Selectively enabled threat based information system
First Claim
Patent Images
1. A method for selectively monitoring a plurality of privacy sensitive areas, each containing surveillance equipment, comprising:
- assigning each of said plurality of privacy sensitive areas a privacy threshold value, wherein said plurality of privacy sensitive areas includes at least one privacy sensitive area having a first privacy threshold value and a second privacy sensitive area having a second privacy threshold value;
receiving a threat level without using said surveillance equipment;
selectively activating an sensor of said surveillance equipment associated with each of said plurality of privacy sensitive areas when said threat level exceeds said privacy threshold value; and
deactivating said sensor of said surveillance equipment associated with each of said plurality of privacy sensitive areas when said threat level does not exceed said privacy threshold value.
0 Assignments
0 Petitions
Accused Products
Abstract
A method for selectively monitoring a privacy sensitive area includes assigning the privacy sensitive area a privacy threshold value, receiving a threat level, and activating surveillance equipment associated with said privacy sensitive area when said threat level exceeds said privacy threshold value.
-
Citations
22 Claims
-
1. A method for selectively monitoring a plurality of privacy sensitive areas, each containing surveillance equipment, comprising:
-
assigning each of said plurality of privacy sensitive areas a privacy threshold value, wherein said plurality of privacy sensitive areas includes at least one privacy sensitive area having a first privacy threshold value and a second privacy sensitive area having a second privacy threshold value; receiving a threat level without using said surveillance equipment; selectively activating an sensor of said surveillance equipment associated with each of said plurality of privacy sensitive areas when said threat level exceeds said privacy threshold value; and deactivating said sensor of said surveillance equipment associated with each of said plurality of privacy sensitive areas when said threat level does not exceed said privacy threshold value. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14)
-
-
15. A method for selectively monitoring a plurality of privacy sensitive areas, each containing surveillance equipment, comprising:
-
assigning each of said plurality of privacy sensitive areas an independent privacy threshold value including evaluating a degree of privacy desired in each of said privacy sensitive areas and assigning said privacy threshold value in relation to said desire for privacy in each of said privacy sensitive areas; receiving a threat level without using said surveillance equipment; and comparing said threat level to said privacy threshold value for each of said privacy sensitive areas and activating at least one inactive sensor of surveillance equipment associated with each of said privacy sensitive areas when said threat level exceeds said privacy threshold value in each of said privacy sensitive areas and deactivating said at least one sensor of said surveillance equipment associated with each of said privacy sensitive areas when said threat level does not exceed said privacy threshold value in each of said privacy sensitive areas; wherein said activating an inactive sensor of surveillance equipment associated with each of said privacy sensitive areas includes activating one of a surveillance camera, a motion sensor, or an audio receptive device associated with said privacy sensitive area when said threat level in each of said privacy sensitive areas exceeds said independent privacy threshold value. - View Dependent Claims (16, 17)
-
-
18. A system for selectively monitoring a plurality of privacy sensitive areas, comprising:
-
a surveillance component configured to be associated with each of said plurality of privacy sensitive areas, the surveillance component having a sensor; a surveillance system interface configured to selectively activate and deactivate said sensor based on a threat level received without using said surveillance component; and a software or firmware module configured to access a privacy threshold value independently associated with each of said privacy sensitive areas based on an occupant'"'"'s expected level of privacy in each of said privacy sensitive areas and determine whether said received threat level is sufficiently high to selectively activate said sensor; wherein said sensor is deactivated when said received threat level is not above said privacy threshold value independently associated with each of said privacy sensitive areas. - View Dependent Claims (19, 20, 21, 22)
-
Specification