Patent application number | Description | Published |
20140053246 | SELF-CONFIGURING WIRELESS NETWORK - Methods, systems, and apparatus, are provided for wireless networking In some implementations, a self-configuring wireless system includes at least one wireless network device; and an access point device; wherein the access point device and the at least one wireless network device are preconfigured with a common key so as to enable the access point device to establish a secure wireless network with the at least one network device using the common key upon powering up the access point device and the at least one wireless network device at a user site. | 02-20-2014 |
20140204727 | REDUNDANT CONTROL OF SELF-CONFIGURING WIRELESS NETWORK - Methods, systems, and apparatus, are provided for wireless networking. In some implementations, a self-configuring wireless system includes one or more wireless network devices; a primary access point device; and a secondary access point device; wherein the primary access point device and the at least one wireless network device are preconfigured with a respective key so as to enable the primary access point device to establish a secure wireless network with the at least one network device using the respective keys, and wherein the secondary access point device is configured assume coordination for the self-configuring wireless system if a fault associated with the primary access point device occurs. | 07-24-2014 |
20140247941 | SELF-CONFIGURING WIRELESS NETWORK - Methods, systems, and apparatus, are provided for wireless networking. In some implementations, a self-configuring wireless system includes one or more wireless network devices; and an access point device, wherein the one or more wireless network devices are each preconfigured with a respective key, and wherein the access point device is configured to obtain the respective keys so as to enable the access point device to establish a secure wireless network with the one or more network devices using the respective keys upon powering up the access point device and the one or more wireless network devices at a user location. | 09-04-2014 |
20140266767 | SECURITY SYSTEM POWER MANAGEMENT - Methods, systems, and apparatus, including computer programs encoded on computer storage media, for power management. One of the methods includes determining that there is a loss in electricity to a security system management device; entering low power state; receiving a wireless sensor alert while in the low power state; in response to the alert: returning to normal power state to transmit an alarm to a service provider system, and returning to low power state after transmitting the alarm; and returning to normal power state when electricity is restored. | 09-18-2014 |
20140281478 | CONFIGURING SECURE WIRELESS NETWORKS - Methods, systems, and apparatus, including computer programs encoded on computer storage media, for configuring secure wireless networks. One of the methods includes receiving, at a security system management device, protocol and key information for establishing a connection as a client device to the wireless IP device, wherein the protocol and key information is received in response to a user transmitting an identifier for the IP device to a service provider system; establishing communication with the wireless IP device, wherein the wireless IP device is acting as an access point device; exchanging keys with the wireless IP device; rebooting the security system management device to become an access point for the secure wireless network; and establishing communication with the wireless IP device, wherein the wireless IP device has become a wireless client. | 09-18-2014 |
20140281990 | INTERFACES FOR SECURITY SYSTEM CONTROL - Methods, systems, and apparatus, including computer programs encoded on computer storage media, for controlling security systems. One of the methods includes receiving, at a mobile device, an input to present camera video content; presenting, in a user interface, a first array of video content, wherein the respective video content is associated with a first security system location; receiving a user input to present a second array of video content, wherein the respective video content is associated with a second security system location, and wherein the user input comprises a touch input; and presenting, in the user interface, the second array of video content. | 09-18-2014 |