System and method for providing configurable security monitoring utilizing an integrated information system
DCFirst Claim
1. A method, comprising:
- categorizing monitoring device data based on a source of the monitoring device data, wherein categorizing the monitoring device data includes determining whether the monitoring device data was generated at least in part, by an identifiable object, the identifiable object having a determined capability of independent activity in generating the monitoring device data;
obtaining a set of rules from a database, wherein the set of rules includes at least one of;
an asset rule for monitoring device data characterized as asset data, a resource rule for monitoring device data characterized as resource data, and a device rule for monitoring device data characterized as event data;
determining from the set of rules whether one or more rules that are based on the categorization of the monitoring device data are found, wherein at least one rule of the set of rules applies to monitoring device data characterized as corresponding to an independent object and wherein at least another rule of the set of rules applies to monitoring device data characterized as not corresponding to an independent object;
processing the monitoring device data according to the one or more rules that are found by causing instructions to be executed by a computing device in response to any of the one or more rules that are based on the categorization of the monitoring device data; and
determining whether the monitoring device data is outside a range of the one or more rules that are found, where the range defines a rule violation.
17 Assignments
Litigations
1 Petition
Accused Products
Abstract
A system and method for implementing an integrated information system are provided. A premises server is in communication with a variety of information sources that produce monitoring data for a premises. The premises server collects, presents, and transmits the monitoring device data to a central server capable of processing data from multiple premises servers. The central server receives the data and traverses one or more logical rule sets to determine whether the inputted data violates the rules. Based on an evaluation of the rules, the central server generates outputs in the form of communication to one or more authorized users via a variety of communication mediums and devices and/or the instigation of a variety of acts corresponding to the evaluation of the rules.
218 Citations
35 Claims
-
1. A method, comprising:
-
categorizing monitoring device data based on a source of the monitoring device data, wherein categorizing the monitoring device data includes determining whether the monitoring device data was generated at least in part, by an identifiable object, the identifiable object having a determined capability of independent activity in generating the monitoring device data; obtaining a set of rules from a database, wherein the set of rules includes at least one of;
an asset rule for monitoring device data characterized as asset data, a resource rule for monitoring device data characterized as resource data, and a device rule for monitoring device data characterized as event data;determining from the set of rules whether one or more rules that are based on the categorization of the monitoring device data are found, wherein at least one rule of the set of rules applies to monitoring device data characterized as corresponding to an independent object and wherein at least another rule of the set of rules applies to monitoring device data characterized as not corresponding to an independent object; processing the monitoring device data according to the one or more rules that are found by causing instructions to be executed by a computing device in response to any of the one or more rules that are based on the categorization of the monitoring device data; and determining whether the monitoring device data is outside a range of the one or more rules that are found, where the range defines a rule violation. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A non-transitory computer-readable medium having computer executable instructions for performing a method comprising:
-
categorizing monitoring device data based on a source of the monitoring device data, wherein categorizing the monitoring device data includes determining whether the monitoring device data was generated, at least in part, by an identifiable object, the identifiable object having a determined capability of independent activity in generating the monitoring device data; obtaining a set of rules from a database, wherein the set of rules includes at least one of;
an asset rule for monitoring device data characterized as asset data, a resource rule for monitoring device data characterized as resource data, and a device rule for monitoring device data characterized as event data;determining from the set of rules whether one or more rules that are based on the categorization of the monitoring device data are found, wherein at least one rule of the set of rules applies to monitoring device data characterized as corresponding to an independent object and wherein at least another rule of the set of rules applies to monitoring device data characterized as not corresponding to an independent object; processing the monitoring device data according to the one or more rules that are found by causing instructions to be executed by a computing device in response to any of the one or more rules that are based on the categorization of the monitoring device data; and determining whether the monitoring device data is outside a range of the one or more rules that are found, where the range defines a rule violation.
-
-
12. A method, comprising:
-
associating an object with a location identifier and a source of monitoring device data, the object having a determined capability of independent activity in generating the monitoring device data; receiving monitoring device data associated with the location identifier; obtaining a set of rules from a database, wherein the set of rules includes at least one of;
an asset rule for monitoring device data characterized as asset data, a resource rule for monitoring device data characterized as resource data, and a device rule for monitoring device data characterized as event data;determining from the set of rules, using a computing device, if one or more rules that correspond to a data type of the monitoring device data are found, wherein at least one rule of the set of rules applies to monitoring device data characterized as corresponding to an object and wherein at least one rule of the set of rules applies to monitoring device data characterized as not corresponding to an object; creating a record including the monitoring device data associated with the location identifier; and determining, using the computing device, if the movement of the object is authorized based on the monitoring device data if the one or more rules are found. - View Dependent Claims (13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25)
-
-
26. A method, comprising:
-
categorizing monitoring device data from an access control monitoring device, the characterization based on a determination of whether the access control monitoring device data corresponds to an identifiable object that generated, at least in part, the identifiable object having a determined capability of independent activity for generating monitoring device data; obtaining a set of rules from a database, wherein the set of rules includes at least one of;
an asset rule for monitoring device data characterized as asset data, a resource rule for monitoring device data characterized as resource data, and a device rule for monitoring device data characterized as event data;determining from the set of rules, using a computing device, whether one or more rules that correspond to the monitoring device data are found, the one or more rules configured to establish access rights for the access control monitoring device, wherein at least one rule of the set of rules applies to monitoring device data characterized as corresponding to an object and wherein at least one rule of the set of rules applies to monitoring device data not characterized as corresponding to an object; and determining, using a computing device, whether an individual has access rights to the access control monitoring device by determining whether the monitoring device data is outside a range of the one or more rules that are found, where the range defines a rule violation. - View Dependent Claims (27, 28, 29, 30, 31, 32, 33, 34)
-
-
35. A computer system having a processor, a memory, and an operating system, the computer system operable to perform a method comprising:
-
categorizing monitoring device data from an access control monitoring device, the characterization based on a determination of whether the access control monitoring device data corresponds to an identifiable object that generated, at least in part, the identifiable object having a determined capability of independent activity for generating monitoring device data; obtaining a set of rules from a database, wherein the set of rules includes at least one of;
an asset rule for monitoring device data characterized as asset data, a resource rule for monitoring device data characterized as resource data, and a device rule for monitoring device data characterized as event data;determining from the set of rules, using a computing device, whether one or more rules that correspond to the monitoring device data are found, the one or more rules configured to establish access rights for the access control monitoring device, wherein at least one rule of the set of rules applies to monitoring device data characterized as corresponding to an object and wherein at least one rule of the set of rules applies to monitoring device data not characterized as corresponding to an object; and determining, using a computing device, whether an individual has access rights to the access control monitoring device by determining whether the monitoring device data is outside a range of the one or more rules that are found, where the range defines a rule violation.
-
Specification