IPC분류정보
국가/구분 |
United States(US) Patent
등록
|
국제특허분류(IPC7판) |
|
출원번호 |
US-0616785
(2012-09-14)
|
등록번호 |
US-8700769
(2014-04-15)
|
발명자
/ 주소 |
- Alexander, Bruce
- Talley, Paul
- Hicks, Jeffrey
|
출원인 / 주소 |
- VIG Acquisitions Ltd., L.L.C.
|
대리인 / 주소 |
Knobbe Martens Olson & Bear, LLP
|
인용정보 |
피인용 횟수 :
2 인용 특허 :
167 |
초록
▼
A system and method for implementing an integrated information system are provided. A premises server is in communication with a variety of information sources that produce monitoring data for a premises. The premises server collects, presents, and transmits the monitoring device data to a central s
A system and method for implementing an integrated information system are provided. A premises server is in communication with a variety of information sources that produce monitoring data for a premises. The premises server collects, presents, and transmits the monitoring device data to a central server capable of processing data from multiple premises servers. The central server receives the data and traverses one or more logical rule sets to determine whether the inputted data violates the rules. Based on an evaluation of the rules, the central server generates outputs in the form of communication to one or more authorized users via a variety of communication mediums and devices and/or the instigation of a variety of acts corresponding to the evaluation of the rules.
대표청구항
▼
1. A method, comprising: determining whether a source of at least a portion of monitoring device data is capable of independent activity in generating the at least a portion of the monitoring device data;categorizing the monitoring device data based at least in part on the source of the at least a p
1. A method, comprising: determining whether a source of at least a portion of monitoring device data is capable of independent activity in generating the at least a portion of the monitoring device data;categorizing the monitoring device data based at least in part on the source of the at least a portion of the monitoring device data;obtaining a set of one or more rules from one or more data stores, wherein the set of rules includes at least one of: an asset rule for monitoring device data categorized as corresponding to a source that is not capable of independent activity in generating the monitoring device data, a resource rule for monitoring device data categorized as corresponding to a source capable of independent activity in generating the monitoring device data, and a device rule for monitoring device data categorized as corresponding to event data;identifying from the set of rules at least one rule that corresponds to the categorization of the monitoring device data;processing the categorized monitoring device data by causing instructions to be executed by a computing device according to the identified at least one rule; anddetermining whether the monitoring device data is outside a range of the identified at least one rule, wherein the range defines a rule violation. 2. The method of claim 1, further comprising generating an output on a display, wherein the output on the display is based on whether the monitoring device data is outside the range that defines the rule violation. 3. The method of claim 2, wherein generating an output based on the rule violation further includes generating an output confirming the identity of a user attempting to log onto a computing device network. 4. The method of claim 1, wherein the set of rules comprises an asset rule, a resource rule, and a device rule. 5. The method of claim 3, wherein the output confirming the identity of the user includes a communication to one or more authorized users including a personal identification number. 6. The method of claim 5 further comprising comparing an inputted personal identification number to the personal identification number communicated to the one or more authorized users. 7. The method of claim 5, wherein generating an output based on the rule violation includes generating an output terminating access to the computing device network if a user identity cannot be confirmed. 8. The method of claim 1, wherein the identified at least one rule includes at least one rule correlated to an object capable of independent action. 9. The method of claim 1, wherein the identified at least one rule includes at least one rule correlated to an object not capable of independent action. 10. A computer-readable, non-transitory storage medium having one or more computer-executable modules, the one or more computer-executable modules comprising: a first module configured to: determine whether a source of at least a portion of monitoring device data is capable of independent activity in generating the at least a portion of the monitoring device data;categorize the monitoring device data based at least in part on the source of the at least a portion of the monitoring device data;identify from a set of rules stored in one or more data stores at least one rule that corresponds to the categorization of the monitoring device data, wherein the set of rules includes at least one of: an asset rule for monitoring device data categorized as corresponding to a source that is not capable of independent activity in generating the monitoring device data, a resource rule for monitoring device data categorized as corresponding to a source capable of independent activity in generating the monitoring device data, and a device rule for monitoring device data categorized as corresponding to event data;process the categorized monitoring device data by causing instructions to be executed by a computing device according to the identified at least one rule; anddetermine whether the monitoring device data is outside a range of the identified at least one rule, wherein the range defines a rule violation. 11. The computer-readable medium of claim 10, wherein the identified at least one rule includes at least one rule correlated to an object capable of independent action. 12. The computer-readable medium of claim 10, wherein the identified at least one rule includes at least one rule correlated to an object not capable of independent action. 13. A system comprising: a computing device in communication with one or more data stores, the computing device configured to: determine whether a source of at least a portion of monitoring device data is capable of independent activity in generating the at least a portion of the monitoring device data;categorize the monitoring device data based at least in part on the source of the at least a portion of the monitoring device data;identify at least one rule from a set of one or more rules stored in the one or more data stores that corresponds to the categorization of the monitoring device data,wherein the set of rules includes at least one of: an asset rule for monitoring device data categorized as corresponding to a source that is not capable of independent activity in generating the monitoring device data, a resource rule for monitoring device data categorized as corresponding to a source capable of independent activity in generating the monitoring device data, and a device rule for monitoring device data categorized as corresponding to event data;process the categorized monitoring device data by causing instructions to be executed by a computing device according to the identified at least one rule; anddetermine whether the monitoring device data is outside a range of the identified at least one rule, wherein the range defines a rule violation. 14. The system of claim 13, wherein the identified at least one rule includes at least one rule correlated to an object capable of independent action. 15. The system of claim 13, wherein the identified at least one rule includes at least one rule correlated to an object capable of independent action. 16. A method, comprising: determining whether monitoring device data from an access control monitoring device corresponds to an identifiable object capable of independent activity to generate at least a portion of the access monitoring device data;categorizing the monitoring device data based at least on whether the identifiable object is capable of independent activity to generate the at least a portion of the monitoring device data;obtaining a set of one or more rules from one or more data stores, wherein the set of rules includes at least one of: an asset rule for monitoring device data categorized as asset data, a resource rule for monitoring device data categorized as resource data, and a device rule for monitoring device data categorized as event data;identifying from the set of rules, using a computing device, whether at least one rule corresponds to the monitoring device data, the at least one rule configured to establish access rights for the access control monitoring device, wherein one or more rules of the set of rules applies to monitoring device data categorized as corresponding to an object and one or more rules of the set of rules applies to monitoring device data not categorized as corresponding to an object; anddetermining, using a computing device, whether an individual has access rights to the access control monitoring device by determining whether the monitoring device data violates the at least one identified rule. 17. The method of claim 16, wherein the access control monitoring device is associated with a geographic location. 18. The method of claim 16, wherein the at least one identified rule defines a range and the monitoring device data violates the rule when the monitoring device data is outside the range. 19. The method of claim 16, wherein the at least one rule includes at least one rule correlated to an object capable of independent action. 20. The method of claim 16, wherein the at least one rule of the set of rules includes at least one rule correlated to an object not capable of independent action. 21. The method of claim 16, wherein the access control monitoring device is one of a plurality of access control devices that are remote from each other. 22. The method of claim 16 further comprising generating an output on a display, wherein the output that is displayed indicates a grant or denial of access by the access control monitoring device. 23. The method of claim 22, wherein generating an output includes generating an alarm if the individual does not have access rights to the access control monitoring device. 24. The method of claim 22, wherein generating an output includes releasing the access control monitoring device if the individual has access rights to the access control monitoring device. 25. A system comprising: a computing device in communication with the one or more data stores, the computing device configured to: determine whether monitoring device data from an access control monitoring device corresponds to an identifiable object capable of independent activity to generate at least a portion of the access monitoring device data;categorize the monitoring device data based at least on whether the identifiable object is capable of independent activity to generate the at least a portion of the monitoring device dataidentify, using a computing device, at least one rule from a set of one or more rules stored in one or more data stores that corresponds to the monitoring device data, the at least one rule configured to establish access rights for the access control monitoring device, wherein one or more rules of the set of rules applies to monitoring device data categorized as corresponding to an object and one or more rules of the set of rules applies to monitoring device data not categorized as corresponding to an object,wherein the set of rules includes at least one of: an asset rule for monitoring device data categorized as asset data, a resource rule for monitoring device data categorized as resource data, and a device rule for monitoring device data categorized as event data; anddetermine, using a computing device, whether an individual has access rights to the access control monitoring device by determining whether the monitoring device data violates the at least one identified rule. 26. The system of claim 25, wherein the at least one identified rule defines a range and the monitoring device data violates the rule when the monitoring device data is outside the range. 27. The system of claim 25, wherein the at least one rule includes at least one rule correlated to an object capable of independent action.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.