into the housing of thecontrol panel20. Anintegrated leveling vial70 may allow a technician or other user to more quickly and accurately install thecontrol panel20.
As mentioned above, thecontrol panel20 may include aspeaker50. In accordance with this disclosure and as described in more detail below with respect toFIGS. 6A-6B, thespeaker50 may be enclosed within a sealed chamber. By enclosing thespeaker50 within the sealed chamber, the sound volume may be increased, e.g., by about 10 decibels (dB), relative tospeaker50 similarly positioned in a similar control panel, e.g., having dimensions of about 2 inches by about 5.5 inches by about 1.25 inches, and tested on a wall about 10 feet away from the control panel. In addition, the sealed chamber may improve the bass and midrange frequency response of thespeaker50 and thus improve the sound quality. Another advantage of the sealed speaker design is to provide equivalent sound at a reduced the size and depth. As a result, the control panel can be smaller and thinner.
Finally, in accordance with this disclosure, thecontrol panel20 may include ahome screen module72 that can receive an input from a user defining one or more screens depicted on adisplay46, store data representing the at least one user-defined screen in a memory, e.g., memory circuit44, and perform one or more actions previously associated by the user with the defined screen. Thehome screen module72 may enable a user to associate one or more actions such as, for example, temperature settings, lighting settings, security settings, with the default or primary screen of the display of the user interface of theircontrol panel20 orremote keypad30, which can allow the user interface, without navigating beyond the nominal default screen, to be a home control panel, security panel, bed-side controller, room controller, thermostat controller or other type of panel. Defining a home screen or defining bookmarks, e.g., a customized screen that is not necessarily a default or primary screen, may reduce the number of keystrokes that the user must enter to reach a desired screen or prompt on the user interface. Thehome screen module72 can then perform the one or more actions previously associated by the user with the defined screen.
FIG. 4 is a perspective view of an example of the control panel ofFIG. 2. Thecontrol panel20 ofFIG. 4 includes ahousing80, auser interface46, e.g., a touchscreen display or other display, and, in some examples, one ormore buttons82A and82B. A user may enter commands, navigate menus, and the like using the touchscreen and/or using thebuttons82A,82B. It should be noted that, in some examples, theremote keypad30 ofFIG. 2 may be similar to thecontrol panel20 ofFIG. 4. For purposes of conciseness, theremote keypad30 and thecontrol panel20 will be described together.
Thecontrol panel20 may also include aUSB connector68. In the non-limiting example shown inFIG. 4, theUSB connector68 is located at the top of thecontrol panel20. In some example implementations, an external web-camera (not depicted) may be connected to thecontrol panel20 via theUSB connector68.
Theuser interface46 may be configured to display many different screens depending on the type of application, e.g., security or home automation. For example, the memory circuit44 may store instructions that, when executed by theprocessor40, cause the user interface to display a security panel, bed-side controller panel, home theater room controller panel, and/or a home automation panel. Aspects of home automation that may be displayed include, but are not limited to, a thermostat panel, a lighting panel, a door lock panel, a garage door panel, a home audio or other speaker system panel, or other type of panel.
Using various techniques of this disclosure, thecontrol panel20 and theremote keypad30 may include the ability for a user to define a home screen and/or bookmark one or more panels using thehome screen module72. For example, a user may define aremote keypad30 located in a home theater room to display a home theater room controller panel as a default home screen. As another example, a user may define aremote keypad30 located in their bedroom to display a thermostat panel as a default home screen. As another example, the user may define a thermostat panel as a default home screen and may define the security panel using a bookmark to allow quick access.
As another example, the user may define aremote keypad30 in their bedroom to be a bedside controller and have an “all lights in room ON/OFF” default home screen. As another example, the user may build a customized home screen forremote keypad30 designated as a bedside controller in their bedroom. For example, the user may build a “go to bed” home screen that may include thermostat control, security panel control (e.g., “arm stay”, and an “all lights OFF” control, or any other system control features that the user may use at bedtime. In some examples, each of these controls may be displayed on a single screen of the user interface of theremote keypad30 for the user to individually control. That is, the user may individually turn down the thermostat, turn off all the lights, and arm the security system. In other examples, the “go to bed” home screen may allow a user to touch a single button on the user interface of theremote keypad30 that initiates a sequence of events including, for example, turning down the thermostat, turning off all the lights, and arming the security system.
As another example, a user may build a customized home screen for aremote keypad30 located in a hallway. For example, the user may build a customized “return from work” home screen that allows a user to touch a single button on the user interface of theremote keypad30 in the hallway that initiates a sequence of events including, for example, turning up the thermostat and turning on various lights in the house. Eachremote keypad30 located about the house may have different home screens defined by the user.
In some example implementations, the user-defined home screens may display the status of various system components, e.g., a thermostat setting and an alarm status, and also display control icons to control the various system components, e.g., increase/decrease thermostat setting and arm/disarm the alarm system.
In one example implementation, when setting or defining a default home screen, a user may navigate through various menus on thecontrol panel20 until theuser interface46 displays the preferred home screen. Thehome screen module72 may cause the user interface to display a home screen or bookmark icon. Once on the preferred home screen, the user may touch a displayed home screen (or bookmark) icon to confirm that the displayed home screen is the preferred home screen or bookmark. Upon receiving the confirmation, thehome screen module72 may store the settings in the memory circuit44, e.g., in a user preferences or configuration file. Thehome screen module72 may cause theuser interface46 to display the preferred home screen as the default screen based on the stored settings.
Similarly, a user may again navigate through various menus until theuser interface46 displays a panel that the user would like to bookmark as a favorite panel, e.g., a thermostat panel. Once on the desired screen, the user may touch a displayed home screen (or bookmark) icon to confirm that the displayed screen should be bookmarked as a favorite panel. Upon receiving the confirmation, thehome screen module72 may store the settings in the memory circuit44, e.g., in a configuration file. Thehome screen module72 may cause theuser interface46 to display the preferred home screen as the default screen based on the stored settings.
In another example implementation, rather than have the user navigate through various menus or screens until theuser interface46 displays the desired screen (either for default as a home screen or for bookmarking as a favorite), theuser interface46 may display thumbnail views or text, for example, of the various panels that can be selected as preferred panels. Thehome screen module72 may prompt a user to select the desired screen, prompt the user to confirm that the displayed screen should be bookmarked as a favorite panel or as a default home screen, and then, upon receiving the confirmation, thehome screen module72 may store the settings in the memory circuit44, e.g., in a configuration file.
FIGS. 10A-10D are examples of screenshots of various portions depicting a user-defined screen of a user-interface46, e.g., display. As indicated above, thecontrol panel20 may include ahome screen module72 that can receive an input from a user defining one or more screens depicted on adisplay46 and store data representing the at least one user-defined screen in a memory, e.g., memory circuit44.
FIG. 10A is an example of ascreenshot200 in which the user has yet to provide input to define a screen, e.g., set a bookmark. A bookmark icon is shown at202. In the examples shown inFIGS. 10A-10D, the user can define a screen for the master bedroom. To begin the task of defining the screen, the user can select the “smart home controls”button204 at the bottom of thescreen200. Selecting the “smart home controls”button204 can causenew buttons206A-206F to appear on the screen, as seen inscreen208 inFIG. 10B. To define a screen for the master bedroom, the user can select the “rooms”button206F on thescreen208. Selecting the “rooms”button206F can cause one or more “room” buttons210A-210B to appear on thescreen212, as seen inFIG. 10C. As seen inFIG. 10C, thescreen212 displays a “master bedroom” button210A and an “add new room”button210B, which can allow a user to define settings for a room other than the master bedroom.
To define a screen for the master bedroom, the user can select the “master bedroom” button210A on thescreen212 inFIG. 10C. Selecting the “master bedroom” button210A can cause one or more control icons to appear on thescreen214, as seen inFIG. 10D. As seen inFIG. 10D, the user can define, for example, the lighting and/or the thermostat settings. For example, the user can useslider control icon216A to set the brightness of the lighting for the master bedroom.
The user can also define the thermostat settings. For example, the user can define the heating and cooling set point temperatures using the up/down arrows shown generally at216B,216C, respectively. In addition, the user can define the fan settings at216D and the mode settings at216E. After defining the lighting and/or temperature settings, for example, for the master bedroom, the user can select thebookmark icon202 to bookmark the screen for the master bedroom.
Thehome screen module72 may constitute either a software module, e.g., code embodied on a non-transitory machine-readable medium, or a hardware-implemented module. If embodied as a software module, the memory circuit44 may include computer-readable instructions that, when executed by theprocessor40, cause theprocessor40 to perform various functions attributed throughout this disclosure to thehome screen module72.
In various configurations, a hardware-implemented module may be implemented mechanically or electronically. For example, a hardware-implemented module may comprise dedicated circuitry or logic that is permanently configured, e.g., as a special-purpose processor, such as a field programmable gate array (FPGA) or an application-specific integrated circuit (ASIC), to perform certain operations. A hardware-implemented module may also comprise programmable logic or circuitry, e.g., as encompassed within a general-purpose processor or other programmable processor, that is temporarily configured by software to perform certain operations. It will be appreciated that the decision to implement a hardware-implemented module mechanically, in dedicated and permanently configured circuitry, or in temporarily configured circuitry, e.g., configured by software, may be driven by cost and time considerations.
Accordingly, the term “hardware-implemented module” should be understood to encompass a tangible entity, be that an entity that is physically constructed, permanently configured, e.g., hardwired, or temporarily or transitorily configured, e.g., programmed, to operate in a certain manner and/or to perform certain operations described herein. Considering embodiments in which hardware-implemented modules are temporarily configured, e.g., programmed, each of the hardware-implemented modules need not be configured or instantiated at any one instance in time. For example, where the hardware-implemented modules comprise a general-purpose processor configured using software, the general-purpose processor may be configured as respective different hardware-implemented modules at different times. Software may accordingly configure a processor, for example, to constitute a particular hardware-implemented module at one instance of time and to constitute a different hardware-implemented module at a different instance of time.
FIG. 5 is a side view of the example control panel ofFIG. 4. As mentioned above, thecontrol panel20 may include a replaceable cellular module (depicted at110 inFIGS. 7, 8A, 8B) that includes thecellular circuit52, e.g., cellular radio, and theantenna54 ofFIG. 3. An end-user, e.g., customer or technician, may install or replace the replaceable cellular module by opening thedoor90 ofFIG. 5, e.g., after removing a screw (shown at116 inFIG. 9) and inserting the module through a slot defined by the housing (shown at93 inFIG. 9). Thedoor90 has an open state and a closed state, and the end-user replaceable cellular module is replaceable through the slot when the door is in the open state. In some examples, thedoor90 can be snapped in place or snapped in place and secured with an optional screw. In some examples, the door can be removed and replaced without requiring a tool. In this manner, the replaceable cellular module is replaceable without disassembling the control panel or housing. After the replaceable cellular module is installed, thetamper detection circuit56 ofFIG. 3 may detect when thedoor90 is opened, as described in more detail below.
In addition to the techniques described above, thecontrol panel20 includes an improved speaker design. Speaker designs of existing security systems utilize forward facing, rearward facing, or side facing speakers with grills. These designs, however, often result in thin, metallic (e.g., tinny), unintelligible sounds. As shown inFIGS. 6A-6B and as described below, the sound quality and volume of thespeaker50 of thecontrol panel20 may be improved by using a sealed speaker enclosure, e.g., a resonant speaker enclosure, thus resulting in a thinner, more desirable panel with comparable sound quality. Thecontrol panel20 may be configured to provide two-way communication using a microphone (not depicted) and thespeaker50. As such, the increase in bass and midrange frequency responses of thespeaker50 may improve the intelligibility and sound quality of received communication, e.g., from thecentral monitoring station14.
In addition, thecontrol panel20 may be configured to provide sirens, signaling, and annunciation using thespeaker50. The sealedspeaker enclosure100 ofFIGS. 6A and 6B may increase the volume of thespeaker50 over existing speaker designs.
FIG. 6A is perspective front view of the example control panel ofFIG. 4, illustrating a sealed speaker enclosure, in accordance with this disclosure. The front cover of thecontrol panel20 has been removed inFIG. 6A in order to depict thespeaker50 within a sealed speaker enclosure100 (depicted by cross-hatching inFIG. 6A). The sealedspeaker enclosure100 may increase the bass and midrange frequency responses of thespeaker50. As seen inFIGS. 6A-6B, thevolume98 extending to the left of thespeaker50 is the primary volume that forms the sealedspeaker enclosure100. In addition, in some examples, thediaphragm102 of thespeaker50 may also form part of the sealedenclosure100, which seals any air behind thediaphragm102. The cross-hatching inFIG. 6A defines at least a portion of the boundary of the sealedspeaker enclosure100.
FIG. 6B is cross-sectional end view of the example control panel ofFIG. 4, illustrating a sealed speaker, in accordance with this disclosure. Thespeaker50 includes a front120 from which sound is projected, a rear122 opposite the front120, afirst side124, and asecond side126 opposite the first side. Thehousing80 can include a frontinterior side130, a rearinterior side132 opposite the frontinterior side130, a firstinterior side134, and a secondinterior side136 opposite the firstinterior side134.
The sealed speaker enclosure100 (shown with hatching) is positioned within thehousing80 and at least partially defined by aspeaker case103 positioned within the housing. In some example configurations, e.g., in a control panel having dimensions of about 2 inches by about 5.5 inches by about 1.25 inches, the volume of the sealedspeaker enclosure100 can be between about 0.35 liters to about 0.45 liters to provide the improved performance characteristics described in this disclosure.
To ensure that that the speaker enclosure is sealed, asealant105 can be applied, e.g., room-temperature vulcanization (RTV) silicone, resulting in a sealed sound box within thecontrol panel20. In some examples, thediaphragm102 of thespeaker50 may also form part of the sealedenclosure100, which seals any air behind thediaphragm102. As seen inFIG. 6B, rather than extending behind thespeaker50, the primary volume ofair98 of the sealedspeaker enclosure100 is adjacent to thefirst side124 of thespeaker50 and extends away from thefirst side124 and, in some examples, behind other components within thecontrol panel20, e.g.,piezoelectric element104. A small, secondary volume ofair101 of the sealedspeaker enclosure100 may extend to the right of thespeaker50 inFIG. 6B.
In some examples, thesecond side126 of thespeaker50 is positioned adjacent the secondinterior side136 of thehousing80, and the sealedspeaker enclosure100 defines the secondary acoustic volume ofair101 that extends between thesecond side126 of thespeaker50 and the secondinterior side136 of thehousing80.
In some examples, thesecond side126 of thespeaker50 is positioned adjacent the secondinterior side136 of thehousing80, and the primary acoustic volume of air extends away from thefirst side124 of thespeaker50 toward the firstinterior side134 of thehousing80.
In some examples, therear portion122 of thespeaker50 is adjacent the rearinterior side132 of thehousing80, and the sealedspeaker enclosure100 extends across only a portion of therear portion122 of thespeaker50. For example, only a small portion of the sealedspeaker enclosure100 is positioned directly behind thespeaker50.
By taking advantage of spaces within thecontrol panel20 that are too small or would otherwise obstruct placement of thespeaker50, the design of the sealedspeaker enclosure100 ofFIGS. 6A and 6B may result in a reduced profile of thecontrol panel20. Without the design of the sealedspeaker enclosure100 ofFIGS. 6A and 6B, the dimensions of thecontrol panel20, e.g., the depth, may need to be increased in order to create an equivalent acoustic volume.
In some example implementations, thecontrol panel20 with the sealedspeaker enclosure100 may form part of an all-in-one home automation and security control panel, e.g., a control panel that includes all the radios of the home automation and security system without additional accessory boxes/panels.
FIG. 7 is perspective back view of the example control panel ofFIG. 6A, illustrating a replaceable cellular module, in accordance with this disclosure. More particularly, thecontrol panel20 ofFIG. 7 may include an end-user replaceablecellular telephony module110, that is removable from thecontrol panel20 without disassembling the control panel, having abody112 that includes thecellular telephony circuit52 and thecellular telephony antenna54. Thecontrol panel20 includes adoor90 through which the replaceablecellular module110 may be inserted for connection to the circuitry of thecontrol panel20. For example, thecontrol panel20 can include aconnector113 sized and shaped or otherwise configured to be removably engaged by the end-user with aconnector114 coupled to thecellular circuit52 and thebody112 of the replaceablecellular module110.
In one example implementation, a customer or technician may open thedoor90, remove the replaceablecellular module110, and install a new replaceablecellular module110 through the slot93 (or compartment) when thedoor90 is in an open state or position, e.g., removed. In some examples, thedoor90 is removable and not hinged and can be affixed to the housing when installed and removed when it is opened. At least a portion of the end-user replaceable cellular module is sized and shaped or otherwise configured to fit through thedoor90 and/or theslot93. For example, in the event that thecontrol panel20 includes a replaceablecellular module110 configured for an older cellular protocol, an updated replaceablecellular module110, e.g., next generation protocol radios such as a 3G or a 4G protocol, may be shipped to and installed by the customer without having to disassemble thehousing80.
FIGS. 8A and 8B are perspective views of the replaceablecellular module110 ofFIG. 7, in accordance with this disclosure. For purposes of concisenessFIGS. 8A and 8B will be described together.
As seen inFIGS. 8A and 8B, thecellular circuit52, e.g., radio chip, and the antenna54 (shown inFIG. 8B) are attached to abody112 and together form part of the replaceablecellular module110. Theantenna54 is electrically connected to thecellular circuit52, and thecellular circuit52 is connected to thecontrol panel20 using amulti-pin connector114. A pull-tab55 can be included to assist the user in removing the replaceablecellular module110 from thecontrol panel20.
Thecellular circuit52 and theantenna54 may each be detached from the replaceablecellular module110. For example, thecellular circuit52 may be a circuit board that may be removed and replaced by another cellular circuit, e.g., radio chip, that snaps into position on thebody112. As another example,antenna54 may be detachable by the service professional or end-user and replaced by a different type of antenna that has one or more improved performance characteristics. For example, a paddle antenna may be replaced by another antenna type that has different performance characteristics in order to produce an optimized radiation pattern, e.g., an isotropic radiation pattern. As another example, to enhance signal strength, theantenna54 can be unwound and re-routed, e.g., out of the replaceablecellular module110 and behind the wall. To re-route theantenna54, one end of theantenna54 can remain connected to thecellular circuit52 and be unwound. The unconnected end can be pulled out of the replaceablecellular module110 and positioned to adjust the signal strength, e.g., behind the wall supporting thecontrol panel20.
FIG. 9 is a perspective view of a portion of thecontrol panel20. InFIG. 9, a faceplate covering thecontrol panel20 has been removed to provide access the optionaldoor locking screw116. Once thedoor locking screw116 is removed, thedoor90 can be removed.
As mentioned above, thedoor90 may be in communication with thetamper detection circuit56. Using the techniques of this disclosure, tamper detection with thedoor90 is a two-step process. In the first step, thetamper detection circuit56 can detect tampering with thedoor90. As one example, thetamper detection circuit56 includes amicroswitch94 held in a first state, e.g., closed, by aportion106 of thedoor90, e.g., a tab. A person attempting to remove the replaceablecellular module110 may begin removing thescrew116. Once thedoor90 is removed, theportion106 of thedoor90 no longer holds themicroswitch94 in the first state and, as a result, themicroswitch94 may change to a second state, e.g., open.
In the second step, theprocessor40 may detect the change in state of themicroswitch94, e.g., open. In response and prior to the removal of the replaceablecellular module110 from thecontrol panel20, theprocessor40 can cause thecellular circuit52 to transmit a signal to thecentral monitoring station14 that indicates that tampering has been detected at thecontrol panel20.
The time delay between the detection of tampering and removal of the replaceablecellular module110 is sufficient for theprocessor40 and thecellular circuit52 to transmit a tamper detect signal to thecentral monitoring station14. In some examples, theprocessor40 and thecellular circuit52 may detect and transmit the tamper detect signal in about 100 milliseconds (ms) to about one second.
In addition, in some example implementations, after theprocessor40 and thecellular circuit52 transmit the tamper detect signal to thecentral monitoring station14, theprocessor40 may power down thecellular circuit52 to prevent damage to thecontrol panel20. That is, removing the replaceablecellular module110 from thecontrol panel20 while the replaceablecellular module110 is powered may damage the replaceablecellular module110 and/or thecontrol panel20. For example, removal of a powered cellular module from thecontrol panel20 may cause electrical arcing at the connector pins, which may permanently damage thecontrol panel20. Hence, the processor may remove power from thecellular circuit52 if thetamper detection circuit56 detects that thedoor90 has been opened.
NOTES AND EXAMPLESExample 1 includes subject matter (such as a device, apparatus, or machine) comprising: an end-user replaceable cellular telephony module that is removable from the control panel without disassembling the control panel, the cellular module including: a body; a cellular telephony circuit coupled to the body; a cellular telephony antenna coupled to the body and the cellular telephony circuit; and a first connector coupled to the cellular telephony circuit and the body, wherein the first connector is sized and shaped or otherwise configured to be removably engaged by the end-user with a second connector in the control panel.
In Example 2, the subject matter of Example1 may include, wherein the antenna is a first antenna, and wherein the module is configured such that the first antenna can be detached from the body by the end-user and replaced by a second antenna.
In Example 3, the subject matter of any one of Examples 1 to 2 may include, wherein the second antenna is configured to have a different performance characteristic than the first antenna.
In Example 4, the subject matter of any one of Examples 1 to 3 may include, a housing defining a slot, and wherein at least a portion of the end-user replaceable cellular module is sized and shaped or otherwise configured to fit through the slot.
In Example 5, the subject matter of any one of Examples 1 to 4 may include, a door removably affixed to the housing, wherein at least a portion of the end-user replaceable cellular module is sized and shaped or otherwise configured to fit through the slot when the door is removed.
In Example 6, the subject matter of any one of Examples 1 to 5 may include, a switch configured to detect an opening of the door affixed, wherein the switch is configured to change state upon detecting the opening; and a processor configured to: detect the changed state of the switch; and control transmission of a tamper detection signal to a central monitoring station upon detection of the changed state of the switch.
In Example 7, the subject matter of any one of Examples 1 to 6 may include, a display; a housing configured to support the display; and a speaker having a front from which sound is projected, a rear opposite the front, a first side, and a second side opposite the first side; and a sealed speaker enclosure positioned within the housing, the sealed speaker enclosure including a speaker case, wherein a portion of the speaker case and a portion of the speaker define the sealed speaker enclosure.
In Example 8, the subject matter of any one of Examples 1 to 7 may include, wherein the sealed speaker enclosure includes a speaker case.
In Example 9, the subject matter of any one of Examples 1 to 8 may include, wherein the sealed speaker enclosure has a volume of between about 0.35 liters to about 0.45 liters.
In Example 10, the subject matter of any one of Examples 1 to 9 may include, wherein the sealed speaker enclosure defines a primary acoustic volume of air that extends away from the first side of the speaker.
In Example 11, the subject matter of any one of Examples 1 to 10 may include, wherein the portion of the speaker that defines the sealed speaker enclosure includes a diaphragm of the speaker.
In Example 12, the subject matter of any one of Examples 1 to 11 may include, wherein the housing has a front interior side, a rear interior side opposite the front interior side, a first interior side and a second interior side opposite the first interior side, wherein the second side of the speaker is positioned adjacent the second interior side of the housing, and wherein the sealed speaker enclosure defines a secondary acoustic volume of air that extends between the second side of the speaker and the second interior side of the housing.
In Example 13, the subject matter of any one of Examples 1 to 12 may include, wherein the housing has a front interior side, a rear interior side opposite the front interior side, a first interior side and a second interior side opposite the first interior side, wherein the second side of the speaker is positioned adjacent the second interior side of the housing, and wherein the primary acoustic volume of air extends away from the first side of the speaker toward the first interior side of the housing.
In Example 14, the subject matter of any one of Examples 1 to 13 may include, wherein the housing has a front interior side, a rear interior side opposite the front interior side, a first interior side and a second interior side opposite the first interior side, wherein the speaker has a rear portion adjacent the rear interior side of the housing, and wherein the sealed speaker enclosure extends across only a portion of the rear portion of the speaker.
In Example 15, the subject matter of any one of Examples 1 to 14 may include, a Bluetooth circuit configured to receive at least one Bluetooth signal from one or more Bluetooth-enabled devices; a processor configured to: store data identifying an authorized Bluetooth-enabled device in a memory; detect the authorized Bluetooth-enabled device; and disarm the security system control panel in response to the detection.
In Example 16, the subject matter of any one of Examples 1 to 15 may include, a user interface including a display; and a home screen module configured to: receive an input from the end-user defining at least one screen depicted on the display; store data representing the at least one end-user-defined screen in a memory; and perform one or more actions previously associated by the user with the defined screen.
In Example 17, the subject matter of any one of Examples 1 to 16 may include, wherein the screen depicted on the display is a thermostat controller.
In Example 18, the subject matter of any one of Examples 1 to 17 may include, wherein the screen depicted on the display is a room controller that includes at least one of lighting and temperature controls.
In Example 19, the subject matter of any one of Examples 1 to 18 may include, a radio-frequency (RF) circuit configured to: when the control panel is in an unpowered state: receive power from an RF signal from an RF programming device; receive data embedded in the RF signal from the powered RF circuit; and using the received power from the RF signal store the data in a memory that is otherwise unpowered; and a processor configured to: when the control panel is in a powered state: receive the stored data; and configure at least one parameter using the received data.
The above detailed description includes references to the accompanying drawings, which form a part of the detailed description. The drawings show, by way of illustration, specific embodiments in which the invention can be practiced. These embodiments are also referred to herein as “examples.” Such examples can include elements in addition to those shown or described. However, the present inventors also contemplate examples in which only those elements shown or described are provided. Moreover, the present inventors also contemplate examples using any combination or permutation of those elements shown or described (or one or more aspects thereof), either with respect to a particular example (or one or more aspects thereof), or with respect to other examples (or one or more aspects thereof) shown or described herein.
All publications, patents, and patent documents referred to in this document are incorporated by reference herein in their entirety, as though individually incorporated by reference. In the event of inconsistent usages between this document and those documents so incorporated by reference, the usage in the incorporated reference(s) should be considered supplementary to that of this document; for irreconcilable inconsistencies, the usage in this document controls.
In this document, the terms “a” or “an” are used, as is common in patent documents, to include one or more than one, independent of any other instances or usages of “at least one” or “one or more.” In this document, the term “or” is used to refer to a nonexclusive or, such that “A or B” includes “A but not B,” “B but not A,” and “A and B,” unless otherwise indicated. In this document, the terms “including” and “in which” are used as the plain-English equivalents of the respective terms “comprising” and “wherein.” Also, in the following claims, the terms “including” and “comprising” are open-ended, that is, a system, device, article, or process that includes elements in addition to those listed after such a term in a claim are still deemed to fall within the scope of that claim. Moreover, in the following claims, the terms “first,” “second,” and “third,” etc. are used merely as labels, and are not intended to impose numerical requirements on their objects.
Method examples described herein can be machine or computer-implemented at least in part. Some examples can include a computer-readable medium or machine-readable medium encoded with instructions operable to configure an electronic device to perform methods as described in the above examples. An implementation of such methods can include code, such as microcode, assembly language code, a higher-level language code, or the like. Such code can include computer readable instructions for performing various methods. The code may form portions of computer program products. Further, the code can be tangibly stored on one or more volatile or non-volatile tangible computer-readable media, such as during execution or at other times. Examples of these tangible computer-readable media can include, but are not limited to, hard disks, removable magnetic disks, removable optical disks (e.g., compact disks and digital video disks), magnetic cassettes, memory cards or sticks, random access memories (RAMs), read only memories (ROMs), and the like.
Examples, as described herein, may include, or may operate on, logic or a number of components, modules, or mechanisms. Modules may be hardware, software, or firmware communicatively coupled to one or more processors in order to carry out the operations described herein. Modules may hardware modules, and as such modules may be considered tangible entities capable of performing specified operations and may be configured or arranged in a certain manner. In an example, circuits may be arranged (e.g., internally or with respect to external entities such as other circuits) in a specified manner as a module. In an example, the whole or part of one or more computer systems (e.g., a standalone, client or server computer system) or one or more hardware processors may be configured by firmware or software (e.g., instructions, an application portion, or an application) as a module that operates to perform specified operations. In an example, the software may reside on a machine-readable medium. In an example, the software, when executed by the underlying hardware of the module, causes the hardware to perform the specified operations. Accordingly, the term hardware module is understood to encompass a tangible entity, be that an entity that is physically constructed, specifically configured (e.g., hardwired), or temporarily (e.g., transitorily) configured (e.g., programmed) to operate in a specified manner or to perform part or all of any operation described herein. Considering examples in which modules are temporarily configured, each of the modules need not be instantiated at any one moment in time. For example, where the modules comprise a general-purpose hardware processor configured using software; the general-purpose hardware processor may be configured as respective different modules at different times. Software may accordingly configure a hardware processor, for example, to constitute a particular module at one instance of time and to constitute a different module at a different instance of time. Modules may also be software or firmware modules, which operate to perform the methodologies described herein.
The above description is intended to be illustrative, and not restrictive. For example, the above-described examples (or one or more aspects thereof) may be used in combination with each other. Other embodiments can be used, such as by one of ordinary skill in the art upon reviewing the above description. Also, in the above Detailed Description, various features may be grouped together to streamline the disclosure. This should not be interpreted as intending that an unclaimed disclosed feature is essential to any claim. Rather, inventive subject matter may lie in less than all features of a particular disclosed embodiment. Thus, the following claims are hereby incorporated into the Detailed Description, with each claim standing on its own as a separate embodiment, and it is contemplated that such embodiments can be combined with each other in various combinations or permutations. The scope of the invention should be determined with reference to the appended claims, along with the full scope of equivalents to which such claims are entitled.
Various aspects of the disclosure have been described. These and other aspects are within the scope of the following claims.