US 12,217,582 B2
Image surveillance and reporting technology
Stephen Scott Trundle, Falls Church, VA (US); Robert J. McCarthy, Jr., Vienna, VA (US); Jean-Paul Martin, Oakton, VA (US); Alison Jane Slavin, Falls Church, VA (US); and David James Hutz, Herndon, VA (US)
Assigned to Alarm.com Incorporated, Tysons, VA (US)
Filed by Alarm.com Incorporated, Tysons, VA (US)
Filed on May 25, 2022, as Appl. No. 17/824,208.
Application 17/824,208 is a continuation of application No. 16/908,107, filed on Jun. 22, 2020, granted, now 11,354,993.
Application 16/908,107 is a continuation of application No. 16/148,124, filed on Oct. 1, 2018, granted, now 10,692,342, issued on Jun. 23, 2020.
Application 16/148,124 is a continuation of application No. 14/873,508, filed on Oct. 2, 2015, granted, now 10,089,843, issued on Oct. 2, 2018.
Application 14/873,508 is a continuation of application No. 14/200,524, filed on Mar. 7, 2014, granted, now 9,153,111, issued on Oct. 6, 2015.
Application 14/200,524 is a continuation of application No. 12/893,162, filed on Sep. 29, 2010, granted, now 8,675,066, issued on Mar. 18, 2014.
Claims priority of provisional application 61/248,263, filed on Oct. 2, 2009.
Prior Publication US 2022/0292943 A1, Sep. 15, 2022
This patent is subject to a terminal disclaimer.
Int. Cl. H04N 7/18 (2006.01); G08B 13/196 (2006.01); G08B 25/00 (2006.01); G08B 25/14 (2006.01); G08B 29/04 (2006.01)
CPC G08B 13/19639 (2013.01) [G08B 13/196 (2013.01); G08B 13/19613 (2013.01); G08B 13/19634 (2013.01); G08B 13/1966 (2013.01); G08B 25/008 (2013.01); G08B 25/14 (2013.01); G08B 29/046 (2013.01); H04N 7/183 (2013.01); H04N 7/188 (2013.01)] 20 Claims
OG exemplary drawing
 
1. A method comprising:
detecting, by a monitoring system, a potential alarm event at a property;
identifying, by the monitoring system, a security rule that controls transmission of images by defining a threshold used to limit a number of images that are transmitted during a time period after the potential alarm event is detected;
determining, by the monitoring system and using the security rule, that transmitting one or more images captured by a camera at the property during the potential alarm event will violate the security rule and exceed the threshold; and
in response to determining that the security rule will be violated and the threshold exceeded if the one or more images are transmitted, discarding, by the monitoring system, the one or more images instead of transmitting the one or more images.