Location based dynamic geo-fencing system for security
First Claim
1. A dynamic integrated security system comprising:
- a processor;
a user interface having a display connected to the processor;
a plurality of security devices situated in a first geographical area, the plurality of security devices communicatively coupled to the processor and configured to monitor one or more parameters of the first geographical area; and
a security perimeter around a high profile entity initiated by a threat level having a predetermined magnitude, wherein the processor is configured to equip the high profile entity with a location tag to establish the security perimeter and track the high profile entity; and
wherein;
the security perimeter is a geo-fence that incorporates a second geographical area around the high profile entity;
the second geographical area moves and stays with the high profile entity upon a change of geographic position of the high profile entity;
the plurality of security devices within the first geographical area are monitored and controlled by the processor for reducing or preventing effects of the threat level against the high profile entity, and one or more of the plurality of security devices are configured to enter a high threat mode when the high profile entity enters the first geographical area and the processor provides specialized security coverage using the one or more of the plurality of security devices and provides the one or more parameters from the one or more of the plurality of security devices on the display of the user interface until the high profile entity exits the first geographical area and the one or more of the plurality of security devices exit the high threat mode;
a value of a profile of the entity that reveals the entity to be a high profile entity is a predetermined magnitude;
the predetermined magnitude of the value of the profile is B, which is between A and C;
A represents absence of worldly importance;
C represents most worldly importance;
the predetermined magnitude of the threat level is Y, which is between X and Z;
X represents absence of a threat of harm; and
Z represents certain destruction.
1 Assignment
0 Petitions
Accused Products
Abstract
A dynamic integrated security system having a user interface with a display connected to the processor. A plurality of security devices may be situated in a geographical area. A security perimeter may be placed around a high profile entity initiated by a threat level having a predetermined magnitude. The security perimeter may be a geo-fence that encompasses a geo area around the high profile entity. The geo area may encompass one or more security devices. The one or more security devices in the geo area may be connected to the processor. The geo area may move and stay with the high profile entity upon a change of geographic position of the high profile entity. The one or more security devices within the geo area may be monitored and controlled for reducing or preventing effects of the threat level against the high profile entity.
169 Citations
20 Claims
-
1. A dynamic integrated security system comprising:
-
a processor; a user interface having a display connected to the processor; a plurality of security devices situated in a first geographical area, the plurality of security devices communicatively coupled to the processor and configured to monitor one or more parameters of the first geographical area; and a security perimeter around a high profile entity initiated by a threat level having a predetermined magnitude, wherein the processor is configured to equip the high profile entity with a location tag to establish the security perimeter and track the high profile entity; and wherein; the security perimeter is a geo-fence that incorporates a second geographical area around the high profile entity; the second geographical area moves and stays with the high profile entity upon a change of geographic position of the high profile entity; the plurality of security devices within the first geographical area are monitored and controlled by the processor for reducing or preventing effects of the threat level against the high profile entity, and one or more of the plurality of security devices are configured to enter a high threat mode when the high profile entity enters the first geographical area and the processor provides specialized security coverage using the one or more of the plurality of security devices and provides the one or more parameters from the one or more of the plurality of security devices on the display of the user interface until the high profile entity exits the first geographical area and the one or more of the plurality of security devices exit the high threat mode; a value of a profile of the entity that reveals the entity to be a high profile entity is a predetermined magnitude; the predetermined magnitude of the value of the profile is B, which is between A and C; A represents absence of worldly importance; C represents most worldly importance; the predetermined magnitude of the threat level is Y, which is between X and Z; X represents absence of a threat of harm; and Z represents certain destruction. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A method in providing a security zone, comprising:
-
connecting a user interface having a display to a processor; detecting a threat level relative to an entity; equipping the entity with a location tag; generating a geo fence on the display to define a security zone around the entity in response to equipping the entity with the location tag; tracking the entity to maintain the security zone around the entity; connecting security devices within a geographical area to the processor; identifying that the entity has entered the geographical area; identifying that the threat level exceeds a predetermined magnitude when the entity is in the geographical area; placing the security devices in a high threat level mode in response to identifying that the threat level exceeds the predetermined magnitude; providing specialized security coverage using the security devices and monitoring data from the security devices on the display of the user interface in response to placing the security devices the high threat level mode; and removing the security devices from the high threat level mode when the entity exits the geographical area. - View Dependent Claims (12, 13, 14, 15)
-
-
16. A mechanism having a dynamic security zone, comprising:
-
a monitoring station comprising a processor and a display; a first area subject to a threat level; one or more security devices situated in the first area connectable to the monitoring station, the one or more security devices configured to monitor one or more physical parameters of the first area; and a geo-fence forming a perimeter around a place for an entity needing protection to reduce the threat level at the place, wherein the processor is configured to equip the entity with a location tag to establish the geo-fence and track the entity; and wherein; the perimeter and a second area within the perimeter move with the place for an entity; and any of the one or more security devices within the second area are connected to the monitoring station and the one or more physical parameters are monitored and controlled by the processor and the one or more of the plurality of security devices are configured to enter a high threat mode when the entity enters the first area and the processor provides specialized security coverage using the one or more security devices and provides the physical parameters from the one or more security devices on the display until the entity exits the first area and the one or more devices exit the high threat mode. - View Dependent Claims (17, 18, 19, 20)
-
Specification