Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

System and method for providing configurable security monitoring utilizing an integrated information system

a security monitoring and information system technology, applied in the field of security monitoring networks, can solve the problems of inability to integrate security data from different monitoring device types to affect system reporting and control, the use of dedicated monitoring services is generally prohibitively expensive, and the availability of security guards is not available to a majority of individuals and businesses

Inactive Publication Date: 2012-11-22
VIVINT INC
View PDF0 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Benefits of technology

The present invention provides an integrated information system that can monitor and control access to a variety of devices and information sources in a network. The system includes a premises server and a central server capable of processing data from multiple premises servers. The premises server collects and presents monitoring device data to the central server, which uses logical rules to determine if the data violates any rules and generates outputs to authorized users or takes appropriate actions based on the evaluation of the rules. The technical effects of the invention include improved security and control over information distribution and access control.

Problems solved by technology

While the conventional art generally discloses utilizing multiple monitoring devices to perform various functions, conventional systems are deficient in data management functionality and integration.
Security data from different monitoring device types is generally not integrated to affect the system reporting and control.
The use of dedicated monitoring services, such as security guards is generally prohibitively expensive and unavailable for a majority of individuals and businesses.
Additionally, if the guard is distracted, absent or inattentive, a security event may go unreported.
Furthermore, the monitoring device data, such as the CCTV data, is typically available only to the dedicated premises monitor and cannot be utilized concurrently by additional users, such as a remote monitor, a quality control supervisor, the owner of the premises, or emergency or public safety authorities.
Moreover, a single security guard may not be capable of processing all of the possible monitoring data sources simultaneously, thereby reducing the effectiveness of multiple monitoring devices.
However, most external monitoring systems have a limited effectiveness in being unable to extensively provide and / or review detailed security information.
For example, most conventional external monitoring systems cannot incur the expense of providing a sufficient amount of communication bandwidth to transmit continuous video / audio feeds from every monitored premises.
In a vast majority of cases, the alarm is false and the premises owner incurs a fine for having the authorities verify the incident.
Additionally, in the event of an actual emergency, the monitoring service cannot provide the public safety authorities with sufficient information to assess the situation with monitoring devices, thereby putting the authorities at greater risk.
In both cases, the monitoring service likely cannot provide the information to the user on a wide scale basis.
Generally however, these systems are directed towards a combination of video surveillance and are limited into being processed solely for the detection of an intrusion or the verification of an intrusion.
These systems generally cannot accept additional non-security information inputs that relate generally to the management of the premises and that are outside of the scope of conventional security monitoring.
Moreover, these systems are deficient in that the data cannot be processed concurrently or distributed to multiple authorized users.
In addition to the above-mentioned deficiencies in the conventional art, some monitoring systems, either with a on-premises guard or an external monitor, are further deficient in creating an uncomfortable environment by monitoring (and often recording) on a continuous basis.
However, one skilled in the relevant art will appreciate that the constant monitoring of a public restroom creates an uncomfortable environment for patrons utilizing the facilities during non-emergencies.
Additionally, continuous monitoring of areas not prone to have a high rate of emergencies quickly becomes expensive.
For example, the constant monitoring of a parking lot during typically off-peak hours presents a great expense to a parking lot provider.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • System and method for providing configurable security monitoring utilizing an integrated information system
  • System and method for providing configurable security monitoring utilizing an integrated information system
  • System and method for providing configurable security monitoring utilizing an integrated information system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0033] As described above, aspects of the present invention are embodied in a World Wide Web (the “WWW” or “web”) site accessible via the Internet. As is well known to those skilled in the art, the term “Internet” refers to the collection of networks and routers that use the Transmission Control Protocol / Internet Protocol (“TCP / IP”) to communicate with one another. A representative section of the Internet 20 is shown in FIG. 1, in which a plurality of local area networks (“LANs”) 24 and a wide area network (“WAN”) 26 are interconnected by routers 22. The routers 22 are special purpose computers used to interface one LAN or WAN to another. Communication links within the LANs may be twisted wire pair, or coaxial cable, while communication links between networks may utilize 56 Kbps analog telephone lines, 1 Mbps digital T-1 lines, 45 Mbps T-3 lines or other communications links known to those skilled in the art. Furthermore, computers and other related electronic devices can be remotel...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A system and method for implementing an integrated information system are provided. A premises server is in communication with a variety of information sources that produce monitoring data for a premises. The premises server collects, presents, and transmits the monitoring device data to a central server capable of processing data from multiple premises servers. The central server receives the data and traverses one or more logical rule sets to determine whether the inputted data violates the rules. Based on an evaluation of the rules, the central server generates outputs in the form of communication to one or more authorized users via a variety of communication mediums and devices and / or the instigation of a variety of acts corresponding to the evaluation of the rules.

Description

CROSS-REFERENCES TO RELATED APPLICATIONS [0001] This application is a continuation-in-part of U.S. patent application Ser. No. 09 / 825,506 entitled SYSTEM AND METHOD FOR PROVIDING CONFIGURABLE SECURITY MONITORING UTILIZING AN INTEGRATED INFORMATION SYSTEM and filed on Apr. 3, 2001. U.S. application Ser. No. 09 / 825,506 is incorporated by reference herein. This application further claims the benefit of U.S. Provisional Application No. 60 / 281,258 filed on Apr. 3, 2001. U.S. Provisional Application No. 60 / 281,258 is incorporated by reference herein.FIELD OF THE INVENTION [0002] The present invention relates generally to a security monitoring network and, in particular, to a system and method for providing variable, remote monitoring of a locally detected event utilizing an integrated information system. BACKGROUND OF THE INVENTION [0003] Generally described, electronic security systems are configured to provide a wide range of security services in both residential and commercial settings...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(United States)
IPC IPC(8): G06F15/16G06F15/173H04L12/24H04L29/06H04L29/08
CPCH04L41/0893H04L41/18H04L41/22H04L69/329H04L63/1416H04L67/00H04L63/10H04L41/0894
Inventor ALEXANDER, BRUCETALLEY, PAULHICKS, JEFFREY
Owner VIVINT INC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products