Building security system
First Claim
Patent Images
1. A method, comprising:
- receiving, by a first computing device at a first location from a second computing device at a second location remote from the first location, sensor data indicative of a sensed condition at the second location and identification data identifying the second computing device;
determining that the second computing device is subscribed to a monitoring service based on the identification data;
determining whether an alarm at the second location is armed at a time corresponding to the sensed condition;
if the alarm at the second location is armed at the time corresponding to the sensed condition, transmitting, to a third computing device at a third location remote from the first location and the second location, the sensor data indicative of the sensed condition, the identification data, and event data indicating that an event has occurred at the second location; and
if the alarm at the second location is disarmed at the time corresponding to the sensed condition, storing, by the first computing device, the sensor data indicative of the sensed condition, the identification data, and event data indicating that an event has occurred at the second location.
2 Assignments
0 Petitions
Accused Products
Abstract
A security system that can be used in a home, office, or other building in order to generate alarms or take other actions depending on conditions within the building. The security system may rely on sensors within the building which sense various conditions and collect other data. The information learned from the sensors can be communicated to a location outside the building for processing, such as, but not limited to, processing associated with a need to instigate an alarm.
13 Citations
20 Claims
-
1. A method, comprising:
-
receiving, by a first computing device at a first location from a second computing device at a second location remote from the first location, sensor data indicative of a sensed condition at the second location and identification data identifying the second computing device; determining that the second computing device is subscribed to a monitoring service based on the identification data; determining whether an alarm at the second location is armed at a time corresponding to the sensed condition; if the alarm at the second location is armed at the time corresponding to the sensed condition, transmitting, to a third computing device at a third location remote from the first location and the second location, the sensor data indicative of the sensed condition, the identification data, and event data indicating that an event has occurred at the second location; and if the alarm at the second location is disarmed at the time corresponding to the sensed condition, storing, by the first computing device, the sensor data indicative of the sensed condition, the identification data, and event data indicating that an event has occurred at the second location. - View Dependent Claims (2, 3)
-
-
4. A method comprising:
-
receiving, by a computing device, first data indicative of an alarm condition sensed by a first sensor; receiving, by the computing device, second data indicative of an alarm condition sensed by a second sensor at a same location as the first sensor, wherein the second sensor is different from the first sensor, and wherein the alarm conditions sensed by the first sensor and the second sensor correspond to a common alarm event; determining that the first data indicates a need to activate an alarm; prior to activating the alarm, verifying a need to activate the alarm based on the second data; and in response to verifying the need to activate the alarm, transmitting an instruction to activate the alarm. - View Dependent Claims (5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16)
-
-
17. A method comprising:
-
receiving, by a computing device, first alarm condition data and second alarm condition data respectively sensed by a first sensor and a second sensor, wherein the first sensor and the second sensor comprise generally co-located sensors sensing a common alarm event; and responsive to determining that the first alarm condition data indicates a need to activate an alarm, verifying the need to activate the alarm based on the second alarm condition data, and then causing the alarm to be activated. - View Dependent Claims (18, 19, 20)
-
Specification