iControl Networks, Inc. (Philadelphia, PA)
A premises management system may comprise a gateway device. The gateway device may configured to determine the premises devices of a premises management system. The gateway device could be configured to detect a communication protocol associated with the premises devices. The communication protocol may be utilized to permit the gateway device to communicate with devices at the premises.
The field of home and small business security is dominated and dominated by technology providers who create complete closed` security systems, where the individual components (sensors and security panels, keypads) work only within the limits of a single vendor solution. A wireless motion sensor manufactured by vendor A cannot be utilized with a security panel from vendor B. Each vendor typically has developed advanced proprietary wireless technologies that allow for the setup and management of wireless sensors, but with limited or no ability for the wireless devices to function separately from the vendor’s homogeneous system. In addition, traditional systems are severely limited in their ability to interface either to a local or wide areastandards-based network (such as an IP network); most installed systems support only the low bandwidth, intermittent connections utilizing phone lines or cellular (RF) backup systems. Companies like Honeywell, GE Security, and DSC/Tyco have a long history of wireless security technologies. They are excellent examples of this innovative approach to home and business security.
Furthermore, with the proliferation of the internet, ethernet , and WiFi local area networks (LANs) and advanced wide area networks (WANs) that provide high bandwidth and low latency connections (broadband), along with more advanced wireless datanetworks for WANs (e.g. GPRS or CDMA 1.times.RTT) there increasingly exists the networking capability to expand these security systems to provide enhanced functionality. In addition, the proliferation of broadband access has driven a correspondingincrease in home and small business networking technologies and devices. It is possible to expand existing security systems to add additional functions, for instance, the ability control and manage security systems using the internet, cell phones, or more advanced internet-connected devices. Additionally, it is desirable to have an open system method of connecting security systems at home to small and home networks.
Due to the proprietary approach as described above, traditional providers are the only ones who can taking advantage of these new networks capabilities. Even though the vast majority of home and commercial clients are equipped with broadband networkaccess on their premises, most security systems do not offer the advanced capabilities associated with high speed, low-latency LANs and WANs. This is primarily because the private vendors have not been able to deliver such technology effectively or efficiently. Solution providers trying to meet this need are becoming known as the latest in technology, and include three types of vendors: traditional hardware providers like Honeywell and GE Security; third party hard-wired module providers such as Alarm.com, NextAlarm, and uControl; and new proprietary system providers like InGrid.
The continued proprietary approach of traditional hardware manufacturers is a hindrance to the use of prior technological advancements. This technology is developed by vendors and works only with hardware manufactured by one vendor. It ignores the need for an integrated solution across vendors. Yet another disadvantage of the prior art technologies of the traditional hardware vendors is due to the lack of knowledge and experience of these companies in creating open internet and web based solutions, as well as user-friendly interfaces.
The drawbacks of prior-art technology of third-party hard-wired module providers is their operational and installation complexities and functional limitations which result from hardwiring the new security systems with existing components. Moreover, a disadvantage of the prior art technologies of the new proprietary systems providers arises due to the need to discard all prior technologies, and implement an entirely new form of security system to access the new functionalitiesassociated with broadband and wireless data networks. Devices, systems and methods that interface with and manage existing wireless security technologies are required.
A premises management system may comprise a gateway device. Gateway devices can be used to identify any of the premises devices within the premises management system. The gateway device may be set up to send the request to communicate with the devices on the premises. The gateway device may be set to receive an indication of a communication protocol that is associated with the devices at the premises. The gateway device may be configured to communicate with the premises devices using the communicationprotocol.
Click here to view the patent on USPTO website.
Get Patents with PatentPC
What is a patent?
Patents are granted by the government to protect an invention. The patent grants the inventor the sole right to develop, utilize and market the idea. Society is benefited when new technologies are brought to the market. The benefits can be in the direct sense, since it can allow people to do previously impossible things, or indirectly, through the economic opportunities (business growth and employment) that innovation provides.
Patent protection is sought by a variety of universities and pharmaceutical companies to protect their research and development. Patents can be granted to the physical or abstract nature of a product or process or a technique or composition of material that are new to the field. In order to be granted protection under a patent an invention has to be novel, useful and not be obvious to other people within the same field.
Patents are a way to reward inventors for their commercially successful inventions. They act as an incentive for inventors to come up with new ideas. Patents enable inventors and small businesses to be assured that there’s the possibility that they’ll receive a return for their efforts, time, and money invested in technology development. They can earn a living from their work.
Companies with the capacity to:
Protect your innovative products and services
Improve the visibility and the value of your product’s presence on the market
Make your brand stand out from the competition.
Access business and technical expertise and other information;
Avoid the risk of accidentally using proprietary third-party content, or losing your important data, original outputs, or any other innovative output.
Patents transform inventor’s knowledge into an asset that can be sold, which opens up new opportunities to create jobs through licensing and joint ventures.
Small companies that have patent protection are more appealing to investors in the development and commercialization of technology.
Patents can result in new ideas and inventions. This information can encourage creativity and could be eligible to be protected by patents.
Patents can serve as an obstacle to unscrupulous third parties profiting from an invention’s successes.
Commercially successful patent-protected technology revenues could be used to finance technological research and development (R&D), which will increase the chance of better technology in the coming years.
It is possible to use the intellectual property rights of your company to convince lenders and investors that your product has real commercial potential. Sometimes, a powerful patent could open the door to multiple financing opportunities. Patents and other IP assets are able to be used as collateral or security for debt financing. You can also show investors the patents you own to increase the value of your company. Forbes and other publications have reported that every patent could add anything from $500,000 to one million dollars to company valuation.
A well-constructed business plan is essential for new businesses. It must be based on IP and explain the way your product or service is distinctive. Investors will also be impressed if your IP rights are secured or in the process to becoming secure, and that they support your business plan.
It is essential to keep an invention secret until you apply for patent protection. The public disclosure of an invention could be detrimental to its novelty and make it invalid. Therefore, pre-filing disclosures (e.g., for test-marketing investors, investors, or for other business partners) must only be done following the signing of a confidentiality agreement.
There are many types of patents. Understanding the different types of patents is vital to protect your invention. Patents for utility are used to protect inventions and processes that are new. Design patents cover ornamental designs. Patents for utility are the best option to protect the proprietor from copies and competitors. In most cases they are granted for alterations or improvements on existing inventions. Utility patents can also be used to cover improvements and modifications to existing inventions. A process patent would describe the methods or actions of performing a particular act. A chemical composition will include the combination of ingredients.
What is the average length of patents? Although utility patents are valid for 20 years from the date of the initial filing, they are able to be extended through delays at the patent office.
Do you wish to protect your idea? Patents are only granted to applicants who are the first to file, therefore you need to file your patent application quickly. Contact PatentPC today to file your patent application submitted!
A patent search is a must when writing a patent application. This allows you to look at other ideas and give you insights into them. This will allow you to limit the extent of your invention. Furthermore, you’ll discover the latest technology in your area of invention. This will help you to comprehend the scope of your invention as well as prepare you to file your patent application.
How to Search for Patents
The first step to get the patent you want is to perform the patent search. You can do a google patent search or do a USPTO search. Patent-pending is the name used to describe the product that has been covered by the patent application. You can search for the public pair in order to locate the patent application. After the patent office has approved the application, you are able to perform a patent search to locate the patent issued which means that your product will now be patented. Alongside the USPTO search engine, you may also use other search engines like espacenet, as detailed below. A patent lawyer or attorney can advise you on the procedure. Patents granted in the United States are granted by the US trademark and patent office, or the United States patent office. This office also reviews trademark applications.
Are you interested in finding similar patents? Here are the steps:
1. Brainstorm terms to describe your invention according to its function composition, use, or purpose.
Write down a concise and precise description of your idea. Don’t use generic terms like “device”, “process”, and “system”. Instead, look for synonyms to the terms you selected initially. Next, note important technical terms and keywords.
To help you find the key words and concepts, try the following questions.
- What’s the purpose of the invention? Is it a utilitarian device or an ornamental design?
- Invention is a method to create something or perform some function? Is it a product or procedure?
- What is the composition and function of the invention? What is the physical makeup of the invention?
- What’s the purpose of the invention?
- What are technical terms and terms that describe the nature of an invention? To find the right terms, refer to the technical dictionary.
2. These terms will enable you to look up pertinent Cooperative Patent Classifications at Classification Search Tool. If you’re unable to determine the correct classification to describe your invention, look through the classification’s Schemas of classes (class schedules). If you don’t see any results from the Classification Text Search, you might consider substituting your words for describing your invention with synonyms.
3. Review the CPC Classification Definition to verify the accuracy of the CPC classification that you have discovered. If the classification you have selected is a blue square that contains “D” The link to the CPC classification definition will be displayed. CPC classification definitions can help identify the specific classification’s range, so you are sure to select the most pertinent. The definitions could also contain some search tips or other recommendations that could be helpful for further research.
4. The Patents Full-Text Database and the Image Database allow you to search for patent documents that have the CPC classification. By focusing your search on abstracts and illustrations it is possible to narrow your search to find the relevant patent documents.
5. Use this selection of the most relevant patent publications to study each in detail for similarities to your own invention. Pay close attention to the specification and claims. Consult the applicant and patent examiner to obtain additional patents.
6. Retrieve published patent applications with the CPC classification you chose in Step 3 in the Applications Full-Text and Image Database. It is possible to use the same search strategy as in Step 4. You can narrow your search results down to the most relevant patent applications by examining the abstract as well as the drawings that appear on each page. Then, you must carefully review the patent applications published with particular attention paid to the claims and additional drawings.
7. You can search for additional US patent publications by keyword searches in AppFT or PatFT databases, as well as classification searching of patents that aren’t from the United States as according to below. You can also use web search engines to find non-patent literature disclosures about inventions. Here are some examples:
- Add keywords to your search. Keyword searches may turn up documents that are not well-categorized or have missed classifications during Step 2. For example, US patent examiners often supplement their classification searches with keyword searches. Think about the use of technical engineering terminology rather than everyday words.
- Search for foreign patents using the CPC classification. Then, re-run the search using international patent office search engines such as Espacenet, the European Patent Office’s worldwide patent publication database of over 130 million patent publications. Other national databases include:
- European Patent Office (EPO) provides esp@cenet to access a network of Europe’s patent databases with access to machine translation of European patents.
- Japan Patent Office (JPO) – with access to machine translations of Japanese patents.
- World Intellectual Property Organization (WIPO) offers PATENTSCOPE with a full-text search of published international patent applications and machine translations for some documents, as well as a list of international patent databases.
- Korean Intellectual Property Rights Information Service (KIPRIS)
- State Intellectual Property Office (SIPO) with machine translation of Chinese patents.
- Other International Intellectual Property Offices with online patent databases include Australia, Canada, Denmark, Finland, France, Germany, Great Britain, India, Israel, Netherlands, Norway, Sweden, Switzerland, and Taiwan.
- Search non-patent literature. Inventions can be made public in many non-patent publications. It is recommended that you search journals, books, websites, technical catalogs, conference proceedings, and other print and electronic publications.
To review your search, you can hire a registered patent attorney to assist. A preliminary search will help one better prepare to talk about their invention and other related inventions with a professional patent attorney. In addition, the attorney will not spend too much time or money on patenting basics.