发明名称 |
Automated, remotely-verified alarm system with intrusion and video surveillance and digitial video recording |
摘要 |
An automated self-monitored alarm verification solution including at least a premises portion, a server portion, and an end user device portion. Alarm verification includes capturing by an image capture device at least one image in response to a detection event, and transmitting a first data signal including the image to a local signal processing device. The signal processing device transmits a second signal including at least a portion of the image to a remote hosted server according to at least a first set of predetermined parameters. After receiving the second signal, the server transmits a third signal including at least a portion of the image from the hosted server to a user device. Using the user device, a user views the image and indicates a validity status of the alarm based at least in part on the content of the image. |
申请公布号 |
US9600987(B2) |
申请公布日期 |
2017.03.21 |
申请号 |
US201414533916 |
申请日期 |
2014.11.05 |
申请人 |
CheckVideo LLC |
发明人 |
Jackson Randall R. |
分类号 |
G06K9/00;G08B13/196;G08B25/00;H04N7/18;G08B29/00;G06T7/00 |
主分类号 |
G06K9/00 |
代理机构 |
|
代理人 |
|
主权项 |
1. A non-transitory processor-readable medium storing code representing instructions to be executed by a processor, the code comprising code to cause the processor to:
receive from a sensor an indication of an event at a monitored premise; analyze, using video analytics and based on the indication of the event, an image associated with the event to automatically identify whether the image satisfies an alarm trigger; send to a first user, according to a set of configuration parameters defined by the first user, and based on the image failing to satisfy the alarm trigger, a first signal representing the indication of the event such that the first user can access the image associated with the event; send to a second user, according to the set of configuration parameters, a second signal representing the indication of the event such that the second user can access the image associated with the event; receive a verification notification that the second user has verified the event as a valid alarm event; and send, in response to the verification notification a signal to an emergency response service provider to provide the emergency response service provider access to the image associated with the event. |
地址 |
Falls Church VA US |