WO2002027518A9 - System and method for providing configurable security monitoring utilizing an integrated information system - Google Patents
System and method for providing configurable security monitoring utilizing an integrated information systemInfo
- Publication number
- WO2002027518A9 WO2002027518A9 PCT/US2001/042360 US0142360W WO0227518A9 WO 2002027518 A9 WO2002027518 A9 WO 2002027518A9 US 0142360 W US0142360 W US 0142360W WO 0227518 A9 WO0227518 A9 WO 0227518A9
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- monitoring device
- data
- recited
- rules
- monitoring
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/22—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks comprising specially adapted graphical user interfaces [GUI]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/08—Configuration management of networks or network elements
- H04L41/0894—Policy-based network configuration management
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/18—Delegation of network management function, e.g. customer network management [CNM]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L43/00—Arrangements for monitoring or testing data switching networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0227—Filtering policies
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0227—Filtering policies
- H04L63/0263—Rule management
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/02—Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/02—Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]
- H04L67/025—Protocols based on web technology, e.g. hypertext transfer protocol [HTTP] for remote control or remote monitoring of applications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/08—Protocols specially adapted for terminal emulation, e.g. Telnet
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/34—Network arrangements or protocols for supporting network services or applications involving the movement of software or configuration parameters
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/50—Network services
- H04L67/75—Indicating network or usage conditions on the user display
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L69/00—Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
- H04L69/30—Definitions, standards or architectural aspects of layered protocol stacks
- H04L69/32—Architecture of open systems interconnection [OSI] 7-layer type protocol stacks, e.g. the interfaces between the data link level and the physical level
- H04L69/322—Intralayer communication protocols among peer entities or protocol data unit [PDU] definitions
- H04L69/329—Intralayer communication protocols among peer entities or protocol data unit [PDU] definitions in the application layer [OSI layer 7]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L43/00—Arrangements for monitoring or testing data switching networks
- H04L43/16—Threshold monitoring
Definitions
- the present invention relates generally to a security monitoring network and, in particular, to a system and method for providing variable, remote monitoring of a locally detected event utilizing an integrated information system.
- electronic security systems are configured to provide a wide range of security services in both residential and commercial settings.
- the types of monitoring devices utilized by a particular security system to perform the system service depend greatly on the sophistication of the security system configuration and the overall function of the security system.
- a majority of conventional security systems include intrusion detecting devices, such as door or window contacts, glass break detectors, motion detectors and the like.
- closed-circuit television In a commercial setting, closed-circuit television
- CCTV badging systems
- asset tracking asset tracking
- access control devices and sensors are also utilized.
- the configuration of the security system is based on the function the system will serve.
- a typical electronic security system may be used to provide smoke, fire, and/or carbon monoxide detection. Accordingly, the system would utilize one or more smoke, fire and/or carbon monoxide detectors within one or more locations on the premises.
- the security system may also be utilized to provide motion or access detection as well as general video and audio monitoring of the premises. Accordingly, the system would utilize ingress or egress sensors and/or video cameras within the premises.
- the primary functions of the security guard may include direct visual surveillance, the monitoring of security cameras or other security devices, a reception or access control and authorization function, and incident response.
- a security guard may also be used to monitor a number of CCTV screens arranged in a bank formation. Accordingly, the security guard accepts the variety of inputs and makes a determination of a security alert, such as an unauthorized entrance.
- monitoring device data such as the CCTV data
- additional users such as a remote monitor, a quality control supervisor, the owner of the premises, or emergency or public safety authorities.
- a single security guard may not be capable of processing all of the possible monitoring data sources simultaneously, thereby reducing the effectiveness of multiple monitoring devices.
- Another security system configuration utilizes external monitors to provide the security services.
- external monitoring systems are more cost effective than a dedicated on-premises monitor.
- most external monitoring systems have a limited effectiveness in being unable to extensively provide and/or review detailed security information.
- most conventional external monitoring systems cannot incur the expense of providing a sufficient amount of communication bandwidth to transmit continuous video/audio feeds from every monitored premises. Accordingly, if the external monitoring service detects an unauthorized entry into a premises, such as through a signal from a detecting device, the monitoring service typically dispatches emergency or public safety authorities to investigate and determine the extent of the detected event. In a vast majority of cases, the alarm is false and the premises owner incurs a fine for having the authorities verify the incident.
- the monitoring service cannot provide the public safety authorities with sufficient information to assess the situation with monitoring devices, thereby putting the authorities at greater risk.
- the remote monitoring service also cannot concurrently process the device information to multiple authorized users for various purposes. For example, a premises owner may need to access video data to locate a pet within the premises, while emergency or public safety personnel would need to access the same video data to identify the location of a victim. In both cases, the monitoring service likely cannot provide the information to the user on a wide scale basis.
- Some conventional security system configurations attempt to integrate at least some security monitoring devices to better detect alarm conditions f om a remote user.
- a security system monitor may detect an unauthorized entry from a motion detector and confirm it by utilizing a video camera.
- these systems are directed towards a combination of video surveillance and are limited into being processed solely for the detection of an intrusion or the verification of an intrusion.
- These systems generally cannot accept additional non-security information inputs that relate generally to the management of the premises and that are outside of the scope of conventional security monitoring.
- these systems are deficient in that the data cannot be processed concurrently or distributed to multiple authorized users.
- some monitoring systems are further deficient in creating an uncomfortable environment by monitoring (and often recording) on a continuous basis.
- the constant monitoring of a public restroom creates an uncomfortable environment for patrons utilizing the facilities during non-emergencies.
- continuous monitoring of areas not prone to have a high rate of emergencies quickly becomes expensive.
- the constant monitoring of a parking lot during typically off-peak hours presents a great expense to a parking lot provider. Accordingly, many parking lots are left to be monitored by attendants that may have a variety of functions, such as collection, access control, etc.
- FIGURE 1 is a block diagram of an Internet environment
- FIGURE 2 is a block diagram of an integrated information system in accordance with the present invention
- FIGURE 3 is a block diagram depicting an illustrative architecture for a premises server in accordance with the present invention
- FIGURE 4 is a block diagram depicting an illustrative architecture for a central server in accordance with the present invention
- FIGURE 5 is a flow diagram illustrative of a monitoring device data processing routine in accordance with the present invention.
- FIGURE 6 is a flow diagram illustrative of a device event processing subroutine in accordance with the present invention.
- FIGURES 7A and 7B are flow diagrams illustrating an asset/resource event processing subroutine in accordance with the present invention
- FIGURE 8 is illustrative of a screen display produced by a WWW browser enabling a user to review a monitoring device rule in accordance with the present invention
- FIGURE 9 is illustrative of a screen display produced by a WWW browser enabling a user to review integrated information system data logs in accordance with the present invention
- FIGURE 10 is an exemplary user interface screen display illustrating a message management interface in accordance with the present invention.
- FIGURE 11 is a flow diagram illustrative of a network access verification routine in accordance with the present invention.
- FIGURE 12 is a flow diagram illustrative of a bar code tracking routine in accordance with the present invention
- FIGURE 13 is a flow diagram illustrative of a asset identification routine in accordance with the present invention.
- FIGURE 14 is a flow diagram illustrative of a data packet transmission routine in accordance with the present invention.
- FIGURE 1 A representative section of the Internet 20 is shown in FIGURE 1, in which a plurality of local area networks (“LANs”) 24 and a wide area network
- WAN 26 are interconnected by routers 22.
- the routers 22 are special purpose computers used to interface one LAN or WAN to another. Communication links within the LANs may be twisted wire pair, or coaxial cable, while communication links between networks may utilize 56 Kbps analog telephone lines, 1 Mbps digital T-l lines, 45 Mbps T-3 lines or other communications links known to those skilled in the art. Furthermore, computers and other related electronic devices can be remotely connected to either the
- the Internet 20 comprises a vast number of such interconnected networks, computers, and routers and that only a small, representative section of the Internet 20 is shown in FIGURE 1.
- FIGURE 1 One skilled in the relevant art will appreciate that aspects of the present invention may be practiced on Internet networks, such as an
- the Internet has recently seen explosive growth by virtue of its ability to link computers located throughout the world. As the Internet has grown, so has the WWW.
- the WWW is a vast collection of interconnected or "hypertext" documents written in HyperText Markup Language ("HTML"), or other markup languages, that are electronically stored at "WWW sites" or "Web sites” throughout the Internet.
- HTML HyperText Markup Language
- a WWW site is a server connected to the Internet that has mass storage facilities for storing hypertext documents and that runs administrative software for handling requests for those stored hypertext documents.
- a hypertext document normally includes a number of hyperlinks, i.e., highlighted portions of text which link the document to another hypertext document possibly stored at a WWW site elsewhere on the Internet.
- Each hyperlink is associated with a Uniform Resource Locator ("URL") that provides the exact location of the linked document on a server connected to the Internet and describes the document.
- URL Uniform Resource Locator
- a hypertext document is retrieved from any WWW server, the document is considered to be retrieved from the WWW.
- a WWW server may also include facilities for storing and transmitting application programs, such as application programs written in the JAVA® programming language from Sun Microsystems, for execution on a remote computer.
- a WWW server may also include facilities for executing scripts and other application programs on the WWW server itself.
- a consumer or other remote consumer may retrieve hypertext documents from the
- a WWW browser such as Netscape's NAVIGATOR® or Microsoft's Internet Explorer, is a software application program for providing a graphical consumer interface to the WWW.
- the WWW browser accesses and retrieves the desired hypertext document from the appropriate WWW server using the URL for the document and a protocol known as HyperText Transfer Protocol ("HTTP").
- HTTP is a higher-level protocol than TCP/IP and is designed specifically for the requirements of the WWW. It is used on top of TCP/IP to transfer hypertext documents between servers and clients.
- the WWW browser may also retrieve application programs from the WWW server, such as JAVA applets, for execution on the client computer.
- An integrated information system 30 is a subscriber-based system allowing a number of monitoring devices within one or more premises to be processed at a single control location. Additionally, the data from the monitoring devices is processed according to one or more rules. The control location customizes output of the processed data to a number of ' authorized users dependent on the preferences and rights of the user. While the system of the present invention is utilized to integrate traditional security monitoring functions, it is also utilized to integrate any information input in a like manner.
- the integrated information system 30 includes a premises server 32 located on a premises.
- the premises server 32 communicates with one or more monitoring devices 34.
- the monitoring devices 34 can include smoke, fire and carbon monoxide detectors.
- the monitoring devices 34 can also include door and window access detectors, glass break detectors, motion detectors, audio detectors and/or infrared detectors.
- the monitoring devices 34 can include computer network monitors, voice identification devices, video cameras, still cameras, microphones and/or fingerprint, facial, retinal, or other biometric identification devices.
- the monitoring devices 34 can include conventional panic buttons, global positioning satellite (“GPS") locators, other geographic locators, medical indicators, and vehicle information systems.
- the monitoring devices 34 can also be integrated with other existing information systems, such as inventory control systems, accounting systems, or the like. It will be apparent to one skilled in the relevant art that additional or alternative monitoring devices 34 may be practiced with the present invention.
- the premises server 32 also communicates with one or more output devices 36.
- the output devices 36 can include audio speakers, display or other audio/visual displays.
- the output devices 36 may also include electrical or electro-mechanical devices that allow the system to perform actions.
- the output devices 36 can include computer system interfaces, telephone interfaces, wireless interfaces, door and window locking mechanisms, aerosol sprayers, and the like.
- the type of output device is associated primarily with the type of action the information system 30 produces. Accordingly, additional or alternative output devices 36 are considered to be within the scope of the present invention.
- the monitoring devices 34 and the output devices 36 can be linked together in a computer network environment in which multiple premises servers 32 work in parallel, sharing data and processes.
- FIGURE 3 is a block diagram depicting an illustrative architecture for a premises server 32.
- the premises server 32 includes many more components then those shown in FIGURE 3. However, it is not necessary that all of these generally conventional components be shown in order to disclose an illustrative embodiment for practicing the present invention.
- the premises server 32 includes a network interface 38 for connecting directly to a LAN or a WAN, or for connecting remotely to a LAN or WAN.
- the network includes the necessary circuitry for such a connection, and is also constructed for use with the TCP/IP protocol, the particular network configuration of the LAN or WAN it is connecting to, and a particular type of coupling medium.
- the premises server 32 may also be equipped with a modem for connecting to the Internet through a point to point protocol (“PPP”) connection or a serial line Internet protocol (“SLIP”) connection as known to those skilled in the art.
- PPP point to point protocol
- SLIP serial line Internet protocol
- the premises server 32 also includes a processing unit 40, a display 42, an input/output (I/O) interface 44 and a mass memory 46, all connected via a communication bus, or other communication device.
- the I/O interface 44 includes hardware and software components that facilitate interaction with a variety of the monitoring devices via a variety of communication protocols including TCP/IP, XI 0, digital I/O, RS-232, RS-485 and the like. Additionally, the I/O interface 44 facilitates communication via a variety of communication mediums including telephone land lines, wireless networks (including cellular, digital and radio networks), cable networks and the like. In an actual embodiment of the present invention, the I/O interface is implemented as a layer between the server hardware and software applications utilized to control the individual monitoring devices.
- the mass memory 46 generally comprises a RAM, ROM, and a permanent mass storage device, such as a hard disk drive, tape drive, optical drive, floppy disk drive, or combination thereof.
- the mass memory 46 stores an operating system 48 for controlling the operation of the premises server. It will appreciated that this component may comprises a general-purpose server operating system as is known to those skilled in the art, such as UNIX, LINUXTM, or Microsoft WINDOWS NT®.
- the memory also includes a WWW browser 50, such as Netscape's NAVIGATOR® or Microsoft's Internet Explorer browsers, for accessing the WWW.
- the mass memory 46 also stores program code and data for interfacing with various premises monitoring devices, for processing the monitoring device data and for transmitting the data to a central server. More specifically, the mass memory stores a device interface application 52 in accordance with the present invention for obtaining monitoring device data from a variety of devices and for manipulating the data for processing by the central server.
- the device interface application 52 comprises computer-executable instructions which, when executed by the premises server 32 obtains and transmits device data as will be explained below in greater detail.
- the mass memory 46 also stores a data transmittal application program 54 for transmitting the device data to a central server and to facilitate communication between the central server and the monitoring devices 34. The operation of the data transmittal application 54 will be described in greater detail below. It will be appreciated that these components may be stored on a computer-readable medium and loaded into the memory of the premises server using a drive mechanism associated with the computer-readable medium, such as a floppy, CD-ROM, DVD-ROM drive, or network drive.
- the premises server 32 is in communication with a central server 56.
- the central server 56 obtains various monitoring device data, processes the data and outputs the data to one or more authorized users.
- the communication between the central server 56 and the premises server 32 is remote and two-way.
- FIGURE 4 is a block diagram depicting an illustrative architecture for a central server 56.
- the central server 56 includes many more components then those shown in FIGURE 4. However, it is not necessary that all of these generally conventional components be shown in order to disclose an illustrative embodiment for practicing the present invention.
- the central server 56 includes a network interface 58 for connecting directly to a LAN or a WAN, or for connecting remotely to a LAN or WAN.
- the network interface includes the necessary circuitry for such a connection, and is also constructed for use with the TCP/IP protocol, the particular network configuration of the LAN or WAN it is connecting to, and a particular type of coupling medium.
- the central server 56 may also be equipped with a modem for connecting to the Internet 20.
- the central server 56 also includes a processing unit 60, a display 62 and a mass memory 64, all connected via a communication bus, or other communication device.
- the mass memory 64 generally comprises a RAM, ROM, and a permanent mass storage device, such as a hard disk drive, tape drive, optical drive, floppy disk drive, or combination thereof.
- the mass memory 64 stores an operating system 66 for controlling the operation of the central server. It will be appreciated that this component may comprises a general-purpose server operating system.
- the mass memory 64 also stores program code and data for interfacing with the premises devices, for processing the device data and for interfacing with various authorized users. More specifically, the mass memory 64 stores a premises interface application 68 in accordance with the present invention for obtaining data from a variety of monitoring devices and for communicating with the premises server.
- the premises interface application 68 comprises computer-executable instructions which, when executed by the central server 56, interfaces with the premises server 32 as will be explained below in greater detail.
- the mass memory 64 also stores a data processing application 70 for processing monitoring device data in accordance with rules maintained within the central server. The operation of the data processing application 70 will be described in greater detail below.
- the mass memory 64 further stores an authorized user interface application 72 for outputting the processed monitoring device data to a variety of authorized users in accordance with the security process of the present invention.
- the operation of the authorized user interface application 72 will be described in greater detail below. It will be appreciated that these components may be stored on a computer-readable medium and loaded into the memory of the central server using a drive mechanism associated with the computer-readable medium. It will be understood by one skilled in the relevant art that the premises server 32 may be remote from the premises or may omitted altogether. In such an alternative embodiment, the monitoring devices 34 transmit the monitoring data to a remote premises server 32 or alternatively, they transmit the monitoring data directly to the central server 56.
- the central database 74 includes a variety of databases including an event logs database 76, an asset rules database 78, a resource rules database 80, an asset inventory database 82, a resource inventory database 84, an event rules database 86 and an active events database 88.
- the utilization of the individual databases within the central database 74 will be explained in greater detail below.
- the central database 74 may be one or more databases, which may be remote from one another. Additionally, it will be further understood that one or more of the databases 74 may be maintained outside of the central server 56.
- the central server 56 communicates with one or more notification acceptors 90.
- the notification acceptors 90 include one or more authorized users. Each authorized user has a preference of notification means as well as rights to the raw and processed monitoring data.
- the authorized users include premises owners, security directors or administrators, on-site security guards, technicians, remote monitors (including certified and non-certified monitors), customer service representatives, emergency personnel and others.
- various user authorizations may be practiced with the present invention. Additionally, it will be further understood that one or more of the rules databases may be maintained outside of the central server.
- the central server 56 communicates with the notification acceptors 90 utilizing various communication devices and communication mediums.
- the devices include personal computers, hand-held computing devices, wireless application protocol enabled wireless devices, cellular or digital telephones, digital pagers, and the like.
- the central server 56 may communicate with these devices via the Internet 20 utilizing electronic messaging or Web access, via wireless transmissions utilizing the wireless application protocol, short message services, audio transmission, and the like.
- the specific implementation of the communication mediums may require additional or alternative components to be practiced. All are considered to be within the scope of practicing the present invention.
- the present invention facilitates the collection and processing of a variety of premises information for distribution to one or more authorized users in a highly extensible manner.
- the system of the present invention obtains monitoring data from any one of a variety of monitoring devices 34.
- the monitoring device data is categorized as asset data, resource data or event data.
- Asset data is obtained from a monitoring device corresponding to an identifiable object that is not capable of independent action.
- asset data includes data obtained from a bar code or transponder identifying a particular object, such as a computer, in a particular location.
- Resource data is obtained from a monitoring device corresponding to an identifiable object that is capable of independent action.
- resource ' data includes data from a magnetic card reader that identifies a particular person who has entered the premises.
- Event data is obtained from a monitoring device corresponding to an on/off state that is not correlated to an identifiable object.
- Event data is a default category for all of the monitoring devices.
- alternative data categorizations are considered to be within the scope of the present invention.
- the monitoring device data is obtained by the monitoring devices 34 on the premises server 32 and transmitted to the central server 56.
- the central server 56 receives the monitoring device data and processes the data according to a rules-based decision support logic.
- the central server 56 maintains databases 74 having logic rules for asset data, resource data and event data. Moreover, because the monitoring device data is potentially applicable to more than one authorized user, multiple rules may be applied to the same monitoring device data. In an alternative embodiment, the rules databases 74 may be maintained in locations remote from the central server 56.
- the central server 56 In the event the processing of the monitoring device rules indicates that action is required, the central server 56 generates one or more outputs associated with the rules.
- the outputs include communication with indicated notification acceptors 90 according to
- the monitoring device data rules For example, an authorized user- may indicate a hierarchy of communication mediums (such as pager, mobile telephone, land-line telephone) that should be utilized in attempting to contact the user.
- the rules may also indicate contingency contacts in the event the authorized user cannot be contacted. Additionally, the rules may limit the type and/or amount of data to which the user is allowed to access.
- the outputs can include the initiation of actions by the central server 56 in response to the processing of the rules.
- FIGURE 5 is a flow diagram illustrative of a device decision support process support routine 500 for processing the monitoring device data in accordance with the present invention.
- the central server 56 obtains an input from a monitoring device. In an actual embodiment of the present invention, the input is obtained from the premises server 32. Alternatively, the input may be received directly from the monitoring device 34 or the central server 56 may poll individual devices (or the premises server 32) for an input.
- the central server 56 identifies the device processing the data. The identification may be accomplished by determining a network address from which the input originated and which is assigned to the specific devices, or by reading other identification data that can be included with the data input.
- a test is performed to determine whether the device data includes intelligence data.
- the intelligence data includes data that characterizes the data as asset data or resource data, because the data contains information identifying the object. In contrast, data that does not contain any information identifying an object and is not considered intelligent. If the device is not determined to be intelligent or if the device cannot be identified, at block 508, an event log database 76 is updated to reflect the input data.
- the central server 56 processes the data according to a process device event subroutine. The routine 500 terminates at block 512.
- FIGURE 6 is a flow diagram illustrative of a process device event subroutine 600 in accordance with the present invention. At block 602, the central server 56 obtains the monitoring device rules.
- the monitoring device rules are stored in a database 86 in communication with the central server 56.
- the rules contain data indicating one or more ranges for determining a rule violation.
- a rule violation is an indication of an event occurrence for which a notification is required.
- the ranges correspond to the type of data produced by the monitoring device. For example, if a monitoring device 34 is capable of only two stages (e.g., on or off), the rule may indicate that existence of one stage, e.g. "on", is a violation.
- the rules may also include an indication that one or more monitoring device rules must also be considered before the rule is determined to be violated. For example, a rule corresponding to a glass break detector may indicate that a motion detector signal must be detected before the rule is violated.
- additional or alternative rule types are considered to be within the scope of the present invention.
- a test is performed to determine whether a device rule is found. If no rule is found, the process terminates at block 606. If, however, a device rule is found, at block 608 the central server 56 evaluates the rule according to the data received from the monitoring device 34.
- the rules may include preset or default rules maintained by the central server 56. Additionally, the rules may include independently created rules by one or more authorized users. Moreover, one or more authorized users may be given the authority to modify or update rules via a user interface.
- a test is performed to determine whether the device rule is violated. If the rule is violated, at block 612, the central server 56 creates a rule violation output.
- the rules violation output instructions are included in the rule.
- the instructions include a list of the authorized users to notify in the event of a rule violation and a hierarchy of which communication medium and devices should be utilized to contact each authorized user.
- the rules may be in the form of logical if/then statements implementing an iterative hierarchy for establishing communication with an authorized user.
- the instructions may also indicate the extent of the data that that authorized user has access to.
- the output may include the generation of a call to the premises owner's mobile device, the paging of an on-site monitor and a land-line telephone call to the public authorities.
- the central server may also maintain an output database indicating the output instructions corresponding to each rule.
- the communication from the central server 56 may be to a wireless computing device, such as a personal digital assistant, or mobile phone.
- the central server 56 maintains an output server for generating output to a wireless device.
- the output server would include a database for formatting the output to the specific requirements of a device selected by the notification acceptor 90.
- the output server may also maintain a standard image including a minimum set of display characteristics that match most mobile computing device displays.
- the rules violation output may be in the form of an output over a telecommunications or IP network.
- notification acceptor 90 request an audible notification
- text to speech components may be utilized to translate electronic data into an audible form. Accordingly, because the notification hierarchy may specify one or more notifications, the same electronic data is processed to allow for display by a first device and an audible play by a second device.
- the rules violation output may also instigate an integrated system response. For example, in the case of an intrusion, a dye may be sprayed on the intruder from an aerosol sprayer. Additionally, the system may sound an audible alarm and directly dial emergency personnel. In another example, if the system rules violation is a medical emergency, the central server 56 may call an ambulance, turn on lights within the premises, and unlock the doors to facilitate entry by the emergency personnel.
- the subroutine 600 terminates at block 614.
- the device data includes intelligence information
- the, intelligence is translated from the monitoring device data.
- the log event database 76 is updated to reflect the input data.
- the central server 56 processes the data according to a process asset/resource event subroutine.
- the routine 500 terminates at block 520.
- FIGURES 7A and 7B are flow diagrams illustrative of a process asset or resource event subroutine 700 in accordance with the present invention.
- a test is performed to determine whether the input signal is asset data. If the signal is identified as asset data, at block 704, the asset rules are obtained. In an actual embodiment of the present invention, the asset rules are maintained and retrieved from an asset rules database 78.
- a test is performed to determine whether an asset rule is found. If no asset rule is found for the asset, the monitoring device data is processed as a device event at block 708.
- the device event is processed as described above with respect to the device ' event processing subroutine 600 (FIGURE 6). In an illustrative embodiment of the present application, in the event the asset rule processing cannot be completed, the monitoring device is still processed as a device-level event.
- the asset rule contains data allowing the central server 56 to determine a rule violation.
- an asset rule may contain information indicating a requirement of a particular object (e.g., a computer) performing an action (e.g., logged into a network) for a violation.
- the asset rule may indicate that additional device, resource or asset rules may be considered prior to determining whether the rule has been violated.
- the rules may include preset rules maintained by the central server and user implemented/modified rules. If the rule has not been violated, the monitoring device data is processed as a device event at block 708.
- processing the rule as a both an asset and a device event allows for multiple purpose processing of the monitoring device data, such as the detection of a specific object and the detection of an object.
- the central server 56 reads a known asset inventory to identify the asset. In an actual embodiment of the present invention, central server maintains and reads from an asset inventory database 82.
- a test is performed to determine whether the asset is found in the asset inventory. If the asset is not found, the system defaults to processing the monitoring device data as a device event at block 708. If the asset is found in the asset inventory, at block 716, central server 56 outputs the asset violation.
- the asset rule contains instructions for generating output in the event of a rule violation to one or more authorized users.
- the instructions also contain a hierarchy of communication mediums and communication devices to attempt to contact the authorized user. Additionally, the instructions may contain alternative contact personnel if central server cannot contact the authorized user. Moreover, as explained above, the output may also instigate action by the integrated system.
- the monitoring device data is processed as a device event.
- a test is done to determine whether the inputted signal is resource data. If the signal is not identified as resource data, at block 720, the monitoring device data is processed as a device event. In an actual application of the present invention, the device event is processed as described above with respect to the device event processing subroutine 600 (FIGURE 6). If the signal is identified as resource data, at block 722, the resource rules are obtained. In an actual embodiment of the present invention, the resource rules are maintained and retrieved from a resource rules database 80. At block 724, a test is performed to determine whether a resource rule is found. If no resource rule is found for the resource, the monitoring device data is processed as a device event at block 726.
- a test is performed to determine whether the resource rule is violated.
- the resource rule contains data allowing the central server to determine a rule violation. Additionally, the resource rule may indicate that additional device, resource or asset rules may be considered prior to determining whether the rule has been violated. If the rule has not been violated, at block 726, the monitoring device data is processed as a device event. It will be generally understood by one skilled in the relevant art, that processing the rule as a both a resource and a device event allows for multiple purpose processing of the monitoring device data.
- the central server 56 reads a known resource inventory to identify the resource.
- central server 56 maintains and reads from a resource inventory database 84.
- a test is performed to determine whether the resource is found in the resource inventory. If the resource is not found, the system defaults to processing the monitoring device data as a device event at block 726. If the resource is found in the resource inventory, at block 734, central server 56 outputs the resource violation.
- the resource rule contains instructions for generating output in the event of a rule violation to one or more authorized users.
- the instructions also contain a hierarchy of communication mediums and communication devices to attempt to contact the authorized user. Additionally, the instructions may contain alternative contact personnel if central server 56 cannot contact the authorized user. Moreover, as explained above, the output may also instigate action by the integrated system.
- the monitoring device data is processed as a device event.
- FIGURES 8, 9, and 10. are exemplary screen displays illustrative of various user interfaces relating to various aspects of the integrated information system 10 of the present invention.
- the various user interfaces allows an authorized system user to perform a variety of tasks associated with the integrated information system 10 including, but not limited to, installing new monitoring devices 34 or output devices 36, generating or modifying device, asset and resources rules, and/or reviewing collected data.
- One skilled in the relevant art will appreciate that a variety of user interfaces may be utilized in conjunction with the present invention and that the disclosed embodiments are illustrative and should not be construed as limiting.
- portions of a user interface with the integrated information system 30 are displayed remotely from one or more of the servers.
- an authorized user such as the premises owner, may be available to view an event violation remotely through the use of a standard Internet Web browser based connection.
- a remote monitoring service may be given access to control one or more of the monitoring devices 34 via a Web browser based connection or via a direct communication line.
- security personnel may review real time monitoring device 34 data via a wireless communication device.
- the user interface provided to the authorized user may conform to the function, being performed, the limits of a device, or the communication medium transmitting the data.
- FIGURE 8 is illustrative of a screen display 92 produced by a WWW browser enabling a user to review a monitoring device rule in accordance with the present invention.
- the screen display 92 includes a field 94 for identifying a name for the rule, one or more fields 96 identifying rule attributes, and one or more fields 98 identifying the notification attributes in the event there is a rule violation.
- an authorized user may review the rule detail, and may also modify or create new rules by completing the associated fields.
- FIGURE 9 is illustrative of a screen display 100 produced by a WWW browser enabling a user to review integrated information system 10 data logs in accordance with the present invention.
- the integrated information system 30 may keep a central log for all event, device and resource violations.
- the screen display 100 provides the user with a table 102 of all rules violation data collected by the integrated information system 10.
- the table 102 includes a variety of records 104 that include a premises identifier field 105, a time stamp field 106, a device location field 107, a monitoring device 34 identifier field 108, a data descriptor field 110, and an indication 112 of whether the data includes video data.
- an authorized user can filter through the event log by specify searching criteria. Additionally, the authorized user may view more detailed information about specific records 104 by manipulating a peripheral graphical device interface tool, such as a mouse or by using a touchscreen interface.
- a peripheral graphical device interface tool such as a mouse or by using a touchscreen interface.
- the event log table 102 may be modified to include additional or less fields.
- FIGURE 10 is illustrative of a screen display 114 produced by a WWW browser enabling a user to review integrated information system 10 event data logs in accordance with the present invention.
- the integrated information system 30 may also maintain specific tables of event rule violations, device rule violations and resource rules violations.
- the screen display 114 illustrated in FIGURE 10 includes a table 116 of all event rules violation data.
- the table 116 is defined by a variety of records 118 that are defined by a client premises location field 120, an event status field 122, a time stamp field 124, an event severity field 126, an event location field 128, a device identifier field 130, a device location field 132 and a video data present field 134.
- an authorized user is able to filter event data and also obtain greater detail.
- the screen display format is a portable digital processing device such as a personal digital assistant ("PDA")
- PDA personal digital assistant
- a user may access a PDA-specific Web site to obtain event data or other device-related data that is sized according to the processing and display capabilities of the device.
- a user would have registered the device with the Web site so that the resulting data may be sized to the processing and display capabilities of the particular device.
- PDA personal digital assistant
- the method and system of the present invention are implemented in the form of a network access verification embodiment.
- a network access verification embodiment One skilled in the relevant art will appreciate that access to computer networks is commonly controlled by a combination of a user identifier and one or more passwords.
- network access verification devices on public networks such as the Internet 20
- a password/identifier is compromised, there is a need for identifying such a compromise in a timely manner and to terminate the unauthorized access as soon as possible.
- the integrated information system 30 is utilized in a network access verification configuration.
- FIGURE 11 is a block diagram illustrative of a network access verification routine 1100 in accordance with the present invention.
- a monitoring device obtains network access information.
- the integrated information system 30 includes at least one monitoring device 34 that generates resource data identifying a particular user identification attempting to log in to a monitored computer network. Additionally, the integrated information system 30 may also include alternative devices for accessing a network, such as a smart card, badge, facial recognition, voice identification, or other transponder or biometric identification devices.
- the premises server 32 obtains the monitoring device data and transmits it to the central server 56.
- the central server 56 obtains a resource rule corresponding to a user identification from the resource rules database 80.
- the resource rule corresponding to the network access device will dictate that if the login is successful to the network, a notification sequence is to be followed.
- the user also selects a preferred notification method. For example, the user may be presented with a list of available notification methods including, but not limited to call to a mobile device, email, call to a land line, and the like. The user selects one or more notification methods and enters the appropriate method.
- the central server 56 generates a network access verification message to the user corresponding to the network access verification resource data.
- the network access verification message is transmitted according preferences selected by the user.
- the message includes sufficient information to inform the user of an access to the network under their personal identifier.
- the message also can include a manner to respond to the message. For example, if the user has selected notification by a telephone call, the message may be in the form of "Your personal identifier to the "X" network has been activated. Press # to continue, Press * to terminate access.”
- the central server 56 obtains a verification from the user.
- the user may indicate a verification by pressing a particular key of a touch pad. Additionally, the user may be required to place a call to a call processing center. Still further, the user may receive a personal identification number that will be entered to gain access to the network.
- the user may utilize any one of a number of communication methods/mediums to verify the network. Moreover, the user does not necessarily have to utilize the same communication method/medium that was utilized to provide the user with the notification.
- the central server 56 performs a test to determine whether the network access has been verified by the user.
- the central server 56 If the network access has not been verified, at block 1112, the central server 56 generates an output that terminates the network access.
- the integrated information system 30 may be utilized to mitigate the unauthorized distribution of private information. This embodiment is similar to the network access verification routine 1100 in which a user would enter a preferred notification method in the event private information, such as a financial institution bank card, is being utilized. Accordingly, if the integrated information system 30 is in communication with the financial institution, the resource rule database 80 may dictate that the authorized user be notified by a selected method before approving a transaction, or alternatively, before approving a transaction over a specified amount.
- the method and system of the present invention are implemented in the form of a bar code video tracking embodiment.
- bar codes on a variety of mobile objects, such as packages facilitate the identification and tracking of the movement of the object. Nevertheless, there is often a need for generating an accurate record of the movement of the object within a facility/premises. Additionally, there is a further need to monitor the movement of objects within a monitored area to mitigate the unauthorized movement of obj ects.
- the integrated information system 30 is utilized in a bar code tracking configuration.
- a video record is created for objects tracked with an identifier such as a bar code, to allow for verification of the location and path of travel for the object.
- FIGURE 12 is a flow diagram illustrative of a bar code tracking routine 1200 in accordance with the present invention.
- the central server 56 obtains an object bar code.
- conventional bar coding method such as code 3 of 9, are utilized to generate the appropriate bar code images on the packages.
- the bar code is read from the package utilizing a bar code reader located in an area accessible to a video monitoring device and connected to the integrated information network 30 as a monitoring device 34.
- the central server 56 obtains scanning location information from the particular bar code scanning computing device.
- each bar code scanning computing device is associated with a particular area within the monitored facility. Accordingly, the central server 56 identifies the location of the bar code scanner by identifying a port number assigned to the area. Alternatively, in the event that bar code scanner is mobile, a second bar code identifying a particular area may be read and transmitted to the central server 56. Still further, the bar code scanner may also have data entry capabilities allowing a user to designate a particular area.
- the central server 56 obtains time information corresponding to the acquired bar code information.
- the central server 56 includes a clock component that serves as a timing standard for all inputted data.
- the central server 56 obtains data archived from a video camera monitoring device 34 corresponding to the area associated with the bar code reader.
- the central server 56 maintains archived data from video monitoring device in a manner that facilitates the retrieval of time sensitive data.
- the video data is associated with the bar code data to create a video record of the movement of the object.
- a frame grabber within the central server 56 stores as one or more frames of the digital video data associated with the time the bar code was obtained.
- the central server may also insert an object identifier in the archived video data to identify at which time the object was detected. In this embodiment, if the archive video includes a time counter, the central server 56 may insert an identifier, such as a symbol, to facilitate later review.
- the integrated information system 30 is implemented in a personnel location identifier embodiment.
- the integrated information system 30 associates the current location of a person on a monitored facility with location, time and/or video data to generate a record of the person's movement within the facility.
- FIGURE 13 is a flow diagram illustrative of a location identification routine 1300 in accordance with the present invention.
- the central server 56 obtains an individual or asset identifier.
- the central server 56 may obtain the individual or asset identifier, by placing a variety of bar code scanning monitoring devices 34 through various places in the monitored facility.
- an asset such as person or a laptop computer, moving or being moved throughout the premises scans a bar code information with the individual or asset, such as on a security badge having a bar code thereon or an adhered barcode on a laptop
- the central system 56 obtains the individual's or asset's identification through the bar code scanning monitoring device 34.
- the bar code information may be processed according to one or more rules. For example, movement of an individual or asset into a restricted area may be a violation of a rule and be processed as an event.
- the integrated information system 30 includes one or more kiosk monitoring devices 34 that are located throughout the monitored premises.
- the kiosk could include input instruments, such as keypads, a computer mouse, a magnetic card reader and the like to obtain an input from the particular user.
- the kiosk monitoring device would then transmit the identity to the central server 56.
- a user may be assigned a unique device that includes an identifier signal. For example, each user may be given a particular radio frequency emitting unit that is associated with that person. Accordingly, a corresponding monitoring device 34 picks up the unique signal and transmits the signal to the central server for associating the signal with a person.
- biometric identification devices voiceprints, fingerprints, eyes scans
- motion sensors motion sensors
- pressure sensitive floor mats and the like
- the central server 56 obtains a geographic location identifier.
- location identification device/method may correspond with the person identification device/method utilized in block 1302.
- a monitoring device 34 such as a bar code scanner
- an individual or asset identifier input would be associated with the assigned geographic region of the monitoring device.
- the a user interface within a monitoring device 34 may also allow the user to designate particular geographic regions or sub-regions via an interface, such as a graphic user interface map.
- the central server 56 obtains any additional monitoring device 34 data that may be desirable to associate with the user input.
- the central server 56 may obtain a time stamp from a central server 56 clock to include a time stamp with the data.
- the central server 56 may also obtain video monitoring device data from a video camera in the geographic region to create a record confirming the presence of the individual or asset identified.
- the central server 56 saves the associated data in a file for archiving.
- the central server 56 may utilize a frame grabber to generate a still frame of the video data verifying the user's presence. Additionally, the central server 56 may generated a printed report identifying the transmitted data.
- the routine 1300 terminates.
- the integrated information system 30 is implemented in an enterprise access control configuration.
- security access systems for monitoring a specific area may have individual security access routines. For example, security access to a first area may be accomplished by a first password, while security access to second area may be accomplished with a different security system requiring a second password. Accordingly, the conventional systems are deficient in lacking coordination over multiple security access systems in multiple areas.
- the integrated information system 30 is configured to provide universal security access information and control processes.
- the integrated information system 30 includes multiple security access monitoring devices 34 located in various areas of a monitored premises or on different premises.
- the security access monitoring devices 34 may have a similar function and manufacturer, or alternatively, may have different or additional functions. Irrespective of the type of access control, each monitoring devices includes a data input portion that allows an authorized user to input a security access data.
- the monitoring device 34 accepts the access data and transmits it to the central server 56 as resource data. Accordingly, the central server 56 evaluates a resource rule to determine whether the particular user is cleared to have access to the area associated with the monitoring device. If evaluation of the rule indicates that access is appropriate, the central server 34 may activate an output device 36 associated with the area to provide security access. The central server 56 may also log in the entrance. If the evaluation of the rule does not indicated that access is appropriate, the central server 34 may not activate the output device 36 that grants access and may also activate an output device 36 that alerts an authorized user of the attempted access.
- the universal access embodiment of the present invention can be embodied as a separate account security layer that may be remote from the access device. Additionally, the embodiment facilitates a change to the access data that can be implemented globally across multiple premises and/or security access monitoring devices 34.
- each data packet includes four sections.
- a first section is a file header that indicates the size of the file and the number of discrete data types that are contained within the file.
- a second section is a set of file handling instructions that instruct how to process the data.
- a third section is the collection of the data to be processed.
- a fourth section is a transmission footer utilized to validate the data transmitted.
- FIGURE 14 is a flow diagram illustrative of data packet transmission routine 1400 implemented by a transmitting component in accordance with the present invention.
- the transmitting component obtains the data to be transmitted/processed.
- the data can include monitoring device 34 data, rules data, control applet data, and the like.
- the transmitting component generates a packet header that identifies the size of the file and the number of data types that are contained within the file.
- the transmitting component generates data handling instructions and inserts them into a second portion of the data packet.
- the transmitting component inserts the data to be processed into the packet.
- the transmitting component inserts a packet footer into the packet.
- the packet footer can include data parity information, checksums, data maps and the like to allow for the verification of a proper transmission.
- the packet is complete and the transmitting component transmits the data packet.
- the routine 1400 terminates.
- the packet receipt is acknowledged. If the packet can be verified, the receiving component may then process the data. Alternatively, if the verification process is not successful, the receiving component may request a retransmittal.
Abstract
Description
Claims
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
AU2001296926A AU2001296926A1 (en) | 2000-09-28 | 2001-09-28 | System and method for providing configurable security monitoring utilizing an integrated information system |
Applications Claiming Priority (6)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US23628200P | 2000-09-28 | 2000-09-28 | |
US60/236,282 | 2000-09-28 | ||
US28125801P | 2001-04-03 | 2001-04-03 | |
US09/825,506 | 2001-04-03 | ||
US09/825,506 US7627665B2 (en) | 2000-09-28 | 2001-04-03 | System and method for providing configurable security monitoring utilizing an integrated information system |
US60/281,258 | 2001-04-03 |
Publications (2)
Publication Number | Publication Date |
---|---|
WO2002027518A1 WO2002027518A1 (en) | 2002-04-04 |
WO2002027518A9 true WO2002027518A9 (en) | 2002-10-24 |
Family
ID=27398833
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/US2001/042360 WO2002027518A1 (en) | 2000-09-28 | 2001-09-28 | System and method for providing configurable security monitoring utilizing an integrated information system |
Country Status (2)
Country | Link |
---|---|
AU (1) | AU2001296926A1 (en) |
WO (1) | WO2002027518A1 (en) |
Family Cites Families (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5619656A (en) * | 1994-05-05 | 1997-04-08 | Openservice, Inc. | System for uninterruptively displaying only relevant and non-redundant alert message of the highest severity for specific condition associated with group of computers being managed |
JPH11120103A (en) * | 1997-10-20 | 1999-04-30 | Fujitsu Ltd | Network management system by management object |
US5999978A (en) * | 1997-10-31 | 1999-12-07 | Sun Microsystems, Inc. | Distributed system and method for controlling access to network resources and event notifications |
US6105122A (en) * | 1998-02-06 | 2000-08-15 | Ncr Corporation | I/O protocol for highly configurable multi-node processing system |
US6070190A (en) * | 1998-05-11 | 2000-05-30 | International Business Machines Corporation | Client-based application availability and response monitoring and reporting for distributed computing environments |
US6314463B1 (en) * | 1998-05-29 | 2001-11-06 | Webspective Software, Inc. | Method and system for measuring queue length and delay |
-
2001
- 2001-09-28 AU AU2001296926A patent/AU2001296926A1/en not_active Abandoned
- 2001-09-28 WO PCT/US2001/042360 patent/WO2002027518A1/en active Application Filing
Also Published As
Publication number | Publication date |
---|---|
WO2002027518A1 (en) | 2002-04-04 |
AU2001296926A1 (en) | 2002-04-08 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US8700769B2 (en) | System and method for providing configurable security monitoring utilizing an integrated information system | |
US7627665B2 (en) | System and method for providing configurable security monitoring utilizing an integrated information system | |
US6542075B2 (en) | System and method for providing configurable security monitoring utilizing an integrated information portal | |
USRE45649E1 (en) | Method and process for configuring a premises for monitoring | |
US7944469B2 (en) | System and method for using self-learning rules to enable adaptive security monitoring | |
US6917902B2 (en) | System and method for processing monitoring data using data profiles | |
US20040093409A1 (en) | System and method for external event determination utilizing an integrated information system | |
US9449484B2 (en) | System for real time security monitoring | |
US7113090B1 (en) | System and method for connecting security systems to a wireless device | |
US8174378B2 (en) | Human guard enhancing multiple site security system | |
US6563910B2 (en) | Emergency response information distribution | |
US20020143923A1 (en) | System and method for managing a device network | |
US20080303903A1 (en) | Networked video surveillance system | |
US20020104094A1 (en) | System and method for processing video data utilizing motion detection and subdivided video fields | |
US20060235697A1 (en) | On-line security management system | |
WO2002027518A9 (en) | System and method for providing configurable security monitoring utilizing an integrated information system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AK | Designated states |
Kind code of ref document: A1 Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EC EE ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NO NZ PL PT RO RU SD SE SG SI SK SL TJ TM TR TT TZ UA UG US UZ VN YU ZA ZW |
|
AL | Designated countries for regional patents |
Kind code of ref document: A1 Designated state(s): GH GM KE LS MW MZ SD SL SZ TZ UG ZW AM AZ BY KG KZ MD RU TJ TM AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE TR BF BJ CF CG CI CM GA GN GQ GW ML MR NE SN TD TG |
|
121 | Ep: the epo has been informed by wipo that ep was designated in this application | ||
AK | Designated states |
Kind code of ref document: C2 Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EC EE ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NO NZ PL PT RO RU SD SE SG SI SK SL TJ TM TR TT TZ UA UG US UZ VN YU ZA ZW |
|
AL | Designated countries for regional patents |
Kind code of ref document: C2 Designated state(s): GH GM KE LS MW MZ SD SL SZ TZ UG ZW AM AZ BY KG KZ MD RU TJ TM AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE TR BF BJ CF CG CI CM GA GN GQ GW ML MR NE SN TD TG |
|
COP | Corrected version of pamphlet |
Free format text: PAGES 1/16-16/16, DRAWINGS, REPLACED BY NEW PAGES 1/15-15/15; DUE TO LATE TRANSMITTAL BY THE RECEIVING OFFICE |
|
DFPE | Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed before 20040101) | ||
REG | Reference to national code |
Ref country code: DE Ref legal event code: 8642 |
|
122 | Ep: pct application non-entry in european phase | ||
NENP | Non-entry into the national phase |
Ref country code: JP |