System-based control of programmable devices

ABSTRACT

A requirement exists for machine-to-machine communications between the multiple Smart Devices and Networks (SDNs) a user has without in today&#39;s environment of ubiquitous electronically enabled devices, sub-systems, systems, and networks. For example, a user&#39;s SDNs may include a multitude of network-controllable devices and networked interfaced devices within an environment of wired and wireless networks and a security system. The combined data/knowledge of these multiple SDNs can be employed to trigger actions for one or more SDNs based upon the combined states of all the SDNs. However, rather than requiring users purchase and install new systems and devices remote cloud based analytics, rule engines, etc. are employed to provide many users with smart home or office automation.

CROSS-REFERENCE TO RELATED APPLICATIONS

This patent application claims the benefit of priority from U.S.Provisional Patent Application 62/166,897 filed May 27, 2015 entitled“Security System Based Control of Programmable Devices”, the entirecontents of which are incorporated herein by reference.

FIELD OF THE INVENTION

This invention relates to electronic device automation and moreparticularly to the automation of network-controllable electronicdevices based upon a context of their environment.

BACKGROUND OF THE INVENTION

The continued evolution of semiconductor technologies over the pastthirty years have led to low cost, high volume, consumer electronicdevices having capabilities and connectivity unprecedented in humanhistory. Today, a teenager armed with a smartphone is able to browse andaccess content potentially from hundreds of millions of websites andbillions of webpages through wireless connectivity to the Internet,exchange messages in electronic, voice, and video remotely or locally,stream high definition video, navigate essentially anywhere in the worldthrough Global Positioning Systems (GPS), and control or obtain datafrom a range of other local and/or remote electronic devices rangingfrom activating or deactivating a residential security system to flyinga drone.

These same technological advancements have also resulted in manyresidential homes and office buildings being increasing equipped withnetwork-controllable devices, such as thermostats and lights. Users,through a mobile device such as a smartphone or tablet, can adjustsettings of these network-controllable devices from a remote location,using a cloud server program registered on both the mobile andnetwork-controllable devices. Using location services embedded in themobile device, actions can also be triggered based on the user'slocation, such as turning on the lights just before a user enters theroom. Wi-Fi APs in larger buildings help identify the unique users ineach access point location. Most of these homes and buildings are alsoequipped with security systems which comprise keypads with “stay” and“away”, or equivalently armed/disarmed modes, along with optionalinfrared, motion, and other sensors for movement detection and audibledetection. Such electronic devices as well as those in fields rangingfrom health, automotive, environmental etc. have led to concepts such asSmart Devices and Networks (SDNs) of which the commonly referred to“Internet of Things” (IoT) forms part.

However, prior art SDN solutions suffer drawbacks including, forexample, that the actions where triggered by user location, e.g. basedupon acquired GPS location or wireless AP/base station connectivity(presence) and/or triangulation, are typically based on the location ofa single PED, e.g. a smartphone. Accordingly, it becomes increasinglydifficult to gauge the proper action to take when the SDNs arecontrolled by more than one user. For example, network-controlled lightswithin a residence may be programmed to a specific action, e.g. turnoff, when the user is not at home, but if said user has guests or othertenants still in the house, the programmed lights will be aninconvenience. Today, the network controllable aspects of the user sresidence form one SDN whilst their security system forms another SDNand they are may exploit different network infrastructure and/or commonnetwork infrastructure. However, in this scenario it would be evidentthat connectivity between the SDNs either as a single SDN and/or throughMachine-to-Machine (M2M) communications may trigger actions based uponthe combined data such that at a basic level the programmed turning offof the lights is linked to the security mode of the residence. In thismanner if the user leaves and arms the security system the lights areset to their programmed state but if the user leaves and does not armthe security system then the lights are left unaffected.

Accordingly, there is a requirement for M2M communications between auser's SDNs such as their network-controllable devices and theirsecurity system, wherein the combined knowledge of these multiple SDNsis employed to trigger actions for one or more SDNs based upon thecombined states of all the SDNs. Hence, within the example describedsupra the network-controllable device settings are established independence upon their settings and the current settings or mode of thesecurity system.

Other aspects and features of the present invention will become apparentto those ordinarily skilled in the art upon review of the followingdescription of specific embodiments of the invention in conjunction withthe accompanying figures.

SUMMARY OF THE INVENTION

It is an object of the present invention to mitigate limitations withinthe prior art relating to electronic device automation and moreparticularly to the automation of network-controllable electronicdevices based upon a context of their environment.

In accordance with an embodiment of the invention there is provided asystem comprising:

-   a security system associated with an element of infrastructure    coupled to a first network and having a plurality of modes;-   a plurality of network-controllable devices associated with the    element of infrastructure, each coupled to a second network and    having a set of operating states; wherein-   a change in the mode of the security system results triggers an    action with respect to a predetermined subset of the plurality of    network-controllable devices.

Other aspects and features of the present invention will become apparentto those ordinarily skilled in the art upon review of the followingdescription of specific embodiments of the invention in conjunction withthe accompanying figures.

BRIEF DESCRIPTION OF THE DRAWINGS

Embodiments of the present invention will now be described, by way ofexample only, with reference to the attached Figures, wherein:

FIG. 1A depicts an electronic device and its connected environment asemployed within, supporting, and providing Network Controlled AutomationApplications, Software and/or Platforms (NCA-ASPs) according toembodiments of the invention;

FIG. 1B depicts an example of Machine-to-Machine (M2M) communicationbetween a user s portable electronic device and two Smart Devices andNetworks (SDNs) associated with the user according to an embodiment ofthe invention wherein the SDNs are the user's residential securitysystem and residential network controllable devices;

FIG. 2 depicts the example of Machine-to-Machine (M2M) communicationbetween PED and SDNs presented in FIG. 1B with respect to an embodimentof the invention wherein the SDN relating to the residential securitysystem now incorporates motion sensors;

FIG. 3 depicts the example of Machine-to-Machine (M2M) communicationbetween PED and SDNs presented in FIGS. 1B and 2 with respect to anembodiment of the invention wherein the SDN relating to the residentialsecurity system now incorporates a button triggering the security systemto simulate armed and disarmed modes;

FIG. 4 depicts an exemplary flow chart for a switch within a HVACconfiguration coupled to a thermostat manager according to an embodimentof the invention;

FIG. 5 depicts an exemplary flow chart for a security system statuschange triggering temperature rules relating to a HVAC system accordingto an embodiment of the invention;

FIG. 6 depicts an exemplary flow chart for programmed settings of asecurity panel based on the status of the security system and optionalmotion sensors according to an embodiment of the invention; and

FIG. 7 depicts an exemplary flow chart for a switch or security panelsettings based on a specialty care scenario, such as disabled or elderlycare, within an embodiment of the invention.

DETAILED DESCRIPTION

The present invention is directed to electronic device automation andmore particularly to the automation of network-controllable electronicdevices based upon a context of their environment.

The ensuing description provides representative embodiment(s) only, andis not intended to limit the scope, applicability or configuration ofthe disclosure. Rather, the ensuing description of the embodiment(s)will provide those skilled in the art with an enabling description forimplementing an embodiment or embodiments of the invention. It beingunderstood that various changes can be made in the function andarrangement of elements without departing from the spirit and scope asset forth in the appended claims. Accordingly, an embodiment is anexample or implementation of the inventions and not the soleimplementation. Various appearances of “one embodiment,” “an embodiment”or “some embodiments” do not necessarily all refer to the sameembodiments. Although various features of the invention may be describedin the context of a single embodiment, the features may also be providedseparately or in any suitable combination. Conversely, although theinvention may be described herein in the context of separate embodimentsfor clarity, the invention can also be implemented in a singleembodiment or any combination of embodiments.

Reference in the specification to “one embodiment”, “an embodiment”,“some embodiments” or “other embodiments” means that a particularfeature, structure, or characteristic described in connection with theembodiments is included in at least one embodiment, but not necessarilyall embodiments, of the inventions. The phraseology and terminologyemployed herein is not to be construed as limiting but is fordescriptive purpose only. It is to be understood that where the claimsor specification refer to “a” or “an” element, such reference is not tobe construed as there being only one of that element. It is to beunderstood that where the specification states that a component feature,structure, or characteristic “may”, “might”, “can” or “could” beincluded, that particular component, feature, structure, orcharacteristic is not required to be included.

Reference to terms such as “left”, “right”, “top”, “bottom”, “front” and“back” are intended for use in respect to the orientation of theparticular feature, structure, or element within the figures depictingembodiments of the invention. It would be evident that such directionalterminology with respect to the actual use of a device has no specificmeaning as the device can be employed in a multiplicity of orientationsby the user or users. Reference to terms “including”, “comprising”,“consisting” and grammatical variants thereof do not preclude theaddition of one or more components, features, steps, integers or groupsthereof and that the terms are not to be construed as specifyingcomponents, features, steps or integers. Likewise, the phrase“consisting essentially of”, and grammatical variants thereof, when usedherein is not to be construed as excluding additional components, steps,features integers or groups thereof but rather that the additionalfeatures, integers, steps, components or groups thereof do notmaterially alter the basic and novel characteristics of the claimedcomposition, device or method. If the specification or claims refer to“an additional” element, that does not preclude there being more thanone of the additional element.

A “portable electronic device” (PED) as used herein and throughout thisdisclosure, refers to a wireless device used for communications andother applications that requires a battery or other independent form ofenergy for power. This includes devices, but is not limited to, such asa cellular telephone, smartphone, personal digital assistant (PDA),portable computer, pager, portable multimedia player, portable gamingconsole, laptop computer, tablet computer, a wearable device and anelectronic reader.

A “fixed electronic device” (FED) as used herein and throughout thisdisclosure, refers to a wireless and/or wired device used forcommunications and other applications that requires connection to afixed interface to obtain power. This includes, but is not limited to, alaptop computer, a personal computer, a computer server, a kiosk, agaming console, a digital set-top box, an analog set-top box, anInternet enabled appliance, an Internet enabled television, and amultimedia player.

A “server” as used herein, and throughout this disclosure, refers to oneor more physical computers co-located and/or geographically distributedrunning one or more services as a host to users of other computers,PEDs, FEDs, etc. to serve the client needs of these other users. Thisincludes, but is not limited to, a database server, file server, mailserver, print server, web server, gaming server, or virtual environmentserver.

An “application” (commonly referred to as an “app”) as used herein mayrefer to, but is not limited to, a “software application”, an element ofa “software suite”, a computer program designed to allow an individualto perform an activity, a computer program designed to allow anelectronic device to perform an activity, and a computer programdesigned to communicate with local and/or remote electronic devices. Anapplication thus differs from an operating system (which runs acomputer), a utility (which performs maintenance or general-purposechores), and a programming tools (with which computer programs arecreated). Generally, within the following description with respect toembodiments of the invention an application is generally presented inrespect of software permanently and/or temporarily installed upon a PEDand/or FED.

A “social network” or “social networking service” as used herein mayrefer to, but is not limited to, a platform to build social networks orsocial relations among people who may, for example, share interests,activities, backgrounds, or real-life connections. This includes, but isnot limited to, social networks such as U.S. based services such asFacebook, Google+, Tumblr and Twitter; as well as Nexopia, Badoo, Bebo,VKontakte, Delphi, Hi5, Hyves, iWiW, Nasza-Klasa, Soup, Glocals,Skyrock, The Sphere, StudiVZ, Tagged, Tuenti, XING, Orkut, Mxit,Cyworld, Mixi, renren, weibo and Wretch.

“Social media” or “social media services” as used herein may refer to,but is not limited to, a means of interaction among people in which theycreate, share, and/or exchange information and ideas in virtualcommunities and networks. This includes, but is not limited to, socialmedia services relating to magazines, Internet forums, weblogs, socialblogs, microblogging, wikis, social networks, podcasts, photographs orpictures, video, rating and social bookmarking as well as thoseexploiting blogging, picture-sharing, video logs, wall-posting,music-sharing, crowdsourcing and voice over IP, to name a few. Socialmedia services may be classified, for example, as collaborative projects(for example, Wikipedia); blogs and microblogs (for example, Twitter™);content communities (for example, YouTube and DailyMotion); socialnetworking sites (for example, Facebook™); virtual game-worlds (e.g.,World of Warcraft™); and virtual social worlds (e.g. Second Life™).

An “enterprise” as used herein may refer to, but is not limited to, aprovider of a service and/or a product to a user, customer, or consumer.This includes, but is not limited to, a retail outlet, a store, amarket, an online marketplace, a manufacturer, an online retailer, acharity, a utility, and a service provider. Such enterprises may bedirectly owned and controlled by a company or may be owned and operatedby a franchisee under the direction and management of a franchiser.

A “service provider” as used herein may refer to, but is not limited to,a third party provider of a service and/or a product to an enterpriseand/or individual and/or group of individuals and/or a device comprisinga microprocessor. This includes, but is not limited to, a retail outlet,a store, a market, an online marketplace, a manufacturer, an onlineretailer, a utility, an own brand provider, and a service providerwherein the service and/or product is at least one of marketed, sold,offered, and distributed by the enterprise solely or in addition to theservice provider.

A “third party” or “third party provider” as used herein may refer to,but is not limited to, a so-called “arm's length” provider of a serviceand/or a product to an enterprise and/or individual and/or group ofindividuals and/or a device comprising a microprocessor wherein theconsumer and/or customer engages the third party but the actual serviceand/or product that they are interested in and/or purchase and/orreceive is provided through an enterprise and/or service provider.

A “user” as used herein may refer to, but is not limited to, anindividual or group of individuals. This includes, but is not limitedto, private individuals, employees of organizations and/or enterprises,members of community organizations, members of charity organizations,men and women. In its broadest sense the user may further include, butnot be limited to, software systems, mechanical systems, roboticsystems, android systems, etc. that may be characterised by an abilityto exploit one or more embodiments of the invention. A user may beassociated with biometric data which may be, but not limited to,monitored, acquired, stored, transmitted, processed and analysed eitherlocally or remotely to the user. A user may also be associated throughone or more accounts and/or profiles with one or more of a serviceprovider, third party provider, enterprise, social network, social mediaetc. via a dashboard, web service, website, software plug-in, softwareapplication, and graphical user interface.

“User information” or “user profile” as used herein may refer to, but isnot limited to, user behavior information and/or user profileinformation. It may also include a user's biometric information, anestimation of the user's biometric information, or aprojection/prediction of a user's biometric information derived fromcurrent and/or historical biometric information. An anonymised userprofile or user information is based upon the actual user informationand/or user profile but is modified such that identification of thespecific user is not feasible. Obvious aspects such as name, addressetc. are merely replaced with simple generic indicators of sex and ahigher level geographic indicator such as town, state, country etc.Other information such as age may be replaced to one or more bands suchthat, for example, ages are reported simply as 0-9, 10-18, 19-25, 26-40,40-55, and 55+ for example.

A “wearable device” or “wearable sensor” relates to miniature electronicdevices that are worn by the user including those under, within, with oron top of clothing and are part of a broader general class of wearabletechnology which includes “wearable computers” which in contrast aredirected to general or special purpose information technologies andmedia development. Such wearable devices and/or wearable sensors mayinclude, but not be limited to, smartphones, smart watches, e-textiles,smart shirts, activity trackers, smart glasses, environmental sensors,medical sensors, biological sensors, physiological sensors, chemicalsensors, ambient environment sensors, position sensors, neurologicalsensors, drug delivery systems, medical testing and diagnosis devices,and motion sensors.

“Biometric” information as used herein may refer to, but is not limitedto, data relating to a user characterised by data relating to a subsetof conditions including, but not limited to, their environment, medicalcondition, biological condition, physiological condition, chemicalcondition, ambient environment condition, position condition,neurological condition, drug condition, and one or more specific aspectsof one or more of these said conditions. Accordingly, such biometricinformation may include, but not be limited, blood oxygenation, bloodpressure, blood flow rate, heart rate, temperate, fluidic pH, viscosity,particulate content, solids content, altitude, vibration, motion,perspiration, EEG, ECG, energy level, etc. In addition, biometricinformation may include data relating to physiological characteristicsrelated to the shape and/or condition of the body wherein examples mayinclude, but are not limited to, fingerprint, facial geometry, baldness,DNA, hand geometry, odour, and scent. Biometric information may alsoinclude data relating to behavioral characteristics, including but notlimited to, typing rhythm, gait, and voice.

“Electronic content” (also referred to as “content” or “digitalcontent”) as used herein may refer to, but is not limited to, any typeof content that exists in the form of digital data as stored,transmitted, received and/or converted wherein one or more of thesesteps may be analog although generally these steps will be digital.Forms of digital content include, but are not limited to, informationthat is digitally broadcast, streamed or contained in discrete files.Viewed narrowly, types of digital content include popular media typessuch as MP3, JPG, AVI, TIFF, AAC, TXT, RTF, HTML, XHTML, PDF, XLS, SVG,WMA, MP4, FLV, and PPT, for example, as well as others, see for examplehttp://en.wikipedia.org/wiki/List_of_file_formats. Within a broaderapproach digital content mat include any type of digital information,e.g. digitally updated weather forecast, a GPS map, an eBook, aphotograph, a video, a Vine™, a blog posting, a Facebook™ posting, aTwitter™ tweet, online TV, etc. The digital content may be any digitaldata that is at least one of generated, selected, created, modified, andtransmitted in response to a user request, said request may be a query,a search, a trigger, an alarm, and a message for example.

A “profile” as used herein, and throughout this disclosure, refers to acomputer and/or microprocessor readable data file comprising datarelating to settings and/or limits of devices, networks, etc.

“Data metrics” as used herein, and throughout this disclosure, relatesto information associated with an electronic device including, but notlimited to, its unique identifiable identity, manufacturer, manufacturermodel, capabilities, location, status, status history, software version,firmware version, hardware version, wired interface(s) and wirelessinterface(s).

Reference to a “barcode” as used herein may refer to, but is not limitedto, an optical machine-readable representation of data relating to anitem to which it is attached and/or printed upon. A barcode employs asymbology mapping data to elements within the barcode as well as one ormore other elements including, but not limited to, orientation markers,start-stop markers, quiet zones, and checksums. Such symbologiesinclude, but are not limited to, linear symbologies, continuoussymbologies, discrete symb ologies, two-width symbologies, many-widthsymbologies, interleaved symbologies, matrix symbologies, andtwo-dimensional (2D) symbologies. Examples of linear and 2D or matrixsymbologies may be found listed in Wikipedia, seehttp://en.wikipedia.org/wiki/Barcode#Symbologies, and therein the publicdomain references referred to. Some barcodes, e.g. QR codes, may furthersupport multiple variants, comprising different models, differentversions, and different error correction codes that support differentbarcode damage levels.

Reference to “Smart Devices and/or Networks” (SDNs) as used herein mayrefer to, but is not limited to, one or more physical objects and/ornetworks to which physical objects are connected including, but notlimited to, consumer devices, electronic devices, manufacturingequipment, physical infrastructure, vehicles, and buildings which are“embedded” with electronics, software, and network connectivity togetherwith optional sensors that enables these objects to collect and exchangedata via one or more networks. SDNs may include, but is not limited to,the so-called “Internet of Things” (IoT), proprietary solutions, opensolutions, solutions based upon standards, solutions not based uponstandards, and network controllable devices. SDNs allows objects to besensed and controlled remotely across existing network infrastructure,either ad-hoc or planned network infrastructure for example, providingfor direct integration of the physical world into computer-basedsystems, and resulting in at least one of improved efficiency, improvedaccuracy, improved economics, improved usability, and improvedknowledge. Benefit. Where SDNs are augmented with sensors and actuators,these represent a subset of a more general class of cyber-physicalsystems, which also encompasses technologies such as smart grids, smarthomes, intelligent transportation and smart cities for example. Eachobject within an SDN is uniquely identifiable through its embeddedcomputing system and capable of interoperating with existing networkinfrastructure, including for example wireless networks, wired networks,and the Internet. An SDN may include, but not be limited to, a singlenetwork controllable device, a single network connected device (e.g.sensor), a plurality of network controllable devices, a plurality ofnetwork connected devices (e.g. a sensor network), and a combination ofnetwork controllable devices and network connected devices.

A “haptic interface” as used herein may refer to, but is not limited to,an interface and/or system that allows a user to interact with anelectronic device, e.g. PED and/or FED, through bodily sensations and/ormovements. A haptic interface provides tactile feedback or other bodilysensations indicating the users action with respect to the interface inorder to start, stop, control, adjust, or perform an action or actionsand/or process or processes upon a local and/or remote electronicdevice. A haptic interface may include, but is not limited to, a keypad,a keyboard, a pointer, a mouse, a touchpad, a touchscreen, a pedal, ahaptic glove, and a stylus.

A “security system” as used herein may refer to, but is not limited to,a means or method by which something is secured through a system ofinterworking components and devices. Such components and devices mayinclude one or more controllers, one or more haptic interfaces to grantauthorized users with access, user authorization systems, locks, alarms,displays, etc. Security systems may exploit alphanumeric code access,biometric verification, keys, pass cards etc.

An “element of physical infrastructure” as used herein may refer to, butis not limited to, a discrete element or a combination of elements ofphysical infrastructure. Infrastructure may include, but not be limitedto, structures, systems, and facilities serving a user, business,organization, country, city, area, or group of people. These mayinclude, but not be limited to, services, facilities, andtransportation. These may include, but not be limited to, roads,buildings, residential dwellings, shopping malls, hospitals, commercialunits, manufacturing locations, warehouses, bridges, tunnels, watersupply, sewers, electrical grids, and telecommunicationsfacilities—equipment. These may include, but not be limited to, physicalcomponents of discrete or interrelated nature providing commodities andservices to enable, sustain, or enhance societal living conditions.

Referring to FIG. 1 there is depicted an infrastructure schematicsupporting communications to a Network 100 and therein Remote Servers190, Electronic Devices 104, etc. as Network Controlled AutomationApplications, Software and/or Platforms (NCA-ASP) according to anembodiment or embodiments of the invention. Accordingly, an ElectronicDevice 104 is connected to Network 100 which is then coupled to a RemoteCentral Exchange 180 which communicates with the remainder of atelecommunication service providers network via Network 100 and/or othernetworks which may include for example long-haul OC-48/OC-192 backboneelements, an OC-48 wide area network (WAN), a Passive Optical Network,and a Wireless Link. The Remote Central Exchange 180 is connected viaNetwork 100 and/or other networks to local, regional, and internationalexchanges (not shown for clarity). Electronic Device 104 is connected toNetwork 100 via an Access Point 106 and Network Device 107. The wirelesscommunications between Electronic Device 104 and Access Point 106 may bethrough one or more wireless communications standards such as, forexample, IEEE 802.11, IEEE 802.15, IEEE 802.16, IEEE 802.20, UMTS, GSM850, GSM 900, GSM 1800, GSM 1900, GPRS, ITU-R 5.138, ITU-R 5.150, ITU-R5.10, and IMT-1000. It would be evident to one skilled in the art thatmany portable and fixed electronic devices may support multiple wirelessprotocols simultaneously, such that for example a user may employ GSMservices such as telephony and SMS and Wi-Fi/WiMAX data transmission,VOIP and Internet access. Accordingly, portable electronic devices suchas Electronic Device 104 may communicate directly to Access Point 106 orit may form an association with another electronic device throughstandards such as IEEE 802.15 and Bluetooth as well in an ad-hoc mannerto communicate with the Access Point 106.

Access Point 106 is depicted as connected to Network Device 107 andtherein Network 100 via a wired interface which may be through one ormore wired communications standards such as, including, but not limitedto, DSL, Dial-Up, DOCSIS, Ethernet, G.hn, ISDN, MoCA, PON, and Powerline communication (PLC) which may or may not be routed through a router(not shown for clarity). Alternatively, Electronic Device 104 may beconnected to Access Point 106 via a wired connection and Access Point(AP) 106 connected to Network Device 107 via a wireless interface. Alsoconnected to the Network 100 are:

-   -   Social Networks (SOCNETS) 165;    -   Software provider 170A, e.g. Aztech™;    -   Insurance service provider 170B, e.g. AllState™ Insurance;    -   First and second security device providers 170C and 170D        respectively, e.g. Stanley™ and Chubb™;    -   Security service provider 175A, e.g. ADT™;    -   Telecommunications service provider 175B, e.g. Verizon™; and    -   Original equipment manufacturer (OEM) 175C, e.g. General        Electric™.

Also connected to Network 100 are Servers 190 which together withothers, not shown for clarity. Servers 190 may host according toembodiments of the inventions multiple services associated with aprovider of Electronic Device Automation software tools, a provider ofElectronic Device Automation Applications, Software, and/or Platforms(EDA-ASPs); a provider of a SOCNET or Social Media (SOME) exploitingEDA-ASP features; a provider of a SOCNET and/or SOME not exploitingEDA-ASP features; a provider of services to PEDs and/or FEDs; a providerof one or more aspects of wired and/or wireless communications; licensedatabases; content databases; image databases; content libraries;customer databases; product databases; software databases; softwarepatch databases; open license software databases; websites; and softwareapplications for download to or access by FEDs and/or PEDs exploitingand/or hosting EDA-ASP features. Servers 190 may also host, for example,other Internet based or web portal based services such as searchengines, financial services, third party applications,telecommunications services (e.g. VoIP or content streaming), and otherInternet based services.

Accordingly, a user may exploit Electronic Device 104 to access Servers190 to perform an operation such as accessing/downloading an applicationwhich provides EDA-ASP features according to embodiments of theinvention; execute an application already installed providing EDA-ASPfeatures; execute a web based application providing EDA-ASP features; oraccess content. Similarly, a user may undertake such actions or othersexploiting embodiments of the invention exploiting a PED or FED within auser group associated with one or more cellular Access Points (APs)and/or one or more short range wireless, e.g. Wi-Fi, nodes (also APs).

The Electronic Device 104 includes one or more microprocessors 110 and amemory 112 coupled to processor(s) 110. AP 106 also includes one or moreprocessors 121 and a memory 123 coupled to processor(s) 110. Anon-exhaustive list of examples for any of processors 110 and 121includes a central processing unit (CPU), a digital signal processor(DSP), a reduced instruction set computer (RISC), a complex instructionset computer (CISC) and the like. Furthermore, any of microprocessors110 and 121 may be part of application specific integrated circuits(ASICs) or may be a part of application specific standard products(ASSPs). A non-exhaustive list of examples for memories 112 and 123includes any combination of the following semiconductor devices such asregisters, latches, ROM, EEPROM, flash memory devices, non-volatilerandom access memory devices (NVRAM), SDRAM, DRAM, double data rate(DDR) memory devices, SRAM, universal serial bus (USB) removable memory,and the like. The Electronic Device 104 may include, in addition to theone or more microprocessors 110, dedicated processors such as graphicacceleration, network interface adaptors, etc.

Electronic Device 104 may include an audio input element 114, forexample a microphone, and an audio output element 116, for example, aspeaker, coupled to any of processors 110. Electronic Device 104 mayinclude a video input element 118, for example, a video camera orcamera, and a video output element 120, for example an LCD display,coupled to any of processors 110. Electronic Device 104 may include akeyboard 115 and touchpad 117 which may for example be a physicalkeyboard and touchpad allowing the user to enter content or selectfunctions within one of more applications 122. Alternatively, thekeyboard 115 and touchpad 117 may be predetermined regions of a touchsensitive element forming part of the display within the ElectronicDevice 104.Optionally, the Electronic Device 104 may support otherhaptic interfaces. The one or more applications 122 that are typicallystored in memory 112 and are executable by any combination of processors110. Electronic Device 104 also includes accelerometer 160 providingthree-dimensional motion input to the process 110 and GPS 162 whichprovides geographical location information to processor 110.

Electronic Device 104 includes a protocol stack 124 and AP 106 includesa communication stack 125. Within system 100 protocol stack 124 is shownas IEEE 802.11 protocol stack but alternatively may exploit otherprotocol stacks such as an Internet Engineering Task Force (IETF)multimedia protocol stack for example. Likewise, AP stack 125 exploits aprotocol stack but is not expanded for clarity. Elements of protocolstack 124 and AP stack 125 may be implemented in any combination ofsoftware, firmware and/or hardware. Protocol stack 124 includes an IEEE802.11-compatible PHY module 126 that is coupled to one or moreFront-End Tx/Rx & Antenna 128, an IEEE 802.11-compatible MAC module 130coupled to an IEEE 802.2-compatible LLC module 132. Protocol stack 124includes a network layer IP module 134, a transport layer User DatagramProtocol (UDP) module 136 and a transport layer Transmission ControlProtocol (TCP) module 138.

Protocol stack 124 also includes a session layer Real Time TransportProtocol (RTP) module 140, a Session Announcement Protocol (SAP) module142, a Session Initiation Protocol (SIP) module 144 and a Real TimeStreaming Protocol (RTSP) module 146. Protocol stack 124 includes apresentation layer media negotiation module 148, a call control module150, one or more audio codecs 152 and one or more video codecs 154.Applications 122 may be able to create maintain and/or terminatecommunication sessions with any of devices 107 by way of AP 106.Typically, applications 122 may activate any of the SAP, SIP, RTSP,media negotiation and call control modules for that purpose. Typically,information may propagate from the SAP, SIP, RTSP, media negotiation andcall control modules to PHY module 126 through TCP module 138, IP module134, LLC module 132 and MAC module 130.

It would be apparent to one skilled in the art that elements of theElectronic Device 104 may also be implemented within the AP 106including but not limited to one or more elements of the protocol stack124, including for example an IEEE 802.11-compatible PHY module, an IEEE802.11-compatible MAC module, and an IEEE 802.2-compatible LLC module132. The AP 106 may additionally include a network layer IP module, atransport layer User Datagram Protocol (UDP) module and a transportlayer Transmission Control Protocol (TCP) module as well as a sessionlayer Real Time Transport Protocol (RTP) module, a Session AnnouncementProtocol (SAP) module, a Session Initiation Protocol (SIP) module and aReal Time Streaming Protocol (RTSP) module, media negotiation module,and a call control module. Portable and fixed electronic devicesrepresented by Electronic Device 104 may include one or more additionalwireless or wired interfaces in addition to the depicted IEEE 802.11interface which may be selected from the group comprising IEEE 802.15,IEEE 802.16, IEEE 802.20, UMTS, GSM 850, GSM 900, GSM 1800, GSM 1900,GPRS, ITU-R 5.138, ITU-R 5.150, ITU-R 5.10, IMT-1000, DSL, Dial-Up,DOCSIS, Ethernet, G.hn, ISDN, MoCA, PON, and Power line communication(PLC).

According to embodiments of the invention described below and depictedin FIGS. 1A to 7 respectively an existing SDN, e.g. a security systemand its associated hardware, are attached to an interface deviceestablishing communications with one or more remotely based servicesaccessible via the Internet (commonly referred to a cloud basedservices) that manage one or more SDNs. With the modification, rules andpolicies can be defined to change the settings of one or more SDNs basedon the status of one or more other SDNs. Within the example supra, ifthe security system is set to “away” mode then the other SDNs, includingdiscrete network-controllable devices, receive notification of thesecurity system's status, and trigger programmed actions for the SDNswhich include this security system status in their decision makingprocess. The defined rules and policies may, therefore, trigger one ormore SDNs to change their settings based on the status of the securitysystem status change. In further examples of this embodiment of anEDA-ASP according to an embodiment of the invention, the armed/disarmedstatus can be employed within an SDN to put the thermostat into energysaving or normal modes. In further examples of this embodiment, optionalmotion or presence sensors coupled to the security system, such asinfrared sensors, may also trigger changes to the SDNs in specific areasof the house, such as audio systems, home entertainment systems, lightsetc. In further examples of this embodiment, a building equipped withelectronic locks may be automatically triggered to set them to a lockedposition when the security system is actively armed. Rules and policiescan also be triggered based upon with network-controllable device (SDN)the status change is associated with such that, for example, dependingon which arming point (such as a specifically located keypad) isemployed different outcomes result for the SDNs. For example, a keypadlocated in a residential garage used to unarm a security system mayresult in different SDN triggers for their associatednetwork-controllable devices than would arise if the unarming occurredat a front door keypad, back door keypad, or remotely.

In a further example of this embodiment of the invention, adoorbell-like switch that triggers the software to act like it was asecurity system, i.e. change “armed”/“unarmed” status, may be employed.For buildings without an alarm system the rules may be established basedupon a geofence associated with predetermined PEDs to establishhome/away status of an individual or group of individuals for triggeringactions. Within the preceding and following descriptions and depictionsof embodiments of the invention the concepts are presented and discussedwith respect to a first SDN, a residential security system, and one ormore other SDNs. However, such exemplary embodiments are not to beconstrued as limiting the application of embodiments of the inventionand the scope of embodiments of the invention shall be construed solelyby the claims of this patent. Embodiments of the invention may beemployed within applications including, but not limited to, homeautomation, office automation, building automation, manufacturing,entertainment, sports, transportation, medical, education, security,telecommunications, and combinations thereof.

It should also be noted that an SDN may include, but is not limited to,a single network controllable device, a single networked connecteddevice, a plurality of network controllable devices associated with anobject, a plurality of network connected devices associated with anobject, a combination of network controllable devices and networkconnected devices associated with an object, a plurality of networkcontrollable devices associated with multiple objects in one or morelocations, a plurality of network connected devices associated withmultiple objects in one or more locations, and a combination of networkcontrollable devices and network connected devices associated withmultiple objects in one or more locations.

Now referring to FIG. 1B there is depicted an example ofMachine-to-Machine (M2M) communication between a user's portableelectronic device and two Smart Devices and Networks (SDNs) associatedwith the user according to an embodiment of the invention wherein theSDNs are the user s residential security system and residential networkcontrollable devices. A PED 101 associated with a user is coupled to aCloud Service 103 via Network 100 via the Key Pad 104 or of the SecuritySystem Panel 105. Using, for example, the GPS embedded in the user's PED101, which communicates with the security system's Cloud Service 103,the location of the user can be used to trigger the Security System 105to determine which mode, such as “armed” or “unarmed”, to use.Particular attention needs to be paid in order to not accidently triggeran unarmed condition. Furthermore, the mobile device can act as anadditional Key Pad 204 for the security system irrespective of itsphysical proximity to the building. The plurality ofnetwork-controllable Devices 102.1 . . . 102.N are coupled to the CloudService 103, and communicate with the Cloud Service 103 of the SecuritySystem 105, wherein a change in status or mode in the Security System105 triggers communication from the Cloud Service 103 to thenetwork-controllable Devices 102.1 . . . 102.N, whereby thenetwork-controllable Devices 102.1 . . . 102.N take a pre-programmedaction, such as turning on or off, based upon at least the status ormode of the Security System 105. A specific type of network-controllabledevice in such an embodiment is a Thermostat 111, which controls theHeating, Ventilation and Air Conditioning (HVAC) of the premises.

Referring to FIG. 2 there is depicted an example of Machine-to-Machine(M2M) communication between PED and SDNs presented in FIG. 1B withrespect to an embodiment of the invention wherein the SDN relating tothe residential security system now incorporates motion sensors. TheSecurity System 105 is now coupled to an Interface Device 210 forcommunicating with a Gateway 208 using proprietary communications orcommunications to an automation standard, such as a Home AutomationNetwork (HAN) operating according to C-Bus, EnOcean, Insteon, KNX,Thread, xPL, Zigbee or Z-Wave protocols for example. Thesecommunications connect to the Cloud Service 103 to enable control of oneor more network-controllable Devices 102.1 . . . 102.N via the network.The Security System 105 can also be armed or disarmed via the Key Pad204, and is coupled to one or more motion Sensors 207.1 . . . 207.N.Based on the point of entry, the motion Sensors 207.1 . . . 207.N whichare activated correlate to a preprogrammed trigger of selectnetwork-controllable Devices 102.1 . . . 102.N. For example, entrancevia Door 205 activates motion Sensor 207.1, which triggersnetwork-controllable Device 102.1, whereas entrance via Garage Door 206activates motion Sensor 207.2, triggering network-controllable Device102.2. A specific application for this HAN being where there is a SmartMeter 213 which is capable of providing energy consumption and priceand/or tier information. An energy display or smart meter Gateway Device209 can take that energy consumption related data and pricing and viathe Gateway 208 to allow the Cloud Service 103 to make networkcontrollable Devices 102.1 . . . 102.N or thermostats 111 changelighting levels or temperatures to some rule or algorithm based functionbased upon time, tier price or demand.

Now referring to FIG. 3 there is depicted a further example ofMachine-to-Machine (M2M) communication between PED and SDNs presented inFIGS. 1B and 2 with respect to an embodiment of the invention whereinthe SDN relating to the residential security system now incorporates aButton 314 triggering the security system to simulate armed and disarmedmodes where a building may not be equipped with a Security System 105.The Security System 105 is coupled to an Interface Device 210 forcommunicating with a Gateway 208 using proprietary or standard HANcommunications to connect to the Cloud Service 103 to enable control ofone or more network-controllable Devices 102.1 . . . 102.N via a CloudService 103. The Security System 105 can also be armed or disarmed viathe Key Pad 204, and is coupled to one or more motion Sensors 207.1 . .. 207.N. Based upon the point of entry, the motion Sensors 207.1 . . .207.N which are activated correlate to a preprogrammed trigger ofselectnetwork-controllable Devices 102.1 . . . 102.N. For example,entrance via Door 205 activates motion Sensor 207.1, which triggersnetwork-controllable Device 102.1, whereas entrance via Garage Door 206activates motion Sensor 207.2, triggering network-controllable Device102.2. A specific application for this HAN is where there is a SmartMeter 213 which is capable of providing energy consumption and priceand/or tier information. An energy display or smart meter Gateway Device209 can take that energy consumption related data and pricing and viathe Gateway 208 to allow the Cloud Service 103 to make networkcontrollable Devices 102.1 . . . 102.N or Thermostats 111 changelighting levels or temperatures to some rule or algorithm based functionbased upon time, tier price or demand as well as Security System 105status etc. If the Thermostat 111 is network-controlled, the controlscan be changed via the Cloud Service 103. Optionally, if the Thermostat111 is an older model without network capabilities, a Thermostat Manager312 is coupled to the Thermostat 111. The Thermostat Manager 312 isnetwork-controlled and can bypass the Thermostat 111 to control thetemperature to a more energy-saving level without requiring a completeretrofit of the Thermostat 111. In some instances, maintaining a“legacy” Thermostat 111 may aid an elderly person who is familiar withtheir Thermostat 111 and may be easily comprehend a new Thermostat 111.

In the instance that the HVAC system consists of multiple zones and theuse of motion Sensors 207.1 . . . 207.N that are nominally only part ofthe security system via the Cloud Service 103 together with a set ofrules can be used to identify zones of motion or occupancy and adjustHVAC settings for those locations where “security” zones map to HVACzones. Optionally, in larger buildings linking this Cloud Service 103, arules database and/or rule generating server to a network connected roomreservation or calendar system, for example, will allow pre-heating orcooling of specialty rooms (conference rooms, auditoriums) based onplanned use versus simply being on all the time based upon day of theweek or other simplistic rules. The aforementioned motion Sensors 207.1. . . 207.N can override the schedule/reservation by actual presence,and can restore the room to “unoccupied” via proper rules even before ascheduled end to further save energy. Optionally, the Cloud Service 103can be coupled to external weather services to aid programmedtemperature settings, such as on weekends or holidays, to keep thetemperature in an optimal energy-saving mode.

Further, additional sensors such as infrared sensors may provideoccupancy information even in the absence of motion, e.g. individual(s)sitting in chair, lounging on floor, sleeping etc. Similarly, acousticsensors may be incorporated. Further, audiovisual entertainment systemsand other devices can be also linked through the Cloud Service 103 suchthat when a determination of a user sleeping is made the sound level maybe reduced in combination with lighting levels etc.

It becomes apparent that the motion Sensors 207.1 . . . 207.N along withproviding their main security purpose when multi-purposed as occupancysensors can not only trigger energy saving rules but can in the case ofeldercare or disabled persons indicate the “OK” status of someone movingaround and not constrained to any part of a building, or not moving atall. Their motion awareness combined with normal “signatures” of energyuse 213 to 209 to 208 can enable offsite care-givers. Further, linkingmultiple sensor types together with acoustic sensors (e.g. microphone)can be used to increase the knowledge based services provided to theelderly, hospitalized etc. without increasing loading on personnel suchas care works, nurses, etc. according to the environment. Theseassociations of sensors and systems through embodiments of the inventionmay also increase elderly care or medical care in the home byassociating rules through an externally based database and/or server tothe sensors and/or systems within a residence such that enhancedknowledge based determinations of needs, help, emergency services etc.can be made. In instances wherein the linking of a system to anautomation network also permits the transmission of data to a systemthen the Cloud Service 103 may employ an existing audiovisual system oraudio system to communicate to occupants etc. Such linking of servicesthrough their existing network interfaces or through augmenting themwith network interfaces allows for loved one, health care workers, etc.to achieve their sought level of knowledge and/or monitoring in a mannerthat is not intrusive and avoids replacement of one or more existingsystems within the residence, commercial environment, etc.

Referring to FIG. 4 there is depicted an exemplary flow chart for aswitch within a HVAC configuration coupled to a thermostat manageraccording to an embodiment of the invention. As noted supra forbuildings not equipped with a security system, a switch is installed tosimulate a security system's arm or disarm modes or alternatively theCloud Service 103 determines the occupancy level and establishes thearm/disarm mode that is then communicated to the other networkinterfaced systems. A change in switch status at step 401 triggersactions for the thermostat or other network-controllable devices. If theswitch is determined to be in home mode in step 402, the thermostatcontinues to operate normally and the process loops back to step 401. Ifthe switch of status becomes away mode in step 404, the thermostatmanager is enabled in step 408 which bypasses the thermostat to triggerchanges to temperature actions. If the temperature is goes outside apredetermined range as determined in step 410, the thermostat managerwill discontinue its bypass of the thermostat and allow the thermostatto operate normally returning the process to step 406 and therein step401. If the temperature is within the allowed range 410, the thermostatmanager will continue to operate until either a switch status change isdetected in step 401, or until the temperature is within range and theprocess proceeds from step 410 to step 406. This predetermined range maybe characterised as a “safe” range and is typically not the normal rangeof the home mode. Accordingly, the away mode limits may be set outsidethe “normal” range in order that the energy consumption is lowered suchthat for example a typical 23° C. threshold for engaging airconditioning and 19° C. threshold for engaging heating may be extendedto 28° C. and 15° C. respectively, for example.

Referring to FIG. 5 there is depicted an exemplary flow chart for asecurity system status change triggering temperature rules relating to aHVAC system according to an embodiment of the invention. When a securitysystem changes its status as detected in step 501, the new statustriggers events for thermostats or other network-controllable devices.If the security system is in home mode as determined in step 502, thethermostat will continue to operate normally until a status change isnoted. In both away mode and stay mode as determined in steps 504 and503 respectively, the thermostat manager is enabled at step 508 whichbypasses the thermostat to trigger temperature adjustment actions. Ifthe temperature is outside a predetermined range as established in step510, the thermostat manager will discontinue the bypass and allow thethermostat to operate normally. If the temperature is within the allowedrange in step 510, the thermostat manager will continue bypassing thethermostat until a system status is changed or until the temperaturereturns to range. It would be evident that where the property has an airconditioning and a heating system that the thermostat status andsecurity system status may trigger one or both according to the actionrequired.

Now referring to FIG. 6 there is depicted an exemplary flow chart forprogrammed settings of a security panel based on the status of thesecurity system and optional motion sensors according to an embodimentof the invention. When a security system status change is detected instep 601 this triggers actions of thermostats and/or othernetwork-controllable devices. When in home mode as established in step602, the system waits to detect motion at step 606 before triggering anyactions. If motion is detected in a zone, the lights and HVAC will turnon in step 608 within that zone until a system status change is noted.If no motion is detected in the zone, HVAC and lights will remain off asestablished in step 612 within the zone until a change in status isnoted. In away mode in step 604, HVAC and lights remain off in all zonesas established in step 610 until a change in status is noted.

Referring to FIG. 7 an exemplary flow chart is depicted for a switch orsecurity panel settings based on a specialty care scenario, such asdisabled or elderly care, within an embodiment of the invention. Achange in the status of a security system established at step 701 willtrigger actions to communicate with a cloud-server based onpredetermined rules of motion and energy. If the system is in away modein step 702, no energy or motion rules will apply, and thus the triggerswill wait for a change in security system status at step 701. If in homemode at step 706, motion sensors will detect if any motion exists instep 708. If no motion exists, an alert is sent in step 710 for apossible accident or emergency. For example, if an elderly person getsup routinely at a certain time, a rule could be established that if nomotion occurs within a predetermined time, e.g. two hours after thattime, an alert will be sent. If motion is detected, energy rules areapplied in step 712, such as thermostat or appliance changes. If theenergy rules are okay, the system continues until a change in statusoccurs by looping back to step 701. If the energy rules are not okay, analert is sent in step 710. For example, if the elderly person also turnson the TV and the coffee maker each morning at a certain time, then ifthese energy rules are not followed, an alert would be sent.

The embodiments of the invention described and depicted with respect toFIGS. 1B to 7 may exploit Electronic Devices 104 wherein the design,construction and features of the Electronic Device 104 is established independence upon factors including, but not limited to, thefunctionality, manufacturer specifications, wired and/or wirelessinterfaces, national standards, industry standards, cost, etc. TheseElectronic Devices 104 may communicate to one or more remote servers viaa network suchas Network 200 wherein the remote servers may beassociated with a variety of service providers, third party providers,other users, friends, family, etc. For example, considering FIG. 1 theServers 190 connected to the Network 200 may be associated with one ormore of the following as depicted:

-   -   Social Networks (SOCNETS) 165;    -   Software provider 170A, e.g. Aztech™;    -   Insurance service provider 170B, e.g. AllState™ Insurance;    -   First and second security device providers 170C and 170D        respectively, e.g. Stanley™ and Chubb™;    -   Security service provider 175A, e.g. ADT™;    -   Telecommunications service provider 175B, e.g. Verizon™; and    -   OEM 175C, e.g. General Electric™.

Accordingly, considering these within the context of the invention thesemay provide and/or support the following inputs and/or outputs to theCloud Service 103 and the various SNDs associated with a user of NetworkControlled Automation Applications, Software and/or Platforms (NCA-ASPs)according to embodiments of the invention.

Social Networks (SOCNETS) 165 may allow an NCA-ASP according to anembodiment of the invention to post alerts, alarms, etc., update statusinformation, access data, and crowd source data. In some instances, thedata posted may include data from a profile of a user or in otherinstances the user may be anonymised.

Software provider 170A, e.g. Aztech™ may remotely update and upgrade viaan NCA-ASP according to an embodiment of the invention SNDs andElectronic Devices 104 that are remote and/or local to the NCA-ASPassociated with a user. Further, fault detections in SNDs and/orElectronic Devices 104 may be communicated to the software provider andtherein addressed individually or in part or all of the user basethrough a software patch or patches until an upgrade is available. Thesoftware provider may also enable/disable some or all features of aNCA-ASP according to an embodiment of the invention based upon factorssuch as, for example, subscription level, subscription status,Government regulations within a jurisdiction, and status of the NCA-ASP.

Insurance service provider 170B, e.g. AllState™ Insurance may accesscrowd analytics relating to NCA-ASPs according to an embodiment of theinvention in order to establish frequency of events by jurisdiction,etc. wherein the analytics relating to settings, events, alarms,controls etc. of SNDs and/or Electronic Devices 104 are associated withanonymised profiles of the user to whom the SNDs and/or ElectronicDevices 104 relate.

First and second security device providers 170C and 170D respectively,e.g. Stanley™ and Chubb™ may similarly to software provider 170A provideremote updates and upgrades via an NCA-ASP to SNDs and ElectronicDevices 104 they have manufactured.

Security service provider 175A, e.g. ADT™ may provide similar updatesand upgrades to their security systems and sensors etc. via NCA-ASP toSNDs and Electronic Devices 104 they have installed as well as accessingcrowd analytics in a similar manner to insurance provider 170B toenhance their product offerings, offer incentives, etc.

Telecommunications service provider 175B, e.g. Verizon™ and OEM 175C,e.g. General Electric™, may exploit NCA-ASPs to update, upgrade, adjustand/or revise software, features, limits, etc. of SNDs and ElectronicDevices 104 associated with them directly or through agreements withother vendors, service providers, third party providers etc. In otherinstances, a motion sensor triggered external to the front door of aproperty may not only result in the exterior lights of the propertybeing turned on but video content being streamed to the user and/ortheir security service provider. If the user has a private calendar withthe security service provider, then the event may automatically triggera security response either in each event or within predetermined timelimits or an operator is automatically presented with the video streamto make a determination.

Embodiments of the invention may exploit multiple geofences with respectto a location such that for example, determination that the user'svehicle has entered a first geofence triggers exterior lighting, whilstentering a second geofence triggers the garage door opener and disablesthat zone of the security system (if covered).

It would be evident that other providers such as utilities may exploitNCA-ASPs to monitor, update, upgrade or adjust SNDs and ElectronicDevices 104. For example, an electricity provider may update pricing andconsumption tier information within Thermostats 111 or within a databasethat the Thermostats 111 periodically update from. Further, one or moreof these different manufacturers, providers, etc. can combine to provideenhanced control algorithms and control interfaces.

Within the embodiments of the invention presented supra SNDs and/orElectronic Devices 104 establish control settings, operating modes,alarms, triggers etc. based upon a determination that includes thecurrent mode, status, setting, etc. of other SNDs and/or ElectronicDevices 104. Within the described embodiments a Cloud Service 103 isemployed to link the different SNDs and/or Electronic Devices 104without requiring wired and/or wireless linking of the SNDs and/orElectronic Devices 104. However, it would be evident that within otherembodiments of the invention a first SND and/or Electronic Device 104,such as a Security System 105, may perform a discovery action whereinthe identities of other SNDs and/or Electronic Devices 104 within rangeof the Security System 105 are established. In such an embodiment theSecurity System 105 may transmit a mode change to all identified SNDsand/or Electronic Devices 104 by direct Internet and/or other networkcommunications. Alternatively, the SNDs and/or Electronic Devices 104may simply listen for a broadcast mode change by the Security System105. Optionally, the available range of communications from the SecuritySystem 105 may be increased through ad-hoc communications of the SNDsand/or Electronic Devices 104 such that a motion sensor at the peripheryof a property may communicate to the Security System 105 via one or moreintermediate SNDs and/or Electronic Devices 104 wherein the networkrouting between Security System 105 and the SNDs and/or ElectronicDevices 104 may be dynamic or based upon an initial network/environmentdiscovery mode. A dynamic system or re-initialization of anetwork/environment discovery mode allows for additional SNDs and/orElectronic Devices 104 to be added without significant overhead to theuser. Accordingly, a user may purchase and locate additional SNDs and/orElectronic Devices 204 together with additional elements of the SecuritySystem 105, themselves SNDs and/or Electronic Devices 104, and theoverall configuration automatically updated either locally and/or via aCloud Service 103.

Whilst within embodiments of the invention location of a user isconsidered to be based upon a location determination exploiting GPS,wireless triangulation, “presence” as defined by connection to apredetermined AP etc. it would be evident that other means ofdetermining the location of a user may be employed including, but notlimited to, environment disturbance, radar, sonar, etc.

Specific details are given in the above description to provide athorough understanding of the embodiments. However, it is understoodthat the embodiments may be practiced without these specific details.For example, circuits may be shown in block diagrams in order not toobscure the embodiments in unnecessary detail. In other instances,well-known circuits, processes, algorithms, structures, and techniquesmay be shown without unnecessary detail in order to avoid obscuring theembodiments.

Implementation of the techniques, blocks, steps and means describedabove may be done in various ways. For example, these techniques,blocks, steps and means may be implemented in hardware, software, or acombination thereof. For a hardware implementation, the processing unitsmay be implemented within one or more application specific integratedcircuits (ASICs), digital signal processors (DSPs), digital signalprocessing devices (DSPDs), programmable logic devices (PLDs), fieldprogrammable gate arrays (FPGAs), processors, controllers,micro-controllers, microprocessors, other electronic units designed toperform the functions described above and/or a combination thereof.

Also, it is noted that the embodiments may be described as a processwhich is depicted as a flowchart, a flow diagram, a data flow diagram, astructure diagram, or a block diagram. Although a flowchart may describethe operations as a sequential process, many of the operations can beperformed in parallel or concurrently. In addition, the order of theoperations may be rearranged. A process is terminated when itsoperations are completed, but could have additional steps not includedin the figure. A process may correspond to a method, a function, aprocedure, a subroutine, a subprogram, etc. When a process correspondsto a function, its termination corresponds to a return of the functionto the calling function or the main function.

Furthermore, embodiments may be implemented by hardware, software,scripting languages, firmware, middleware, microcode, hardwaredescription languages and/or any combination thereof. When implementedin software, firmware, middleware, scripting language and/or microcode,the program code or code segments to perform the necessary tasks may bestored in a machine readable medium, such as a storage medium. A codesegment or machine-executable instruction may represent a procedure, afunction, a subprogram, a program, a routine, a subroutine, a module, asoftware package, a script, a class, or any combination of instructions,data structures and/or program statements. A code segment may be coupledto another code segment or a hardware circuit by passing and/orreceiving information, data, arguments, parameters and/or memorycontent. Information, arguments, parameters, data, etc. may be passed,forwarded, or transmitted via any suitable means including memorysharing, message passing, token passing, network transmission, etc.

For a firmware and/or software implementation, the methodologies may beimplemented with modules (e.g., procedures, functions, and so on) thatperform the functions described herein. Any machine-readable mediumtangibly embodying instructions may be used in implementing themethodologies described herein. For example, software codes may bestored in a memory. Memory may be implemented within the processor orexternal to the processor and may vary in implementation where thememory is employed in storing software codes for subsequent execution tothat when the memory is employed in executing the software codes. Asused herein the term “memory” refers to any type of long term, shortterm, volatile, nonvolatile, or other storage medium and is not to belimited to any particular type of memory or number of memories, or typeof media upon which memory is stored.

Moreover, as disclosed herein, the term “storage medium” may representone or more devices for storing data, including read only memory (ROM),random access memory (RAM), magnetic RAM, core memory, magnetic diskstorage mediums, optical storage mediums, flash memory devices and/orother machine readable mediums for storing information. The term“machine-readable medium” includes, but is not limited to portable orfixed storage devices, optical storage devices, wireless channels and/orvarious other mediums capable of storing, containing or carryinginstruction(s) and/or data.

The methodologies described herein are, in one or more embodiments,performable by a machine which includes one or more processors thataccept code segments containing instructions. For any of the methodsdescribed herein, when the instructions are executed by the machine, themachine performs the method. Any machine capable of executing a set ofinstructions (sequential or otherwise) that specify actions to be takenby that machine are included. Thus, a typical machine may be exemplifiedby a typical processing system that includes one or more processors.Each processor may include one or more of a CPU, a graphics-processingunit, and a programmable DSP unit. The processing system further mayinclude a memory subsystem including main RAM and/or a static RAM,and/or ROM. A bus subsystem may be included for communicating betweenthe components. If the processing system requires a display, such adisplay may be included, e.g., a liquid crystal display (LCD). If manualdata entry is required, the processing system also includes an inputdevice such as one or more of an alphanumeric input unit such as akeyboard, a pointing control device such as a mouse, and so forth.

The memory includes machine-readable code segments (e.g. software orsoftware code) including instructions for performing, when executed bythe processing system, one of more of the methods described herein. Thesoftware may reside entirely in the memory, or may also reside,completely or at least partially, within the RAM and/or within theprocessor during execution thereof by the computer system. Thus, thememory and the processor also constitute a system comprisingmachine-readable code.

In alternative embodiments, the machine operates as a standalone deviceor may be connected, e.g., networked to other machines, in a networkeddeployment, the machine may operate in the capacity of a server or aclient machine in server-client network environment, or as a peermachine in a peer-to-peer or distributed network environment. Themachine may be, for example, a computer, a server, a cluster of servers,a cluster of computers, a web appliance, a distributed computingenvironment, a cloud computing environment, or any machine capable ofexecuting a set of instructions (sequential or otherwise) that specifyactions to be taken by that machine. The term “machine” may also betaken to include any collection of machines that individually or jointlyexecute a set (or multiple sets) of instructions to perform any one ormore of the methodologies discussed herein.

The foregoing disclosure of the exemplary embodiments of the presentinvention has been presented for purposes of illustration anddescription. It is not intended to be exhaustive or to limit theinvention to the precise forms disclosed. Many variations andmodifications of the embodiments described herein will be apparent toone of ordinary skill in the art in light of the above disclosure. Thescope of the invention is to be defined only by the claims appendedhereto, and by their equivalents.

Further, in describing representative embodiments of the presentinvention, the specification may have presented the method and/orprocess of the present invention as a particular sequence of steps.However, to the extent that the method or process does not rely on theparticular order of steps set forth herein, the method or process shouldnot be limited to the particular sequence of steps described. As one ofordinary skill in the art would appreciate, other sequences of steps maybe possible. Therefore, the particular order of the steps set forth inthe specification should not be construed as limitations on the claims.In addition, the claims directed to the method and/or process of thepresent invention should not be limited to the performance of theirsteps in the order written, and one skilled in the art can readilyappreciate that the sequences may be varied and still remain within thespirit and scope of the present invention.

What is claimed is:
 1. A system comprising: a security system associatedwith an element of infrastructure coupled to a first network and havinga plurality of modes; a plurality of network-controllable devicesassociated with the element of infrastructure, each coupled to a secondnetwork and having a set of operating states; wherein a change in themode of the security system results triggers an action with respect to apredetermined subset of the plurality of network-controllable devices.2. The system according to claim 1, wherein the action comprisesestablishing a setting for each network-controllable device within thepredetermined subset of the plurality of network-controllable devices.3. The system according to claim 1, wherein the action comprisestransmitting to each network-controllable device within thepredetermined subset of the plurality of network-controllable devicesdata relating to a setting for that network-compatible device from aremote service, wherein the remote service is connected to both thefirst network and the second network.
 4. The system according to claim1, wherein the first network and the second network are the Internet. 5.The system according to claim 1, wherein the first network and thesecond network are the same network comprising a first predeterminedwired portion and a second predetermined wireless portion; the securitysystem at least one of transmits and broadcasts the change in mode ofthe security system on the network.
 6. The system according to claim 1,wherein each network-controllable device of the plurality ofnetwork-controllable devices associated with the element ofinfrastructure is either directly coupled the second network or coupledto the second network via at least another network-controllable deviceof the plurality of network-controllable devices.
 7. The systemaccording to claim 1, wherein the plurality of network-controllabledevices are the second network and establish the second network as anad-hoc network.
 8. The system according to claim 1, wherein eachnetwork-controllable device of the plurality of network-controllabledevices may be directly controlled from at least one of a portableelectronic device and a fixed electronic device, wherein the at leastone of the portable electronic device and the fixed electronic device isother than the security system.
 9. The system according to claim 1,wherein the triggered action relates to a setting of thenetwork-controllable device of the plurality of network-controllabledevices, wherein the setting is established in dependence upon crowdsourcing data relating to the network-controllable device of theplurality of network-controllable devices.
 10. The system according toclaim 1, wherein the triggered action is established in dependence uponat least one of a rule and an algorithm at least one of stored upon andexecuted by a remote server coupled to a network which is at least oneof connected to and partly formed by each of the first network and thesecond network.
 11. The system according to claim 1, wherein thetriggered action is established in dependence upon the change in themode of the security system and the current settings of thepredetermined subset of the plurality of network-controllable devices.12. The system according to claim 1, wherein the change in the mode ofthe security system is established in dependence upon the location of anindividual with respect to a plurality of geofences established withrespect to the element of infrastructure.
 13. The system according toclaim 1, wherein The triggered action is established in dependence uponthe change in the mode of the security system and the location of anevent associated with the security system leading to the change in themode.