Voice remote command and control of a mapping security system
First Claim
1. A system where remote mobile devices recognize human voice and transmits speech commands into a security monitoring system over a network to follow intrusions, activate the system or devices, configure the system, display video information, communicate to others accessing the system and obtain any and all system and device status. i. Mobile display devices include mobile vehicle terminals, hand held computers, cell phones, PDAs, and all similar remote devices. ii. Security devices at the location under surveillance are cameras, motion sensors, transmitting card tag systems, open/close switch sensors, window security sensors, and all similar security devices. iii. Each location under surveillance is controlled by a computer security management monitoring system. iv. The access is over various network types to include wireless, Internet, intranet, dedicated, etc.
0 Assignments
0 Petitions
Accused Products
Abstract
An invention that enables the use of human speech to remotely access, interrogate, control and obtain real time information from security devices in a facility or location. Wireless, or other network connectivity, mobile devices are used as the voice recognition system. These devices interface to a management system located at the facility or location under surveillance. The user is able to view the mobile display device and command the system using human voice. The system supports detecting and tracking security intrusions, controlling the security devices at the location, requesting changes to the display, obtaining status information of the system or any device, and communicating to others that may be accessing the system jointly. The invention also uses hierarchical maps to quickly identify security problems within an enterprise. The system uses real-time altered icons or element pictures that identify the status of that element at a quick glance. The organized use of hierarchical maps to quickly traverse to and identify particular security problems to include intrusions, alarms, failures, pending failures, etc. Intruder movement is also automatically tracked on or between maps.
64 Citations
4 Claims
-
1. A system where remote mobile devices recognize human voice and transmits speech commands into a security monitoring system over a network to follow intrusions, activate the system or devices, configure the system, display video information, communicate to others accessing the system and obtain any and all system and device status.
i. Mobile display devices include mobile vehicle terminals, hand held computers, cell phones, PDAs, and all similar remote devices. ii. Security devices at the location under surveillance are cameras, motion sensors, transmitting card tag systems, open/close switch sensors, window security sensors, and all similar security devices. iii. Each location under surveillance is controlled by a computer security management monitoring system. iv. The access is over various network types to include wireless, Internet, intranet, dedicated, etc.
-
2. A computer system that uses a traversing mapping system to identify and locate security problems at particular locations to include sites, facilities, buildings, rooms, locales, areas, floor plans etc. This allows for quick movement to problems areas and the hierarchy traversing system allows for rapid movement to the failing element.
i. A mapping hierarchy that starts at a high level, like the work map, and identifies sites and from these sites the system will traverse down a tree structure using sub-maps to get to a detailed security location with identified security devices. ii. A picture status display at every hierarchy level element so that users can identify the level they are at. iii. A facility index page that shows every security area that has security devices and the status of that facility in the facilities icon or picture.
-
3. A computer system that uses icons or pictures representing elements such as sites, facilities, locations, floors, rooms, devices, etc. where these icons graphically represent the security status of that location or item. The icon may be the original picture overlaid with a cross out, a warning, or some graphical or text identifier that represent the current security status. If any security device with that location has an abnormal status (such as intrusion, failure, etc.) the location icon will represent that in its picture. By traversing down the security tree the abnormal status can be tracked to the offending device.
-
4. A computer system that by command automatically tracks intruders on and between maps. Intruders will have their own graphical representation and will be shown overlaid on the maps. The system will automatically display the movement in map windows even if there is more than one intruder on different maps.
Specification