System interaction with a movable barrier operator method and apparatus
09818243 ยท 2017-11-14
Assignee
Inventors
Cpc classification
International classification
Abstract
A secure communication link is provided between a movable barrier operator and a peripheral system. Information conveyed via this link is used by one, the other, or both such elements to further inform or direct their respective actions.
Claims
1. An apparatus comprising: a peripheral system controller configured to control an alarm system; a movable barrier operator secure communication link interface configured to send communications to a movable barrier operator over a local secure encrypted communication link between the movable barrier operator and the alarm system; wherein the peripheral system controller is peripheral to the movable barrier operator and configured to: receive from the movable barrier operator at least one information communication using the local secure encrypted communication link, wherein the information communication comprises, at least in part, movable barrier operator status information; receive a movable barrier movement command; and send via the local secure encrypted communication link at least one signal representative of an encrypted information communication comprising, at least in part, a command configured to effect movement of a barrier by the movable barrier operator.
2. The apparatus of claim 1 wherein the peripheral system controller is configured to cause an action regarding providing egress to a secured area.
3. The apparatus of claim 1 wherein the peripheral system controller is configured to receive the movable barrier operator status information comprising information regarding detection of attempted movement of the movable barrier.
4. The apparatus of claim 1 wherein the movable barrier operator secure communication link interface is configured to employ a rolling-code based authentication protocol.
5. The apparatus of claim 1 wherein the secure communication link interface between the movable barrier operator and the peripheral system controller includes an additional communication link.
6. The apparatus of claim 5 wherein the additional communication link is secure.
7. The apparatus of claim 5 wherein the additional communication link is non-secure.
8. A method of controlling access to a secured area with a movable barrier operator and a movable barrier with a local secure wireless encrypted communication link between at least the movable barrier operator and a control system configured to control an alarm system, the control system is peripheral to the movable barrier operator, the movable barrier operator configured to control movement of the movable barrier, the control system also peripheral to and configured to communicate with movable barrier operator devices that are peripheral to the movable barrier operator, the method comprising: receiving by the control system from the movable barrier operator at least one information communication using the local secure wireless encrypted communication link between the movable barrier operator and the control system of the alarm system, wherein the information communication comprises, at least in part, movable barrier operator status information; receiving, by the control system, a movable barrier movement command; and effecting at least one wireless signal representative of an encrypted information communication from the control system using the local secure wireless encrypted communication link, the at least one wireless signal comprising, at least in part, a command configured to effect movement of the movable barrier by the movable barrier operator.
9. The method of claim 8 further comprising performing a control action in response to the control system receiving the wireless signal representative of the at least one information communication from the movable barrier operator.
10. The method of claim 9 wherein effecting at least one wireless signal representative of the encrypted information communication further comprises: effecting at least one control system action as a function, at least in part, of the movable barrier operator status information.
11. The method of claim 9 wherein effecting at least one wireless signal representative of the encrypted information communication comprises employing a rolling-code based authentication protocol.
12. The method of claim 9 wherein the secure wireless encrypted communication link between at least the movable barrier operator and the control system includes an additional communication link.
13. The method of claim 12 wherein the additional communication link is secure.
14. The method of claim 12 wherein the additional communication link is non-secure.
15. The apparatus of claim 1 wherein the movable barrier operator is configured to detect reversal of movement of the movable barrier operator.
16. An apparatus comprising: a peripheral system controller configured to control an alarm system; a movable barrier operator secure communication link interface configured to send communications to a movable barrier operator over a local secure encrypted communication link; wherein the peripheral system controller is peripheral to the movable barrier operator and configured to: receive from the movable barrier operator at least one information communication using the local secure encrypted communication link, wherein the information communication comprises, at least in part, movable barrier operator status information; receive a movable barrier movement command; and send via the local secure encrypted communication link at least one signal representative of an encrypted information communication comprising, at least in part, a command configured to effect movement of a barrier by the movable barrier operator; and wherein the movable barrier operator is configured to detect reversal of movement of the movable barrier operator and notify the peripheral system controller of the reversal of movement.
17. An apparatus comprising: a peripheral system controller configured to control an alarm system; a movable barrier operator secure communication link interface configured to send communications to a movable barrier operator over a local secure encrypted communication link; wherein the peripheral system controller is peripheral to the movable barrier operator and configured to: receive from the movable barrier operator at least one information communication using the local secure encrypted communication link, wherein the information communication comprises, at least in part, movable barrier operator status information; receive a movable barrier movement command; and send via the local secure encrypted communication link at least one signal representative of an encrypted information communication comprising, at least in part, a command configured to effect movement of a barrier by the movable barrier operator; and wherein the peripheral system control is configured to disarm the alarm system in response to an indication that the movable barrier operator has received an instruction to open.
18. The method of claim 8 further comprising detecting reversal of movement of the movable barrier operator.
19. A method of controlling access to a secured area with a movable barrier operator and a movable barrier with a local secure wireless encrypted communication link between at least the movable barrier operator and a control system configured to control an alarm system, the control system is peripheral to the movable barrier operator, the movable barrier operator configured to control movement of the movable barrier, the control system also peripheral to and configured to communicate with movable barrier operator devices that are peripheral to the movable barrier operator, the method comprising: receiving by the control system from the movable barrier operator at least one information communication using the local secure wireless encrypted communication link, wherein the information communication comprises, at least in part, movable barrier operator status information; receiving, by the control system, a movable barrier movement command; effecting at least one wireless signal representative of an encrypted information communication from the control system using the local secure wireless encrypted communication link, the at least one wireless signal comprising, at least in part, a command configured to effect movement of the movable barrier by the movable barrier operator; detecting reversal of movement of the movable barrier operator; and notifying the control system of the reversal of movement of the movable barrier operator upon detection thereof.
20. A method of controlling access to a secured area with a movable barrier operator and a movable barrier with a local secure wireless encrypted communication link between at least the movable barrier operator and a control system configured to control an alarm system, the control system is peripheral to the movable barrier operator, the movable barrier operator configured to control movement of the movable barrier, the control system also peripheral to and configured to communicate with movable barrier operator devices that are peripheral to the movable barrier operator, the method comprising: receiving by the control system from the movable barrier operator at least one information communication using the local secure wireless encrypted communication link, wherein the information communication comprises, at least in part, movable barrier operator status information; receiving, by the control system, a movable barrier movement command; effecting at least one wireless signal representative of an encrypted information communication from the control system using the local secure wireless encrypted communication link, the at least one wireless signal comprising, at least in part, a command configured to effect movement of the movable barrier by the movable barrier operator; and disarming the control system in response to receipt of a notification that the movable barrier operator has received an instruction to open.
Description
BRIEF DESCRIPTION OF THE DRAWINGS
(1) The above needs are at least partially met through provision of the alarm system interaction with a movable barrier operator method and apparatus described in the following detailed description, particularly when studied in conjunction with the drawings, wherein:
(2)
(3)
(4)
(5) Skilled artisans will appreciate that elements in the figures are illustrated for simplicity and clarity and have not necessarily been drawn to scale. For example, the dimensions and/or relative positioning of some of the elements in the figures may be exaggerated relative to other elements to help to improve understanding of various embodiments of the present invention. Also, common but well-understood elements that are useful or necessary in a commercially feasible embodiment are often not depicted in order to facilitate a less obstructed view of these various embodiments of the present invention. It will also be understood that the terms and expressions used herein have the ordinary meaning as is accorded to such terms and expressions with respect to their corresponding respective areas of inquiry and study except where specific meanings have otherwise been set forth herein.
DETAILED DESCRIPTION
(6) Generally speaking, pursuant to these various embodiments, one provides a secure communication link between a movable barrier operator and a peripheral alarm system and then effects at least one communication between these elements using that secure communication link.
(7) The secure communication link can comprise, for example, an encrypted wireless communication link, a non-wireless communication link, or the like. The communication can comprise, for example, data such as, but not limited to, an instruction to the movable barrier operator. Depending upon the needs of a given application, the peripheral alarm system can be responsive to data as is received from the movable barrier operator and/or the movable barrier operator can respond to operational instructions as are sourced by the peripheral alarm system.
(8) Various capabilities and corresponding benefits are readily facilitated by these actions. As an illustrative example, when a given alarm system has a corresponding actuation time delay (to permit, for example, a home owner to vacate their premises prior to the alarm system arming itself), use and/or control of that actuation time delay can be further informed, controlled, or influenced by a present (or recent) operational state of a corresponding movable barrier operator. For example, the actuation time delay may be effectively lengthened (or shortened) as a function, at least in part, of whether the garage door of a home is opened, opening, closed, or closing.
(9) These and other benefits may become clearer upon making a thorough review and study of the following detailed description. Referring now to the drawings, and in particular to
(10) Certain approaches to securing such a communication path are set forth in a co-owned patent application bearing U.S. patent application Ser. No. 11/044,411, now U.S. Pat. No. 7,071,850, entitled METHOD AND APPARATUS TO FACILITATE TRANSMISSION OF TERNARY MOVABLE BARRIER OPERATOR INFORMATION, the contents of which are fully incorporated herein by this reference.
(11) Accordingly, by one approach this communication path can comprise a rolling code-based authentication protocol. This rolling code-based authentication protocol, in turn, can employ ternary data. For example, ternary data as corresponds to a communication path endpoint can be converted into a binary format (such as corresponding pairs of binary bits) and then transmitted to a recipient platform. Such a process can achieve an encryption effect.
(12) Depending upon the needs of a given application setting, the secure communication link can comprise a dedicated link as between the movable barrier operator and the peripheral alarm system or can be shared or multiplexed in some manner with other elements. (Those skilled in the art will recognize that additional other communication links, including either or both secure and non-secure communication links, can also be provided as between the movable barrier operator and the peripheral alarm system, if desired.)
(13) This process 10 then generally effects 12 at least one communication as between the movable barrier operator and the peripheral alarm system using the secure communication link. This communication can be directed from the movable barrier operator to the peripheral alarm system and/or vice versa, depending upon the needs and capabilities that characterize a given application setting. Pursuant to a preferred approach this communication comprises, at least in part, data (such as status information as pertains to one or the other of the movable barrier operator and the peripheral alarm system, confirmation messages, instructions, and so forth).
(14) Effecting 12 this communication can also comprise, in a given deployment, effecting an action at one and/or the other of the movable barrier operator and the peripheral alarm system in response to receiving and/or sourcing the at least one communication. For example, the communication itself can comprise an instruction to the movable barrier operator regarding subsequent movement of a movable barrier as is controlled, at least in part, by the movable barrier operator. In such a case, the movable barrier operator may then respond to receipt of this instruction with a compliant action to cause the movable barrier to move as instructed. As another example, the peripheral alarm system may effect a given action as a function, at least in part, of receiving data from the movable barrier operator.
(15) So configured, a movable barrier operator and a peripheral alarm system are able to communicate with one another with respect to information that may be useful to their relative operating strategies and/or with respect to specific instructions that one element can usefully execute to benefit or otherwise match or supplement the operations of the opposing element.
(16) There are various ways to effect the above-described process 10. An illustrative example will now be set forth with reference to
(17) In this illustrative embodiment, an alarm control system 20 comprises an alarm system controller 21 that serves to generally receive data (regarding, for example, a monitored premises), to process that data with respect to various rules and tests, and to provide alarms and other actions in accordance with a given operating strategy. Such alarm system controllers 21 are generally well understood in the art. In addition, these teachings are not especially sensitive to the selection or use of any particular alarm system controller. Therefore, further elaboration will not be provided here for the sake of brevity and the preservation of narrative focus aside from noting that such alarm system controllers 21 are often partially or wholly programmable and can therefore be readily programmed to operate as described herein.
(18) In this illustrative embodiment the alarm system controller 21 operably couples to a movable barrier operator secure communication link interface 22. The latter, in turn, comprises the interface that effects compatible interaction with a corresponding movable barrier operator 23 via a given secure communication link 24. So configured, the alarm system controller 21 is able to receive data from the movable barrier operator 23 via the secure communication link 24. As per these teachings, the alarm system controller 21 is then able to respond in some appropriate way to such received data.
(19) In a preferred approach, the alarm system controller 21 comprises, in part, an alarm actuator 25. This alarm actuator 25, in a preferred embodiment, has a corresponding actuation time delay and serves, for example, to delay the arming of the alarm system in order to permit an authorized user to leave their house without fear that an alarm will sound upon detecting the opening of the egress door. In such a case (i.e., when the alarm actuator 25 comprises at least in part an alarm arming actuator), the operation of the alarm actuator 25 can be modified appropriately in response to receipt of information from a corresponding movable barrier operator. For example, arming of the alarm system can be delayed longer than is usual upon being advised by the movable barrier operator that the movable barrier operator's movable barrier (such as a garage door) has been opened but not yet closed (which may indicate, for example, that the authorized user has not yet completely left the premises).
(20) As another example, when the alarm actuator 25 comprises an alarm disarming actuator (to automatically disarm the alarm system when it is otherwise armed), information received from the movable barrier operator can again be used to influence and inform this disarming functionality. To illustrate, when the movable barrier operator receives a remote control signal comprising an instruction to open the movable barrier, this information can be passed to the alarm system controller 21 as per these teachings and then used to trigger a full or temporary disarming of the alarm system in anticipation of the arrival of an authorized user.
(21) Such actions can vary with the needs and requirements of a given application and can also vary with the substantive content of the conveyed information. Similarly, the precise information conveyed can vary with the needs and requirements of a given setting. Some illustrative examples include, but are certainly not limited to: reception of a remotely sourced movable barrier operator command signal; a current position of a movable barrier; initiation of movement of the movable barrier; current movement of the movable barrier; cessation of movement of the movable barrier; reversal of movement of the movable barrier; detection of an obstacle in a pathway of the movable barrier; and unauthorized movement of the movable barrier;
to name a few.
(22) As noted above, it may be useful in some settings for the alarm system controller 21 to itself convey information to a movable barrier operator (to permit, for example, providing a specific instruction to the movable barrier operator such as an instruction to illuminate one or more lights, to move the movable barrier to a particular position, to maintain a present position of the movable barrier, and so forth). In such a case a movable barrier operator message transmitter 26 can be provided to effect such transmissions. (Those skilled in the art will recognize and appreciate that such functionality can comprise stand-alone capability (as suggested by the illustration) or can be integrated with other elements of the alarm system such as the alarm system controller 21 and/or the movable barrier operator secure communication link interface 22.)
(23) Referring now to
(24) Pursuant to one approach, the effected action can comprise, at least in part, the transmission of an external communication (such as, but not limited to, a command to the garage door opener, an inquiry to the garage door opener, a command to a peripheral alert mechanism, a message (intended, for example, for an authorized or unauthorized user of the movable barrier operator), to name a few).
(25) Pursuant to these teachings, a movable barrier operator and a peripheral alarm system are able to securely communicate with one another. This security, in turn, permits each to rely upon the communications of the other. For example, the peripheral alarm system can rely upon status information from the movable barrier operator and take actions such as disarming its alarm capability with reduced concern that this action may be inappropriate. As another example, the movable barrier operator can rely upon specific operational instructions as may be provided by the peripheral alarm system and take actions that are otherwise contrary to its operating strategy. This, in turn, permits various useful opportunities to leverage the respective capabilities and information sources of both such elements in a way that supplements and benefits one, the other, or both.
(26) Those skilled in the art will recognize that a wide variety of modifications, alterations, and combinations can be made with respect to the above described embodiments without departing from the spirit and scope of the invention, and that such modifications, alterations, and combinations are to be viewed as being within the ambit of the inventive concept.