Security system and method

ABSTRACT

A security control apparatus, system and method are provided. The security control apparatus includes a wireless communication element that supports a plurality of wireless communication protocols. The wireless communication element is configured to provide wireless communications with a user interface device and at least one premise-based device. A remote communication element is configured to provide remote communications with a monitoring center. A processor is in communication with the local wireless communication element and the remote communication element. The processor is configured to use the wireless communication element to communicate with the user interface device to receive local control and configuration data. The processor is also configured to use the remote communication element to communicate data associated with at least one of a life safety feature and life style feature with the monitoring center.

CROSS-REFERENCE TO RELATED APPLICATION

This application is a continuation of U.S. patent application Ser. No.13/560,679, filed Jul. 27, 2012, entitled “SECURITY SYSTEM AND METHOD”,which claims the benefit of U.S. Provisional Patent Application Ser. No.61/513,003, filed Jul. 29, 2011, entitled “TOTAL SITE SECURITY ANDCONTROL”, the entire contents of both of which are hereby incorporatedherein by reference.

FIELD OF THE INVENTION

The invention relates to security systems and in particular to securitysystem control using wireless communication.

BACKGROUND OF THE INVENTION

The demand for security systems that monitor homes and businesses foralarm conditions has continued to grow as more home and business ownersseek to protect their premises from various hazards and threats. Suchhazards and threats include intrusion, fire, carbon monoxide andflooding, among others dangers that may be monitored and reported to amonitoring station.

Conventional security systems typically employ a wall-mounted controlpanel (typically mounted in a less accessible area of a home) thatreceives information from various sensors, and may trigger alarms basedon the received information. These triggered alarms are then reported bythe control panel to a monitoring center via a plain old telephoneservice (POTS) line, digital subscriber line (DSL), or cellular radio,such that the monitoring center can take appropriate action. However,installation and servicing complexity associated with these systemstends to be high as an installer has to physically mount the controlpanel onto the wall and configure the various sensors. These systemsalso typically incorporate a manufacturer's specific technology designedfor the manufacturer's security application, and are thus limited foruse only with certain life safety type devices such as door and windowcontacts, smoke detectors, motion detectors, etc. This is true as wellfor more recent all-in-one (AIO) security systems, in which the controlpanel and a user interface (such as a keypad) are combined in a singleunit. To reduce some of the cost associated with installation of suchsystems, portable AIO systems have been implemented so that the unitthat may be relocated around the premise and not permanently installed.For example, the unit may sit on top of a table or on the floor, butcommunicates with life safety sensors in a similar manner as awall-mounted security panel.

While the complexity of portable AIO systems is less than moreconventional security panels installations, portable AIO systems may bemore vulnerable to damage and tampering. For example, portable AIOsystems are often located near an entrance or exit, and even chirp whena sensor is activated or to remind a homeowner to disarm thesystem—announcing its location. A thief may break into a residenceprotected by a portable AIO in which the thief may be able todestroy/disable the portable AIO system and prevent the AIO system fromtriggering an alarm. The phenomenon of a thief breaking in and disablingthe portable AIO system control panel is referred to as “crash andsmash” and is a growing problem.

While a homeowner may take measures to prevent “crash and smash” byhiding the portable AIO system in a remote closet or back room, such alocation is often not practical because the home or business owner stillneeds access to the portable AIO system in order to arm/disarm orotherwise control the system via the built-in keypad. For example, thebusiness owner may be forced to initiate arming of the portable AIOsystem located in a backroom and then run to exit the premises beforethe system is armed. In other words, while portable AIO systems may beless complex than more conventional wall-mounted security panels, theyare also more vulnerable to tampering and disablement.

Another issue associated with some portable AIO systems is that thesesystems are designed to operate using only the built-in user interface.If the control panel becomes damaged, due to weather or tampering by athief, the system may be rendered inoperable. Also, a single point ofcontrol on the premise makes configuration of the system more difficultas an installer often has to go back and forth between the control paneland various sensors during installation to configure the sensors.

Moreover, both portable AIO security systems and conventional securitypanels are typically limited to controlling and monitoring life safety,such as intrusion and fire detection. But today, home or business ownerswant to utilize additional life style features (such as lightingcontrol, temperature control and remote viewing of video). Such lifestyle systems operate in a manner that has developed largely independentof life safety systems. For example, the life style devices providedifferent types of event information and are typically operated andmanaged through a different provider and/or remote system than thoseused for monitoring life safety. Consequently, in order to add thislifestyle capability, users have to have completely separatehardware/software/service directed to controlling and monitoring theseadditional features, with a separate user interface dedicated solely tocontrolling the separate system.

SUMMARY OF THE INVENTION

The invention advantageously provides a method and system for securitycontrol management.

According to one embodiment, a security control apparatus is provided.The security control apparatus includes a wireless communication elementthat supports a plurality of wireless communication protocols. Thewireless communication element is configured to provide wirelesscommunications with a user interface device and at least onepremise-based device. The security control apparatus includes a remotecommunication element configured to provide remote communications with amonitoring center. The security control apparatus includes a processorin communication with the local wireless communication element and theremote communication element. The processor is configured to use thewireless communication element to communicate with the user interfacedevice to receive local control and configuration data. The processor isalso configured to use the remote communication element to communicatedata associated with at least one of a life safety feature and lifestyle feature with the monitoring center.

According to another embodiment, a system is provided that includes auser interface device in which the user interface device is configuredto communicate local control data and configuration data, and a securitycontrol device in communication with the user interface device. Thesecurity control device includes a communication subsystem that providesa plurality of communication protocols and is arranged to providewireless communications with the user interface device and apremise-based device. The communication subsystem is further arrangedprovide remote communications with a remote monitoring center. Thesecurity control device includes a processor configured to use thecommunication subsystem to communicate with the user interface device toreceive the local control and configuration data. The processor isfurther configured to use the communication subsystem to communicatedata associated with at least one of a life safety feature and lifestyle feature with the remote monitoring center.

According to yet another embodiment, a portable user interface devicefor use with a security control unit is provided. The user interfacedevice includes a siren that is configured to provide an audible alarm.The user interface device also includes a power supply that isconfigured to power the portable user interface device. The userinterface device also includes a processor that is configured to triggerthe siren upon occurrence of a triggering condition.

According to yet another embodiment, a method for controlling featuresof a security system is provided. The security system includes asecurity control device in communication with a user interface device inwhich the security control device includes a communication subsystemthat provides a plurality of communication protocols. The communicationsubsystem is arranged to provide wireless communications with the userinterface device and provide remote communications with remotemonitoring center. The communication subsystem is used to communicatewith the user interface device to receive local control andconfiguration data. The communication subsystem is used to communicatedata associated with at least one of a life safety feature and lifestyle feature with the remote monitoring center.

BRIEF DESCRIPTION OF THE DRAWINGS

A more complete understanding of the invention, and the attendantadvantages and features thereof, will be more readily understood byreference to the following detailed description when considered inconjunction with the accompanying drawings wherein:

FIG. 1 is a block diagram of a security control system for securitycontrol management, constructed in accordance with the principles of theinvention;

FIG. 2 is a block diagram of a security control unit constructed inaccordance with the principles of the invention;

FIG. 3 is a block diagram of a user interface device constructed inaccordance with the principles of the invention;

FIG. 4 is a block diagram of a software architecture of the securitycontrol unit, constructed in accordance with the principles of theinvention;

FIG. 5 is a flow chart of an exemplary security control unit powermanagement process of the invention, constructed in accordance with theprinciples of the invention; and

FIG. 6 is a flow chart of an exemplary user interface device powermanagement process of the invention, constructed in accordance with theprinciples of the invention.

DETAILED DESCRIPTION OF THE INVENTION

The invention advantageously provides a system, device and method for asecurity control management. Accordingly, the system, device and methodcomponents have been represented where appropriate by convention symbolsin the drawings, showing only those specific details that are pertinentto understanding the embodiments of the invention so as not to obscurethe disclosure with details that will be readily apparent to those ofordinary skill in the art having the benefit of the description herein.

As used herein, relational terms, such as “first” and “second,” “top”and “bottom,” and the like, may be used solely to distinguish one entityor element from another entity or element without necessarily requiringor implying any physical or logical relationship or order between suchentities or elements.

Referring now to the drawing figures in which like reference designatorsrefer to like elements there is shown in FIG. 1 a security controlsystem constructed in accordance with the principles of the inventionand designated generally as “10.” System 10 may include one or more userinterface devices 12 a to 12 n (collectively referred to as “userinterface device 12”), one or more premise devices 14 a to 14 n(collectively referred to as “premise device 14”), security control unit16, one or more networks 18 a to 18 n (collectively referred to as“network 18”) and one or more remote monitoring centers 20 a to 20 n(collectively referred to as “remote monitoring center 20”),communicating with each other.

User interface device 12 may be a wireless device that allows a user tocommunicate with security control unit 16. User interface device 12 maybe a portable control keypad/interface 12 a, computer 12 b, mobile phone12 c and tablet 12 n, among other devices that allow a user to interfacewith security control unit 16. User interface device 12 may communicateat least with security control unit 16 using one or more wirelesscommunication protocols well known to those of ordinary skill in theart. For example, portable control keypad 12 a may communicate withsecurity control unit 16 via a ZigBee based communication link 22, e.g.,network based on Institute of Electrical and Electronics Engineers(IEEE) 802.15.4 protocols, and/or Z-wave based communication link 24, orover the premises' local area network, e.g., network based on Instituteof Electrical and Electronics Engineers (IEEE) 802.11 protocols, Userinterface device 12 is discussed in detail with respect to FIG. 3.

Premise devices 14 may include one or more types of sensors, controland/or image capture devices. For example, the types of sensors mayinclude various life safety related sensors such as motion sensors, firesensors, carbon monoxide sensors, flooding sensors and contact sensors,among other sensor types that are known in the art. The control devicesmay include, for example, one or more life style related devicesconfigured to adjust at least one premise setting such as lighting,temperature, energy usage, door lock and power settings, among othersettings associated with the premise or devices on the premise. Imagecapture devices may include a digital camera and/or video camera, amongother image captures devices that are well known in the art. Premisedevice 14 may communicate with security control unit 16 via proprietarywireless communication protocols and may also use Wi-Fi, both of whichare known in the art. Those of ordinary skill in the art will alsoappreciate that various additional sensors and control and/or imagecapture devices may relate to life safety or life style depending onboth what the sensors, control and image capture devices do and howthese sensors, control and image devices are used by system 10. One ofthe advantages of the invention is the ability to use any of thesedevices irrespective of whether they are life safety or life style.

Security control unit 16 may provide management functions such as powermanagement, premise device management and alarm management, among otherfunctions. In particular, security control unit 16 may manage one ormore life safety and life style features. Life safety features maycorrespond to security system functions and settings associated withpremise conditions that may result in life threatening harm to a personsuch as carbon monoxide detection and intrusion detection. Life stylefeatures may correspond to security system functions and settingsassociated with video capturing devices and non-life threateningconditions of the premise such as lighting and thermostat functions.Exemplary security control unit 16 components and functions aredescribed detail with respect to FIG. 2.

Security control unit 16 may communicate with network 18 via one or morecommunication links. In particular, the communications links may bebroadband communication links such as a wired cable modem or Ethernetcommunication link 26, and digital cellular communication link 28, e.g.,long term evolution (LTE) based link, among other broadbandcommunication links known in the art. Broadband as used herein may referto a communication link other than a plain old telephone service (POTS)line. Ethernet communication link 26 may be an IEEE 802.3 basedcommunication link. Network 18 may be a wide area network, local areanetwork, wireless local network and metropolitan area network, amongother networks known in the art. Network 18 provides communicationsbetween security control unit 16 and remote monitoring center 20.

System 10 may include remote monitoring center 20 that is capable ofperforming monitoring, configuration and/or control functions associatedwith security control unit 16. For example, remote monitoring center 20may include a remote life safety monitoring center that monitors lifesafety features associated with security control unit 16 in which theremote monitoring center 20 receives life safety data from securitycontrol unit 16. For example, with respect to fire and carbon monoxidedetectors/sensors, life safety data may include at least one carbonmonoxide readings, smoke detection reading, sensor location and time ofreading, among other related to these detectors that may be communicatedwith remote monitoring center 20. In yet another example, with respectto a door contact detector, life safety data may include at least one ofsensor location and time of detection, among other data related to thedoor contact detection that may be communicated with remote monitoringcenter 20.

Alarm event data from the premises may be used by the remote monitoringcenter in running through various life safety response processes innotifying the owner of the premises, determining whether an actual alarmevent is occurring at the premises, and notifying any appropriateresponse agency (e.g., police, fire, emergency response).

The same or separate remote monitoring center 20 may also include a lifestyle system/service that allows for various life style featuresassociated with security control 16. The remote life style system mayreceive life style data from security control unit 16. For example, withrespect to temperature control, life safety data may include thermostatreadings. In yet another example, with respect to video capture devices,life style data may include at least one of captured images, video, timeof video capture and video location, among other data related to videocapture devices that may be communicate with remote monitoring center20. Remote monitoring center 20 may also provide updates to securitycontrol unit 16 such as updates to features associated with life safetyand/or life style operating system. Those of ordinary skill in the artwill appreciate that video and other data may also be used by the lifesafety monitoring center.

An exemplary security control unit 16 for managing a premise securitysystem is described with reference to FIG. 2. Security control unit 16may include communication subsystem 30 that is configured to providecommunications with user interface device 12, premise device 14 andnetwork 18. In particular, communication subsystem 30 may includewireless communication element 32 and remote communication element 34.Wireless communication element 32 provides wireless communication withuser interface device 12 and premise device 14. Wireless communicationelement 32 may support one or more wireless communication protocols suchas ZigBee, Z-wave and Wi-Fi, e.g., IEEE 802.11, among others wirelesscommunications protocols that support wireless data transfer.

Wireless communication element 32 may be composed of one or morehardware components in which each hardware component is configured toprovide wireless communication using a specific protocol. For example,wireless communication element 32 may include a ZigBee hardwarecomponent configured to provide ZigBee based communications and a Z-wavehardware component configured to provide Z-wave based communications.The hardware components associated with wireless communication element32 may be internal components within security control unit 16 such thatthese features are built-in or standard features. Alternatively, any oneor more of the hardware components associated with wirelesscommunication element 32 may be external components that may be replacedby a user, homeowner or installer. For example, the ZigBee and Z-wavehardware component modules may be internal components while the Wi-Fihardware component may be an external component that allows forupgrading. Wireless communication element 32 may broadcast a wirelesssignal so that user interface device 12 may connect directly to securitycontrol unit 16. For example, wireless communication element 32 mayprovide a Wi-Fi encrypted service set identifier (SSID) and path forcommunication with multiple user interface devices 12.

By supporting a plurality of wireless communication protocols, wirelesscommunication element 32 enables security control unit 16 to be usedwith a variety of user interface devices 12 and premise devices 12 thatare designed to work using only a specific wireless communicationprotocol. Supporting a plurality of wireless communication protocolsallows easy upgrading of existing user interface device 12 and premisedevice 14, and for security control unit 16 integration with variousequipment venders that may incorporate different wireless protocols.Wireless communication element 32 may provide two-way voicecommunication with user interface device 12, which is then communicatedwith remote monitoring center 20. For example, wireless communicationelement 32 may support voice over internet protocol (VoIP) basedcommunications. In one embodiment, component parts of wirelesscommunication element 32, e.g., an IEEE 802.11 communication module, mayalso be past of remote communication element so that the wirelesscommunication protocols, e.g., IEEE 802.11 protocols, can be used tocommunicate with remote monitoring center 20. In other words, one ormore specific communication modules of wireless communication element 32can also be part of remote communication element 34.

Remote communication element 34 is configured to provide broadbandcommunications with remote monitoring center 20 via network 18. Forexample, remote communication element 34 may be an Ethernet basedhardware component that provides communication with network 18.Alternatively or in addition to Ethernet based hardware component,remote communication element 34 may include a Wi-Fi (IEEE 802.11)hardware component that provides communication with a home or otherpremise network, e.g., a home wireless network, and may utilize some ofthe same components as wireless communication element 32. The remotecommunication element 34 may also include a cellular radio hardwarecomponent that provides communications with at least one cellularnetwork such as an LTE based cellular network. Security control unit 16may use Ethernet communication link 26 as a primary communication linksuch that the cellular communication link is used for broadbandcommunications when the Ethernet or primary communication link is notfunctioning properly such as during a power outage where a home networkis unavailable, i.e., home network router has no power.

Security control unit 16 may include premise power supply 36 that isconfigured to provide power to security control unit 16. For example,premise power supply 36 may provide power to security control unit 16via a home alternating current (AC) power outlet or other power outletsthat are known in the art. Premise power supply 36 may be a primarypower supply such that security control unit 16 operates using powerfrom the premise power supply 36 when available. Security control unit16 may also include back-up power supply 38 that provides power duringpremise power supply failure. Back-up power supply 38 may include one ormore disposable or rechargeable batteries that are configured to provideenough power to operate security control unit 16 for first predeterminedamount of time and activate siren 40 for a second predetermined amountof time, e.g., a user can access the security system for at leasttwenty-four hours while security control unit 16 is power by back-uppower supply 38 while the siren can be activated and operate after thetwenty-four hour period.

Siren 40 may be an eighty-five decibel (dB) siren, among other audibledevices known in the art. Siren 40 may be an optional component insecurity control unit 16 such that audible alerts are generated by userinterface device 12, e.g., portable control keypad/interface 12 a, andnot security control unit 16. Moreover, security control unit 16 mayinclude at least one universal serial bus port (USB) to receive powerfrom a laptop or other device with a USB interface. Other port typescapable of providing power to security control unit 16 may be used basedon design need.

Input element 42 may be configured to receive input data from a user.For example, input element 42 may be a ten number keypad that enables auser to arm and disarm system 10. Input element 42 allows for analternative or back-up way of arming and disarming system when no userinterface device 12 is available to a user. Other input elements may beused as are known in the art. Security control unit 16 may include oneor more indicators such as light emitting diodes (LEDs) that mayindicate the status of security control unit 16. For example, a firstLED is turned on when security control panel is powered, a second LED isturned on when the system is armed or disarmed, a third LED is turned onwhen an internet protocol connection is connected, a fourth LED may beturned on when the cellular connection has sufficient strength and thefirst LED may flash during low power conditions, among other LED and LEDon/off may be used based on design need. Processor 44 may be a centralprocessing unit (CPU) that executes computer program instructions storedin memory 46 to perform the functions described herein.

Memory 46 may include non-volatile and volatile memory. For example,non-volatile memory may include a hard drive, memory stick, flash memoryand the like. Also, volatile memory may include random access memory andothers known in the art. Memory 46 may store power management module 48,life safety operating system 50 and life style operating system 52,among other data and/or modules. Power management module 48 includesinstructions, which when executed by processor 44, causes processor 44to perform the process described herein, such as the power managementprocess, discussed in detail with reference to FIG. 5. Life safetyoperating system is configured to provide life safety featuresassociated with system 10. Life style operating system 52 is configuredto provide life style features associated with system 10. In particular,processor 44 is configured to run both life safety operating system 50and life style operating system 52 such that separate processors are notneeded to run both operating systems. This single processorconfiguration reduces cost while still providing both life safety andlife style features.

Memory 46 may include a Wi-Fi high-jacking module (not shown) thatvaries security control unit 16 settings when processor determines anunauthorized has connected to security control unit 16 via Wi-Fi. Forexample, Wi-Fi high-jacking module may shutdown Wi-Fi and/or move to lowpower RF such that user interface device 12 and/or premise device 14 canstill communicate with security control panel. Memory 46 may include anauto enrollment module (not shown) that is configured to cause processor44 to search, wirelessly, for user interface device 12 and premisedevice 14 located within or near the premise. The auto enrollment modulemay cause processor 44 to forward information associated with the founddevices 12 and 14 to remote monitoring center 20 such that remotemonitoring center 20 may push enrollment data to security control unit16 to facilitate configuration. Security control unit 16 may use theenrollment data configured the security system such that the systemoperates using the found devices 12 and/14. Auto enrollment modulereduces installation time as the devices 12 and/14 are automaticallyfound and enrolled for use by security control unit 16.

An exemplary user interface device 12 for providing local control andconfiguration data is described with reference to FIG. 3. User interfacedevice 12 may include a portable control keypad/interface 12 a, personalcomputer 12 b, mobile device 12 c and tablet computer 12 n, among otherdevices. User interface device 12 includes communication element 54 thatis configured to communicate with security control unit 16 via at leastone wireless communication protocol such as ZigBee, Z-wave and Wi-Fi,among other protocols known in the art. User interface device 12 mayinclude processor 56 and memory 58 that correspond to security controlunit 16 components, with size and performance being adjusted based ondesign need. Processor 56 performs the functions described herein withrespect to user interface device 12.

Memory 58 may include power management module 60 in which powermanagement module 60 includes instructions, which when executed byprocessor 56, causes processor 56 to perform the process describedherein, such as the power management process, discussed with respect toFIG. 6. Memory 58 may store other modules and data based on design need.Interface 62 may be user interface configured to receive user inputs.For example, interface 62 may receive local control and configurationdata input from user.

User interface device 12 may include siren 64 such as an eighty-five dBsiren or other audible device(s) known in the art. User interface device12 may include power supply 66 for supplying power to user interfacedevice 12. Power supply 66 may include one or more rechargeable and/ordisposable batteries, among other types of batteries that are well knownin the art. Moreover, user interface device 12 may be powered via auniversal serial bus (USB), have an interface that allows the connectionof an external power adapter/recharger, and/or other connection type.

Exemplary software architecture 68 of security control unit 16 isdescribed with reference to FIG. 4. In particular, software architecture68 may include life safety operating system 50, life style operatingsystem 52 and bootloader 54, among other software components relates tosecurity feature management and operation of security control unit 16.Life safety operating system 50 and life style operating system 52 areconfigured to run in security control unit 16 in which the life safetyoperating system 50 and life style operating system 52 run in a virtualmachine configuration. The virtual machine configuration allows a singleprocessor such as processor 44 to separately run the life safetyoperating system 50 while updating life style operating 52 withoutnegatively affecting features associated with life safety operatingsystem 50, i.e., life safety features remain functioning while lifestyle features are updated. The converse is also contemplated.Bootloader 54 is used to load the run time environment for operatingsystems 50 and 52.

An exemplary power management process is illustrated in FIG. 5. Thepower management process relates to managing a security system based atleast in part on the monitoring of premise power supply 36 and back-uppower supply 38. Processor 44 determines whether premise power supply 36has failed (Block S100). For example, processor 44 may monitor the powerbeing provided by premise power supply 36 using well known methods inthe art to determine whether power failure has occurred. Power failuremay occur when the voltage being supplied by premise power supply 36falls below a predefined voltage threshold. If processor 44 determines apower failure has not occurred, the determination of Block S100 may berepeated.

If the determination is made that premise power supply 36 is in a powerfailure condition, processor 44 disables a non-life safety feature suchas a life style feature, while keeping the life safety feature(s)enabled (Block S102). For example, the temperature control featureassociated with the life style operating system may be disabled whilekeeping the intrusion detection, fire detection and carbon monoxidedetection features associated with life safety operating system 50enabled. Power management module 48 advantageously allows non-lifesafety features such as life style features associated with life styleoperating system 50 to be disabled without interrupting life safetyfeatures associated with life safety operating system 52. Thisconfiguration helps ensure life safety features will remain enabledduring premise power supply 36 failure while at the same time reducingpower consumed by disabling a non-life style feature. For example, somelife style features may require or attempt to initiate communicationwith user interface device 12 and/or remote monitoring center 20 inwhich such communications consume power, i.e., may consume limitedback-up power. Other non-life style features that may be disabledinclude turning off any security control device LEDs and/or terminatingcommunications to user interface device 12 while maintainingcommunications with premise devices. Therefore, disabling at least onenon-life safety feature reduces the amount of power consumed by securitycontrol unit 16 in which the more non-life safety features that aredisabled, the greater the power savings.

Processor 44 determines whether premise power supply 36 has beenrestored based at least in part on the monitoring of premise powersupply 36 (Block S104). For example, processor 44 may continually orperiodically monitor the power level of premise power supply 36 todetermine whether the power level is equal to or above the predeterminedvoltage threshold. If processor 44 determines premise power supply 36has been restored, processor 44 may resume or enable the previouslydisabled non-life safety feature(s) (Block S106). In other words, thepower management process enables non-life safety features such as lifestyle features that may consume more power once security control device16 is being power by premise power supply 36 such that the non-lifesafety features consume minimal power from the back-up power supply 38.

If the determination is made that power of premise power supply 36 hasnot been restored, a determination is made whether to trigger an alarmsuch as an audible alarm (Block S108). In particular, an audible alarmmay be trigger after processor 44 determines security control unit 16has been operating on back-up power supply 38 for a predetermined amountof time, e.g., twenty-four hours. The predetermined amount of time maybe based on design need and/or regulatory requirements. If thedetermination is made to trigger an alarm, siren 40 or siren 64 may betriggered for a predetermined amount of time (Block S116). In oneembodiment, processor 44 uses communication subsystem 30 to send a sirentrigger message to user interface device 12 to trigger siren 64 in userinterface device 12. For example, siren 64 may be triggered for at leastfour minutes in order to alert a user of a security control unit 16status such as loss of all power. The predetermined amount of time thealarm is triggered may be based on design need and/or regulatoryrequirements. Other criteria may be used to trigger an audible alarmbased on design need. After triggering siren 64, security control unit16 may shut down (Block S118). For example, security control unit 16 mayperform a graceful shutdown according to a shutdown routine when theback-up power supply 38 reaches a predefined threshold such as tenpercent power remaining.

Referring back to Block S108, if processor 44 makes the determinationnot to trigger an alarm, processor 44 determines whether an availablepower threshold has been reached (Block S110). The power threshold maycorrespond to a back-up power supply 38 level at which another non-lifesafety feature may be shutdown in order to reduce power consumption. Forexample, a different non-life safety feature may be terminated everytime the power level falls by a predetermined amount such as five or tenpercent or to a predetermined level. Moreover, one or more non-lifesafety features may be terminated at a time. If the determination ismade that the feature threshold is not reached, the determination ofBlock S104 may be repeated.

If the determination is made that the power threshold has been reached,processor 44 determines whether at least one other non-life safetyfeature, e.g., life style feature, is enabled (Block S112). For example,a lighting life style feature may have been previously been disabled inBlock S102 but a temperature life style feature remains enabled. If thedetermination is made that at least one other non-life safety feature isnot enabled, the determination of Block S104 may be repeated. Ifprocessor 44 determines at least one other non-life safety feature isenabled, processor 44 disables the at least one other non-life safetyfeature such that the non-life safety features consume less power fromthe back-up power supply 38 (Block S114). The order of which non-lifesafety features are disabled may vary based on design need and powerconsumption of individual features or other criteria. After disablingthe at least one other non-life safety feature, the determination ofBlock S104 may be repeated. The power management process helps ensuremore important or safety-dependent features stay powered by terminatingor disabling less important features such as life style features.Alternatively, processor 44 may disable more than one or all non-lifesafety features at one time.

An exemplary power management process for user interface device 12 isillustrated in FIG. 6. The power management process relates to managinguser interface device 12 features based at least in part on themonitoring of power supply 66. For example, processor 56 may monitor thepower being provided by power supply 66 using well known methods in theart. Processor 56 determines whether the power being supplied by powersupply 66 drops below a predefined threshold based at least in part onthe monitoring, i.e., whether a power supply 66 voltage or power levelis less than a threshold (Block S120). The threshold may be a powerand/or voltage level determined based on design need and/or otherfactors. If processor 56 determines power supply 66 is not below, i.e.,greater than or equal to, a predetermined threshold, the determinationof Block S120 may be repeated.

If the determination is made that the power supply 66 is below thepredetermined threshold, processor 56 disables at least one non-safetyfeature while keeping life safety feature(s) enabled at user interfacedevice 12 (Block S122). For example, processor 56 may disable a lifestyle feature such that less power may be consumed by not having toperform processing, communication and/or other functions associated withthe disabled feature. Other non-safety features may include a backlightkeypad and/or display feature. Therefore, disabling at least onenon-life safety feature reduces the amount of power consumed by userinterface device 12 such that the more non-safety features that aredisabled, the greater the power savings.

After at least one non-life safety has been disabled, processor 56 maydetermine whether power supply 66 is still below the threshold based atleast in part on the monitoring (Block S124). For example, processor 56may continually or periodically monitor the voltage level of powersupply 66. If the determination is made that power supply 66 is notbelow the threshold (i.e., is greater than or equal to the threshold),processor 56 may resume the previously disabled or terminated non-safetyfeature(s) (Block S126). In other words, the power management process ofFIG. 6 enables or executes the previously disabled non-life safetyfeature(s) that may consume more power once power supply 66 is greaterthan or equal to the threshold such that the non-life safety featuresconsume minimal power from power supply 66. Power supply 66 may riseback to the predetermined threshold level when power supply 66 is beingrecharged and/or when user interface device 12 is being power via USB,among other situations where power supply 66 is no longer below thepredetermined threshold. Alternatively, Blocks S124 and S126 may beskipped or excluded from the power management process of FIG. 6 based ondesign need, i.e., the process moves from Block S122 directly to BlockS128.

If the determination is made that power supply 66 is below threshold,processor 56 determines whether to trigger an alarm such as an audiblealarm (Block S128). In particular, an audible alarm may be trigger afterprocessor 56 determines power supply 66 has reached a lowerpredetermined threshold. For example, the lower predetermined thresholdmay correspond to a minimum power level needed to trigger siren 64 for apredetermined amount of time and/or shutdown user interface device 12.The lower predetermined threshold may be based on design need. If thedetermination is made to trigger an alarm, siren 64 and/or siren 40 maybe triggered for a predetermined amount of time (Block S136). Forexample, siren 64 may be triggered for at least four minutes in order toalert a user of user interface device 12 status such as a loss of allpower status. The predetermined amount of time the alarm is triggeredmay be based on design need and/or regulatory requirements. Othercriteria may be used to trigger an audible alarm based on design need.After triggering siren 64, user interface device 12 may shut down (BlockS138). For example, security control unit 16 may perform a gracefulshutdown according to a shutdown routine.

Referring back to Block S128, if the determination is made not totrigger an alarm, processor 56 determines whether a feature thresholdhas been reached (Block S130). The feature threshold may correspond to aback-up power supply 38 level at which another feature may be shutdownin order to reduce power consumption. For example, a difference featuremay be terminated every time the power level fails another predeterminedamount, e.g., five or ten percent. Moreover, more than one feature maybe disabled or terminated at a time. If the determination is made thatthe feature threshold is not reached, the determination of Step S124 maybe repeated. Alternatively, if Block S124 is skipped or excluded fromthe process and the determination is made that the feature threshold notbeen reached, the determination of Block S128 may be performed.

If the determination is made that the feature threshold is reach,processor 56 determines whether at least one other non-life safetyfeature is enabled (Block S132). If the determination is made that atleast one other non-life safety feature is not enabled, thedetermination of Block S124 may be repeated. Alternatively, if BlockS124 is skipped or excluded from the process and the determination ismade that at least one other non-life-style feature is not enabled, thedetermination of Block S128 may be repeated, i.e., the process movesfrom Block S132 to Block S128. If processor 56 determines at least oneother non-life safety feature is enabled, processor 56 disables the atleast one other life style feature such that the non-life safetyfeatures consume less power from power supply 66 (Block S134). The orderof which non-life safety features are disabled may vary based on designneed and power consumption of individual features or other criteria.

After disabling the at least one other non-life style feature, thedetermination of Block S124 may be repeated. Alternatively, if BlockS124 is skipped or excluded from the process and the other non-lifesafety feature has been disabled at Block S134, the determination ofBlock S128 may be repeated, i.e., the process moves from Block S134 toBlock S128. The power management process helps ensure more important orsafety dependent features remain operating by terminating or disablingless important features such as life style features or other non-safetyfeatures at user interface device 12. Alternatively, processor 56 maydisable more than one or all life style features at one time. In oneembodiment, the power management is configured and power supply 66 sizedsuch that processor 56 can still trigger and sound siren 64 for fourminutes after a twenty-four hour period upon the occurrence of atriggering condition, e.g., low battery, sensor trigger detection,receipt of trigger message from security control unit 16, etc.

The invention can be realized in hardware, software, or a combination ofhardware and software. Any kind of computing system, or other apparatusadapted for carrying out the methods described herein, is suited toperform the functions described herein. A typical combination ofhardware and software could be a specialized or general purpose computersystem having one or more processing elements and a computer programstored on a storage medium that, when loaded and executed, controls thecomputer system such that it carries out the methods described herein.The invention can also be embedded in a computer program product, whichcomprises all the features enabling the implementation of the methodsdescribed herein, and which, when loaded in a computing system is ableto carry out these methods. Storage medium refers to any volatile ornon-volatile storage device.

Computer program or application in the present context means anyexpression, in any language, code or notation, of a set of instructionsintended to cause a system having an information processing capabilityto perform a particular function either directly or after either or bothof the following a) conversion to another language, code or notation; b)reproduction in a different material form.

It will be appreciated by persons skilled in the art that the inventionis not limited to what has been particularly shown and described hereinabove. In addition, unless mention was made above to the contrary, itshould be noted that all of the accompanying drawings are not to scale.A variety of modifications and variations are possible in light of theabove teachings without departing from the scope and spirit of theinvention, which is limited only by the following claims.

What is claimed is:
 1. A security control apparatus, comprising: awireless communication element supporting a plurality of local wirelesscommunication protocols, the wireless communication element configuredto provide local wireless communications with a user interface deviceand at least one premise-based device; a remote communication elementconfigured to provide remote communications with a monitoring center;and a processor in communication with the local wireless communicationelement and the remote communication element, the processor configuredto: use the wireless communication element to communicate with the userinterface device to receive local control and configuration data; anduse the remote communication element to communicate data associated withat least one each of a life safety feature and life style feature withthe monitoring center.
 2. The security control apparatus of claim 1,further comprising: a premise power supply, the premise power supplyconfigured to supply power to the security control apparatus; a back-uppower supply, the back-up power supply configured to provide power tothe security control apparatus during failure of the premise powersupply; and the processor further configured to: execute at least onelife safety feature and at least one life style feature; monitor thepremise power supply; and disable the at least one life style featurebased at least in part on the monitoring.
 3. The security controlapparatus of claim 2, wherein the at least one life style feature isdisabled when the monitoring indicates power failure of the premisepower supply.
 4. The security control apparatus of claim 3, wherein theat least one life safety feature remains enabled while the at least onelife style feature is disabled.
 5. The security control apparatus ofclaim 2, wherein the executed at least one life style feature includesexecuting a plurality of life style features; and the disablement of theat least one life style feature occurs selectively from among theplurality of life style features based at least in part on the durationof power failure.
 6. The security control apparatus of claim 1, furthercomprising a memory configured to: store a life safety operating system,the life safety operating system configured to provide functionalityassociated with the life safety feature; store a life style operatingsystem, the life style operating system configured to providefunctionality associated with the life style feature; and the processoris further configured to process the life safety operating system andlife style operating system in a virtual machine configuration.
 7. Thesecurity control apparatus of claim 1, wherein the plurality of localwireless communication protocols includes at least one of a ZigBeeprotocol, Z-Wave protocol and Wi-Fi protocol.
 8. The security controlapparatus of claim 1, wherein the remote communications are provided atleast by 1) at least one of an Ethernet communication link and Wi-Ficommunication link and 2) a cellular communication link.
 9. The securitycontrol apparatus of claim 8, wherein the cellular communication link isused for remote communications when at least one of the Ethernetcommunication link and Wi-Fi communication link is unavailable.
 10. Thesecurity control apparatus of claim 1, wherein the user interface deviceis at least one of a keypad, mobile phone, tablet computer, personalcomputer and laptop computer.
 11. The security control apparatus ofclaim 1, wherein the premise-based device is at least one of a sensor,video camera, thermostat and appliance.
 12. A method for a securitycontrol device, the security control device having a wirelesscommunication element and a remote communication element, the methodcomprising: using the wireless communication element to: provide localwireless communications with a user interface device and at least onepremise-based device, the local wireless communications using at leastone local wireless communication protocol; and communicate with the userinterface device to receive local control and configuration data; andusing the remote communication element to: provide remote communicationswith a monitoring center; and communicate data associated with at leastone each of a life safety feature and life style feature with themonitoring center.
 13. The method of claim 12, further comprising:executing at least one life safety feature and at least one life stylefeature; monitor a premise power supply; and disable at least one lifestyle feature based at least in part on the monitoring.
 14. The methodof claim 13, wherein the at least one life style feature is disabledwhen the monitoring indicates power failure of the premise power supply.15. The method of claim 14, wherein the at least one life safety featureremains enabled while the at least one life style feature is disabled.16. The method of claim 13, wherein the executed at least one life stylefeature includes executing a plurality of life style features; and thedisablement of the at least one life style feature occurs selectivelyfrom among a plurality of life style features based at least in part onthe duration of power failure.
 17. The method of claim 12, furthercomprising: storing a life safety operating system, the life safetyoperating system configured to provide functionality associated with thelife safety feature; storing a life style operating system, the lifestyle operating system configured to provide functionality associatedwith the life style feature; and processing the life safety operatingsystem and life style operating system in a virtual machineconfiguration.
 18. The method of claim 12, wherein the plurality oflocal wireless communication protocols includes at least one of a ZigBeeprotocol, Z-Wave protocol and Wi-Fi protocol.
 19. The method of claim12, wherein the remote communications are provided at least by 1) atleast one of an Ethernet communication link and Wi-Fi communication linkand 2) a cellular communication link.
 20. The method of claim 19,further comprising using the cellular communication link for remotecommunications when at least one of the Ethernet communication link andWi-Fi communication link is unavailable.