ADT Sued: Remote Monitoring Patent Lawsuit

Author: John Honovich, Published on Apr 14, 2011

A powerful IP licensing firm has sued ADT and a number of remote monitoring providers for patent infringement. The firm, Walker Digital, claims that ADT and other surveillance companies violate their patent for an 'Internet Surveillance System' that they originally filed in 1998.

Walker Digital is a powerful force in patent enforcement. They are the company behind the Priceline patent and claimed to have generated over $200 million USD in patent licensing for their hundreds of patents. Walker Digital also recently filed suits against Google, Groupon, Facebook, etc. in cases unrelated to their surveillance patents.

Remote monitoring is widely viewed as one of the next big things. ADT is one of the leading promoters of this service. Remote monitoring holds the promise of reducing expenditures on guards and providing a surveillance service with strong, clearly demonstrated ROI. Interestingly, remote monitoring also greatly benefits from video analytics for generating alerts. Analytics themselves are under attack from patent lawsuits (review the OV analytics lawsuit campaign).

The case was filed this week and also names publicly traded Iveda Solutions and retail provider Westec, among others. We will continue to update as the lawsuit makes its way through the court system.

UPDATE May 4, 2011: In the comments section, two industry veterans make the case that significant prior art exists that should invalidate the Walker Digital patents. Read the comments for full details.

* ******** ** ********* **** *** **** *** *** * number ** ****** ********** ********* *** ****** ************. *** ****,****** *******, ****** ********** ***** ************ ********* ******* ***** ****** *** ** '******** Surveillance ******' **** **** ********** ***** ** ****.

****** ******* ** * ******** ***** ** ****** ***********. **** are *** ******* ****** *** ********* ****** *** ******* ** have ********* **** $*** ******* *** ** ****** ********* *** their ******** ** *******. ****** ******* **** ******** ********** ******* ******, *******, ********, ***. ** ***** ********* ** ***** ************ *******.

****** ********** ** ****** ****** ** *** ** *** **** big ******. *** ** *** ** *** ******* ********* ** this *******. ****** ********** ***** *** ******* ** ******** ************ on ****** *** ********* * ************ ******* **** ******, ******* demonstrated ***. *************, ****** ********** **** ******* ******** **** ***** analytics *** ********** ******. ********* ********** *** ***** ****** **** patent ******** (****** ***** ********* ******* ********).

*** **** *** ***** **** **** *** **** ***** ******** traded***** ************ ****** **************, ***** ******. ** **** ******** ** ****** ** *** lawsuit ***** *** *** ******* *** ***** ******.

****** *** *, ****: ** *** ******** *******, *** ******** veterans **** *** **** **** *********** ***** *** ****** **** should ********** *** ****** ******* *******. **** *** ******** *** full *******.

[***************]

**********

*** *******, ** ********* ********* *** *********:

*** *** ***** **** ** *** ********* ** **** ***** providers, ********* ***, *** '******, *****, *********, ******** *** **** and/or ******* ****** *** ******** ********** *** ************ ******** *** services.' *** ********* ******* **** *** **** ***** ********* *** for **** ****** *****.

*** *******

******* ** *** **** ******, **** *** *** ******* **** might ****** *** ************ ********:

  • ****** ***: ******* *** *** ** * ******* ******: "* ******* ****** to ****** ****** ********** ***** ********* ** ***** ** * data *******"; **'* ****** **** *** ********** ****** ********** ******** use * ******* ****** (** *******).
  • ******* ********: ******* ******* *** *** *******: *** ******* "****[**] * ******* to ** ******** ** *** ****** ******, ******* *** ******* is ** ******** *** **** *** ****** ****** ***** ******* at ***** *** *****." **** *********** ********** *** ***** ** self-monitoring. *** *******, ** *** **** * *** *** *** monitoring ** **** **** **** ** *****, ***., **** **** not ****** ** ** *******.
  • ****-********** ********: ************ **** ****-********** ******** ******* ****** ***** ****** ***********. **** cite * *** ******** **** ** ****** *** ***** ******. This ** ******* *********** **** ******* ****** ********** ******** ** not **********.
  • *** *******: **** ** *** *** ******* **** **** *** ******** ** have ********: "********* * ******* **** * **** ** * user ****** ** ******* * ****** ********; *********** * ****** location ** ** *********; ******** ************* ******* * ****** ** the ****** ******** *** *** **** ******; *** ********* ***** to *** **** *** ********** *** ****** ******** ** ********** with ** ****** ** **** *** **** ****** *** **** in ************* **** *** ****** *** ****** ********** ********." **** of **** *********** ********* ***** ****** ********** ******** **** ****.  One ****** **** ***** ** ******** ** ****** *** ** 'amount ** ****'. **** ********* ****** * **** **** *** event. *******, * ***** *** ***** **** * **** **** falls ***** **** *******.
  • ****** ********** ***********: ** *********** "********** ** *** ******* ********* ** ******** ** a ********-***** ****** *** ****** **** ******* ******* ** *** general ****** *** **** ****** ** * **** ******* **** as *** ******** ** *** ** ** *** **** *** perform ****** ********** ***** *** *****." **** ***** ****** ** directly ****** ****************** ***** ** *** **.

******* ************

* *** ************ **** *** ******* ******:

  • *********** ****** ********** ******** *** ****-********** ****** ** ** **** from **** ****** ******.
  • '*******' ***** ********* *** ******** ** ** ******** ** ***** companies ********* ******* ** ********** ********. *** ******** ****** *** provides ****** *** **** *** ******* ** ******* ** ********** events.
  • * ****** ** *********** ****** ********** ********* *** ********* ** this ******* *** ***** **** * ****** ** ********* ******** for ****** **********.
  • *** *** ** *** ****** (****) ** * ***** *** concern. ****'* ****** ******* ** ***** ************ ***** *** ***** there **** ********* ****** ******* *** **** ******* *** ***** art ****** ** **** *** ****** ********** ******** ** ************. Westec ******* ************ ** ****** **** *** *** **** ** ***** '***** ***'.
  • ****** ** * ************* ******* **** * ***** ****** ** pursuing ****** ************ *****. **** ****** ** ********* ** * 'crazy' ****** *****.
  • ** ** *** ***** **** **** ******* *** ******* **** term **** ** ****** **********. ***** ****, *** ********* **** pay * ******* ** *******. **** * *** **** ********* significant ******* ** *** **** (*.*. ******) ** *** ******* should ** ******* *** ****. *** *** *********, *** ******* business ***** ** ****** ********** ** ******* ****** **** ****** licenses ****** *** ** ***********.
Login to read this IPVM report.
Why do I need to log in?
IPVM conducts unique testing and research funded by member's payments enabling us to offer the most independent, accurate and in-depth information.

Related Reports on Monitoring

Remote Video Monitoring Providers Directory on May 22, 2017
Remote video monitoring can help integrators generate RMR plus end users lower their security costs and/or improve response to critical...
Shark Tank Startup Guard Llama Mobile Panic Tested on May 16, 2017
A Shark Tank TV show appearance has attracted big attention for Guard Llama, a security startup touting a 'panic button' paired with mobile app...
Burglar Alarm Partitions Guide on May 10, 2017
Many burglar alarm systems have a single designated level of access for users. A user can arm or disarm the entire alarm by entering a single code....
Arming States For Burglar Alarms on May 04, 2017
Burglar alarms give the user the ability to choose how much of their alarm is active at any time. Activating alarm sensors on windows and...
Duress Codes For Alarms Systems on May 02, 2017
An alarm system can call for help in the event of an attempted break in, but only if it is armed. If an adversary forces an authorized user to...
Burglar Alarm Zoning Guide on Apr 28, 2017
The function of an alarm panel is to gather information from sensors and respond to this information by triggering actions. While it is possible to...
Bosch B-Series Intrusion Tested on Apr 10, 2017
Bosch is one of the biggest names in intrusion but their B-Series panels, targeted at smaller site installs and available through distribution, are...
Deep Science - Active Threat Cloud Monitoring Startup on Apr 03, 2017
Deep learning for $2 a day for a system that automatically detects guns and masks, alerting the police to robberies and threats? A US startup is...
2Gig Intrusion Megatest (GC2 & GC3 Panels Tested) on Mar 28, 2017
2Gig is one of the most widely used intrusion systems, with two product lines that are the main offering of many alarm companies, huge national...
Simplisafe Warns Customers About Alarm Fines on Mar 17, 2017
Simplisafe markets themselves as a 'better way' than traditional professional alarm companies. However, in one key way, Simplisafe hides the...

Most Recent Industry Reports

Anti-Hack Access Card Shields Tested on May 26, 2017
Keeping your access control card information secure is becoming a big priority, especially since cheaper copiers can hack details easily. Multiple...
H.265 / HEVC Codec Tutorial 2017 on May 25, 2017
Since 2013, video surveillance professionals have talked about the potential for H.265. Now, in 2017, H.265 is starting to gain mainstream...
Camera Course Summer 2017 on May 25, 2017
Learn video surveillance and get certified. IPVM provides live online classes, recorded videos, personal help, cutting edge education and...
Most Respected Manufacturer Competitors on May 25, 2017
Manufacturers told IPVM what competitor they most respected. In terms of total revenue, Hikvision, Dahua and Axis are certainly tops but would...
CyPhy 'Unlimited' Flight Time Security Drone Examined on May 25, 2017
Drones face several issues as commercial security platforms - legal restrictions (e.g., in the US, the FAA), costs, and limited flight durations...
Milestone Entry Level Mobile Password Vulnerability Disclosed on May 24, 2017
While many manufacturers have only addressed cybersecurity vulnerabilities after public disclosures were made (or threatened), Milestone has...
How Integrators Use IPVM on May 24, 2017
150 integrators explained how they use IPVM and how it helps them stay informed and improve their business.  The 4 main uses integrators cited for...
Alarm Supervision Guide on May 24, 2017
Burglar alarms can constantly monitor the health of attached circuits, sensors, and devices to ensure that they remain operational. This is known...
Arlo Go Cellular Cloud Camera Tested on May 23, 2017
Totally wireless surveillance cameras are growing but almost all typically depend on a hub and local Internet access. However, many outdoor...
Avigilon New COO James Henderson Profile on May 23, 2017
It has been nearly 2 years since the infamous Bryan Schmode 'resigned' as Avigilon COO. Now, Avigilon once again has a COO, promoting James...

The world's leading video surveillance information source, IPVM provides the best reporting, testing and training for 10,000+ members globally. Dedicated to independent and objective information, we uniquely refuse any and all advertisements, sponsorship and consulting from manufacturers.

About | FAQ | Contact