Automated, remotely-verified alarm system with intrusion and video surveillance and digitial video recording
First Claim
1. A non-transitory processor-readable medium storing code representing instructions to be executed by a processor, the code comprising code to cause the processor to:
- receive from a sensor an indication of an event at a monitored premise;
analyze, using video analytics and based on the indication of the event, an image associated with the event to automatically identify whether the image satisfies an alarm trigger;
send to a first user, according to a set of configuration parameters defined by the first user, and based on the image failing to satisfy the alarm trigger, a first signal representing the indication of the event such that the first user can access the image associated with the event;
send to a second user, according to the set of configuration parameters, a second signal representing the indication of the event such that the second user can access the image associated with the event;
receive a verification notification that the second user has verified the event as a valid alarm event; and
send, in response to the verification notification a signal to an emergency response service provider to provide the emergency response service provider access to the image associated with the event.
6 Assignments
0 Petitions
Accused Products
Abstract
An automated self-monitored alarm verification solution including at least a premises portion, a server portion, and an end user device portion. Alarm verification includes capturing by an image capture device at least one image in response to a detection event, and transmitting a first data signal including the image to a local signal processing device. The signal processing device transmits a second signal including at least a portion of the image to a remote hosted server according to at least a first set of predetermined parameters. After receiving the second signal, the server transmits a third signal including at least a portion of the image from the hosted server to a user device. Using the user device, a user views the image and indicates a validity status of the alarm based at least in part on the content of the image.
-
Citations
32 Claims
-
1. A non-transitory processor-readable medium storing code representing instructions to be executed by a processor, the code comprising code to cause the processor to:
-
receive from a sensor an indication of an event at a monitored premise; analyze, using video analytics and based on the indication of the event, an image associated with the event to automatically identify whether the image satisfies an alarm trigger; send to a first user, according to a set of configuration parameters defined by the first user, and based on the image failing to satisfy the alarm trigger, a first signal representing the indication of the event such that the first user can access the image associated with the event; send to a second user, according to the set of configuration parameters, a second signal representing the indication of the event such that the second user can access the image associated with the event; receive a verification notification that the second user has verified the event as a valid alarm event; and send, in response to the verification notification a signal to an emergency response service provider to provide the emergency response service provider access to the image associated with the event. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18)
-
-
19. A non-transitory processor-readable medium storing code representing instructions to be executed by a processor, the code comprising code to cause the processor to:
-
receive from a sensor an indication of an event at a monitored premise, the indication of the event detected by the sensor based on non-image data; analyze, using video analytics and based on the indication of the event, an image associated with the event to automatically identify whether the image satisfies an alarm trigger; send to a first user, according to a set of configuration parameters defined by the first user, and based on the image failing to satisfy the alarm trigger, a first signal representing the indication of the event such that the first user can access data associated with the event, the data including the image; and send to a second user, according to the set of configuration parameters, a second signal representing the indication of the event such that the second user can access data associated with the event. - View Dependent Claims (20, 21, 22, 23, 24, 25, 26)
-
-
27. A method, comprising:
-
receiving from a sensor an indication of an event at a monitored premise, the indication of the event detected by the sensor based on non-image data, the event occurring from a first time to a second time; analyzing, using video analytics and based on the indication of the event, a first image associated with the event to automatically identify whether the first image satisfies an alarm trigger; sending, to a first user and based on the first image net failing to satisfying the alarm trigger, a first signal representing the indication of the event such that the first user can access a set of images associated with the monitored premise, the set of images including the first image, a second image, and a third image, the second image being captured by an image capture device before the first time, the third image being captured after the second time, the image capture device being separate from the sensor; and sending, to a second user, a second signal representing the indication of the event such that the second user can access the set of images associated with the monitored premise. - View Dependent Claims (28, 29, 30, 31, 32)
-
Specification