System, Device and Method for Asymmetric Panoramic Security
First Claim
1. A security system, comprising:
- at least one camera having a field of view outside of a known outer perimeter for an event;
at least one gunshot detection sensor positioned outside of the known outer perimeter;
at least one closed wireless network;
at least one processor; and
at least one memory device storing a plurality of instructions which, when executed by the at least one processor, cause the at least one processor to;
receive, via the at least one closed wireless network, at least one threat communication from the at least one camera or the at least one gunshot detection sensor;
determine, based on the at least one threat communication, a response protocol; and
issue, via the at least one closed wireless network to at least a first wireless device, a law enforcement communication or an emergency event communication according to the response protocol.
1 Assignment
0 Petitions
Accused Products
Abstract
A system, device and method deploys one or more cameras secured to ground-based and/or aerial devices along with one or more gunshot detection units (GDUs) to monitor an event for threats. Visual and audible signals received by the cameras and GDUs are sent to a central controller, which analyzes the received threat communications and issues appropriate communications according to a response protocol over a secure wireless network to intended recipients, including security/law enforcement personnel and members of the public attending the event. In various embodiments, a high intensity light source is provided for emitting high intensity light in the direction of any located gunshots or other relevant threat.
11 Citations
20 Claims
-
1. A security system, comprising:
-
at least one camera having a field of view outside of a known outer perimeter for an event; at least one gunshot detection sensor positioned outside of the known outer perimeter; at least one closed wireless network; at least one processor; and at least one memory device storing a plurality of instructions which, when executed by the at least one processor, cause the at least one processor to; receive, via the at least one closed wireless network, at least one threat communication from the at least one camera or the at least one gunshot detection sensor; determine, based on the at least one threat communication, a response protocol; and issue, via the at least one closed wireless network to at least a first wireless device, a law enforcement communication or an emergency event communication according to the response protocol. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13)
-
-
14. A method for providing security, comprising the steps of:
-
detecting the presence of a potential threat via one or more of;
at least one camera having a field of view outside of a known outer perimeter for an event, and at least one gunshot detection sensor positioned outside of the known outside perimeter;receiving, by at least one processing unit in operative communication with the at least one camera and the at least one gunshot detection unit, at least one threat communication based on the detected presence of the potential threat; comparing, by the at least one processing unit, the received at least one threat communication with an archive of threat communications; developing, by the at least one processing unit, a response protocol based on the comparison; and issuing, by the at least one processing unit, at least one communication to at least one wireless device according to the response protocol. - View Dependent Claims (15, 16, 17, 18, 19)
-
-
20. A method for providing security, comprising the steps of:
-
detecting the presence of a potential threat via one or more of;
at least one camera having a field of view outside of a known outer perimeter for an event, and at least one gunshot detection sensor positioned outside of the known outside perimeter;receiving, by at least one processing unit in operative communication with the at least one camera and the at least one gunshot detection unit, at least one threat communication based on the detected presence of the potential threat; categorizing, by the at least one processing unit, the received at least one threat communication within an archive of categorized threat communications; developing, by the at least one processing unit, a response protocol based on the categorized at least one threat; and issuing, by the at least one processing unit, at least one communication to at least one wireless device according to the response protocol.
-
Specification