Abstract: Disclosed is a system for alarm verification, comprising a server in communication with one or more sensors configured to detect a potential alarm event, and a data collection module in communication with the server and the one or more sensors. The data collection module is configured to collect data from the one or more sensors. An alarm verification module applies the collected sensor data to at least one alarm verification model and generates an alarm validation score indicating the likelihood that an actual alarm condition exists. The alarm verification module automatically forwards an indication of a valid alarm to a responding authority if the alarm validation score exceeds a predetermined threshold.
Type:
Application
Filed:
April 16, 2010
Publication date:
October 20, 2011
Applicant:
INFRASAFE, INC.
Inventors:
Charles PERKINSON, Frank C. WESTERVELT, Jacob PEERY
Abstract: Disclosed is a method for alarm verification including the steps of collecting data representing a potential alarm event and applying the collected data to an alarm verification module. This exemplary method also includes the steps of generating an alarm validation score indicating the likelihood that an alarm condition exists and automatically forwarding an indication of a valid alarm to a responding authority if the alarm validation score exceeds a predetermined threshold.
Type:
Application
Filed:
April 16, 2010
Publication date:
October 20, 2011
Applicant:
INFRASAFE, INC.
Inventors:
Charles PERKINSON, Nicholas E. CIRCELLI
Abstract: A security monitoring methodology and device using digital audio. A security control device integrates physical intrusion detection functions, physical access control functions, and compressed, streaming, digital audio transmission capability. The device provides interfaces for a number of sensor inputs, including standard alarm monitoring sensors and audio sensors. The device is capable of communicating with a monitoring system over a variety of digital networking configurations options, including TCP/IP, via embedded Ethernet interface, or serial modem communications over telephone or digital cellular networks using PPP network protocol. The device may use backup channels of communications including telephone and cellular network communications. All communications with the device, whether to monitoring receiver or other local devices, may be secured with a minimum AES 128-bit encryption.
Abstract: A security monitoring methodology and device using digital audio. A security control device integrates physical intrusion detection functions, physical access control functions, and compressed, streaming, digital audio transmission capability. The device provides interfaces for a number of sensor inputs, including standard alarm monitoring sensors and audio sensors. The device is capable of communicating with a monitoring system over a variety of digital networking configurations options, including TCP/IP, via embedded Ethernet interface, or serial modem communications over telephone or digital cellular networks using PPP network protocol. The device may use backup channels of communications including telephone and cellular network communications. All communications with the device, whether to monitoring receiver or other local devices, may be secured with a minimum AES 128-bit encryption.