Selectively enabled threat based information system
First Claim
Patent Images
1. A method for selectively monitoring a privacy sensitive area, comprising:
- assigning said privacy sensitive area a privacy threshold value;
receiving a threat level; and
activating surveillance equipment associated with said privacy sensitive area when said threat level exceeds said privacy threshold value.
0 Assignments
0 Petitions
Accused Products
Abstract
A method for selectively monitoring a privacy sensitive area includes assigning the privacy sensitive area a privacy threshold value, receiving a threat level, and activating surveillance equipment associated with said privacy sensitive area when said threat level exceeds said privacy threshold value.
-
Citations
22 Claims
-
1. A method for selectively monitoring a privacy sensitive area, comprising:
-
assigning said privacy sensitive area a privacy threshold value; receiving a threat level; and activating surveillance equipment associated with said privacy sensitive area when said threat level exceeds said privacy threshold value. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14)
-
-
15. A method for selectively monitoring a privacy sensitive area, comprising:
-
assigning said privacy sensitive area a privacy threshold value including evaluating a degree of privacy desired in said privacy sensitive area and assigning said privacy threshold value in relation to said desire for privacy; receiving a threat level; and activating surveillance equipment associated with said privacy sensitive area when said threat level exceeds said privacy threshold value including comparing said threat level to said privacy threshold value, and activating one of a surveillance camera, a motion sensor, or an audio receptive device associated with said privacy sensitive area if said threat level exceeds said privacy threshold value. - View Dependent Claims (16, 17)
-
-
18. A system for selectively monitoring a privacy sensitive area, comprising:
-
a surveillance component configured to be associated with a privacy sensitive area; a surveillance system interface configured to selectively activate and deactivate said surveillance component based on a received threat level; and a software or firmware module configured to determine whether said received threat level is sufficiently high to activate said surveillance component. - View Dependent Claims (19, 20, 21, 22)
-
Specification