17. The method of Claim 15, wherein said predetermined parameter is established by the frequency of said light.
18. The method of Claim 15, wherein said predetermined parameter is established by modulating said light at a predetermined modulation rate.
19. The method of Claims 3, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, or 18, wherein there is further included the step of monitoring for the unauthorized utlization of said spread spectrum code, and upon discerning unauthorized use, re-initiating programming of said spread spectrum code of said sensor/transmitters and said central processing unit to change said spread spectrum code to an new spread spectrum code.
20. The method of Claims 3, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17,18, or 19, wherein there is further included the step of monitoring for the unauthorized utlization of said system code, and upon discerning unauthorized use, re-initiating programming of said system code of said sensor/transmitter and said central processing unit to change said system code to a new system code.
21. The method of Claims 1, 2, 3, 4, 7, 8, 9, 11, 12, 13, 14, 15, 16, 17, 18, 29, or 20, wherein the data is transmitted via radio frequency having a frequency channel, and wherein there is further included the step of monitoring for the unauthorized utlization of said frequency channel, and upon discerning unauthorized use, re-initiating programming of said sensor/transmitters and said central processing unit to a new frequency channel.
22. The method of Claim 1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, or
21 wherein in step "a" of Claim 1 , said seed is communicated to said programming device via scanning a bar code. 23. The method of Claim 1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, or
21, wherein in step "a" of Claim 1, said seed is communicated to said programming device via reading a magnetic strip.
24. The method of Claims 1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, or 23, wherein said sensor transmitter has programmed power conservation means, said power conservation means for switching said sensor transmitter into a power saving mode, and wherein there is included the additional steps in step "c" of said sensor transmitter waking up upon contacting said programming device, then said sensor transmitter, powering up, handshaking with said programming device, and then being placed into a programming mode to accept programming from said programming device.
25. The method Of Claims 1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19,
20, 21, 22, 23, or 24, wherein said sensor transmitter further comprises transmit condition variance means for varying the speed and/or time period of transmission, selective increasing or decreasing the speed of transmission, or selectively transmitting in a continuous mode, burst mode, parcel mode, or other desired transmission rate.
26. The method of Claim 25, wherein there is provided the further step of providing self diagnostic means for said sensor transmitter for diagnosing the condition and operability of said sensor transmitter, and there is provided the step of selectively initiating said self diagnostic means, and verifying that said sensor transmitter is functioning within acceptable parameters.
27. The method of programming a sensor transmitter in a secure manner, comprising the steps of: a. providing a programming device containing sensor transmitter identification and function information comprising programming data bits, said programming device further containing in memory a scrambling algorithm; b. providing a sensor transmitter containing a scrambling algorithm compatible with said programming device scrambling algorithm; c. said programming device applying said scrambling algorithm to said programming data bits, producing security/randomization bits which are appended to said programming data bits, forming an outgoing programming message having programming data bits and appended security/randomization bits; d. transferring said outgoing programming message from said programming device to said sensor transmitter, forming an incoming programming message to said sensor transmitter; e. said sensor transmitter applying said scrambling algorithm to said incoming data bits in said incoming programming message, providing a scrambling result; f. comparing said scrambling result to the security/randomization bits appended to said programming data bits in said incoming programming message; g. upon a correct match of said scrambling result with said security/randomization bits, said sensor transmitter/transmitter accepting said programming data bits in said incoming programming message from said programming device as from a valid, secure programming device, and h. said sensor transmitter transmitting a verification message verifying valid programming.
28. The method of Claim 27 whereby the linking of said programming station to said sensor transmitter is accomplished magnetically or optically.
29. The method of Claim 27, wherein, following step "g", there is included the additional step of said programming station, once verifying that said sensor transmitter has been successfully programmed, said programming station sending a coded JAM command to said sensor transmitter, said sensor transmitter permanently latching said jam command into a flip-flop in such a manner as to logically disconnect the programming connection for said sensor transmitter so that future incoming programming commands received by said sensor transmitter will be ignored.
30. The method of Claim 27, wherein there is provided the additional step in step "c" of said programming station, encrypting said programming data bits, and said sensor transmitter decrypting said programming data bits.
31. The method of Claim 27, wherein said security/randomization bits are communicated to said programming device via optical data link, said optical data link further including the steps of reading a bar code.
32. The method of Claim 27, wherein said security/randomization bits are communicated to said programming device via reading a magnetic stripe.
33. The method of Claims 27, 28, 29, 30, 31, or 32, wherein there is further included the step of monitoring for the unauthorized utlization of said spread spectrum code, and upon discerning unauthorized use, re-initiating programming of said spread spectrum code of said sensor/transmitters and said central processing unit to change said spread spectrum code to an new spread spectrum code.
34. The method of Claims 27, 28, 29, 30, 31, 32, or 33, wherein there is further included the step of monitoring for the unauthorized utlization of said system code, and upon discerning unauthorized use, re-initiating programming of said system code of said sensor/transmitters and said central processing unit to change said system code to an new system code.
35. The method of Claims 27, 28, 29, 30, 31, 32, 33, or 34, wherein the programming message of step "d" is transferred via radio frequency having a frequency channel, and wherein there is further included the step of monitoring for the unauthorized utlization of said frequency channel, and upon discerning unauthorized use, re-initiating programming of said sensor/transmitters and said central processing unit to a new frequency channel.
36. The method of Claim 27, 28, 29, 30, 31, 32, 33, 34, or 35, wherein after step T of Claim 27, there is included the further step of said sensor transmitter transmitting a verification burst upon completion of programming, said verification burst comprising a digital data string verifying said sensor transmitter's address/ID Code, type code, property code, spread spectrum channel, and seed.
37. The method of Claim 36, wherein said verification burst includes a data string indicating status conditions of said sensor transmitter.
38. The method of programming a sensor transmitter in a secure manner, comprising the steps of: a. providing sensor transmitter identification and function information comprising programming data bits; b. applying a scrambling algorithm to said programming data bits, producing security/randomization bits, appending said security/randomization bits to said programming data bits, forming a programming message having programming data bits and security/randomization bits; c. providing a sensor transmitter containing in memory a scrambling algorithm compatible to said scrambling algorithm in step "b"; d. transferring said programming message to said sensor transmitter, forming an incoming programming message to said sensor transmitter; e. said sensor transmitter applying said scrambling algorithm in said memory to said incoming programming data bits in said incoming programming message, providing a scrambling result; f. comparing said scrambling result to the security/randomization bits appended to said programming data; g. upon a correct match of said scrambling result with said security/randomization bits, said sensor transmitter accepting said data bits in said incoming programming message as from a valid, secure programmer, and h. upon verification of a secure programmer, said sensor transmitter accepting said data from said programming device. 39. The method of Claim 38, wherein there is included the further step of said sensor transmitter transmitting a verification burst upon completion of programming, said verification burst comprising a digital data string verifying said sensor transmitter's address/ID Code, type code, property code, spread spectrum channel, and seed.
40. The method of Claims 38 or 39, wherein there is included the additional step of verifying said sensor transmitter's programming, and upon verification, transmitting a JAM command addressed to the verified sensor transmitter, said JAM command preventing unauthorized tampering of said verified transmitter.
41. The method of Claim 38 whereby the linking of said programming station to said sensor transmitter is accomplished magnetically or optically.
42. The method of Claim 38, whereby there is further included, after step "g", the additional step of sending a coded JAM command to said sensor transmitter, said sensor transmitter comparing said JAM command with said programming message and, upon verifying a match, said sensor transmitter permanently latching said jam command into a flip-flop in such a manner as to logically disconnect the programming connection so that future incoming programming command will be ignored.
43. The method of Claim 38, wherein there is provided the additional step in step "b" of encrypting said programming data bits, and wherein there is provided the additional step in step "e" of said sensor transmitter decrypting said encrypted programming data bits.
44. The method of Claim 38, wherein said verification burst includes a sensor transmitter identification code and power status.
45. The method of Claim 38, said programming message in step "b" is stored and scanned from a bar code.
46. The method of Claim 38, wherein said programming message in step "b" is stored and read from a magnetic strip.
47. The method of Claim 38, wherein said programming station is portable.
48. The method of Claim 38, wherein said programming station is part of a receiver or control panel. 49. The method of Claims 39 or 40, wherein there is further included the step of monitoring for the unauthorized utlization of said spread spectrum code, and upon discerning unauthorized use, re¬ initiating programming of said spread spectrum code of said sensor/transmitters and said central processing unit to change said spread spectrum code to an new spread spectrum code.
50. The method of Claims 39 or 40, wherein there is further included the step of monitoring for the unauthorized utlization of said system code, and upon discerning unauthorized use, re-initiating programming of said system code of said sensor/transmitters and said central processing unit to change said system code to an new system code.
51. The method of Claims 38, 39, or 40, wherein the data is transmitted via radio frequency having a frequency channel, and wherein there is further included the step of monitoring for the unauthorized utlization of said frequency channel, and upon discerning unauthorized use, re-initiating programming of said sensor/transmitters and said central processing unit to a new frequency channel.
52. The method of programming a sensor transmitter in a secure manner, comprising the steps of: a. providing sensor transmitter identification and function information comprising programming data bits; b. applying a scrambling algorithm to said programming data bits, producing security/randomization bits, appending said security/randomization bits to said programming data bits, forming a programming message having programming data bits and security/randomization bits; c. providing a sensor transmitter containing in memory a scrambling algorithm compatible to said scrambling algorithm in step "b"; d. transferring said programming message to said sensor transmitter, forming an incoming programming message to said sensor transmitter; e. said sensor transmitter applying said scrambling algorithm in said memory to said incoming programming data bits in said incoming programming message, providing a scrambling result; f. comparing said scrambling result to the security/randomization bits appended to said programming data; g. upon a correct match of said scrambling result with said security/randomization bits, said transmitter accepting said data bits in said incoming programming message as from a valid, secure programmer. h. sending a coded JAM command to said sensor transmitter, said sensor transmitter comparing said JAM command with said programming message and, upon verifying a match, said sensor transmitter initiating a means to disconnect the programming connection, preventing further programming of said sensor transmitter.
53. The method of Claim 52 whereby the linking of said programming station to said sensor transmitter is accomplished magnetically or optically.
54. The method of claim 52, whereby said scrambling algorithm may be alterable. 55. The method of Claim 52, wherein there is provided the additional step in step "b" of encrypting said programming data bits, and in step "e" said sensor transmitter decrypting said encrypted programming data bits.
56. The method of Claim 52, wherein there is included after step "g" the additional step of said transmitter sending a verification burst to the programmer.
57. The method of Claim 52, said programming message in step "b" is stored on a bar code.
58. The method of Claim 52, wherein said identification and function information in step "a" is stored on a magnetic strip.
59. The method of Claim 52, wherein said programming station is portable.
60. The method of Claim 52, wherein said programming station is part of a control panel.
61. The method of Claim 52, wherein there is included the further step of said sensor transmitter transmitting a verification burst upon completion of programming, said verification burst comprising a digital data string verifying said sensor transmitter's address/ID Code, type code, property code, spread spectrum channel, and seed.
62. The method of Claim 61, wherein there is further included the step of monitoring for the unauthorized utlization of said spread spectrum code, and upon discerning unauthorized use, re-initiating programming of said spread spectrum code of said sensor/transmitters and said central processing unit to change said spread spectrum code to an new spread spectrum code.
63. The method of Claim 61, wherein there is further included the step of monitoring for the unauthorized utlization of said system code, and upon discerning unauthorized use, re-initiating programming of said system code of said sensor/transmitters and said central processing unit to change said system code to an new system code. 64. The method of Claims 52, 53, 54, 55, 56, 57, 58, 59, 60, or 61, wherein the data is transmitted via radio frequency having a frequency channel, and wherein there is further included the step of monitoring for the unauthorized utlization of said frequency channel, and upon discerning unauthorized use, re-initiating programming of said sensor/transmitters and said central processing unit to a new frequency channel.
65. A method of programming a sensor transmitter in a secure fashion, comprising the steps of: a. placing an unprogrammed sensor transmitter in near proximity to an unprogrammed system receiver/panel/programming device; b. said receiver set into a mode by which it can accept programming data via transmitted programming message from said sensor transmitter; c. limiting the signal strength of said sensor transmitter to a near proximity of the receiver; d. selectively generating security/randomization bits for said sensor transmitter, and transmitting said bits to said receiver; e. said receiver imputing programming message and determining if such a device ID/address already exists in the system; f. if said new device ID/address is acceptable it becomes internally associated by the system receiver/panel/programming device with said sensor transmitter; g. if the new device ID/address is not acceptable the receiver or system receiver/panel/programming device so makes an appropriate indication; h. steps d-g are repeated until step h is met, once met the transmitter is removed from the programming mode.
66. The method of programming a sensor transmitter/transmitter of Step 65, wherein after step "g" there is provided the additional step of said receiver inputting said transmission and appending said security/ randomization bit to programming data including new device ID/address, forming a programming message, and sending said programming message to said transmitter;
67. The method of programming a sensor transmitter/transmitter of Step 65 wherein in step "d" there is included the extra step of providing input means for externally inputting said security/randomization bit.
68. The method of programming a sensor transmitter/transmitter of Claim 65 wherein, once the device ID/address is programmed with the transmitter, said programming button for generating said random number generator feature is configured to reprogram to allow said switch to be utilized to program the spread spectrum code or frequency channel or the like, by depressing said button in increments for selecting the desired channel.
69. The method of programming a sensor transmitter/transmitter of Claim 65, wherein there is provided the additional step of the transmitter type code is transferred from the transmitter to said receiver for programming of said receiver.
70. The method of Claim 65, wherein there is included the further step of said sensor transmitter transmitting a verification burst upon completion of programming, said verification burst comprising a digital data string verifying said sensor transmitter's address/ID Code, type code, property code, spread spectrum channel, and seed.
71. The method of Claim 70, wherein there is further included the step of monitoring for the unauthorized utlization of said spread spectrum code, and upon discerning unauthorized use, re-initiating programming of said spread spectrum code of said sensor/transmitters and said central processing unit to change said spread spectrum code to an new spread spectrum code.
72. The method of Claim 70, wherein there is further included the step of monitoring for the unauthorized utlization of said system code, and upon discerning unauthorized use, re-initiating programming of said system code of said sensor/transmitters and said central processing unit to change said system code to an new system code.
73. The method of Claims 65, 66, 67, 68, 69, or 70, wherein the data is transmitted via radio frequency having a frequency channel, and wherein there is further included the step of monitoring for the unauthorized utlization of said frequency channel, and upon discerning unauthorized use, re-initiating programming of said sensor/transmitters and said central processing unit to a new frequency channel.
74. The method of programming an array of sensor transmitters to communicate with a central processing unit in a secure fashion, comprising the steps of: a. providing a EEROM power means for selectively switching power to a sensor transmitter EEROM, limiting the operation of said EEROM to predetermined periods; b. placing a programming device in a programming mode; c. placing said sensor transmitter into a mode by which it can accept data via transmitted programming information from said programming device; d. utilizing said EEROM power means to switch on programming power to said sensor transmitter EEROM, placing said EEROM in a programming mode e. transmitting programming data from said programming device to said transmitter as part of a programming message; f. said sensor transmitter inputting said programming message and saving said programming data in memory; g. once programming ceases, utilizing said EEROM power means for switching off designated programming power to said EEROM, thereby conserving power. h. repeating steps b-h until all of said sensor transmitters in said array have been programmed.
75. The method of Claim 74 wherein there is included the further step of redundantly saving said seed and programming data in said EEROM, thereby providing a backup of said programming data upon corruption of part of the memory of said sensor transmitter, said EEROM further comprising error detection means for detecting errors in data stored in memory.
76. The method of Claim 75, wherein said EEROM power means comprises a logic gate whose logic high output is capable of conveying sufficient power to the EEROM.
77. The method of Claim 75, wherein said EEROM power means comprises a pass transistor in series with the EEROM's Ucc power lead.
78. The method of Claim 75, 76, or 77, wherein there is provided the additional step of providing EEROM limited programming means for limiting programming of said EEROM to that period when said programming device is providing power to said sensor transmitter.
79. The method of Claim 74, 75, 76, 77, or 78, wherein said sensor transmitter has programmed therein power conservation means, said power conservation means for switching said sensor transmitter into a power saving mode, and wherein there is included the additional steps in step "c" of said sensor transmitter waking up upon contacting said programming device, then said sensor transmitter, powering up, handshaking with said programming device, and then being placed into a programming mode to accept programming from said programming device.
80. The method of Claim 74, 75, 76, 77, 78, or 79, wherein said programming device transmits data to said sensor transmitter utilizing a magnetic loop/induction system, and is configured only to initiate programming sequence only upon exposure to a magnetic field exceeding a predetermined field strength, generated by said magnetic loop/induction system.
81. The method of Claim 80, wherein said sensor transmitter is configured to utilize said magnetic field generated by said magnetic loop/induction system to power said sensor transmitter. 82. The method of Claim 74, 75, or 76, wherein after step T of Claim 74, there is included the further step of said sensor transmitter transmitting a verification burst upon completion of programming, said verification burst verifying correct programming of said sensor transmitter.
83. The method of Claim 82 wherein there is included the additional step of verifying said sensor transmitter's programming via said verification burst, and upon verification, transmitting a JAM command addressed to the verified sensor transmitter, said JAM command altering the programmabillty of said sensor transmitter, preventing unauthorized programming or tampering of said verified transmitter.
84. The method of programming an array of sensor transmitters to communicate with a central processing unit in a secure fashion, comprising the steps of: a. providing a programming device having an magnetic loop coil; b. placing a programming device in a programming mode; c. providing a sensor transmitter with power conservation means, said power conservation means including a low power mode and a high power mode, and switching means for switching from a lower power mode to a high power mode, and visa-versa, said sensor transmitter further having magnetic field sensing means for sensing a predesignated magnetic field; d. setting said magnetic loop coil to emit a predesignated magnetic field strength, and placing said magnetic loop coil into the reception range of said magnetic field sensing means; e. upon sensing a predesignated magnetic field, said magnetic field sensing means switching said power conservation means from a low power mode to a high power mode, placing said sensor transmitter into a mode by which it can accept data via transmitted programming information from said programming device; f . transmitting programming data from said programming device to said transmitter as part of a programming message; g. said sensor transmitter inputting said programming message and saving said programming data in memory; h. once programming ceases, utilizing said power conservation means for switching said sensor to a lower power mode, thereby conserving power. i. repeating steps b-h until all of said sensor transmitters in said array have been programmed.
85. The method of Claim 84, wherein there is provided the additional step of said sensor transmitter utilize said magnetic field generated by said magnetic loop/induction system to power said sensor transmitter. 86. The method of Claim 84, wherein after step "g" of Claim 1, there is included the further step of said sensor transmitter transmitting a verification burst upon completion of programming, said verification burst verifying correct programming of said sensor transmitter.
87. The method of Claim 86, wherein there is included the additional step of verifying said sensor transmitter's programming via said verification burst, and upon verification, transmitting a JAM command addressed to the verified sensor transmitter, said JAM command altering the programmability of said sensor transmitter, preventing unauthorized, programming or tampering of said verified transmitter.
88. The method of Claims 84, 85, 86, 87, or 88, wherein said sensor transmitter further comprises transmit condition variance means for varying the speed and/or time period of transmission, and wherein there is further included the step of selectively varying the speed of transmission or selectively transmitting in a continuous mode, burst mode, parcel mode, or other desired transmission rate.
89. The method of Claims 84, 85, 86, 87, 88, or 89, wherein said sensor transmitter further comprises transmit condition variance means for varying the speed and/or time period of transmission, and wherein there is further included the step of selectively transmitting in a continuous mode, burst mode, or parcel mode.
90. The method of Claim 84, wherein there is provided the further step of providing self diagnostic means for said sensor transmitter for diagnosing the condition and operability of said sensor transmitter, and there is provided the step of selectively initiating said self diagnostic means, and verifying that said sensor transmitter is functioning within acceptable parameters.
91. The method of programming an array of sensor transmitters to communicate with a central processing unit in a secure fashion, comprising the steps of: a. providing a programming device having an optical data link; b. placing a programming device in a programming mode; c. providing a sensor transmitter with power conservation means, said power conservation means including a low power mode and a high power mode, and switching means for switching from a lower power mode to a high power mode, and visa-versa, said sensor transmitter further having an optical input and optical sensing means for sensing a optical emission; d. setting said optical data link of said programming device to emit a predesignated optical emission, and placing said optical input of said sensor into the reception range of said optical data link; e. upon sensing a predesignated optical emission, said optical sensing means switching said power conservation means from a low power mode to a high power mode, placing said sensor transmitter into a mode by which it can accept data via transmitted programming information from said programming device; f . transmitting programming data from said programming device to said transmitter as part of a programming message; g. said sensor transmitter inputting said programming message and saving said programming data in memory; h. once programming ceases, utilizing said power conservation means for switching said sensor to a lower power mode, thereby conserving power. i. repeating steps b-h until all of said sensor transmitters in said array have been programmed.
92. The method of Claim 91, wherein there is provided the additional step of said sensor transmitter utilizing said optical emission generated by said optical data link power said sensor transmitter.
93. The method of Claim 91, wherein after step "g" of Claim 91, there is included the further step of said sensor transmitter transmitting a verification burst upon completion of programming, said verification burst verifying correct programming of said sensor transmitter.
94. The method of Claim 93, wherein there is included the additional step of verifying said sensor transmitter's programming via said verification burst, and upon verification, transmitting a JAM command addressed to the verified sensor transmitter, said JAM command altering the programmability of said sensor transmitter, preventing unauthorized programming or tampering of said verified transmitter.
95. The method of Claims 91, 92, 93, or 94, wherein said sensor transmitter further comprises transmit condition variance means for varying the speed of transmission, and there is included the additional step of selectively varying the speed of transmission.
96. The method of Claims 91, 92, 93, or 94, wherein said sensor transmitter further comprises transmit condition variance means for varying the time period of transmission, and wherein there is included the step of selectively transmitting in a continuous mode, burst mode, parcel mode, or other desired transmission rate.
97. The method of Claims 95 or 96, wherein there is provided the further step of providing self diagnostic means for said sensor transmitter for diagnosing the condition and operability of said sensor transmitter, and there is provided the step of selectively initiating said self diagnostic means, and verifying that said sensor transmitter is functioning within acceptable parameters.
AMENDED CLAIMS
[received by the International Bureau on 17 October 1995 (17.10.95); original claims 3, 4, 6, 7, 10, 11, 13, 15, 19-25, 34-36, 40, 79, 80, 88, 89 and 97 amended; remaining claims unchanged ( 16 pages )]
1 The method of programming an array of sensor transmitters to communicate with a central processing unit in a secure fashion, compπsing the steps of a placing a programming device in a programming mode, selectively generating a seed, and communicating said seed into the memory of said central processing unit and said programming device, said seed to be utilized in the validation of data transmitted from said sensor transmitters to said central processing unit, providing a unique operational code for said sensor transmitter array, b placing said programming device within the reception range of a sensor transmitter, c placing said sensor transmitter into a mode by which it can accept data via transmitted programming information from said programming device, d transmitting said seed from said programming device to said transmitter as part of a programming message, e said sensor transmitter inputting said programming message and saving said seed in memory, f said sensor transmitter utilizing said seed to code digital data bits transmitted from said sensor transmitter to said central processor unit, said central processor unit programmed to validate said data upon receipt of said code, and reject digital data received which does is not coded by said seed, thereby providing an operational code for said array site, g repeating steps b-f until ail of said sensor transmitters in said array have been programmed
2 The method of Claim 1, wherein said sensor transmitters and said central processor unit utilize the CRC (cyclic redundancy check) coding method
3 The method of Claim 1 , wherein in step "a" there is provided the additional step of said programming device appending to said data stnng containing said seed, and sending to said sensor transmitter and central processor unit, the sensor transmitter address/ID code, type code, system code, property code, and spread spectrum channel
4 The method of Claim 1, wherein after step "f' of Claim 1, there is included the further step of said sensor transmitter transmitting a verification burst upon completion of programming, said verification burst comprising a digital data stπng verifying said sensor transmitter's address/ID Code, type code, property code, spread spectrum channel, and seed
5 The method of Claim 4, wherein there is included the additional step of verifying said sensor transmitter's programming and upon verification transmitting a JAM command addressed to the verified sensor transmitter, said JAM command atteπng the programmability of said sensor transmitter, preventing unauthorized programming or tampering of said venfied transmitter
6 The method of Claim 1, wherein said sensor transmitter has provided therein EEROM, and step "e" includes the further step of redundantly saving said seed and programming data in said
EEROM, thereby providing a backup of said programming data upon corruption of part of the memory of said sensor transmitter, said EEROM further compπsing error detection means for detecting errors in data stored in memory
7 The method of Claim 6, wherein said sensor transmitter has provided therein EEROM, and there is further provided the additional step of utilizing a power means for limiting the operation of said
EEROM
8 The method of Claim 7, wherein said power means compπses a logic cage whose logic high output is capable of conveying sufficient power to the EEROM
9 The method of Claim 7, wherein said power means comprises a pass transistor in seπes with the EEROM's Ucc power lead
10 The method of Claim 9, wherein there is provided the additional step of providing EEROM limited programming means for limiting programming said EEROM to that penod when said programming device is providing power to said sensor transmitter
11 The method of Claim 1, wherein in step "f" of Claim 1, said digital data bits are coded by appending said seed to said digital data bits, and wherein said central processor unit validates or rejects received upon detection of said seed stnng appended to said digital data bits
12 The method of Claims 1, 2, 3, 4, 5, 6, 7, 8, 9, 10, or 11, wherein in step "f of Claim 1, said digital data bits are coded and decoded by applying a scrambling algorithm utilizing said seed
13 The method of Claims 1, 2, 3, 4, 5, 6, 7, 8, 9, 10, or 11 , wherein said programming device transmits data to said sensor transmitter utilizing a magnetic loop/induction system, and is configured only to initiate programming sequence only upon exposure to a magnetic field exceeding a predetermined field strength, generated by said magnetic loop/induction system 14 The method of Claim 13, wherein said sensor transmitter is configured to utilize said magnetic field generated by said magnetic loop/induction system to power said sensor transmitter
15 The method of Claims 1, 2, 3, 4, 5, 6, 7, 8, 9, 10, or 11, wherein said programming device transmits data to said sensor transmitter utilizing an optical linkage, and is configured only to initiate programming sequence only upon exposure to light exceeding a predetermined parameter generated by said optical linkage
16 The method of Claim 15, wherein said predetermined parameter is established by the bnghtness of said light
17 The method of Claim 15, wherein said predetermined parameter is established by the frequency of said light
52. The method of programming a sensor transmitter in a secure manner, compnsmg the steps of: a. providing sensor transmitter identification and function information comprising programming data bits; b. applying a scrambling algorithm to said programming data bits, producing security/randomization bits, appending said security/randomization bits to said programming data bits, forming a programming message having programming data bits and security/randomization bits; c. providing a sensor transmitter containing in memory a scrambling algorithm compatible to said scrambling algorithm in step "b"; d. transferring said programming message to said sensor transmitter, forming an incoming programming message to said sensor transmitter, e said sensor transmitter applying said scrambling algonthm in said memory to said incoming programming data bits in said incoming programming message, providing a scrambling result; f. comparing said scrambling result to the security /randomization bits appended to said programming data; g upon a correct match of said scrambling result with said secuπty/randomization bits, said transmitter accepting said data bits in said incoming programming message as from a valid, secure programmer. h. sending a coded JAM command to said sensor transmitter, said sensor transmitter comparing said JAM command with said programming message and, upon veπfying a match, said sensor transmitter initiating a means to disconnect the programming connection, preventing further programming of said sensor transmitter 53 The method of Claim 52 whereby the linking of said programming station to said sensor transmitter is accomplished magnetically or optically
54 The method of claim 52, whereby said scrambling algonthm may be alterable
55 The method of Claim 52, wherein there is provided the additional step in step "b" of encrypting said programming data bits, and in step "e" said sensor transmitter decrypting said encrypted programming data bits
56 The method of Claim 52, wherein there is included after step "g" the additional step of said transmitter sending a verification burst to the programmer
57 The method of Claim 52, said programming message in step "b" is stored on a bar code
58 The method of Claim 52, wherein said identification and function information in step "a" is stored on a magnetic strip
59 The method of Claim 52, wherein said programming station is portable
60 The method of Claim 52, wherein said programming station is part of a control panel
61 The method of Claim 52, wherein there is included the further step of said sensor transmitter transmitting a veπfication burst upon completion of programming, said verification burst compπsing a digital data stnng veπfying said sensor transmitter's address/ID Code, type code, property code, spread spectrum channel, and seed
62 The method of Claim 61, wherein there is further included the step of monitonng for the unauthoπzed utlization of said spread spectrum code, and upon discerning unauthoπzed use, re¬ initiating programming of said spread spectrum code of said sensor/transmitters and said central processing unit to change said spread spectrum code to an new spread spectrum code
63 The method of Claim 61, wherein there is further included the step of monitoring for the unauthoπzed utlization of said system code, and upon discerning unauthoπzed use, re-initiating programming of said system code of said sensor/transmitters and said central processing unit to change said system code to an new system code
64 The method of Claims 52, 53, 54, 55, 56, 57, 58, 59, 60, or 61 wherein the data is transmitted via radio frequency having a frequency channel, and wherein there is further included the step of monitoring for the unauthorized utlization of said frequency channel, and upon discerning unauthoπzed use, re-initiating programming of said sensor/transmitters and said central processing unit to a new frequency channel
65 A method of programming a sensor transmitter in a secure fashion, compπsing the steps of a plaαng an unprogrammed sensor transmitter in near proximity to an. unprogrammed system receiver/panel/programming device, b said receiver set into a mode by which it can accept programming data via transmitted programming message from said sensor transmitter, c limiting the signal strength of said sensor transmitter to a near proximity of the receiver, d selectively generating security/randomization bits for said sensor transmitter, and transmitting said bits to said receiver, e said receiver imputing programming message and determining if such a device ID/address already exists in the system, f if said new device ID/address is acceptable it becomes internally associated by the system receiver/panel/programming device with said sensor transmitter, g if the new device ID/address is not acceptable the receiver or system receiver/panel/programming device so makes an appropπate indication, h steps d-g are repeated until step h is met, once met the transmitter is removed from the programming mode
66 The method of programming a sensor transmitter/transmitter of Step 65, wherein after step "g" there is provided the additional step of said receiver inputting said transmission and appending said secunty/randomization bit to programming data including new device ID/address, forming a programming message, and sending said programming message to said transmitter,
67 The method of programming a sensor transmitter/transmitter of Step 65 wherein in step "d" there is included the extra step of providing input means for externally inputting said secuπty/randomization bit
68 The method of programming a sensor transmitter/transmitter of Claim 65 wherein, once the device ID/address is programmed with the transmitter, said programming button for generating said random number generator feature is configured to reprogram to allow said switch to be utilized to program the spread spectrum code or frequency channel or the like, by depressing said button in increments for selecting the desired channel 69 The method of programming a sensor transmitter/transmitter of Claim 65, wherein there is provided the additional step of the transmitter type code is transferred from the transmitter to said receiver for programming of said receiver
70 The method of Claim 65, wherein there is included the further step of said sensor transmitter transmitting a venfication burst upon completion of programming, said verification burst composing a digital data stnng veπfying said sensor transmitter's address/ID Code, type code, property code, spread spectrum channel, and seed
71 The method of Claim 70, wherein there is further included the step of monitonng for the unauthoπzed utlization of said spread spectrum code, and upon discerning unauthorized use, re- initiating programming of said spread spectrum code of said sensor/transmitters and said central processing unit to change said spread spectrum code to an new spread spectrum code
72 The method of Claim 70, wherein there is further included the step of monitonng for the unauthorized utlization of said system code, and upon discerning unauthonzed use, re-initiating programming of said system code of said sensor/transmitters and said central processing unit to change said system code to an new system code
73 The method of Claims 65, 66, 67, 68, 69, or 70, wherein the data is transmitted via radio frequency having a frequency channel, and wherein there is further included the step of monitonng for the unauthoπzed utlization of said frequency channel, and upon discerning unauthoπzed use, re-initiating programming of said sensor/transmitters and said central processing unit to a new frequency channel
74 The method of programming an array of sensor transmitters to communicate with a central processing unit in a secure fashion, compπsing the steps of a providing a EEROM power means for selectively switching power to a sensor transmitter EEROM, limiting the operation of said EEROM to predetermined periods, b plaαng a programming device in a programming mode, c placing said sensor transmitter into a mode by which it can accept data via transmitted programming information from said programming device d utilizing said EEROM power means to switch on programming power to said sensor transmitter EEROM placing said EEROM in a programming mode e transmitting programming data from said programming device to said transmitter as part of a programming message, f said sensor transmitter inputting said programming message and saving said programming data in memory, g once programming ceases, utilizing said EEROM power means for switching off designated programming power to said EEROM, thereby conserving power h repeating steps b-h until all of said sensor transmitters in said array have been programmed
75 The method of Claim 74 wherein there is included the further step of redundantly sauing said seed and programming data in said EEROM, thereby providing a backup of satd programming data upon corruption of part of the memory of said sensor transmitter, said EEROM further comprising error detection means for detecting errors in data stored in memory
76 The method of Claim 75, wherein said EEROM power means compnses a logic cage whose logic high output is capable of conveying sufficient power to the EEROM
77 The method of Claim 75, wherein said EEROM power means compnses a pass transistor in series with the EEROM's Ucc power lead
78 The method of Claim 75, 76, or 77, wherein there is provided the additional step of providing EEROM limited programming means for limiting programming of said EEROM to that peπod when said programming device is providing power to said sensor transmitter
79 The method of Claims 74, 75, 76, or 77, wherein said sensor transmitter has programmed therein power conservation means, said power conservation means for switching said sensor transmitter into a power saving mode, and wherein there is included the additional steps in step "c" of said sensor transmitter waking up upon contacting said programming device, then said sensor transmitter, powering up, handshaking with said programming device, and then being placed into a programming mode to accept programming from said programming device
80 The method of Claims 74, 75, 76, or 77, wherein said programming device transmits data to said sensor transmitter utilizing a magnetic loop/induction system, and is configured only to initiate programming sequence only upon exposure to a magnetic field exceeding a predetermined field strength, generated by said magnetic loop/induction system
81 The method of Claim 80, wherein said sensor transmitter is configured to utilize said magnetic field generated by said magnetic loop/induction system to power said sensor transmitter
82 The method of Claim 74, 75, or 76, wherein after step of Claim 74, there is included the further step of said sensor transmitter transmitting a veπfication burst upon completion of programming said verification burst verifying correct programming of said sensor transmitter
83 The method of Claim 82 wherein there is included the additional step of venfymg said sensor transmitter's programming via said veπfication burst, and upon verification, transmitting a JAM command addressed to the venfied sensor transmitter, said JAM command altering the programmability of said sensor transmitter, preventing unauthoπzed programming or tampeπng of said verified transmitter
84 The method of programming an array of sensor transmitters to communicate with a central processing unit in a secure fashion, comprising the steps of a providing a programming device having an magnetic loop coil, b placing a programming device in a programming mode, c providing a sensor transmitter with power conservation means, said power conservation means including a low power mode and a high power mode, and switching means for switching from a lower power mode to a high power mode, and visa-versa, said sensor transmitter further having magnetic field sensing means for sensing a predesignated magnetic field, d setting said magnetic loop coil to emit a predesignated magnetic field strength, and placing said magnetic loop coil into the reception range of said magnetic field sensing means, e upon sensing a predesignated magnetic field, said magnetic field sensing means switching said power conservation means from a low power mode to a high power mode, placing said sensor transmitter into a mode by which it can accept data via transmitted programming information from said programming device, f transmitting programming data from said programming device to said transmitter as part of a programming message, g said sensor transmitter inputting said programming message and saving said programming data in memory, h once programming ceases, utilizing said power conservation means for switching said sensor to a lower power mode, thereby conserving power i repeating steps b-h until all of said sensor transmitters in said array have been programmed
85 The method of Claim 84, wherein there is provided the additional step of said sensor transmitter utilize said magnetic field generated by said magnetic loop/induction system to power said sensor transmitter
86 The method of Claim 84, wherein after step "g" of Claim 1 there is included the further step of said sensor transmitter transmitting a veπfication burst upon completion of programming, said venfication burst verifying correct programming of said sensor transmitter
87 The method of Claim 86, wherein there is included the additional step of veπfying said sensor transmitter's programming via said verification burst, and upon verification, transmitting a JAM command addressed to the veπfied sensor transmitter, said JAM command alteπng the programmability of said sensor transmitter, preventing unauthorized programming or tampering of said verified transmitter
88 The method of Claims 84, 85, 86, or 87, wherein said sensor transmitter further compnses transmit condition vaπance means for varying the speed and/or time period of transmission, and wherein there is further included the step of selectively varying the speed of transmission or selectiively transmitting in a continuous mode, burst mode, parcel mode, or other desired transmission rate
89 The method of Claims 84, 85, 86, or 87, wherein said sensor transmitter further compnses transmit condition vaπance means for varying the speed and/or time penod of transmission, and wherein there is further included the step of selectiively transmitting in a continuous mode, burst mode, or parcel mode
90 The method of Claim 84, wherein there is provided the further step of providing self diagnostic means for said sensor transmitter for diagnosing the condition and operability of said sensor transmitter, and there is provided the step of selectively initiating said self diagnostic means, and veπfying that said sensor transmitter is functioning within acceptable parameters
91 The method of programming an array of sensor transmitters to communicate with a central processing unit in a secure fashion, comprising the steps of a providing a programming device having an optical data link, b placing a programming device in a programming mode, c providing a sensor transmitter with power conservation means, said power conservation means including a low power mode and a high power mode, and switching means for switching from a lower power mode to a high power mode, and visa-versa said sensor transmitter further having an optical input and optical sensing means for sensing a optical emission, d setting said optical data link of said programming device to emit a predesignated optical emission, and placing said optical input of said sensor into the reception range of said optical data link, e upon sensing a predesignated optical emission, said optical sensing means switching said power conservation means from a low power mode to a high power mode, placing said sensor transmitter into a mode by which it can accept data via transmitted programming information from said programming device, f transmitting programming data from said programming device to said transmitter as part of a programming message, g said sensor transmitter inputting said programming message and saving said programming data in memory, h once programming ceases, utilizing said power conservation means for switching said sensor to a lower power mode, thereby conserving power i repeating steps b-h until all of said sensor transmitters in said array have been programmed
92 The method of Claim 91, wherein there is provided the additional step of said sensor transmitter utilizing said optical emission generated by said optical data link power said sensor transmitter
93 The method of Claim 91, wherein after step "g" of Claim 91, there is included the further step of said sensor transmitter transmitting a veπfication burst upon completion of programming, said veπfication burst veπfying correct programming of said sensor transmitter
94 The method of Claim 93, wherein there is included the additional step of veπfying said sensor transmitter's programming via said veπfication burst, and upon veπfication, transmitting a JAM command addressed to the verified sensor transmitter, said JAM command alteπng the programmability of said sensor transmitter, preventing unauthoπzed programming or tampeπng of said veπfied transmitter
95 The method of Claims 91, 92, 93, or 94, wherein said sensor transmitter further compnses transmit condition variance means for varying the speed of transmission, and there is included the additional step of selectively varying the speed of transmission
96 The method of Claims 91 , 92, 93, or 94, wherein said sensor transmitter further comprises transmit condition variance means for varying the time penod of transmission, and wherein there is included the step of selectively transmitting in a continuous mode, burst mode, parcel mode, or other desired transmission rate
97 The method of Claim 96 wherein there is provided the further step of providing self diagnostic means for said sensor transmitter for diagnosing the condition and operability of said sensor transmitter, and there is provided the step of selectively initiating said self diagnostic means, and verifying that said sensor transmitter is functioning within acceptable parameters.