(19)
(11)EP 3 144 914 B1

(12)EUROPEAN PATENT SPECIFICATION

(45)Mention of the grant of the patent:
13.06.2018 Bulletin 2018/24

(21)Application number: 16189523.0

(22)Date of filing:  19.09.2016
(51)International Patent Classification (IPC): 
G08B 25/10(2006.01)

(54)

FAST REPLACEMENT Z-WAVE DEVICE IN HOME AUTOMATION

SCHNELL ERSATZBARE Z-WELLENVORRICHTUNG IN HEIMAUTOMATION

DISPOSITIF À ONDES Z À REMPLACEMENT RAPIDE DANS LA DOMOTIQUE


(84)Designated Contracting States:
AL AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO RS SE SI SK SM TR

(30)Priority: 21.09.2015 US 201514859576

(43)Date of publication of application:
22.03.2017 Bulletin 2017/12

(73)Proprietor: Honeywell International Inc.
Morris Plains, NJ 07950 (US)

(72)Inventors:
  • LU, Ming Hong
    Morris Plains, NJ 07950 (US)
  • GONG, Zion
    Morris Plains, NJ 07950 (US)
  • HUANG, Kevin Yong
    Morris Plains, NJ 07950 (US)

(74)Representative: Houghton, Mark Phillip 
Patent Outsourcing Limited 1 King Street
Bakewell, Derbyshire DE45 1DZ
Bakewell, Derbyshire DE45 1DZ (GB)


(56)References cited: : 
WO-A1-2010/097964
US-B1- 8 677 342
US-A1- 2007 063 836
US-B1- 8 836 467
  
      
    Note: Within nine months from the publication of the mention of the grant of the European patent, any person may give notice to the European Patent Office of opposition to the European patent granted. Notice of opposition shall be filed in a written reasoned statement. It shall not be deemed to have been filed until the opposition fee has been paid. (Art. 99(1) European Patent Convention).


    Description


    [0001] This application relates to in-home systems and more particular to home automation systems.

    BACKGROUND



    [0002] Systems are known to automate home functions such as controlling environmental functions such as lighting and providing security. A security system portion of the home automation system protects people and assets within secured areas. Such systems are typically based upon the use of one more sensors that detect threats within the areas.

    [0003] Threats to people and assets may originate from any of number of different sources. For example, a fire may kill or injure occupants who have become trapped by a fire in a home. Similarly, carbon monoxide from a fire may kill people in their sleep.

    [0004] Alternatively, an unauthorized intruder, such as a burglar, may present a threat to assets within the area. Intruders have also been known to injure or kill people living within the area.

    [0005] Sensors and controllers may be placed in different areas based upon the respective uses of those areas. For example, fire and/or carbon monoxide detection devices may be placed near sleeping areas of a home while intrusion detectors may be placed near entrances.

    [0006] In most cases, threat detectors are connected to a local control panel. In the event of a threat detected via one of the sensors, the control panel may sound a local audible alarm. The control panel may also send a signal to a central monitoring station.

    [0007] Patent document number US2007/063836A1 describes a method and apparatus for adding wireless devices to a security system.

    [0008] Patent document number US8836467B1 describes a method, system and apparatus for automated reporting of account and sensor zone information to a central system.

    [0009] While conventional home automation systems work well, it is sometimes difficult or inconvenient to maintain and/or repair sensors or device controllers. Accordingly, a need exists for better methods and apparatus for simplifying the process for replacement of home automation devices.

    SUMMARY



    [0010] The present invention in its various aspects is as set out in the appended claims.

    BRIEF DESCRIPTION OF THE DRAWINGS



    [0011] FIG. 1 illustrates a block diagram of a home automation system in accordance herewith.

    DETAILED DESCRIPTION



    [0012] While disclosed embodiments can take many different forms, specific embodiments thereof are shown in the drawings and will be described herein in detail with the understanding that the present disclosure is to be considered as an exemplification of the principles thereof as well as the best mode of practicing same, and is not intended to limit the application or claims to the specific embodiment illustrated.

    [0013] FIG. 1 is a block diagram of a home automation system 10 shown generally in accordance with an illustrated embodiment. The home automation system may be embodied in any of a number of different forms. For example, the home automation system may be embodied as a security system. Alternatively, the home automation system may be embodied as a device that controls environmental devices (e.g., lighting, heating, cooling, etc.). Under still another embodiment, the home automation system may incorporate both security and environmental control devices.

    [0014] Included within the system may be a number of wireless sensors 12, 14 that detect threats within a secured geographic area (e.g., a home) 16. Alternatively or in addition, the secured area may include one or more environmental control devices 18, 20. One or more (or all) of the sensors and/or control devices may operate under a Z-wave format.

    [0015] The wireless sensors may detect any of a number of different types of threats. For example, some of the sensors may be switches mounted on the doors and/or windows that provide entrance into or egress from the secured area. Other sensors may be passive infrared (PIR) devices placed within the secured area to detect intruders who have been able to circumvent the switches mounted to the doors and/or windows.

    [0016] Other sensors may be environmental sensors (e.g., temperature, smoke, fire, carbon monoxide. In some cases, environmental sensors (e.g., temperature sensors) may be used to activate and deactivate environmental control devices (e.g., heating, cooling, etc.).

    [0017] The sensors may be monitored by a control panel 22 either located within the secured area as shown in FIG. 1 or located remotely. For example, upon detecting a threat via activation of one of the sensors, the control panel may send an alarm message to a central monitoring station 24. The central monitoring station may respond by summoning the appropriate help (e.g., police, fire department, etc.).

    [0018] The system may be controlled by a human user through a user interface 34. Where the system incorporates a security system, the user may arm or disarm the system through the user interface by entering a personal identification (PIN) number and selecting a function through a keyboard 38. The user may determine and verify the status of the system via information shown on a display 36.

    [0019] Included within the control panel, sensors, automation devices and user interface may be control circuitry that accomplishes the functionality described below. For example, the circuitry may include on or more processor apparatus (processors) 26, 28, each operating under control of a computer program 30, 32 loaded from a non-transitory computer readable medium (memory) 34. As used herein, reference to a step performed by a computer program is also reference to the processor that executed that step.

    [0020] For example, a status processor operating within the control panel may monitor the user interface for control instructions related to the security system. Upon detecting an arm or arm away command, the status processor may enter an armed or armed away state. Upon detecting a disarm command, the status processor may enter a disarmed state.

    [0021] In the armed state, an alarm processor may monitor the threat sensors for threats. Upon detecting a threat, the alarm processor may compose an alarm message to be sent to the central monitoring station. The alarm message may include an identifier of the secured area (e.g., an address, account number, etc.), an identifier of a type of threat (e.g., fire, intrusion, etc.), an identifier of the specific sensor activated and the time. Alternatively, the home automation control devices may be activated by a timer.

    [0022] In the case of the home automation devices, an automation controller may monitor for inputs and activate the home automation devices accordingly. Inputs may be received through the keyboard or wirelessly through a portable device (e.g., cellphone) of the user.

    [0023] The sensors and environmental control devices may be wirelessly connected to the control panel directly or through a mesh network. Upon activation of each device, the device may search a predefined spectrum for a beacon transmitted by the control panel. The beacon may include an identifier of the system and information about how to form a wireless connection with the system. For example, the beacon may define a communication frame and superframe including a number of transmitting and receiving slots under a time division multiplexing multiple access (TDMA) format. The beacon may also include an identifier of a location within the frame and superframe where a sensor may transmit a registration message.

    [0024] Upon receiving and decoding the beacon, a newly activated sensor may transmit a registration message in the designated location of the superframe. A registration processor within the control panel may receive the registration message, verify the identity of the sensor and assign the sensor to separate transmission and reception slots of the frame and superframe.

    [0025] Following detection and recognition by the control panel of a newly activated sensing or control device, the registration processor may display a list of newly detected sensors and/or control devices on the display of the user interface. The registration processor may also display the type of device and an indicator of whether the device is activated or not activated.

    [0026] In order to install the device into the system, the user may determine the function and location of the device and assign a number of system operating attributes to the device. For example, if the device is a lighting controller, then the user would assign a control attribute to the device. If the device is a sensor, then the user assigns a sensing attribute to the device. In this regard, assigning attributes to the device automatically links the device to the appropriate program that operates in conjunction with the device to give the device the proper functionality.

    [0027] For example, a lighting control device is linked to (and controlled) by a lighting control program (and processor). In this case, the lighting control processor receives input from the user and sends an activation command to the device.

    [0028] Similarly, if the device is a sensor, then the device is linked to a monitoring program that takes the proper action in response to activation of the sensor. For example, a fire sensor is monitored by a fire detection processor that sends a specific type of alarm message to a central monitoring station. Similarly, an intrusion sensor is monitored by and sends a different type of alarm message to the central monitoring station.

    [0029] In addition to functional attributes, each device also has location attributes that are assigned by the user. The locational attributes may be a room where a lighting controller controls a lighting level. A grouping attribute may also group fire sensors in a portion of a building in order to provide better destination information to first responders.

    [0030] In addition, the device may have a purpose attribute. For example, an intrusion sensor has the purpose of sending an intrusion alarm to the central monitoring station. The purpose attribute links the intrusion sensor to a program that sends intrusion alarms to the central monitoring station. Similarly, the purpose attribute links a fire sensor to a program that sends fire alarms to the central monitoring station.

    [0031] The device may also have a name attribute assigned by the user. In this case, the name may be a word or short text message that is displayed along with an alert that allows a user to more easily identify the reason for the alert (e.g., "fire on 1st floor, etc.).

    [0032] In general, control attributes are not related to system addresses. In this case, system addresses are assigned independently when the device first registers with the control panel. For example, upon initially registering with the control panel, a newly activated device may be assigned a system address before being assigned to any location or purpose.

    [0033] Once the user has assigned an appropriate set of operating attributes to each sensor and control device, the system may be placed into an operating mode. While in the operating mode, each sensor or control device is accessed or controlled by a respective program based upon the assigned attributes of the device.

    [0034] While the assignment of attributes to home automation devices is important, it is also tedious. If a device fails, then the attributes must be re-entered.

    [0035] According to the present invention, the pre-assigned attributes of sensors and control devices are automatically assigned to a replacement sensor or control device by following a simple routine initiated through the control panel. According to the present invention, a user accesses a device replacement program that displays a list of each sensor and control device previously registered with the system. The user then selects one of the devices and the program displays a request for confirmation from the user. The user then activates the replacement sensor. In addition, the device has an enroll button on the device. Once the device has been activated, the user confirms the replacement request.

    [0036] Once a device has been selected for replacement, a deletion processor within the control panel operatively deletes and/or removes the original device from the system, but retains the attributes of the device. Once deleted, an installation processor looks for the concurrent registration of a new device. The installation processor may assume that this new device is the replacement device, or the installation processor display device details obtained from the device (e.g., model, revision number, etc.) and asks the user to confirm the replacement. Once confirmed, the installation processor may install the replacement device in place of the deleted device. Installation in this case means the automatic assignment of the attributes of the deleted device to the replacement device.

    [0037] In general, dealers/installers have been the source of many complaints regarding the maintenance and replacement of Z-wave devices in existing home automation systems. If a Z-wave device is abnormal in some way and has to be replaced, it is very time consuming to rename the device, reconfigure the attributes (the contextual scenes of use) related to the device, and so on.

    [0038] For example, replacing a Z-wave device in a conventional system requires at least four steps. First, the user must access and remove the abnormal device via the keypad screen. Second, the user must enroll the new (replacement) device into the system using the keypad. Next, the user must rename the newly enrolled device with the same name as the old device. Finally, the user must reconfigure related automation scenes (defined by the attributes) into the interface of the newly enrolled device.

    [0039] The system of FIG. 1 offers a method of fast replacement. Fast replacement of Z-wave devices is an improvement over conventional methods by saving time and effort based upon a number of novel features. First, the keypad provides a replacement feature (program) to automatically manage and implement this use case. The installer or other user need only click on a replacement feature or icon and an "enroll" button on the new device to complete the whole replacement process. The keypad activates a program that automatically removes the old device and then (by operation of the program) the new device automatically inherits the old Z-wave device's related settings, including names, scenes, etc. by migrating the settings, names, scenes, etc. to the new device.

    [0040] As noted above, the installer can accomplish the device replacement with a very simple set of convenient steps as follows. First, the installer selects a first device to be replaced and clicks a "replace" button on the keypad screen. Next, the installer may walk to the new or replacement device and presses an "enroll" button on the device to finish device enrollment. Finally, upon the successful enrollment of the device and confirmation that the devices types are the same, the program activated through the keypad will cause the new device to inherit the old device's name and, in addition, changes (i.e., transfers) all the scene settings from the old device to the new device.

    [0041] In general, the system includes a home automation system having a plurality of sensors that detect events within a predetermined geographic area, a first wireless sensor of the plurality of sensors that operates within the home automation system under a Z-wave format wherein the first wireless sensor has a number of predetermined system operating attributes that are not related to a system address of the first sensor, a replacement wireless sensor having a processor that communicates under a Z-wave format and a program executing on a processor of the home automation system that operatively removes the first sensor from the home automation system and automatically enrolls the replacement sensor with the home automation system by assigning the predetermined system operating attributes to the replacement sensor.

    [0042] Alternatively, the system may include a security system having a plurality of sensors that detect threats within a secured geographic area, a first wireless sensor of the plurality of sensors that communicates with the security system under a Z-wave format wherein the first wireless sensor has a number of predetermined system operating attributes that are not related to a system address of the first sensor, a replacement wireless sensor having a processor that communicates under a Z-wave format and a program executing on a processor of the security system that operatively removes the first sensor from the security system and automatically assigns the predetermined system operating attributes to the replacement sensor.

    [0043] Alternatively, the system may include a security system having a plurality of sensors that detect threats within a secured geographic area, a first wireless sensor of the plurality of sensors that communicates with the security system under a Z-wave format wherein the first wireless sensor has a predetermined number of system operating attributes that are not related to a system address of the first sensor, a replacement wireless sensor having a processor that communicates under a Z-wave format, a control panel of the security system that displays a name of each of the plurality of sensors and a location within the secured area and a program executing on a processor of the security system that receives an identifier of the first sensor through the control panel, operatively removes the first sensor from the security system and automatically assigns the predetermined operating attributes to the replacement sensor.

    [0044] From the foregoing, it will be observed that numerous variations and modifications may be effected without departing from the scope hereof. It is to be understood that no limitation with respect to the specific apparatus illustrated herein is intended or should be inferred. It is, of course, intended to cover by the appended claims all such modifications as fall within the scope of the claims. Further, logic flows depicted in the figures do not require the particular order shown, or sequential order, to achieve desirable results. Other steps may be provided, or steps may be eliminated, from the described flows, and other components may be add to, or removed from the described embodiments.


    Claims

    1. An apparatus comprising:

    a home automation system (10) having a plurality of sensors (12, 14) that detect events within a predetermined geographic area;

    a user interface (34) of the home automation system;

    a first wireless sensor of the plurality of sensors that operates within the home automation system under a Z-wave format, wherein the first wireless sensor has a number of predetermined system operating attributes that are not related to a system address of the first wireless sensor, and wherein the first wireless sensor has scene settings stored in the user interface;

    a replacement wireless sensor having a device type the same as the first wireless sensor; and

    a processor of the user interface that receives user input from the user interface, and, responsive thereto, initiates a device replacement program that operatively removes the first wireless sensor from the home automation system while retaining the predetermined system operating attributes and the scene settings of the first wireless device and automatically enrolls the replacement wireless sensor with the home automation system by assigning the predetermined system operating attributes of the first wireless sensor to the replacement wireless sensor and transferring the scene settings from the user interface to the replacement wireless sensor,

    wherein the processor operatively removes the first wireless sensor in response to a selection of the first wireless sensor from a list of the plurality of sensors displayed on the user interface and an activation of a replace button displayed on the user interface in response to the selection of the first wireless sensor from the list,

    wherein the list of the plurality of sensors is displayed in response to initiation of the device replacement program, and

    wherein the processor automatically enrolls the replacement sensor in response to an activation of an enroll button on the replacement sensor.


     
    2. The system as claim 1 wherein the home automation system includes a security system.
     
    3. The system as in claim 1 wherein the plurality of sensors includes threat sensors.
     
    4. The system as in claim 3 wherein at least some of the threat sensors include one of an intrusion sensor and a fire detector.
     
    5. The system as in claim 1 wherein the predetermined system operating attributes include a functional name of the first wireless sensor.
     
    6. A method comprising:

    providing a security system (10) having a user interface (34) and a plurality of sensors (12, 14) that detect threats within a secured geographic area;

    providing a first wireless sensor of the plurality of sensors that communicates with the security system under a Z-wave format, wherein the first wireless sensor has a number of predetermined system operating attributes that are not related to a system address of the first wireless sensor, and wherein the first wireless sensor has scene settings stored in the user interface;

    providing a replacement wireless sensor having a device type the same as the first wireless sensor;

    receiving user input from the user interface, and, responsive thereto, initiating a device replacement program for operatively removing the first wireless sensor from the security system while retaining the predetermined system operating attributes and the scene settings of the first wireless device wherein the user input includes a selection of the first wireless sensor from a list of the plurality of sensors displayed on the user interface and an activation of a replace button displayed on the user interface in response to the selection of the first wireless sensor from the list;

    responsive to an activation of an enroll button on the replacement wireless sensor, automatically assigning the predetermined system operating attributes of the first wireless sensor to the replacement wireless sensor; and

    responsive to the activation of the enroll button on the replacement wireless sensor, transferring the scene settings from the user interface to the replacement wireless sensor.


     
    7. The method as in claim 6 wherein the predetermined system operating attributes include a name of the first wireless sensor.
     
    8. The method as in claim 6 wherein a processor of the replacement wireless sensor automatically registers with the security system.
     
    9. The method as in claim 8 further comprising transmitting a beacon that identifies the security system to the replacement wireless sensor.
     


    Ansprüche

    1. Vorrichtung, umfassend:

    ein Heimautomationssystem (10) mit einer Vielzahl von Sensoren (12, 14), die Ereignisse innerhalb eines vorher bestimmten geografischen Bereichs erkennen;

    eine Benutzerschnittstelle (34) des Heimautomationssystems;

    einen ersten Funksensor aus der Vielzahl von Sensoren, der innerhalb des Heimautomationssystems im Z-Wave-Format betrieben wird, wobei der erste Funksensor eine Anzahl von vorher bestimmten Systembetriebseigenschaften, die nicht auf eine Systemadresse des ersten Funksensors bezogen sind, aufweist und wobei der erste Funksensor in der Benutzerschnittstelle gespeicherte Szeneneinstellungen aufweist;

    einen Ersatzfunksensor vom selben Gerätetyp wie der erste Funksensor; und

    einen Prozessor der Benutzerschnittstelle, der Benutzereingaben von der Benutzerschnittstelle empfängt und ansprechend darauf ein Geräteersatzprogramm startet, das im Betrieb den ersten Funksensor aus dem Heimautomationssystem entfernt, während er die vorher bestimmten Systembetriebseigenschaften und die Szeneneinstellungen des ersten Funkgeräts beibehält, und den Ersatzfunksensor durch Zuweisen der vorher bestimmten Systembetriebseigenschaften des ersten Funksensors zum Ersatzfunksensor und Transferieren der Szeneneinstellungen von der Benutzerschnittstelle an den Ersatzfunksensor automatisch im Heimautomationssystem anmeldet,

    wobei der Prozessor im Betrieb den ersten Funksensor in Ansprechen auf eine Auswahl des ersten Funksensors aus einer auf der Benutzerschnittstelle angezeigten Liste der Vielzahl von Sensoren und eine Aktivierung eines in Ansprechen auf die Auswahl des ersten Funksensors aus der Liste auf der Benutzerschnittstelle angezeigten Ersetzen-Buttons entfernt,

    wobei die Liste der Vielzahl von Sensoren in Ansprechen auf das Starten des Geräteersatzprogramms angezeigt wird und

    wobei der Prozessor den Ersatzsensor in Ansprechen auf eine Aktivierung eines Anmelde-Buttons auf dem Ersatzsensor automatisch anmeldet.


     
    2. System nach Anspruch 1, wobei das Heimautomationssystem ein Sicherheitssystem enthält.
     
    3. System nach Anspruch 1, wobei die Vielzahl von Sensoren Bedrohungssensoren enthält.
     
    4. System nach Anspruch 3, wobei mindestens einige der Bedrohungssensoren einen Einbruchsensor oder einen Brandmelder enthalten.
     
    5. System nach Anspruch 1, wobei die vorher bestimmten Systembetriebseigenschaften einen Funktionsnamen des ersten Funksensors enthalten.
     
    6. Verfahren, umfassend:

    Bereitstellen eines Sicherheitssystems (10) mit einer Benutzerschnittstelle (34) und einer Vielzahl von Sensoren (12, 14), die Bedrohungen innerhalb eines gesicherten geografischen Bereichs erkennen;

    Bereitstellen eines ersten Funksensors aus der Vielzahl von Sensoren, der mit dem Sicherheitssystem im Z-Wave-Format betrieben wird, wobei der erste Funksensor eine Anzahl von vorher bestimmten Systembetriebseigenschaften, die nicht auf eine Systemadresse des ersten Funksensors bezogen sind, aufweist und wobei der erste Funksensor in der Benutzerschnittstelle gespeicherte Szeneneinstellungen aufweist;

    Bereitstellen eines Ersatzfunksensors vom selben Gerätetyp wie der erste Funksensor;

    Empfangen von Benutzereingaben von der Benutzerschnittstelle und ansprechend darauf Starten eines Geräteersatzprogramms zum Entfernen des ersten Funksensors aus dem Sicherheitssystem im Betrieb bei gleichzeitiger Beibehaltung der vorher bestimmten Systembetriebseigenschaften und der Szeneneinstellungen des ersten Funkgeräts, wobei die Benutzereingaben eine Auswahl des ersten Funksensors aus einer auf der Benutzerschnittstelle angezeigten Liste der Vielzahl von Sensoren und eine Aktivierung eines in Ansprechen auf die Auswahl des ersten Funksensors aus der Liste auf der Benutzerschnittstelle angezeigten Ersetzen-Buttons enthalten;

    ansprechend auf eine Aktivierung eines Anmelde-Buttons auf dem Ersatzfunksensor automatisches Zuweisen der vorher bestimmten Systembetriebseigenschaften des ersten Funksensors zum Ersatzfunksensor; und

    ansprechend auf die Aktivierung des Anmelde-Buttons auf dem Ersatzfunksensor Transferieren der Szeneneinstellungen von der Benutzerschnittstelle an den Ersatzfunksensor.


     
    7. Verfahren nach Anspruch 6, wobei die vorher bestimmten Systembetriebseigenschaften einen Namen des ersten Funksensors enthalten.
     
    8. Verfahren nach Anspruch 6, wobei die Registrierung eines Prozessors des Ersatzfunksensors beim Sicherheitssystem automatisch erfolgt.
     
    9. Verfahren nach Anspruch 8, ferner umfassend Übertragen eines Beacons, welches das Sicherheitssystem identifiziert, an den Ersatzfunksensor.
     


    Revendications

    1. Appareil comprenant :

    un système de domotique (10) comportant une pluralité de capteurs (12, 14) qui détectent des événements à l'intérieur d'une zone géographique prédéterminée,

    une interface utilisateur (34) du système de domotique,

    un premier capteur sans fil appartenant à la pluralité de capteurs, lequel fonctionne à l'intérieur du système de domotique dans le format du protocole « Z-wave », le premier capteur sans fil possédant un certain nombre d'attributs prédéterminés d'exploitation de système qui ne sont pas liés à une adresse système du premier capteur sans fil et le premier capteur sans fil possédant des réglages de contexte mémorisés dans l'interface utilisateur,

    un capteur sans fil de remplacement présentant un type de dispositif qui est identique à celui du premier capteur sans fil, et

    un processeur de l'interface utilisateur qui reçoit une entrée utilisateur émise par l'interface utilisateur, et, en réponse à celle-ci, initie un programme de remplacement de dispositif qui retire fonctionnellement le premier capteur sans fil du système de domotique tout en retenant les attributs prédéterminés d'exploitation de système et les réglages de contexte du premier dispositif sans fil, et qui inscrit automatiquement le capteur sans fil de remplacement avec le système de domotique en allouant au capteur fil de remplacement les attributs prédéterminés d'exploitation de système du premier capteur sans fil et en transférant les réglages de contexte de l'interface utilisateur au capteur sans fil de remplacement,

    dans lequel le processeur retire fonctionnellement le premier capteur sans fil en réponse à la sélection du premier capteur sans fil dans une liste de la pluralité de capteurs sans fil affichée sur l'interface utilisateur, ainsi qu'à l'activation d'un bouton de remplacement affiché sur l'interface utilisateur en réponse à la sélection du premier capteur sans fil dans la liste,

    dans lequel la liste de la pluralité de capteurs est affichée en réponse à l'initiation du programme de remplacement de dispositifs, et

    dans lequel le processeur inscrit automatiquement le capteur de remplacement en réponse à l'activation d'un bouton d'inscription sur le capteur de remplacement.


     
    2. Système selon la revendication 1, dans lequel le système de domotique inclut un système de sécurité.
     
    3. Système selon la revendication 1, dans lequel la pluralité de capteurs inclut des capteurs de danger.
     
    4. Système selon la revendication 3, dans lequel au moins certains des capteurs de danger incluent l'un d'un capteur d'intrusion et d'un détecteur d'incendie.
     
    5. Système selon la revendication 1, dans lequel les attributs prédéterminés d'exploitation de système incluent le nom fonctionnel du premier capteur sans fil.
     
    6. Procédé comprenant :

    l'utilisation d'un système de sécurité (10) possédant une interface utilisateur (34) et une pluralité de capteurs (12, 14) qui détectent des menaces à l'intérieur d'une zone géographique sécurisée,

    l'utilisation d'un premier capteur sans fil appartenant à la pluralité de capteurs, lequel communique avec le système de sécurité dans le format du protocole « Z-wave », le premier capteur sans fil possédant un certain nombre d'attributs prédéterminés d'exploitation de système qui ne sont pas liés à une adresse système du premier capteur sans fil et le premier capteur sans fil possédant des réglages de contexte mémorisés dans l'interface utilisateur,

    l'utilisation d'un capteur sans fil de remplacement présentant un type de dispositif qui est identique à celui du premier capteur sans fil,

    la réception d'une entrée utilisateur émise par l'interface utilisateur, et, en réponse à celle-ci, l'initiation d'un programme de remplacement de dispositif destiné à retirer fonctionnellement le premier capteur sans fil du système de sécurité tout en retenant les attributs prédéterminés d'exploitation de système et les réglages de contexte du premier dispositif sans fil, l'entrée utilisateur incluant la sélection du premier capteur sans fil dans une liste de la pluralité de capteurs affichée sur l'interface utilisateur ainsi que l'activation d'un bouton de remplacement affiché sur l'interface utilisateur en réponse à la sélection du premier capteur sans fil dans la liste,

    l'assignation automatique des attributs prédéterminés d'exploitation de système du premier capteur sans fil au capteur sans fil de remplacement en réponse à l'activation d'un bouton d'inscription sur le capteur sans fil de remplacement, et

    le transfert des réglages de contexte de l'interface utilisateur au capteur sans fil de remplacement en réponse à l'activation du bouton d'inscription sur le capteur sans fil de remplacement.


     
    7. Procédé selon la revendication 6, dans lequel les attributs prédéterminés d'exploitation de système incluent le nom du premier capteur sans fil.
     
    8. Procédé selon la revendication 6, dans lequel le processeur du capteur sans fil de remplacement s'enregistre automatiquement avec le système de sécurité.
     
    9. Procédé selon la revendication 8, comprenant en outre la transmission d'une balise qui identifie le système de sécurité auprès du capteur sans fil de remplacement.
     




    Drawing








    Cited references

    REFERENCES CITED IN THE DESCRIPTION



    This list of references cited by the applicant is for the reader's convenience only. It does not form part of the European patent document. Even though great care has been taken in compiling the references, errors or omissions cannot be excluded and the EPO disclaims all liability in this regard.

    Patent documents cited in the description