Intelligent notification methods

ABSTRACT

Intelligent notification methods and systems configured for receiving and processing any suitable input message, determining whether or not an output notification should be sent and for sending such output notifications with the appropriate information to the appropriate parties according to predetermined business rules are disclosed. Particular methods for performing intelligent notification are described by example.

CROSS-REFERENCE TO RELATED APPLICATIONS

This is patent application is a continuation of U.S. patent applicationSer. No. 14/156,323, filed on Jan. 15, 2014, titled “INTELLIGENTNOTIFICATION SYSTEM AND METHOD”, issued as U.S. Pat. No. 9,276,884, onMar. 1, 2016, which is a continuation-in-part patent applicationclaiming benefit and priority to U.S. patent application Ser. No.11/823,494 filed on Jun. 29, 2007, titled “OFFENDER TRANSPORT TRACKINGAND EMERGENCY RESPONSE (OTTER) SYSTEM”, now abandoned. The contents ofthe above-referenced patent applications are incorporated by referenceas if fully set forth herein.

BACKGROUND OF THE INVENTION

Field of the Invention: This invention relates generally to automatedresponse systems and methods. More particularly, this invention relatesto automated response systems and methods that provide preconfiguredresponses based on variable inputs. Still more particularly, theinvention relates to intelligent notification methods.

Description of Related Art: Emergency response and alert systems thatcan be activated in the event of an emergency, e.g., medical, security,accident, fire, public safety, etc., are well known. For example, USRE44,535 to Zimmers et al. discloses an alert notification system forproviding alert notifications to multiple persons or to a plurality ofrelated geographic locations. The alerts of the Zimmers et al. systemmay be initiated by authorized personnel via telephone or Internetinteraction with the system, or may be generated automatically from datafeeds such as the Emergency Managers Weather Information Network (EMWIN)system of the National Weather Service and then delivers the alerts viatelephone, pager (voice or text), e-mail, Internet or other media.

Systems for tracking assets are also well known. For example, U.S. Pat.No. 8,531,294 to Slavin et al. discloses a moving asset locationtracking system that may include a mobile device application thatenables a user to observe and provide alerts related to the location ofassets, e.g., car, trailer, motorcycle, boat, all-terrain vehicle (ATV),tractor, kid's backpack, grandma's purse, etc. The system of Slavin etal. may include a data feed from a security/sensor network installed ina fixed location, such as a home or business, and location data providedby moving assets for tracking, reporting and alerting.

However, the systems of Zimmers et al. and Slavin et al. are tailoredfor specific uses and do not lend themselves to more general processingof input or sensor data against business rules for generating one ormore output notifications when such notifications are warranted.

Accordingly, it would be highly advantageous to provide an intelligentnotification system configured for receiving and processing any suitableinput message, determining whether or not an output notification shouldbe sent and for sending such output notifications with the appropriateinformation to the appropriate parties according to predeterminedbusiness rules. A method for intelligent notification is also desirable.

SUMMARY OF THE INVENTION

An embodiment of a method for intelligent notification is disclosed. Themethod may include receiving an input message from a client. The methodmay further include parsing the message for message contents, themessage contents, comprising: sender, recipient, event description, timeof event and date of event. The method may include analyzing the messagecontents based on preselected business rules established by the client.The method may include determining whether an output notification shouldbe sent based on the analysis of the message contents and the businessrules established by the client. The method may include sending anoutput notification to at least one preselected recipient specified bythe client, if so directed by the business rules established by theclient.

An embodiment of an intelligent notification system is disclosed. Thesystem may include a web server for receiving an input message from anInternet. The system may further include a database server incommunication with the web server. The database server may be configuredfor storing and retrieving client contact lists and client businessrules. The system may further include a communications server incommunication with the web server and the database server. Thecommunications server may be configured to generate and send outputnotifications according to the client contact lists and client businessrules.

Additional features and advantages of the invention will be set forth inthe description which follows, and in part will be apparent from thedescription, or may be learned by the practice of the present invention.

BRIEF DESCRIPTION OF THE DRAWINGS

The following drawings illustrate exemplary embodiments for carrying outthe invention. Like reference numerals refer to like parts in differentviews or embodiments of the present invention in the drawings.

FIG. 1 is high-level block diagram of an embodiment of the intelligentnotification system of the present invention.

FIG. 2 is a block diagram illustrating various entities that mayinteract with the intelligent notification system of the presentinvention.

FIG. 3 is a block diagram illustrating the physical structure of anembodiment of the intelligent notification system.

FIG. 4. is a flowchart of an embodiment of a method for intelligentnotification, according to the present invention.

DETAILED DESCRIPTION

There are many contexts where it would be desirable to have an automatedsystem that can process one or more inputs and provide an automatedresponse in the form of one or more outputs. Generally speaking an inputis any data acquired by the system which may or may not be the result ofa process that pulls or extracts data. Since the embodiments of theintelligent notification system disclosed herein is computer based, theinputs and outputs generally comprise digital content conveyed over anInternet Protocol (IP) based network, e.g., the Internet. Thus, inputscan be essentially anything that can be described or measured and sentover the Internet. A non-exhaustive list of examples of inputs to such asystem may include sensor or equipment outputs, email, phone calls(e.g., conventional telephone calls, voice over IP, or VoIP), web site,supervisory control and data acquisition (SCADA) systems, really simplesyndication (RSS) feeds, public safety messages, and scheduled pollingof systems or equipment.

FIG. 1 is a high-level block diagram of an embodiment of the intelligentnotification system 100 of the present invention. As shown in FIG. 1,the inputs 200 may come from any suitable source, for example and not byway of limitation, telephone calls, email message, text message (shortmessage service (SMS)), web services, mobile devices (smartphones,tablets, laptop computer, netbook computer, etc.), and websites. Theseinputs 200 are processed by the intelligent notification system 100which may take action in the form of any one or multiple optionaloutputs 300, which may include any or all of the same types of inputs200 listed above. The term “web service” as used herein is a vehiclethrough which different computer systems can exchange information usingan agreed upon format. The terms “input” and “input” message” are usedsynonymously herein. Additionally, the terms “output”, “outputnotification” and “notification” are used synonymously herein.

As previously noted the inputs 200 to a particular embodiment of anintelligent notification system 100 can be any type of input asdescribed above. The following is a non-exhaustive exemplary list ofactual input data that could be applied to various embodiments of system100:

-   -   employees using telephones to report emergencies to response        teams,    -   global positioning system (GPS) tracking solution sending device        information via email,    -   mining company initiating a recall using web site,    -   in-vehicle panic button sending data via web services (via        satellite),    -   bear traps sending trap status via email,    -   power management solutions sending amp/volt/watt info via email,    -   Android® and iPhone® mobile apps sending event data using web        site,    -   law enforcement kiosk sending data over web service,    -   device/equipment status being polled by application via a        schedule,    -   camera systems sending images and event data by web service, and    -   local equipment activity information being made global.

In a general embodiment of an intelligent notification system 100, asingle type of input 200 may result in no output 300, one type of output300, a few types of output 300, or many types of output 300.Additionally, such a general embodiment of an intelligent notificationsystem 100 may receive and process a few, or many, inputs 200 andthereby generate no output 300, one type of output 300, a few types ofoutput 300, or many types of output 300. The optional outputs 300generated by the intelligent notification system 100 are dictated byparticular business rules for a particular client of the intelligentnotification system 100.

Processing, according to an embodiment of the intelligent notificationsystem 100 of the present invention, may include the monitoring ofvarious inputs as described above, analysis of that input data andaction to be taken, or not taken, based upon predefined criteria orbusiness rules. Thus, processing may include detecting whether suchmonitored inputs fall within or outside a business rule predefined for acustomer or client. If the detected input breaks a predefined rule, thenan alert is immediately transmitted to those tasked with responding to aknown problem. Depending upon the nature of the input, authenticationand analysis may or may not be part of the processing performed.However, the determination of what action to take, based upon the input,is consistent in every implementation. Once authentication is complete,if required, the input is analyzed, if required, to evaluate the contentof the input data in relation to acceptable, or actionable valuesdefined by the customer and referred to herein as business rules. If theevaluation of content results in action required, the intelligentnotification system then generates the appropriate output(s), e.g.,persons or agencies designated with responding to the problem arecontacted with the appropriate information about the problem. Otherwise,no action is taken if the input data is found to be acceptable whencompared to the business rules.

FIG. 2 is a block diagram illustrating various entities that mayinteract with the intelligent notification system 100 of the presentinvention. Inputs 200 of any suitable type may feed into the intelligentnotification system 100 as also shown in FIG. 1. The optional outputs300 may be notifications of any of the various types described hereinthat are directed to government agencies 400, e.g., police, firedepartment, paramedics, political offices, etc. Alternatively, theoptional outputs 300 may be notifications directed to private agencies500, e.g., private security companies or agencies. Often it is desirableto direct a notification to one or more individuals 600 or corporateentities 700. According to at least one embodiment of the presentinvention, a user interface 800 provides access to configure variousaspects of the intelligent notification system 100, for example and notby way of limitation, web server, database server, communications serverand/or other components that may be used to implement the clientaccounts, access credentials, business rules and other features of theintelligent notification system 100.

Exemplary Application—1

The following is an exemplary application of the intelligentnotification system 100 of the present invention that providesadditional description of how the system works. The following examplealso demonstrates usefulness of the invention. Company A providesmonitoring of individuals in the criminal justice system, e.g.,individuals out on parole, or awaiting trial. Company A attaches anankle bracelet to these individuals, and this bracelet communicateswirelessly with a unit installed in the individual's home. The unitinstalled in the individual's home in turn communicates wirelessly withCompany A's data center. When away from home the ankle bracelet usescellular communication to relay information (e.g., GPS location) to thedata center.

Company A's data center keeps track of where an individual is located,based upon their current GPS location. Company A's data center also usesvirtual landmarks, or “geo-fences”, to identify areas of interestrelative to each particular individual (place of work, home address,etc.) Company A's data center detects events when a particularindividual is somewhere they are not supposed to be, or conversely, whenthey are absent from somewhere they are supposed to be.

Upon detecting an event, Company A sends an email to a preselected emailaccount, an email account associated with Company A as a client, withinthe intelligent notification system of the present invention. Thoughthis example uses an “email” as the input, it will be understood thatany suitable input may be used according to the principles and methodsdescribed herein. This event email forms an input into the intelligentnotification system. An event email from Company A will typicallyinclude a number of pieces of data, e.g., the name of an individualbeing monitored by Company A, “to” and “from” address information, adescriptor for the particular offense detected, time of the offense,location of the offense, etc.

When the event email arrives at the intelligent notification system, itis parsed to extract the various contents of the email and to verifyseveral things before further processing is conducted. For example, isthe “from” address accurate and associated with a client (in this case,Company A) of the intelligent notification system? Is the “to” address apreconfigured email address associated and configured for Company A? Isthe named individual found in the email the name of someone for whichCompany A has specified support in their business rules? Is the offensesomething supported according to the business rules? What is the time ofthe event? Where did the event take place? Thus, during parsing of theevent email received from Company A, every valuable piece of informationis extracted and then analyzed in light of Company A's business rulesthat dictate what the intelligent notification system is supposed to dowith that information.

The following is an example of the Company A implementation, uponreceiving an email. The first processing performed is to determinewhether or not the email is from a legitimate client of the intelligentnotification system. As noted above, the email can be certified byanalyzing the “from” address and the “to” address in the email message.These two pieces of information must match a legitimate client of theintelligent notification system for any further processing. Let's assumeit is a valid email that reveals the following information: from theCourt in Bend, Oregon, which was sent to Company A's preconfigured emailaddress within the intelligent notification system, the body or title ofthe message concerning an offender by the name of Brad Simpson, in thelocation of his ex-girlfriend's home, at 2:15 AM on a Sunday morning(date and time information). Company A has preconfigured business rulesstored within a database within the intelligent notification systemindicating this particular location of the offender is an “exclusionzone” violation, meaning he is not supposed to be there.

Company A's preconfigured business rules further define what actionshould be taken when such an “exclusion zone” violation occurs with thisparticular offender. The intelligent notification system evaluates whatparticular action Company A has prescribed for Brad Simpson in the eventof an exclusion zone violation for this location, on this day, at thistime. In this particular instance, the output from the intelligentnotification system is telephone calls to: (1) the local 911 DispatchOffice, (2) his parole officer, (3) the victim (ex-girlfriend), (4) thevictim's father, and (5) the victim's next door neighbor. Company A'sbusiness rules further dictate that each of these individuals or officeswill receive up to five telephone call attempts (fewer, if the partycontacted acknowledges the call). Further, if the 911 office cannot“acknowledge” the call, the intelligent notification system willfail-over to calling the sheriff's cell phone. So, in this particularexample, these notifications form the output of the intelligentnotification system.

The above exemplary embodiment used an incoming email message as aninput to the intelligent notification system. However, for otherembodiments the input could change, say from an email to a web service,and the output could change, say from phone calls to text messages and apublic announcement (PA) system announcement. Thus, embodiments of theintelligent notification system may be configured to process most anysuitable input, and upon processing deliver most any suitable outputnotification.

FIG. 3 is a block diagram illustrating the physical structure of anembodiment of an intelligent notification system 100. Inputs (100,FIG. 1) may come from the Internet 202 and pass through optionalfirewall 310, for increased security and verification and certificationof the inputs 200. Once through the optional firewall 310, inputs may bereceived at a web server 102 within the intelligent notification system100. The web server 102 and/or database server 104 may include one ormore computer programs (stored in memory, not shown) for parsing theinput 200 received from the Internet 202 and other input conditioningprior to interfacing, or concurrent, with one or more database servers104 (one shown in FIG. 3). The database server 104 may additionally beused to store and retrieve the parsed input message contents 110, clientcontact lists 112 and also to store and retrieve the business rules 114for each client served by the intelligent notification system 100,according to various embodiments. If action is deemed necessary, basedon the parsed input information and instructions dictated by theparticular client business rules, one or more outputs 300 (FIG. 1) maybe generated and sent via communications server 106 via the web server102.

Another firewall 310 may separate the communications server 106 of theintelligent notification system 100 from pointing to and communicatingwith third party web sites or services 204 that may be utilized bysystem 100 during analysis of the input and processing according to theclient business rules. Such third party services 204 may includetelephony services for receiving and sending telephone calls, textmessaging services for receiving and sending text messages, and anyother communications service, including receiving and sending email,according to various embodiments.

One exemplary third party service 204 provides telephony services,whether receiving phone calls from the client, or sending phone calls toa given client of the intelligent notification system 100. Suchtelephony services may include interactive voice response (IVR) menus toprovide feedback, determine acknowledgement, allow the client to searcha database, etc. Exemplary third party telephony services would be thoseprovided by companies like Twilio, Inc., San Francisco, Calif., Tropo,Inc., Menlo Park, Calif., or Voxeo Corporation, Orlando, Fla.. Suchtelephony services allow the recording and storage of audio files(conversations) for subsequent processing by an embodiment ofintelligent notification system 100, including retransmission of audiofor output notifications 300.

One exemplary third party service 204 provides texting (SMS) service.Again, this service would be used to receive texts from, or send textsto, clients of the intelligent notification system 100. An exemplarythird party SMS service could be provided by mBlox, Inc., Sunnyvale,Calif. Such third party texting services provide a mechanism forreceiving replies from delivered messages, considered as an input 200,especially when communicating with sensors or equipment belonging to aclient.

According to still further embodiments of the intelligent notificationsystem 100, Facebook® or Twitter® may also provide third party services204 for communications that fall uniquely within their respectivecommunications mediums for inputs 200 and output notifications 300according to still further embodiments.

According to yet further embodiments of the intelligent notificationsystem 100, third party services 204 may include speech-to-text servicesfor receiving speech from a phone call or audio file as an input 200 andtransmitting an output notification in the form of a text document whichupon processing may be delivered as a text message, email message orwebpage report, as desired. In this particular example the client willsend an audio file via third party telephony (meaning, they will call aphone number and leave a recorded message). An embodiment of theintelligent notification system 100 can then send the audio to a thirdparty audio transcription service and they will return a text document.The text document can then be parsed for content as described herein aswell as made available through a webpage report, or text message, oremail to designated recipients according to a particular client'sbusiness rules.

Third party services 204 not strictly tied to communications may includea video analytics service, in which a client may send a raw video feedas an input 200 for processing through an analytics engine with theintelligent notification system 100 in order to provide usefulinformation on what may be happening in the video, and consequentlyuseful output notifications 300.

Note that FIG. 3 illustrates a simplified implementation of theintelligent notification system 100. The physical structure may varydepending upon the location where the intelligent notification system100 is installed, and could include additional scaling and robustnessfeatures like load balancers (not shown), duplicate servers forfail-over (not shown), geographic redundancy (not shown), placement intocloud environments (not shown), etc. Such additional features of anetworked computer system and/or environment, and how to implement same,falls within the knowledge of one of ordinary skill in the art and,thus, will not be further described herein.

With additional reference to FIG. 1, “input” can be thought of asprimarily acting upon the web server 102 portion of the structure shownin FIG. 3. The “processing” phase is best thought of as thecommunications server 104 and database server 106 working together, andthe “output” tends to be more focused on the communications server 106working together with the web server 102.

Exemplary Application—2

The following is another exemplary application of the intelligentnotification system 100 of the present invention that provides furtherdescription of using the system 100 and how it functions. Company B hasa large manufacturing plant where they assemble tractors. To improvesafety by rapid emergency response, Company B installed telephones onseveral support pillars around the manufacturing plant. When an eventtakes places, Company B employees are trained to use one of these“pillar phones” to contact response personnel. According to theirtraining and emergency response protocols, Company B employees reportingan event use these pillar phones to speed dial a predefined phone numberthat is a preconfigured input 200 for Company B into the intelligentnotification system 100. During such a phone call the Company Bemployees state their name, location, and nature of the event and thetelephone message is recorded, along with the time and date by theintelligent notification system 100 as an input 200, ready for parsing.Here the relevant information parsed from the call is the Company Bemployee's name, location, and nature of the event.

Upon parsing the recorded phone message, the Employee's name, locationand description of event are extracted by the intelligent notificationsystem 100. According to Company B's business rules, the audio recordingis then forwarded to approximately 50 personnel at Company B for furtheraction. The audio recording becomes a notification that is played duringphone calls, is made available as an audio file link via SMS, and as anaudio file attachment to email, all according to Company B's businessrules.

In this particular application, the processing performed by theintelligent notification system 100 is fairly simple, i.e., the time andday are evaluated and only those Company B personnel who are on-duty, asdefined by their profiles within Company B's business rules storedwithin the intelligent notification system 100 are notified. As an addedenhancement, the intelligent notification system 100 uses the caller-IDof the pillar phone to confirm or add location information within thenotification. Occasionally, when an emergency arises, the caller mayforget to mention which pillar they are calling from because of stressor panic during the emergency. As one might surmise, locationinformation may be critical because without it, the large manufacturingplant contains a lot of ground to search for somebody needing immediateassistance.

So, in this particular example, a single phone call operates as theinput 200, which triggers processing by the intelligent notificationsystem 100, resulting in call recording, caller-ID evaluation andcontact notification collection during the processing phase, and voice,SMS and email as the outputs 300 to various Company B personnel. Recallthat exemplary application 1 relied upon an input email message as input200. The following application demonstrates the use of web services asan input 200.

Exemplary Application—3

Company C provides a sophisticated video surveillance system, combininglong range (daylight or thermal) cameras with pan-tilt-zoom (PTZ)cameras for its customers. Any long range camera, upon detectingsomething out of place, directs a PTZ camera to zoom in on that spot.This focuses the video imagery on the anomaly. However, without furthernotification capability, Company C's system could only temporarily flagthe event, but without any operator response would reset back to normal.So, if you happen to miss the event by not viewing the camera field ofview when it became flagged, you would never have known it ever happenedwithout further investigation.

When Company C detects an event, the images tied to the event (the longrange camera image and the PTZ image) are delivered to the intelligentnotification system 100. Included with the images is informationregarding the camera name or ID, the location where the camera islocated, time and date stamp of when the event was observed, etc. All ofthis input 200 information is passed to the intelligent notificationsystem 100 by means of a web service. As noted above, a web service isan agreement between two computer systems on how to transferinformation. The intelligent notification system 100 has a “method” thatCompany C's web server can invoke, passing along the various eventdetails. So, the input 200 to the intelligent notification system 100comes from a web service in this particular application.

Once received, the intelligent notification system 100 verifies theinformation provided (which includes account credentials). Theinformation allows the intelligent notification system 100 to determinewhich agency (Company C) owns that camera, and based on Company C'spredefined business rules, allows the intelligent notification system100 to collect contact information of Company C personnel to benotified. This is the processing phase.

Once the list of contacts is built, the intelligent notification system100 sends phone calls, text (SMS) messages and email with the details ofthe event including the images (attached to email, or linked via SMS).This forms the output 300 of the intelligent notification system 100 forthis particular application.

This particular application of the intelligent notification system 100,includes providing a web portal (108 FIG. 3) to allow authorized CompanyC personnel to configure their profile information, manage cameras, setnotification options and things of that nature by directly configuringCompany C business rules within the intelligent notification system 100.Another useful aspect of this particular solution is that the outputs300 may be time shifted if Company C so desires. For example, managementoften wants to be made aware of surveillance activity, but notnecessarily to be notified as it happens (middle of the night,typically). To support this feature, the intelligent notification system100 provides a “scheduled” notification. For instance, every X timeinterval, as defined by the client, the intelligent notification system100 can generate and send an email notification (output 300) of allactivity processed during that time frame. So, for this feature, thereis a timer monitoring the period of time until the next notificationneeds to be sent out.

Exemplary Application—4

An additional variation on the above three exemplary applications of theintelligent notification system 100 will now be described. The webservice input of exemplary application 3 is very similar to pollingsolutions, where the intelligent notification system 100 monitors remotesystems or equipment. Every X time frame, the intelligent notificationsystem 100 polls (contacts) the sensor, or device for current status. Ifeverything is OK with the sensor or device being polled, a reply of someknown value is returned. If the reply indicates a problem, theintelligent notification system 100 may begin output notifications 300according to some particular business rules for that particular client.

Company D operates oil and gas pumps in the field. A pump in the oilfield needs to be operating all the time to maximize profit. Every fiveminutes this embodiment of the intelligent notification system 100 isconfigured to invoke a web service method to communicate with that pump(via cell modem on the pump). If the pump replies with an “OK” code, nofurther action takes place until the pump status is polled again inanother five minutes, when the process repeats itself. Alternatively, ifthe intelligent notification system 100 fails to get the “OK” code,system 100 notifies maintenance personnel that the pump needs servicingor other attention based on the returned code and Company D's businessrules. It will be evident that various personnel at Company D may benotified depending on the code returned. Furthermore, such personnel canbe notified by any suitable output 300 type.

FIG. 4. is a flowchart of an embodiment of a method 900 for intelligentnotification, according to the present invention. Method 900 may includereceiving 902 an input message from a client. The input message may beof any suitable type disclosed herein or shown in FIG. 1. Method 900 mayfurther include parsing 904 the message for message contents, themessage contents, comprising at minimum: sender, recipient, eventdescription, time of event and date of event. Additional message contentas described herein may also be included according to other embodimentsof method 900. Method 900 may further include analyzing 906 the messagecontents based on preselected business rules established by the client.The preselected business rules allow the client to configure when and ifan output notification is to be sent as well as who will receive such anoutput notification, how many attempts to deliver the outputnotification and any fail-over processing that should occur, asdescribed herein. Method 900 may further include determining 908 whetheran output notification should be sent based on the analysis of themessage contents and the business rules established by the client.Finally, method 900 may further include sending 910 an outputnotification to at least one preselected recipient specified by theclient, if so directed by the business rules established by the client.

According to another embodiment of method 900, the input message typemay be selected from the following non-exhaustive list: telephone call,email message, text message, web services, mobile device, and website.Of course any suitable input message type that is capable oftransmitting information such as sender, recipient, event description,time of event and date of event, could be an input for an embodiment ofsystem 100 and another embodiment of method 900. Similarly, in yetanother embodiment of method 900, the output notification type may beselected from the same non-exhaustive list, i.e., telephone call, emailmessage, text message, web service, mobile device, and website. Theoutput notification type will be dictated by the preselected businessrules of the client.

According to still another embodiment of method 900, the business rulesestablished by the client may be configurable by the client via a webportal. According to one embodiment of method 900, the outputnotification may be directed to multiple recipients. According to oneembodiment of method 900, no output notification may be sent in responseto an input according to the preselected business rules established bythe client. According to yet another embodiment of method 900, theoutput notification may be directed to at least one of: a governmentagency, a private agency, an individual and a corporate entity. See forexample, FIG. 2, and related description above.

An embodiment of an intelligent notification system 100 is disclosed.For example, see intelligent notification system 100 as shown in FIG. 3and described above. System 100 may include a web server 102 forreceiving an input message 200 from an Internet 202. System 100 mayfurther include a database server 104 in communication with the webserver 102. The database server 104 may be configured for storing andretrieving client contact lists 112 and client business rules 114. Thesystem may further include a communications server 106 in communicationwith the web server 102 and the database server 104. The communicationsserver may be configured to generate and send output notificationsaccording to the client contact lists and client business rules.

According to one embodiment, system 100 may further include a firewall310 between the intelligent notification system 100 and the Internet202, see, e.g., FIG. 3 and related discussion above. According toanother embodiment of system 100, the input message type may be selectedfrom the following list of message types: telephone call, email message,text message, web services, mobile device, and website. Similarly,according to yet another embodiment of system 100, the outputnotification type may be selected from the same list of message types,i.e., telephone call, email message, text message, web service, mobiledevice, and website.

According to another embodiment of system 100, the output notificationmay be sent to at least one recipient. According to yet anotherembodiment of system 100, the output notification may be sent tomultiple recipients. According to still another embodiment of system100, the output notification may be sent repeatedly until acknowledgedby at least one recipient.

According to one embodiment, system 100 may further include third partyservices in communication with the communications server, the thirdparty services providing external processing of the input message and atleast one output notification. According to another embodiment of system100, the third party services may include telephony services forreceiving telephone messages, recording the messages as audio files andretransmitting the audio files. According to yet another embodiment ofsystem 100, the third party services may include texting services forreceiving acknowledgements in the form of text messages in response todelivered polling messages sent to sensors or equipment. For example, inthe context of polling equipment or sensors for status, it is necessaryto deliver a polling message to the equipment or sensor being polled. Inresponse to the message, the equipment or sensor may reply with statusin a text message.

In understanding the scope of the present invention, the term“configured” as used herein to describe a component, section or part ofa device includes hardware and/or software that is constructed and/orprogrammed to carry out the desired function. In understanding the scopeof the present invention, the term “comprising” and its derivatives, asused herein, are intended to be open ended terms that specify thepresence of the stated features, elements, components, groups, integers,and/or steps, but do not exclude the presence of other unstatedfeatures, elements, components, groups, integers and/or steps. Theforegoing also applies to words having similar meanings such as theterms, “including”, “having” and their derivatives. Also, the terms“part,” “section,” “portion,” “member” or “element” when used in thesingular can have the dual meaning of a single part or a plurality ofparts. Finally, terms of degree such as “substantially”, “about” and“approximately” as used herein mean a reasonable amount of deviation ofthe modified term such that the end result is not significantly changed.

While the foregoing advantages of the present invention are manifestedin the detailed description and illustrated embodiments of theinvention, a variety of changes can be made to the configuration, designand construction of the invention to achieve those advantages. Hence,reference herein to specific details of the structure and function ofthe present invention is by way of example only and not by way oflimitation.

What is claimed is:
 1. A method for intelligent notification ofmonitored offenders, comprising: providing a web server for receivinginput messages from a client; providing a database server incommunication with the web server, the database server configured forstoring and retrieving client contact lists and client business rules;providing a communications server in communication with the web serverand the database server, the communications server configured togenerate and send at least one output notification to a recipient on theclient contact lists according to the client business rules; the webserver receiving an input message email from a client; the web serverparsing the email for contents, the contents, comprising: name of amonitored offender; sender email address; recipient email address; eventdescriptor for a particular offense; time of an event; date of theevent; and location of the offense; the database server analyzing theemail contents based on the client business rules; the database serverdetermining whether an output notification will be sent or not to selectrecipients in the client contact lists based on the analysis of themessage contents and the client business rules; and the communicationsserver sending the output notification to the select clients in theclient contact lists according to the client business rules.
 2. Themethod according to claim 1, wherein the preselected business rulesdefine a geographical exclusion zone for which the offender isrestricted from entering, and when the offender is located in theexclusion zone based on the location of the offense and the eventdescriptor for the particular offense, an output notification should besent.
 3. The method according to claim 2, wherein the outputnotification comprises at least one telephone call to predefinedrecipients including: a local 911 dispatch office, parole officer of theoffender, a victim, a victim's relative and a victim's next doorneighbor.
 4. The method according to claim 1, wherein the outputnotification is directed to multiple recipients in the client contactlists.
 5. The method according to claim 1, further comprising the webserver authenticating the input message email to determine if the senderis associated with the client and whether the recipient is associatedand configured for the client after parsing the email for contents. 6.The method according to claim 1, wherein the client business rules areestablished by the client and are configurable by the client via a webportal.
 7. The method according to claim 1, wherein no outputnotification is sent in response to the input message email according tothe client business rules.
 8. The method according to claim 1, whereinthe output notification is directed to at least one of: governmentagency, private agency, individual and corporate entity.
 9. The methodaccording to claim 8, wherein the output notification is sent repeatedlyuntil acknowledged by at least one recipient.
 10. A method forintelligent emergency response notification, comprising: providing a webserver for receiving input messages from a client; providing a databaseserver in communication with the web server, the database serverconfigured for storing and retrieving client contact lists and clientbusiness rules; providing a communications server in communication withthe web server and the database server, the communications serverconfigured to generate and send at least one output notification to arecipient on the client contact lists according to the client businessrules; the web server receiving and recording an input message from aclient, the input message comprising a telephone call from one of theclient's employees; the web server parsing the recorded telephone callfor contents, the message contents, comprising: name of the employee;location of the employee; and description of the event; the databaseserver analyzing the message contents based on the client businessrules; the database server determining whether an output notificationwill be sent or not to select recipients in the client contact listsbased on the analysis of the message contents and the client businessrules; and the communications server sending the output notification tothe select recipients in the client contact lists according to theclient business rules.
 11. The method according to claim 10, wherein theoutput notification comprises forwarding the recorded telephone call tomultiple recipients in the client contact lists for further action. 12.The method according to claim 11, wherein the recorded telephone callbecomes a notification that is played during phone calls to recipients,is made available as an audio file link via short message service (SMS)sent to recipients, and as an audio file attachment to email sent torecipients, all according to client business rules.
 13. The methodaccording to claim 10, wherein the message contents further comprisescaller-ID from the telephone as additional location information withinthe input message.
 14. The method according to claim 10, wherein nooutput notification is sent in response to the input message accordingto the client business rules.
 15. The method according to claim 10,further comprising the web server authenticating the input messagetelephone call to determine if the name of the employee is associatedwith the client after parsing the input message.
 16. A method forintelligent video surveillance notification, comprising: providing a webserver for receiving input messages from a client; providing a databaseserver in communication with the web server, the database serverconfigured for storing and retrieving client contact lists and clientbusiness rules; providing a communications server in communication withthe web server and the database server, the communications serverconfigured to generate and send at least one output notification to arecipient on the client contact lists according to the client businessrules; the web server receiving an input message from a client uponobservation of an image anomaly, the input message comprising a webservice; the web server parsing the web service for contents, thecontents, comprising: long range camera image of the anomaly, zoomcamera image of the anomaly, camera identification, camera location,time and date stamp; the database server analyzing the contents based onthe client business rules; the database server determining whether anoutput notification will be sent or not to select recipients in theclient contact lists based on the analysis of the message contents andthe client business rules; and the communications server sending theoutput notification to the select recipients in the client contact listsaccording to the client business rules.
 17. The method according toclaim 16, wherein the output notification comprises the input messagecontents from the web service, namely: the camera images, the camera ID,the camera location, and time and date stamp.
 18. The method accordingto claim 17, wherein the output notification is sent to the selectrecipients via phone calls, text (SMS) messages and email with thedetails of the anomaly including the camera images attached to email, orlinked via SMS.
 19. The method according to claim 16, wherein no outputnotification is sent in response to the input message according to theclient business rules.