Method of security monitoring and alarming using mobile voice device
First Claim
1. A method utilizing a mobile voice device for security monitoring, alarming, and logging;
- said mobile voice device being an electronic device at least capable of collecting audio signals, playing audio signals, sending short messages, and making voice calls over mobile communications networks; and
, after being activated, said method comprising at least steps of;
collecting noise data from a surrounding environment via a microphone of said mobile voice device for a period of time, and analyzing said noise data to establish criteria;
collecting current noise data from said surrounding environment via said microphone of said mobile voice device;
comparing said current noise data to said criteria, returning to the previous step if the difference is within a pre-determined tolerance, or continuing with the next step if the difference exceeds said pre-determined tolerance; and
utilizing said mobile voice device'"'"'s capability of collecting audio signals, playing audio signals, sending short messages, and making voice calls over mobile communications networks to conduct a type of alarming and logging operation selected from the following three types of operations;
issuing a type of alarm only;
performing a type of logging only; and
issuing a type of alarm and performing a type of logging simultaneously.
0 Assignments
0 Petitions
Accused Products
Abstract
A method utilizing a mobile handset (or a PDA capable of collecting voices, playing voices, and making voice calls over a mobile communications network) to conduct security monitoring, alarming, and logging is provided. The method allows a user to turn his or her mobile handset into intrusion detection, alarming, and logging device when the user is alone at home or during the night. The method utilizes the handset'"'"'s microphone to collect surrounding noise and, if the handset has a camera, the method could also utilize the camera to capture images. By analyzing the collected noise and/or captured images, the method could detect if there is some intruder breaking into the house. The method then plays a pre-recorded voice/audio via the handset'"'"'s speaker to scare the intruder. The method could also automatically send out short messages and/or making voice call to ask for help. In addition, the method could transmit a record of the incident'"'"'s scenario to another handset or a remote computer using the handset'"'"'s recording capability for subsequent investigation.
20 Citations
42 Claims
-
1. A method utilizing a mobile voice device for security monitoring, alarming, and logging;
- said mobile voice device being an electronic device at least capable of collecting audio signals, playing audio signals, sending short messages, and making voice calls over mobile communications networks; and
, after being activated, said method comprising at least steps of;
collecting noise data from a surrounding environment via a microphone of said mobile voice device for a period of time, and analyzing said noise data to establish criteria;
collecting current noise data from said surrounding environment via said microphone of said mobile voice device;
comparing said current noise data to said criteria, returning to the previous step if the difference is within a pre-determined tolerance, or continuing with the next step if the difference exceeds said pre-determined tolerance; and
utilizing said mobile voice device'"'"'s capability of collecting audio signals, playing audio signals, sending short messages, and making voice calls over mobile communications networks to conduct a type of alarming and logging operation selected from the following three types of operations;
issuing a type of alarm only;
performing a type of logging only; and
issuing a type of alarm and performing a type of logging simultaneously. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21)
- said mobile voice device being an electronic device at least capable of collecting audio signals, playing audio signals, sending short messages, and making voice calls over mobile communications networks; and
-
22. A method utilizing a mobile voice device for security monitoring, alarming, and logging;
- said mobile voice device being an electronic device at least capable of image capturing, collecting audio signals, playing audio signals, sending short messages, and making voice calls over mobile communications networks; and
, after being activated, said method comprising at least steps of;
collecting image data from a surrounding environment via said camera of said mobile voice device for a period of time, and analyzing said image data to establish criteria;
collecting current image data from said surrounding environment via said camera of said mobile voice device;
comparing said current image data to said criteria, returning to the previous step if the difference is within a pre-determined tolerance, or continuing with the next step if the difference exceeds said pre-determined tolerance; and
utilizing said mobile voice device'"'"'s capability of collecting audio signals, playing audio signals, sending short messages, and making voice calls over mobile communications networks to conduct a type of alarming and logging operation selected from the following three types of operations;
issuing a type of alarm only;
performing a type of logging only; and
issuing a type of alarm and performing a type of logging simultaneously. - View Dependent Claims (23, 24, 25, 26, 27, 28, 29, 30, 31, 32, 33, 34, 35, 36, 37, 38, 39, 40, 41, 42)
- said mobile voice device being an electronic device at least capable of image capturing, collecting audio signals, playing audio signals, sending short messages, and making voice calls over mobile communications networks; and
Specification