Home security administration platform
First Claim
1. A method of administering a security system, said method comprising the steps of:
- receiving a surveillance profile from security equipment that has detected a security breach;
dispatching emergency services corresponding to the surveillance profile of the security equipment, wherein said step of receiving the surveillance profile from the security equipment includes receiving information identifying the detecting security equipment as at least one of a video camera, motion detector and heat detector, and further includes receiving at least one of registration information corresponding to the detecting security equipment, a location of the detecting security equipment and a physical description of the contents of a room in which the detecting security equipment is located; and
upon detection of a security breach, requesting verification from a predetermined sequence of terminals corresponding to the detecting security equipment, and if a predetermined authorization code is received in response, terminating further processing associated with the received surveillance profile, including dispatching emergency services, otherwise the method further comprises, after said dispatching step, the step of informing a subscriber of the security breach by calling a sequence of designated telephone numbers until the first of (1) receiving a response by an answering party or (2) exhausting the sequence of designated telephone numbers without receiving an answer, wherein the step of requesting verification from a predetermined sequence of terminals correspondingly to the detecting security equipment includes at least one of (1) calling a designated telephone number to request the predetermined authorization code from an answer party and (2) transmitting the request for the predetermined authorization code to a designated internet protocol (IP) address for a processor corresponding to the detecting security equipment.
1 Assignment
0 Petitions
Accused Products
Abstract
A network may receiving tracking information of various emergency services personnel, so that when a security breach has occurred at a particular location, the network may receive a surveillance profile from a computer that is disposed at the location where the detector is located, and dispatch the most geographically appropriate emergency services personnel as determined based on the tracking information. A verification protocol may be initiated by calling a predetermined sequence of telephone numbers set by the subscriber to the security system. If the subscriber provides the predetermined authorization code, the detected security breach is disregarded as being a false alarm. However, if the call recipient is unable to provide the predetermined authorization code, or if there is no answer at any of the numbers in the predetermined call sequence, the emergency services personnel are dispatched.
271 Citations
20 Claims
-
1. A method of administering a security system, said method comprising the steps of:
-
receiving a surveillance profile from security equipment that has detected a security breach;
dispatching emergency services corresponding to the surveillance profile of the security equipment, wherein said step of receiving the surveillance profile from the security equipment includes receiving information identifying the detecting security equipment as at least one of a video camera, motion detector and heat detector, and further includes receiving at least one of registration information corresponding to the detecting security equipment, a location of the detecting security equipment and a physical description of the contents of a room in which the detecting security equipment is located; and
upon detection of a security breach, requesting verification from a predetermined sequence of terminals corresponding to the detecting security equipment, and if a predetermined authorization code is received in response, terminating further processing associated with the received surveillance profile, including dispatching emergency services, otherwise the method further comprises, after said dispatching step, the step of informing a subscriber of the security breach by calling a sequence of designated telephone numbers until the first of (1) receiving a response by an answering party or (2) exhausting the sequence of designated telephone numbers without receiving an answer, wherein the step of requesting verification from a predetermined sequence of terminals correspondingly to the detecting security equipment includes at least one of (1) calling a designated telephone number to request the predetermined authorization code from an answer party and (2) transmitting the request for the predetermined authorization code to a designated internet protocol (IP) address for a processor corresponding to the detecting security equipment. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A method of administrating a security system, said method comprising the steps of:
-
receiving tracking information of emergency services personnel;
receiving a surveillance profile from security equipment that has detected a security breach;
requesting verification from a predetermined sequence of terminals corresponding to the detecting security equipment, said requesting including at least one of dispatching a designated telephone number to request the predetermined authorization code from an answering party and transmitting the request for the predetermined authorization code to a designated internet protocol (IP) address for the computer corresponding to the detecting security equipment; and
if receiving a predetermined authorization code, terminating further processing associated with the received surveillance profile, otherwise;
dispatching the emergency services personnel in accordance with the surveillance profile of the detecting security equipment and the received tracking information of emergency services personnel; and
informing a subscriber of the security breach by dispatching a sequence of designated telephone numbers until the first of receiving a response by an answering party or exhausting the sequence of designated telephone numbers without receiving an answer. - View Dependent Claims (10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20)
-
Specification