
US
2004/0183668
A1
INTERACTIVE
VIDEO
MONITORING
(IVM)
PROCESS
FIELD
OF
THE
INVENTION
[0001]
This
invention
Will
document
a
process
to
verify
alarm
signals
from
an
unlimited
number
of
intrusion
detec
tion
systems
and/or
video
devices.
This
process
utilizes
video
to
provide
additional
information
to
a
central
station
operator
at
a
central
station,
but
more
particularly,
this
invention
Will
document
hoW
to
associate
a
video
device
With
an
alarm
signal
to
facilitate
the
connection
betWeen
the
central
station
and
the
monitored
location’s
video
device
after
the
alarm
signal
from
the
monitored
location
has
been
received
by
the
central
station.
BACKGROUND
OF
THE
INVENTION
[0002]
False
Alarms
caused
by
Intrusion
detection
sys
tems
are
increasing
in
number
every
year.
The
number
of
false
alarms
Police
and
Fire
Departments
respond
to
far
eXceed
the
number
of
legitimate
alarms.
Central
stations
dispatch
the
Police
and
Fire
Departments
When
they
are
noti?ed
of
the
possibility
of
an
event
(burglary,
holdup,
?re
alarm
etc.)
rather
than
When
an
event
has
been
veri?ed
(With
video)
by
the
central
station
operator.
It
is
the
intention
of
this
invention
to
provide
central
station
operators
the
oppor
tunity
to
verify
(With
video)
all
incoming
alarm
signals
from
any
monitored
location
prior
to
dispatching
anyone
to
the
monitored
location.
This
process
Will
signi?cantly
reduce
the
number
of times
Police
and
Fire
Departments
are
required
to
respond
to
false
alarms.
Since
the
mid-1990’s
video
devices
have
been
capable of
transmitting
video
to
central
stations.
HoWever,
central
stations
have
not
been
able
to
utiliZe
video
devices
to
verify
alarm
signals
because
video
devices
cannot
be
monitored
using
the
same
process
as
intrusion
detection
devices.
[0003]
An
understanding
of
the
current
process of
moni
toring
intrusion
detection
devices
is
provided
to
appreciate
the
problems
associated
With
attempting
to
monitor
video
devices
using
the
same
process.
[0004]
Example
of
the
current
process
used
to
monitor
intrusion
detection
devices:
National
Alarm
Computer
Cen
ter
(NACC/WWW.nacchq.com)
monitors
upWards
of
250,000
intrusion
detection
devices
at
as
many
monitored
locations.
They
accomplish
this
by
utiliZing
alarm
processing
devices
(alarm
receivers)
to
receive
alarm
signals
(account
number,
event
type,
event
time)
from
intrusion
detection
devices.
The
intrusion
detection
devices
typically
communicate
to
the
alarm
processing
device
using
a
standard
telephone
line.
[0005]
The
alarm
processing
device’s function
is
to
cap
tures
the
alarm
signal
and
then
disconnects
the
incoming
phone
line to
make
the
phone
line
available
for
the
neXt
intrusion
detection
device
at
the
central
station,
and
for
the
operator
to
call
the
monitored
location
and
verify
the
alarm
siganal
[0006]
After
the
alarm
processing
device
receives
the
signal
and
disconnects
from
the
intrusion
detection
device
the
alarm
processing
device
transfers
the
alarm
signal
to
the
central
station
softWare.
The
central
station
softWare
places
the
alarm
signal
into a
queue
along
With
the
other
alarm
signals
Which
are
Waiting
for
delivery
to
the
neXt
available
operator.
The
queue
prioritiZes
the
alarm
signals
by
type
Sep.
23,
2004
(?re,
medical
panic,
hold
up,
burglary,
etc.)
and
event
time.
The
central
station
softWare
selects
the
highest
priority
alarm
signal,
combines
the
alarm
signal
With
the
customer
account
record
(address,
oWner’s
phone
number,
Who
to
call
list,
response
instructions,
local
police
department
phone
number,
local
?re
department
phone
number,
etc.),
and
delivers
the
alarm
condition
With
the
customer
account
record
to
the
neXt
available
operator.
[0007]
Example
Response
by
an
Operator
to
a
Burglary:
The
operator
calls
the
monitored
location’s
phone
number
and
asks
the
person
Who
ansWers
the
phone
for
their
name
and
passWord.
If
there
is
no
ansWer
at
the
location
or
the
person
Who
ansWers
doesn’t
knoW
the
passWord,
the
opera
tor
dispatches
the
police.
[0008]
NACC
uses
central
station
softWare
manufactured
by
Monitoring
Automation
Systems
(MAS/WWW.monauto
.com)
to
accomplish
the
above
eXample.
MAS
and
other
video
device
manufacturers
Were
contacted
and
asked
to
create
a
solution
for
NACC.
NACC
began
marketing
Inter
active
Video
Monitoring
services
in
With
permission
from
the
inventors
to
use
the
IVM
process.
The
inventors
created
the
process
of
Interactive
Video
Monitoring
(IVM)
after
a
detailed
investigation
of
the
present
process
of
monitoring
intrusion
detection
devices.
In
order
to
test
the
neW
IVM
process of
a
prototype
application
needed
to
be
created.
This
required
softWare
modi?cations
to
a
central
station
moni
toring
softWare
and
to
a
video
device
manufacturers
soft
Ware.
[0009]
The
IVM
process
is
required
to
monitor
a
large
number
of
video
devices.
[0010]
Listed
beloW
are
the
methods
currently
being
deployed
by
central
stations
to
monitor
video
devices:
[0011]
Solution
1:
Fulltime
connections
display
video
to
the
central
station
by
connecting
to
the
video
device
on
a
continuous
basis
(one
client
to
one
video
device).
[0012]
Solution
2:
Fulltime
connections
display
video
to
the
central
station
by
connecting
to
the
video
device
on
a
continuous
basis
(one
client
to
a
limited
number
of
video
devices).
[0013]
Solution
3:
When
there
is
an
alarm
condition
the
video
device
contacts,
connects
to
and
streams
video
to
the
central
station
and
displays
the
video
to
the
central
station
operator
(one
video
device
to
one
client).
[0014]
Solution
4:
When
there
is
an
alarm
condition
the
video
device
contacts,
connects
to
and
streams
video
to
the
central
station
and
displays
the
video
to
the
central
station
operator
(limited
number
of
video
devices
to
one
client).
[0015]
Solution
5:
When
there
is
an
alarm
condition
the
video
device
contacts,
connects
to
and
streams
video
to
the
central
station
and
stores
the
streaming
video
to
a
video
storage
device Within
the
central
station
(limited
number
of
video
devices
to
one
client).
[0016]
Solution
6:
The
central
station
operator
manu
ally
connects
to
the
video
device.
Comentarios a estos manuales