Security monitoring methodology using digital audio
First Claim
1. A universal controller comprising:
- one or more inputs that receive signals from one or more sensors;
a data compressor that compresses signals received from the sensors into compressed data, said data compressor in communication with said one or more inputs to receive the signals from the sensors;
a buffer in communication with said data compressor to store the compressed data;
a detector in communications with said data compressor to receive the compressed data and determine when a triggering event has occurred; and
a packet transmitter that transmits the compressed data to disparate locations in response to the determination of the triggering event, wherein the transmitted compressed data corresponds in time to the triggering event and a predetermined amount of time preceding the triggering event.
17 Assignments
0 Petitions
Accused Products
Abstract
A security monitoring methodology and device using digital audio. A security control device integrates physical intrusion detection functions, physical access control functions, and compressed, streaming, digital audio transmission capability. The device provides interfaces for a number of sensor inputs, including standard alarm monitoring sensors and audio sensors. The device is capable of communicating with a monitoring system over a variety of digital networking configurations options, including TCP/IP, via embedded Ethernet interface, or serial modem communications over telephone or digital cellular networks using PPP network protocol. The device may use backup channels of communications including telephone and cellular network communications. All communications with the device, whether to monitoring receiver or other local devices, may be secured with a minimum AES 128-bit encryption.
39 Citations
24 Claims
-
1. A universal controller comprising:
-
one or more inputs that receive signals from one or more sensors;
a data compressor that compresses signals received from the sensors into compressed data, said data compressor in communication with said one or more inputs to receive the signals from the sensors;
a buffer in communication with said data compressor to store the compressed data;
a detector in communications with said data compressor to receive the compressed data and determine when a triggering event has occurred; and
a packet transmitter that transmits the compressed data to disparate locations in response to the determination of the triggering event, wherein the transmitted compressed data corresponds in time to the triggering event and a predetermined amount of time preceding the triggering event. - View Dependent Claims (2, 3, 4, 5, 6, 19, 20)
-
-
7. A method of processing signals received from security systems, comprising:
-
receiving one or more input signals from one or more sensors;
summing the one or more input signals;
digitizing the summed one or more input signals;
compressing the digitized signals as data;
buffering the compressed data;
detecting the compressed data to determine when a triggering event occurred; and
transmitting the compressed data to disparate locations in response to the determination of the triggering event in substantially real-time, wherein the transmitted compressed data corresponds in time to the triggering event and a predetermined amount of time preceding the triggering event. - View Dependent Claims (8, 9, 10)
-
-
11. A security control system, comprising:
-
remote sensor devices to detect when a triggering event has occurred;
controller devices for processing input data from the remote sensor devices for storage as multiple data streams, and routing the data streams over networks; and
network interfaces providing communications between the controller and the networks, wherein each one of the controller devices is connected to a plurality of the sensor devices; and
wherein the controller devices transmit the data streams which corresponds in time to the triggering event and a predetermined amount of time preceding the triggering event by selecting from two or more networks. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 21, 22, 23, 24)
-
Specification