PERIMETER SECURITY SYSTEM
First Claim
1. A method of operating a perimeter security system, the method comprising:
- monitoring a perimeter for a plurality of events;
receiving an event signal for an event of the plurality of events wherein the event signal comprises an acceleration;
processing the first event signal to determine if the event is a threat;
transferring a confirmation request to confirm that the event is a threat in response to determining that the event is a threat;
receiving a confirmation response in response to the confirmation request confirming that the event is a threat; and
generating and transmitting a message identifying the event in response to confirming the threat.
0 Assignments
0 Petitions
Accused Products
Abstract
A method of operating a perimeter security system comprises monitoring a perimeter for a plurality of events, receiving an event signal for an event of the plurality of events wherein the event signal comprises an acceleration, processing the first event signal to determine if the event is a threat, transferring a confirmation request to confirm that the event is a threat in response to determining that the event is a threat, receiving a confirmation response in response to the confirmation request confirming that the event is a threat, and generating and transmitting a message identifying the event in response to confirming the threat.
-
Citations
5 Claims
-
1. A method of operating a perimeter security system, the method comprising:
-
monitoring a perimeter for a plurality of events; receiving an event signal for an event of the plurality of events wherein the event signal comprises an acceleration; processing the first event signal to determine if the event is a threat; transferring a confirmation request to confirm that the event is a threat in response to determining that the event is a threat; receiving a confirmation response in response to the confirmation request confirming that the event is a threat; and generating and transmitting a message identifying the event in response to confirming the threat. - View Dependent Claims (2, 3)
-
-
4. A perimeter security network comprising:
-
a sensor system configured to monitor a perimeter for a plurality of events, receive an event signal for an event of the plurality of events wherein the event signal comprises an acceleration, process the first event signal to determine if the event is a threat, transfer a confirmation request to confirm that the event is a threat in response to determining that the event is a threat, receive a confirmation response in response to the confirmation request confirming that the event is a threat; and
generate and transmit a message identifying the event in response to confirming the threat; anda user interface system configured to receive the message and display a threat notification. - View Dependent Claims (5)
-
Specification