IPC분류정보
국가/구분 |
United States(US) Patent
등록
|
국제특허분류(IPC7판) |
|
출원번호 |
US-0116351
(2002-04-03)
|
등록번호 |
US-8392552
(2013-03-05)
|
발명자
/ 주소 |
- Alexander, Bruce
- Talley, Paul
- Hicks, Jeffrey
|
출원인 / 주소 |
- Vig Acquisitions Ltd., L.L.C.
|
인용정보 |
피인용 횟수 :
6 인용 특허 :
175 |
초록
▼
A system and method for implementing an integrated information system are provided. A premises server is in communication with a variety of information sources that produce monitoring data for a premises. The premises server collects, presents, and transmits the monitoring device data to a central s
A system and method for implementing an integrated information system are provided. A premises server is in communication with a variety of information sources that produce monitoring data for a premises. The premises server collects, presents, and transmits the monitoring device data to a central server capable of processing data from multiple premises servers. The central server receives the data and traverses one or more logical rule sets to determine whether the inputted data violates the rules. Based on an evaluation of the rules, the central server generates outputs in the form of communication to one or more authorized users via a variety of communication mediums and devices and/or the instigation of a variety of acts corresponding to the evaluation of the rules.
대표청구항
▼
1. A method, comprising: categorizing monitoring device data based on a source of the monitoring device data, wherein categorizing the monitoring device data includes determining whether the monitoring device data was generated at least in part, by an identifiable object, the identifiable object hav
1. A method, comprising: categorizing monitoring device data based on a source of the monitoring device data, wherein categorizing the monitoring device data includes determining whether the monitoring device data was generated at least in part, by an identifiable object, the identifiable object having a determined capability of independent activity in generating the monitoring device data;obtaining a set of rules from a database, wherein the set of rules includes at least one of: an asset rule for monitoring device data characterized as asset data, a resource rule for monitoring device data characterized as resource data, and a device rule for monitoring device data characterized as event data;determining from the set of rules whether one or more rules that are based on the categorization of the monitoring device data are found, wherein at least one rule of the set of rules applies to monitoring device data characterized as corresponding to an independent object and wherein at least another rule of the set of rules applies to monitoring device data characterized as not corresponding to an independent object;processing the monitoring device data according to the one or more rules that are found by causing instructions to be executed by a computing device in response to any of the one or more rules that are based on the categorization of the monitoring device data; anddetermining whether the monitoring device data is outside a range of the one or more rules that are found, where the range defines a rule violation. 2. The method as recited in claim 1, further comprising generating an output on a display, wherein the output that is displayed is based on whether the monitoring device data is outside the range that defines the rule violation. 3. The method as recited in claim 2 wherein generating an output based on the rule violation further includes generating an output confirming the identity of a user attempting to log onto the computing device network. 4. The method as recited in claim 3, wherein the output confirming the identity of the user includes receiving and processing a communication from one or more authorized users in a call back. 5. The method as recited in claim 3, wherein the output confirming the identity of the user includes a communication to one or more authorized users including a personal identification number. 6. The method as recited in claim 5, further comprising comparing an inputted personal identification number to the personal identification number communicated to the one or more authorized users. 7. The method as recited in claim 2, wherein generating an output based on the rule violation includes generating an output terminating access to the computing device network if a user identity cannot be confirmed. 8. A computer system having a processor, a memory, and an operating system, the computer system operable to perform the method recited in claim 1. 9. The method as recited in claim 1, wherein the at least one of the set of rules is correlated to an object includes at least one rule correlated to an object capable of independent action. 10. The method as recited in claim 1, wherein the at least one of the set of rules is correlated to an object includes at least one rule correlated to an object not capable of independent action. 11. A non-transitory computer-readable medium having computer executable instructions for performing a method comprising: categorizing monitoring device data based on a source of the monitoring device data, wherein categorizing the monitoring device data includes determining whether the monitoring device data was generated, at least in part, by an identifiable object, the identifiable object having a determined capability of independent activity in generating the monitoring device data;obtaining a set of rules from a database, wherein the set of rules includes at least one of: an asset rule for monitoring device data characterized as asset data, a resource rule for monitoring device data characterized as resource data, and a device rule for monitoring device data characterized as event data;determining from the set of rules whether one or more rules that are based on the categorization of the monitoring device data are found, wherein at least one rule of the set of rules applies to monitoring device data characterized as corresponding to an independent object and wherein at least another rule of the set of rules applies to monitoring device data characterized as not corresponding to an independent object;processing the monitoring device data according to the one or more rules that are found by causing instructions to be executed by a computing device in response to any of the one or more rules that are based on the categorization of the monitoring device data; anddetermining whether the monitoring device data is outside a range of the one or more rules that are found, where the range defines a rule violation. 12. A method, comprising: associating an object with a location identifier and a source of monitoring device data, the object having a determined capability of independent activity in generating the monitoring device data;receiving monitoring device data associated with the location identifier;obtaining a set of rules from a database, wherein the set of rules includes at least one of: an asset rule for monitoring device data characterized as asset data, a resource rule for monitoring device data characterized as resource data, and a device rule for monitoring device data characterized as event data;determining from the set of rules, using a computing device, if one or more rules that correspond to a data type of the monitoring device data are found, wherein at least one rule of the set of rules applies to monitoring device data characterized as corresponding to an object and wherein at least one rule of the set of rules applies to monitoring device data characterized as not corresponding to an object;creating a record including the monitoring device data associated with the location identifier; anddetermining, using the computing device, if the movement of the object is authorized based on the monitoring device data if the one or more rules are found. 13. The method as recited in claim 12, further comprising generating an output of a video record including identification information and location information for the object. 14. The method as recited in claim 13, further comprising obtaining time of day monitoring device data and wherein the video record further includes the time of day monitoring device data. 15. The method as recited in claim 12, wherein the monitoring device data is associated with a fixed location. 16. The method as recited in claim 12, wherein the monitoring device data is associated with a variable location. 17. The method as recited in claim 12 wherein the monitoring device data comes from a bar code scanner. 18. The method as recited in claim 12, further comprising receiving the one or more rules that correspond to the data type of the monitoring device data, the one or more rules including an asset rule. 19. The method as recited in claim 18, wherein the one or more rules are associated with determining whether an asset corresponding to the location identifier is properly located within a premises. 20. The method as recited in claim 18, wherein the one or more rules are used to associate a location of asset data within a premises based on the monitoring device data. 21. The method as recited in claim 18, further comprising receiving one or more rules corresponding to identification tracking, location monitoring devices, and a resource rule from a separate monitoring device. 22. A non-transitory computer-readable medium having computer-executable instructions for performing the method recited in claim 12. 23. A computer system having a processor, a memory, and an operating system, the computer system operable to perform the method recited in claim 12. 24. The method as recited in claim 12, wherein the at least one of the set of rules is correlated to an independent object includes at least one rule correlated to an object capable of independent action. 25. The method as recited in claim 12, wherein the at least one of the set of rules is correlated to an object includes at least one rule correlated to an object not capable of independent action. 26. A method, comprising: categorizing monitoring device data from an access control monitoring device, the characterization based on a determination of whether the access control monitoring device data corresponds to an identifiable object that generated, at least in part, the identifiable object having a determined capability of independent activity for generating monitoring device data;obtaining a set of rules from a database, wherein the set of rules includes at least one of: an asset rule for monitoring device data characterized as asset data, a resource rule for monitoring device data characterized as resource data, and a device rule for monitoring device data characterized as event data;determining from the set of rules, using a computing device, whether one or more rules that correspond to the monitoring device data are found, the one or more rules configured to establish access rights for the access control monitoring device, wherein at least one rule of the set of rules applies to monitoring device data characterized as corresponding to an object and wherein at least one rule of the set of rules applies to monitoring device data not characterized as corresponding to an object; anddetermining, using a computing device, whether an individual has access rights to the access control monitoring device by determining whether the monitoring device data is outside a range of the one or more rules that are found, where the range defines a rule violation. 27. The method as recited in claim 26, wherein the access control monitoring device is associated with a geographic location. 28. The method as recited in claim 26, further comprising generating an output on a display, wherein the output that is displayed indicates a grant or denial of access by the access control monitoring device. 29. The method as recited in claim 28, wherein generating an output includes releasing the access control monitoring device if the individual has access rights to the access control monitoring device. 30. The method as recited in claim 28, wherein generating an output includes generating an alarm if the individual does not have access rights to the access control monitoring device. 31. The method as recited in claim 26, wherein the access control monitoring device is one of a plurality of access control devices that are remote from each other. 32. A non-transitory computer-readable medium having computer executable instructions for performing the method of claim 26. 33. The method as recited in claim 26, wherein the at least one of the set of rules is correlated to an independent object includes at least one rule correlated to an object capable of independent action. 34. The method as recited in claim 26, wherein the at least one of the set of rules is correlated to an object includes at least one rule correlated to an object not capable of independent action. 35. A computer system having a processor, a memory, and an operating system, the computer system operable to perform a method comprising: categorizing monitoring device data from an access control monitoring device, the characterization based on a determination of whether the access control monitoring device data corresponds to an identifiable object that generated, at least in part, the identifiable object having a determined capability of independent activity for generating monitoring device data;obtaining a set of rules from a database, wherein the set of rules includes at least one of: an asset rule for monitoring device data characterized as asset data, a resource rule for monitoring device data characterized as resource data, and a device rule for monitoring device data characterized as event data;determining from the set of rules, using a computing device, whether one or more rules that correspond to the monitoring device data are found, the one or more rules configured to establish access rights for the access control monitoring device, wherein at least one rule of the set of rules applies to monitoring device data characterized as corresponding to an object and wherein at least one rule of the set of rules applies to monitoring device data not characterized as corresponding to an object; anddetermining, using a computing device, whether an individual has access rights to the access control monitoring device by determining whether the monitoring device data is outside a range of the one or more rules that are found, where the range defines a rule violation.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.