×

System and method for providing configurable security monitoring utilizing an integrated information system

  • US 7,627,665 B2
  • Filed: 04/03/2001
  • Issued: 12/01/2009
  • Est. Priority Date: 09/28/2000
  • Status: Expired due to Term
First Claim
Patent Images

1. In an integrated information system including a central server in communication with premises servers that are associated with two or more geographically distinct sites, a method for processing monitoring device data, the method comprising:

  • obtaining monitoring device data at the premises servers that are associated with the two or more geographically distinct sites, wherein the monitoring device data corresponds to two monitoring devices with at least one monitoring device at each geographically distinct site wherein the monitoring device data is obtained continuously;

    at the premises servers, characterizing the monitoring device data as at least one of asset data, resource data, and event data;

    transmitting the monitoring device data and characterization data from the premises servers to the central server;

    obtaining one or more monitoring rules at the central server corresponding to the at least one monitoring device, wherein the one or more rules establish the thresholds of monitoring device data that define a rule violation and wherein obtaining one or more rules includes at least one of;

    obtaining asset rules if the monitoring device data is characterized as asset data;

    obtaining resource rules if the monitoring device data is characterized as resource data; and

    obtaining device rules if the monitoring device data is characterized as event data;

    processing the monitoring device data at the central server according to the monitoring rules to determine whether a rule violation occurred wherein a rule violation identifies a combination of thresholds for each of the two monitoring devices;

    wherein processing the monitoring device data according to the rules includes determining whether the monitoring device data exceeds thresholds of security information indicative of whether an unauthorized access to a premises has occurred; and

    generating an output corresponding to the processing of the monitoring device data, wherein the output indicates whether a rule violation occurred;

    characterizing the monitoring device data as asset data, resource data or event data;

    wherein asset data includes data from an identifiable object that is not capable of independent action;

    wherein resource data includes data from an object capable of independent action; and

    wherein event data includes data from a device having a defined state.

View all claims
  • 19 Assignments
Timeline View
Assignment View
    ×
    ×