Claims
- 1. A method for monitoring a security communications system for at least one designated property comprising the steps of:
providing a computer for transmitting signals to and receiving signals from designated security equipment and devices disposed along selected portions of a designated property stored on a computer readable medium; transmitting a signal representative of a display of said security equipment by said computer for detection of security event data; retrieving said display data by said computer; sending security event data to an operation center for off site storage and dissemination of said display of said designated property to a property owner; wherein a property owner includes at least one member provided to said security system and designated as a security contact; responding to said security event data by a property owner; and directing said computer to respond to said security event data by a property owner.
- 2. The method for monitoring a security communications system of claim 1, wherein said computer is a personal computer including a video camera having a connection to the Internet.
- 3. The method for monitoring a security communications system of claim 2, wherein said personal computer and said video camera further comprise an image software application, and including the steps of:
after retrieving said display data, said image software monitoring and analyzing images provided by said camera, including detecting changes in the area surrounding said designated property, capturing images of said changes, storing said images on said computer readable medium, and generating an alarm condition.
- 4. The method for monitoring a security communications system of claim 3, wherein said system further comprises an Internet based utility application for receiving a coded signal transmitted from said security system when said alarm condition is generated.
- 5. The method for monitoring a security communications system of claim 4, and further comprising the steps of once said utility application receives said coded signal, said application includes:
verifying the origin of said coded signal; identifying and comparing said coded signal and said security system with records stored within said utility application; instructing said security system to transmit said stored images; receiving and recording said images; instructing said security system to seek verification of said alarm condition by a property owner; monitoring communications between said security system and a property owner; and recording all communications between said security system and a property owner.
- 6. The method for monitoring a security communications system of claim 5, wherein the step of seeking verification of said alarm condition by said security system includes the steps of:
using Instant Messaging by said security system to seek said verification including the steps of;
polling the status of a property owner and all other members of said security contact list via Instant Messaging; contacting each of said members via Instant Messaging currently in communication with and available on-line with the Internet; maintaining and receiving two-way communication with said available members via Instant Messaging including said security system providing information identifying said security system and said alarm condition; receiving instructions for responding to said alarm condition from said member to said security system via Instant Messaging; and carrying out said instructions.
- 7. The method for monitoring a security communications system of claim 6, wherein if said alarm condition is verified by said member, said security system method further comprises the steps of:
sending a code representing a higher urgency to said utility application; creating an event summary packet of information in response to said code by said utility application; transmitting said summary packet to a monitoring agent by said utility application; receiving of said summary packet by said monitoring agent; and responding to said code received by said monitoring agent.
- 8. The method for monitoring a security communications system of claim 7, wherein if said alarm condition is not verified by a property owner or at least one of said members, a different code representing a failure to contact and verify said alarm condition is sent to said utility application.
- 9. The method for monitoring a security communications system of claim 8, wherein said responding step includes at least one of the following:
if said code indicates to said monitoring agent that said alarm condition has been verified by a property owner or at least one of said members, contacting emergency authorities directly by said monitoring agent; and if said code indicates to said monitoring agent the failure to contact and verify said alarm condition, re-contacting a property owner or at least one of said members seeking verification of said alarm condition.
- 10. The method for monitoring a security communications system of claim 9, and further comprising the steps of:
wherein if said step of re-contacting a property owner or at least one of said members results in a failure to re-contact, then contacting emergency authorities directly by said monitoring agent; wherein if said step of re-contacting a property owner or at least one of said members is successful, then contacting emergency authorities if said alarm condition is verified; and wherein if said step of re-contacting a property owner or at least one of said members is successful, then remotely returning said security system to a normal state if a property owner or at least one of said members if alarm condition is confirmed as a false alarm.
- 11. A method for monitoring a security communications system for at least one designated property, said security system including personal computer communicating with a video camera via an image software application and connected to the Internet for implementing an Internet based utility application for communication with at least one member and at least one device provided to said security system and designated as a security contact, comprising the steps of:
using Instant Messaging to communicate security system results to a second device; using Instant Messaging to respond to said second device in the manner designated by said second device; and communicating said alarm condition received by said second device to a third party.
- 12. The method for monitoring a security communications system for at least one designated property of claim 11, said step of using Instant Messaging to communicate security system results to a second device further including the step of:
reporting security alarm conditions via Instant Messaging, including images of said at least one designated property.
- 13. The method for monitoring a security communications system for at least one designated property of claim 12, said step of using Instant Messaging to communicate security system results to a second device further including the step of:
establishing auto detection of entries on the notification list thereby designating the availability of said devices to notify.
- 14. The method for monitoring a security communications system for at least one designated property of claim 13, said step of using Instant Messaging to communicate security system results to a second device further including the step of:
automatically propagating notification to other of said members via said designated devices if no response is specified within a designated period of time.
- 15. The method for monitoring a security communications system for at least one designated property of claim 11, said step of using Instant Messaging to communicate security system results to a second device further including the step of:
manually sending a notification to a designated member in the case where an alarm condition exists at said designated property.
- 16. The method for monitoring a security communications system for at least one designated property of claim 15, said step of using Instant Messaging to respond to said second device in the manner designated by said second device further including the step of:
directing said security system to record events for said at least one designated property, wherein said events include one of the following designated events: images received from said camera, sound received from said camera, movement received from said camera and indications from sensors or switches further included with said security system and received by said computer and said camera.
- 17. The method for monitoring a security communications system for at least one designated property of claim 16, said step of using Instant Messaging to respond to said second device in the manner designated by said second device further including the steps of:
overriding said alarm condition in the case of false alarms, or acceptable unforeseen entries; turning said security system on or off; requesting a status report from said security system; placing said security system into a locked mode, thereby restricting access to the contents of the recording system; activating an audible siren, speaker system or flashing lights; re-training the camera system template image for visual detection; changing the sensitivity of detection for said devices; and controlling any action within said at least one designated property in response to said notification of said security system results.
- 18. The method for monitoring a security communications system for at least one designated property of claim 17, said step of communicating said alarm condition received by said second device to a third party further including the steps of:
redirecting notification to said designated recipient; forwarding said notification to said third party, said third party including but not limited to local law enforcement, a professional monitoring organization, and another recipient; copying another party upon said notification; and responding to said notification through a second communication path.
- 19. A method for monitoring a security communications system for at least one designated property, said security system including personal computer communicating with a video camera via an image software application and connected to the Internet for implementing an Internet based utility application for communication with at least one member and at least one device provided to said security system and designated as a security contact, comprising the steps of:
using Instant Messaging to communicate security system results to a second device; using Instant Messaging to respond to said second device in the manner designated by said second device, including the step of directing said security system to record events for said at least one designated property, wherein said events include one of the following designated events: images received from said camera, sound received from said camera, movement received from said camera and indications from sensors or switches further included with said security system and received by said computer and said camera; and communicating said alarm condition received by said second device to a third party.
- 20. The method for monitoring a security communications system for at least one designated property of claim 19, said step of using Instant Messaging to communicate security system results to a second device further including the steps of:
reporting security alarm conditions via Instant Messaging, including images of said at least one designated property; establishing auto detection of entries on the notification list thereby designating the availability of said devices to notify; automatically propagating notification to other of said members via said designated devices if no response is specified within a designated period of time; and manually sending a notification to a designated member in the case where an alarm condition exists at said designated property.
- 21. The method for monitoring a security communications system for at least one designated property of claim 20, said step of using Instant Messaging to respond to said second device in the manner designated by said second device further including the steps of:
overriding said alarm condition in the case of false alarms, or acceptable unforeseen entries; turning said security system on or off; requesting a status report from said security system; placing said security system into a locked mode, thereby restricting access to the contents of the recording system; activating an audible siren, speaker system or flashing lights; re-training the camera system template image for visual detection; changing the sensitivity of detection for said devices; and controlling any action within said at least one designated property in response to said notification of said security system results.
- 22. The method for monitoring a security communications system for at least one designated property of claim 21, said step of communicating said alarm condition received by said second device to a third party further including the steps of:
redirecting notification to said designated recipient; forwarding said notification to said third party, said third party including but not limited to local law enforcement, a professional monitoring organization, and another recipient; copying another party upon said notification; and responding to said notification through a second communication path.
CLAIM OF BENEFIT OF FILING DATE
[0001] The present application claims the benefit of the filing date of U.S. Provisional Application Serial No. 60/342,705 filed Dec. 20, 2001.
Provisional Applications (1)
|
Number |
Date |
Country |
|
60342705 |
Dec 2001 |
US |