Audio monitoring and sound identification process for remote alarms
First Claim
1. A method for remote monitoring of alarms, the method comprising:
- providing, by one or more processors of a mobile computing device, a user interface to a user of the mobile computing device, the user interface enabling the user to (i) enter alarm descriptors associated with alarm devices, and (ii) indicate timings of triggering alarm devices;
receiving, by the one or more processors, a timing of triggering a first alarm device indicated by the user via the user interface;
after receiving the timing of triggering the first alarm device, utilizing, by the one or more processors, a microphone of the mobile computing device to detect a first audio test signal generated by the first alarm device;
processing, by the one or more processors, the first audio test signal to generate first alarm identification data;
receiving, by the one or more processors, a first alarm descriptor entered by the user via the user interface; and
transferring (i) the first alarm descriptor, and (ii) the first alarm identification data, from the mobile computing device to an alarm monitoring system to enable the alarm monitoring system to identify the first alarm device when the first alarm device generates an audio signal in response to detecting an alarm condition.
1 Assignment
0 Petitions
Accused Products
Abstract
In a method for remote monitoring of alarms, a user interface is provided to a user of a mobile computing. The user interface enables the user to enter alarm descriptors associated with alarm devices, and indicate timings of triggering alarm devices. A timing of triggering a first alarm device indicated by the user is received, after which a microphone of the mobile computing device is utilized to detect a first audio test signal generated by the first alarm device. The first audio test signal is processed to generate first alarm identification data, and a first alarm descriptor entered by the user is received. The first alarm descriptor and first alarm identification data are transferred from the mobile computing device to an alarm monitoring system to enable the alarm monitoring system to identify the first alarm device when the first alarm device detects an alarm condition and generates an audio signal.
63 Citations
20 Claims
-
1. A method for remote monitoring of alarms, the method comprising:
-
providing, by one or more processors of a mobile computing device, a user interface to a user of the mobile computing device, the user interface enabling the user to (i) enter alarm descriptors associated with alarm devices, and (ii) indicate timings of triggering alarm devices; receiving, by the one or more processors, a timing of triggering a first alarm device indicated by the user via the user interface; after receiving the timing of triggering the first alarm device, utilizing, by the one or more processors, a microphone of the mobile computing device to detect a first audio test signal generated by the first alarm device; processing, by the one or more processors, the first audio test signal to generate first alarm identification data; receiving, by the one or more processors, a first alarm descriptor entered by the user via the user interface; and transferring (i) the first alarm descriptor, and (ii) the first alarm identification data, from the mobile computing device to an alarm monitoring system to enable the alarm monitoring system to identify the first alarm device when the first alarm device generates an audio signal in response to detecting an alarm condition. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A non-transitory computer-readable memory storing instructions that, when executed by one or more processors of a mobile computing device, cause the one or more processors to:
-
provide a user interface to a user of the mobile computing device, the user interface enabling the user to (i) enter alarm descriptors associated with alarm devices, and (ii) indicate timings of triggering alarm devices; receive a timing of triggering a first alarm device indicated by the user via the user interface; after receiving the timing of triggering the first alarm device, utilize a microphone of the mobile computing device to detect a first audio test signal generated by the first alarm device; process the first audio test signal to generate first alarm identification data; receive a first alarm descriptor entered by the user via the user interface; and transfer (i) the first alarm descriptor, and (ii) the first alarm identification data, from the mobile computing device to an alarm monitoring system to enable the alarm monitoring system to identify the first alarm device when the first alarm device generates an audio signal in response to detecting an alarm condition. - View Dependent Claims (12, 13, 14, 15)
-
-
16. A non-transitory computer-readable memory storing instructions that, when executed by one or more processors of a mobile computing device, cause the one or more processors to:
-
provide a user interface to a user of the mobile computing device, the user interface enabling the user to (i) enter alarm descriptors associated with alarm devices, and (ii) indicate timings of triggering alarm devices; receive a timing of triggering a first alarm device indicated by the user via the user interface; after receiving the timing of triggering the first alarm device, utilize a microphone of the mobile computing device to detect a first audio test signal generated by the first alarm device; record the first audio test signal in a memory of the mobile computing device; receive a first alarm descriptor entered by the user via the user interface; and transfer (i) the first alarm descriptor, and (ii) the recorded first audio test signal, from the mobile computing device to an alarm monitoring system to enable the alarm monitoring system to identify the first alarm device when the first alarm device generates an audio signal in response to detecting an alarm condition. - View Dependent Claims (17, 18, 19, 20)
-
Specification