SYSTEM AND METHOD FOR PROVIDING CONFIGURABLE SECURITY MONITORING UTILIZING AN INTEGRATED INFORMATION SYSTEM
First Claim
1. A method, comprising:
- determining whether a source of at least a portion of monitoring device data is capable of independent activity in generating the at least a portion of the monitoring device data;
categorizing the monitoring device data based at least in part on the source of the at least a portion of the monitoring device data;
obtaining a set of one or more rules from one or more data stores, wherein the set of rules includes at least one of;
an asset rule for monitoring device data categorized as corresponding to a source that is not capable of independent activity in generating the monitoring device data, a resource rule for monitoring device data categorized as corresponding to a source capable of independent activity in generating the monitoring device data, and a device rule for monitoring device data categorized as corresponding to event data;
identifying from the set of rules at least one rule that corresponds to the categorization of the monitoring device data;
processing the categorized monitoring device data by causing instructions to be executed by a computing device according to the identified at least one rule; and
determining whether the monitoring device data is outside a range of the identified at least one rule, wherein the range defines a rule violation.
8 Assignments
0 Petitions
Accused Products
Abstract
A system and method for implementing an integrated information system are provided. A premises server is in communication with a variety of information sources that produce monitoring data for a premises. The premises server collects, presents, and transmits the monitoring device data to a central server capable of processing data from multiple premises servers. The central server receives the data and traverses one or more logical rule sets to determine whether the inputted data violates the rules. Based on an evaluation of the rules, the central server generates outputs in the form of communication to one or more authorized users via a variety of communication mediums and devices and/or the instigation of a variety of acts corresponding to the evaluation of the rules.
-
Citations
27 Claims
-
1. A method, comprising:
-
determining whether a source of at least a portion of monitoring device data is capable of independent activity in generating the at least a portion of the monitoring device data; categorizing the monitoring device data based at least in part on the source of the at least a portion of the monitoring device data; obtaining a set of one or more rules from one or more data stores, wherein the set of rules includes at least one of;
an asset rule for monitoring device data categorized as corresponding to a source that is not capable of independent activity in generating the monitoring device data, a resource rule for monitoring device data categorized as corresponding to a source capable of independent activity in generating the monitoring device data, and a device rule for monitoring device data categorized as corresponding to event data;identifying from the set of rules at least one rule that corresponds to the categorization of the monitoring device data; processing the categorized monitoring device data by causing instructions to be executed by a computing device according to the identified at least one rule; and determining whether the monitoring device data is outside a range of the identified at least one rule, wherein the range defines a rule violation. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A computer-readable, non-transitory storage medium having one or more computer-executable modules, the one or more computer-executable modules comprising:
a first module configured to; determine whether a source of at least a portion of monitoring device data is capable of independent activity in generating the at least a portion of the monitoring device data; categorize the monitoring device data based at least in part on the source of the at least a portion of the monitoring device data; identify from a set of rules stored in one or more data stores at least one rule that corresponds to the categorization of the monitoring device data, wherein the set of rules includes at least one of;
an asset rule for monitoring device data categorized as corresponding to a source that is not capable of independent activity in generating the monitoring device data, a resource rule for monitoring device data categorized as corresponding to a source capable of independent activity in generating the monitoring device data, and a device rule for monitoring device data categorized as corresponding to event data;process the categorized monitoring device data by causing instructions to be executed by a computing device according to the identified at least one rule; and determine whether the monitoring device data is outside a range of the identified at least one rule, wherein the range defines a rule violation. - View Dependent Claims (11, 12)
-
13. A system comprising:
a computing device in communication with one or more data stores, the computing device configured to; determine whether a source of at least a portion of monitoring device data is capable of independent activity in generating the at least a portion of the monitoring device data; categorize the monitoring device data based at least in part on the source of the at least a portion of the monitoring device data; identify at least one rule from a set of one or more rules stored in the one or more data stores that corresponds to the categorization of the monitoring device data, wherein the set of rules includes at least one of;
an asset rule for monitoring device data categorized as corresponding to a source that is not capable of independent activity in generating the monitoring device data, a resource rule for monitoring device data categorized as corresponding to a source capable of independent activity in generating the monitoring device data, and a device rule for monitoring device data categorized as corresponding to event data;process the categorized monitoring device data by causing instructions to be executed by a computing device according to the identified at least one rule; and determine whether the monitoring device data is outside a range of the identified at least one rule, wherein the range defines a rule violation. - View Dependent Claims (14, 15)
-
16. A method, comprising:
-
determining whether monitoring device data from an access control monitoring device corresponds to an identifiable object capable of independent activity to generate at least a portion of the access monitoring device data; categorizing the monitoring device data based at least on whether the identifiable object is capable of independent activity to generate the at least a portion of the monitoring device data obtaining a set of one or more rules from one or more data stores, wherein the set of rules includes at least one of;
an asset rule for monitoring device data categorized as asset data, a resource rule for monitoring device data categorized as resource data, and a device rule for monitoring device data categorized as event data;identifying from the set of rules, using a computing device, whether at least one rule corresponds to the monitoring device data, the at least one rule configured to establish access rights for the access control monitoring device, wherein one or more rules of the set of rules applies to monitoring device data categorized as corresponding to an object and one or more rules of the set of rules applies to monitoring device data not categorized as corresponding to an object; and determining, using a computing device, whether an individual has access rights to the access control monitoring device by determining whether the monitoring device data violates the at least one identified rule. - View Dependent Claims (17, 18, 19, 20, 21, 22, 23, 24)
-
-
25. A system comprising:
a computing device in communication with the one or more data stores, the computing device configured to; determine whether monitoring device data from an access control monitoring device corresponds to an identifiable object capable of independent activity to generate at least a portion of the access monitoring device data; categorize the monitoring device data based at least on whether the identifiable object is capable of independent activity to generate the at least a portion of the monitoring device data identify, using a computing device, at least one rule from a set of one or more rules stored in one or more data stores that corresponds to the monitoring device data, the at least one rule configured to establish access rights for the access control monitoring device, wherein one or more rules of the set of rules applies to monitoring device data categorized as corresponding to an object and one or more rules of the set of rules applies to monitoring device data not categorized as corresponding to an object, wherein the set of rules includes at least one of;
an asset rule for monitoring device data categorized as asset data, a resource rule for monitoring device data categorized as resource data, and a device rule for monitoring device data categorized as event data; anddetermine, using a computing device, whether an individual has access rights to the access control monitoring device by determining whether the monitoring device data violates the at least one identified rule. - View Dependent Claims (26, 27)
Specification