Entries |
Document | Title | Date |
20080198009 | Security Lighting System and Method, and Control Unit Therefore - The present invention provides a security lighting system and method, that are intended to dispel and/or affect unwanted humans or animals ( | 08-21-2008 |
20080211668 | METHOD AND SYSTEM TO DETECT HUMANS OR ANIMALS WITHIN CONFINED SPACES WITH A LOW RATE OF FALSE ALARMS - The present disclosure describes a detection system and methods for detecting a presence of a person or animal within a confined space with a low false alarm rate. The detection system may include a chemical detector to determine whether respiratory gas concentrations within the confined space exceed a predetermined concentration threshold. The detection system may further include an accelerometer-controlled, range-controlled radar unit to detect movement within the confined space during times in which acceleration of the confined space is less than a predetermined acceleration threshold. In this manner, a measured respiratory gas concentration that initially indicates a presence of a person or animal within the confined space may be confirmed by motion detection. | 09-04-2008 |
20080218338 | SYSTEM AND METHOD FOR PREMISES MONITORING USING WEIGHT DETECTION - The present invention is directed to systems and methods which monitor weights applied within a protected premises and, based on detected weight pressure patterns, serve to control operational aspects of the premises. In one embodiment, the pressure monitoring system is used in conjunction with a security system to resolve ambiguities in detected breach conditions. In one embodiment the pressure monitoring system learns and remembers how the premises is used. When a possible trouble condition is detected the system compares a detected pressure against known normal, known abnormal, and unexpected pressures to determine the action to be taken at that time. | 09-11-2008 |
20080224862 | Selectively enabled threat based information system - A method for selectively monitoring a privacy sensitive area includes assigning the privacy sensitive area a privacy threshold value, receiving a threat level, and activating surveillance equipment associated with said privacy sensitive area when said threat level exceeds said privacy threshold value. | 09-18-2008 |
20080224863 | Method for Monitoring a Room and an Apparatus For Carrying Out the Method - A method for monitoring a room (R) is specified, in which acoustic properties ({circle around (S)}, W) of the room (R) are determined, changes (δ) in the acoustic properties ({circle around (S)}, W) of the room (R) are detected, the changes (δ) are compared with prescribed criteria (Δ{circle around (S)}, ΔW)and an action (α) is triggered if the prescribed criteria (Δ{circle around (S)}, ΔW) have been satisfied. This makes it possible to monitor a room with the aid of an active noise reduction system. If there is no need to monitor a room, the system can be used for active noise reduction. | 09-18-2008 |
20080238667 | Clothing and Accessories that Operate Radio Frequency Identification Enabled Security Devices - A wearable radio frequency identification (RFID) device is disclosed that includes a wearable housing and an RFID chip within the wearable housing. The RFID chip is configured to communicate with one or more RFID enabled security devices to activate and/or deactivate one or more security systems. The wearable RFID device may take on many different wearable forms, for example, a watch, a ring or a label with an RFID chip inside. | 10-02-2008 |
20080238668 | SYSTEM AND METHOD FOR SECURITY MONITORING BETWEEN TRUSTED NEIGHBORS - A system and method for security monitoring by a trusted neighbor is disclosed. In one embodiment, the system allows a security monitor in a first building to communicate with a building automation network in a second building to enable monitoring of a security sensor in the second building. | 10-02-2008 |
20080252450 | A Method and a Device for Detecting Intrusion Into or Tampering with Contents of an Enclosure - A method and a device for detecting intrusion into or tampering with contents of an enclosure. According to the method at least one gas proof seal-barrier is provided in association with the enclosure and a first environment is produced within said gas proof seal-barrier. Said first environment is different regarding at least one characteristic feature from a second environment surrounding said gas proof seal-barrier. At least one detector is arranged within said gas proof seal-barrier for detecting a predetermined change of the characteristic feature of the said first environment. Said detector is transferred irrevocably from a first state to a second state when there is a predetermined change of the characteristic feature, and the state of the detector is supplied to a position outside said gas proof seal-barrier. | 10-16-2008 |
20080266086 | Fluidized bed technology for security enhancement - An improved system and methods for increasing security at sensitive locations from unwanted third parties through the use of fluidized granular solids. | 10-30-2008 |
20080278320 | Method and system for reduction of electronic article surveillance system false alarms - A method and system for generating alarms in a security system that include establishing a detection region, detecting a first event where the first event is one of (a) detecting a tag in the detection region and (b) detecting a person in the detection region, starting a timer upon detecting the first event, detecting a second event where the second event is the other one of (a) detecting a tag in the detection region and (b) detecting a person in the detection region and enabling an alarm output when the second event is detected prior to expiration of the timer. The method and system for generating alarms in a security system can further include setting a first event flag upon detecting the first event where the first event flag corresponds to the first event and setting a second event flag upon detecting the second event where the second event flag corresponds to the second event. | 11-13-2008 |
20080284592 | Home health monitoring system - The present invention relates to a system and method of modifying and utilizing a standard home security system augmenting it into a viable state-of-the-art home health monitoring system. More specifically, this invention relates to an apparatus and method of adding a program and some motion sensors thus using the methods (with slight modification) of an existing home security system in such a way that there is a minimum of intrusion and cost compared to other methods. | 11-20-2008 |
20080284593 | Method and system for power management of electronic article surveillance systems - A method, system and apparatus for managing power use in security systems, which include establishing a detection region, triggering a person detection event, the person detection event based on the detection of a person in the detection region, starting a timer upon triggering the person detection event, and transmitting a tag interrogation signal until the expiration of the timer. The method, system and apparatus can further include determining a relative direction of movement of the person. | 11-20-2008 |
20080284594 | Optoelectronic sensor arrangement and process for monitoring a surveillance area - The invention relates to an optoelectronic sensor arrangement ( | 11-20-2008 |
20080291017 | Apparatus and method for deploying a wireless network intrusion detection system to resource-constrained devices - Wireless devices, such as field devices or repeater/relay nodes, detect the presence of anomalies in data packets that suggest intrusion. Upon detection of an anomaly, a wireless device sends a notification to a sentinel device, which determines if intrusion may be occurring. If so, the sentinel device downloads a spy routine to at least one of the wireless devices, which enables further investigation into and/or isolation of the intrusion. Since the spy routine is downloaded to the wireless devices, the spy routine can be used in conjunction with memory-constrained wireless devices. Memory-constrained wireless devices may lack adequate memory for storing both a main application executed during normal operation and the spy routine. The spy routine could overwrite one or more modules of the main application. Once executed, the spy routine could itself be overwritten by the one or more modules, allowing the wireless device to return to normal operation. | 11-27-2008 |
20080291018 | METHOD, COMPUTER PROGRAM ELEMENT AND A SYSTEM FOR PROCESSING ALARMS TRIGGERED BY A MONITORING SYSTEM - A method and system is designed for processing alarms, that have been triggered by a monitoring system such as an intrusion detection system, a firewall, or a network management system, comprising the steps of entering the triggered alarms into an alarm log, evaluating similarity between alarms, grouping similar alarms into alarm clusters, summarizing alarm clusters by means of generalized alarms, counting the covered alarms for each generalized alarm and forwarding generalized alarms for further processing if the number of alarms covered satisfies a predetermined criterion. In the event of high rates of alarm messages, possibly containing many false alarms, a system administrator will therefore not be confronted with a flood of messages with little significance. Instead, only generalized alarms, more meaningful and smaller in number, are presented. The method can further comprise copying the alarm log to a cluster log and for each generalized alarm in the cluster log counting the number of covered alarms that are identical to the generalized alarm or more specific than the generalized alarm, and, if the number of covered alarms exceeds a predetermined minimum number, then terminating the loop. A heuristic is used to select an attribute of the alarms of the cluster log and for each alarm thereof the selected attribute is replaced by a more general attribute. A taxonomy on the attributes can be used to define the similarity between the alarms. The forwarded generalized alarm can furthermore be investigated in order to identify a root cause. | 11-27-2008 |
20080303661 | COMPACT AND SELF-CONTAINED SECURITY SYSTEM - A system to monitor and detect an intruder within a structure is disclosed. The system comprises a self-contained security insert configured to be mounted to and substantially contained within an electrical junction box. The security insert is capable of being coupled to a primary power source within the structure and operating as a stand-alone security device. The self-contained security insert includes an occupancy sensor configured to detect the intruder, a modem block coupled to the occupancy sensor and configured to transmit one or more intrusion codes to other electrical devices within the structure, a primary lighting control circuit configured to activate an externally mounted lighting device upon detection of the intruder, and a battery backup device contained within the insert and configured to provide power to the insert upon interruption of the primary power source. | 12-11-2008 |
20080303662 | TRAFFIC AND POPULATION COUNTING DEVICE SYSTEM AND METHOD - A traffic and population counting device system and method is provided. The traffic and population counting device may be executable by a computing device and may include an entry selector configured to be selected to indicate that a shopper has entered a shopping zone and to keep a running count of a number of shoppers who enter the shopping zone. An exit selector may be configured to be selected to indicate that a shopper has exited a shopping zone and to keep a running count of a number of shoppers who exit the shopping zone. Further, a display may be configured to display a running population count of shoppers within the shopping zone. The running population count may be determined by a running difference between the running count of the number of shoppers who enter the shopping zone and the running count of the number of shoppers who exit the shopping zone. | 12-11-2008 |
20090009326 | Portable Motion-Detecting Alarm with Remote Notification - A Disturbance-Sensing System comprises a fixed unit comprising a small and self-powered unit for associating with an object being protected, and for sensing an alarm event such as movement of the object being protected, and for remotely notifying the an owner or person responsible for the object being protected that the alarm event is occurring; and a mobile unit which may be carried by an owner of or person responsible for the object being protected, for receiving the notification of the alarm event. The fixed unit may be attached to or otherwise disposed in, on or in proximity to the object being protected. The mobile unit may comprise a user's cell phone. Various means for attaching the fixed unit to an object being protected are disclosed. | 01-08-2009 |
20090027195 | Augmented security system - A system for augmenting security sensor accuracy and reduction of false alarm signals. The system includes the security sensor system along with an external sensor system for measuring the effect of environmental conditions on the security sensors and further includes a sensor data augmentation component to adjust the sensitivity of the security sensors according to measured environmental conditions. Weather sensors and video sensors are two preferred external sensor systems. | 01-29-2009 |
20090027196 | SYSTEM AND METHOD FOR PREMISES MONITORING AND CONTROL USING SELF-LEARNING DETECTION DEVICES - The present invention is directed to systems and methods in which monitors track their respective parameters. Based on the learned activity, the monitors control operational aspects of the premises. The monitors thus learn and remember how the premises is used. When a possible trouble condition is detected, the system compares a detected parameter against parameters expected at that day and time in order to determine the action to be taken. In one embodiment the system learns and remembers the cyclical repetition and frequency of parameters, for example, of someone with a cane or limp, or a small person with a short gait as compared to a tall person with a longer stride. | 01-29-2009 |
20090033489 | Terminal - A terminal, such as an automated teller machine, comprises: a customer identification device; a sensor for detecting presence of a customer at the terminal; and a controller coupled to the customer identification device and the sensor. The controller is programmed to (i) track the customer's location, (ii) create a session on identification of a customer, and (iii) close the created session when a customer absence criterion is fulfilled. The functions of the customer identification device and the sensor may be performed by a single unit. The customer absence criterion may comprise a time period during which the customer is not detected at the terminal. | 02-05-2009 |
20090033490 | System and Method of Dynamically Weighted Analysis for Intrusion Decision-Making - An intrusion detection mechanism is provided for flexible, automatic, thorough, and consistent security checking and vulnerability resolution in a heterogeneous environment. The mechanism may provide a predefined number of default intrusion analysis approaches, such as signature-based, anomaly-based, scan-based, and danger theory. The intrusion detection mechanism also allows a limitless number of intrusion analysis approaches to be added on the fly. Using an intrusion detection skin, the mechanism allows various weights to be assigned to specific intrusion analysis approaches. The mechanism may adjust these weights dynamically. The score ration can be tailored to determine if an intrusion occurred and adjusted dynamically. Also, multiple security policies for any type of computing element may be enforced. | 02-05-2009 |
20090045952 | Operating & controlling a security system by mobile phone - An operating and controlling system is disclosed to monitor and protect various premises. The premises may include residential, commercial, automobile, boat, airplane or any other property that is to be protected by a security system. A Hand Held Mobile Phone (HHMP) manages and controls the security system through a two way wireless multimedia communication between the security device located at the premises and the HHMP remotely located worldwide. | 02-19-2009 |
20090072971 | PERIMETER SECURITY SYSTEM - A method of operating a perimeter security system comprises monitoring a perimeter for a plurality of events, receiving an event signal for an event of the plurality of events wherein the event signal comprises an acceleration, processing the first event signal to determine if the event is a threat, transferring a confirmation request to confirm that the event is a threat in response to determining that the event is a threat, receiving a confirmation response in response to the confirmation request confirming that the event is a threat, and generating and transmitting a message identifying the event in response to confirming the threat. | 03-19-2009 |
20090072972 | INTELLIGENT OBSERVATION AND IDENTIFICATION DATABASE SYSTEM - An intelligent video/audio observation and identification database system may define a security zone or group of zones. The system may identify vehicles and individuals entering or exiting the zone through image recognition of the vehicle or individual as compared to prerecorded information stored in a database. The system may alert security personnel as to warrants or other information discovered pertaining to the recognized vehicle or individual resulting from a database search. The system may compare images of a suspect vehicle, such as an undercarriage image, to standard vehicle images stored in the database and alert security personnel as to potential vehicle overloading or foreign objects detected, such as potential bombs. The system may track individuals or vehicles within a zone or between zones. The system may further learn the standard times and locations of vehicles or individuals tracked by the system and alert security personnel upon deviation from standard activity. | 03-19-2009 |
20090091444 | MOVEMENT CONTROLLED LUMINAIRE AND LUMINAIRE ARRANGEMENT - A luminaire includes at least one main illuminant and at least one auxiliary illuminant. The main illuminant is provided for a continuous operation. The auxiliary illuminant is controlled by a motion sensor, which activates it when movement is detected. Preferably, the motion sensor is embedded in the luminaire. Furthermore, it is preferred that the at least one auxiliary illuminant is designed as a LED-luminaire. | 04-09-2009 |
20090091445 | System and Method for Providing Visual and Physiological Cues in a Security Matching System - A system and method for displaying a security alert. First and second user monitors are configured to communicate with an interrogator to establish the presence of the user monitors in a defined space. An information server is configured to determine a degree to which the users of the first and second user monitors are permitted to exchange information according to security matching criteria applied to user profiles. Security alert signals are sent to first and second match indicators. The first match indicator is visible to the user of the second user monitor so as to be informative to the user of the second user monitor of a degree to which the users of the first and second user monitors are permitted to exchange information according to the security matching criteria. The second match indicator is visible to the user of the first user monitor so as to be informative to the user of the first user monitor of a degree to which the users of the first and second user monitors are permitted to exchange information according to the security matching criteria. | 04-09-2009 |
20090102648 | Motion detector - The invention discloses a motion detector that includes a casing, a sensor and a signal deflector. The casing has a lens array around an external periphery of the casing and an installation space inside the casing for installing the sensor and the signal deflector. The sensor includes a sensing unit and a signal processing unit electrically connected with each other. The signal deflector is installed between the sensor and the lens array, and the signal deflector includes a plurality of elliptic concave lenses for reflecting lights incident from different directions to the sensing unit by the focusing characteristics of the elliptic concave lenses, so as to broaden the scope of applications. | 04-23-2009 |
20090115607 | Tamper detection system - A system and method for detecting radiation from a source in a container is disclosed. A continuous optical fiber path is disposed in a medium which is part of or associated with a container and which encloses the volumetric space of the container. The optical fiber path provides a volumetric mass of optical fiber which is reactive to radiation from a radiation source in the container to cause an irreversible change in the light carrying capacity or other characteristic of the optical fiber. A light source is coupled to one end of the optical fiber path for introducing light having a predetermined characteristic. A light detector is coupled to the other end of the optical path for receiving light from the optical path. A circuit is coupled to the light detector and is operative to detect a total loss of light or a change in the predetermined characteristic of the light and to provide an indication thereof. A continuous wire path can be provided in an alternative embodiment, and which may include e-textiles. In another aspect of the invention, alarm signals from a number of individual detectors can be multiplexed into a gate circuit, such as an OR gate, the output of which provides an alarm signal in response to any one or more of the input signals from the individual detectors. | 05-07-2009 |
20090121869 | ACCESS MONITORING AND CONTROL SYSTEM AND METHOD - An access monitoring and control system is provided. The access monitoring and control system includes a sensing device configured to collect data points regarding at least one of movement of a person through an access portal and a state of the access portal and a processing unit configured to receive the data points from the sensing device and to form activity clusters from the data points based upon similar patterns of inactive or active behaviors. | 05-14-2009 |
20090128327 | Systems and Methods of Detection Using Fire Modeling - A system for adjusting parameters of ambient condition detectors in a regional monitoring system is coupled to or includes fire modeling processing. Based on outputs from the processing, selected parameters of respective detectors can be adjusted to shorten detector time to alarm. As a fire condition develops, different detectors can be adjusted dynamically and in real-time. | 05-21-2009 |
20090128328 | Automatic monitoring system with a security system - The invention is related to a security system of an automatic monitoring system that is used to guard the automatic monitoring system from theft. The security system uses a sensing device to detect the movement or vibration of the monitoring system and produces a sense signal that will be processed by an information processing device to produce and send out a warning signal to guard the automatic monitoring system against theft and track the position after being moved. | 05-21-2009 |
20090135010 | ALARM SYSTEM AUDIO INTERFACE TAMPER AND STATE DETECTION - An alarm system comprises: an audio interface comprising: a microphone; a state sensor for sensing a state at the audio interface; a signal generator for generating an inaudible state signal indicative of the state; a multiplexer for combining an audio signal from the microphone and the state signal; a control panel for monitoring sensed conditions at the audio interface; a conductor interconnecting the audio interface to the control panel carrying audio signal and the state signal as combined from the audio interface to the control panel. | 05-28-2009 |
20090135011 | CONTROL APPARATUS OF SHOWCASE - An object is to provide a control apparatus of a showcase in which appropriate illumination having a high presentation effect can be realized by an LED illumination apparatus having a high durability against turning ON/OFF and capable of securing a predetermined illumination intensity even under an environment at a low temperature. The control apparatus controls a plurality of showcases so that display chambers where commodities are displayed are illuminated with LED illumination apparatuses, and includes a person detecting sensor provided in a showcase disposed in such a position that the approaching of any person can first be detected among the plurality of arranged showcases, so that the approaching of the person is detected. When the person detecting sensor detects the approaching of the person, the illumination intensities of all the LED illumination apparatuses of the plurality of showcases are increased. | 05-28-2009 |
20090153325 | VIRTUAL RECEPTIONIST METHOD AND SYSTEM - A method of reception includes detecting that an object has entered a first region of a space at a first time. A time period is measured around the first time. A determination is made whether any object has entered a second region of the space within the time period. Thereafter, a determination is made that the object needs attention when no object is detected entering the second region within the time period. | 06-18-2009 |
20090153326 | Method for locating intruder - Method includes receiving plurality of measured signal strengths, computing estimated intruder signal strength associated with each of plurality of potential intruder locations, and selecting estimated intruder location. Receiving plurality of measured signal strengths includes receiving plurality of measured signal strengths each associated with sensor included in plurality of sensors distributed in monitored area that includes plurality of potential intruder locations. Selecting estimated intruder location includes selecting as estimated intruder location, first potential intruder location associated with estimated intruder signal strength greater than or equal to estimated intruder signal strength associated with another potential intruder location adjacent to first potential intruder location. Computer-readable medium containing code that executes method. | 06-18-2009 |
20090167529 | Electronic fence using wireless mesh network - The current problem in protecting a secure area which can be a border between countries, Federal facility, Army deployment or even a house is that we are relying for the most part on a fence, cameras, electric fence, which takes a longer time to install. It is very expensive and cannot locate the point of entry. Sometime it is too late to react if someone cuts the fence and enters the secure area. My patent is to provide a very fast solution, early detection, identify the location of entry and all wireless systems which will allow implementing this idea in any location even in enemy fields where you wish to protect troops, army facilities and more. | 07-02-2009 |
20090174552 | DIGITAL OCCUPANCY SENSOR LIGHT CONTROL - A method of sensing motion in a predetermined area is provided. The method may include using a digital output motion sensor to produce a digital output signal indicative of the presence of motion in the predetermined area. The method may further include transmitting the digital output signal along a signal path independent of analog amplification and filtering. The method may also include using a microprocessor coupled to the signal path to receive the digital output signal and to process the digital output signal. | 07-09-2009 |
20090184821 | Smart display device for independent living care - A wireless contextual prompting device provides contextual (context-aware) prompting in the home for applications such as Activities of Daily Living (ADL) monitoring, medication adherence, journaling, social messaging and coaching. The device combines the advantages of a small, wireless, battery-operated sensor that may be easily mounted at critical places in a person's daily routine with a low-power, high-contrast display panel that may be palm sized. The context may be displayed on the display screen as images, icons and/or text such that it is easy to interpret warnings by the young, elderly, or the language-challenged. | 07-23-2009 |
20090189763 | Security film - A tamper indication device has a film attached and connected within the circuit that generates a signal in response to a tamper event. The signal is received by a micro-controller which generates an output signal to a display or data collection device and transceiver. More particularly, the tamper indication device has a printed circuit in a specialized pattern to make entry without breaking the circuit near impossible. When the circuit is broken a signal is counted by the micro controller which generates an output signal for delivery to a display or other data collection device. The output signal can be transmitted by RF device such as a passive or active RFID Tag, or by an IR communications device or by any other communication variant. | 07-30-2009 |
20090195382 | VIDEO SENSOR AND ALARM SYSTEM AND METHOD WITH OBJECT AND EVENT CLASSIFICATION - A method and system detects an intrusion into a protected area. Image data is captured and processed to create a reduced image dataset having a lower dimensionality than the captured image data. The reduced image dataset is transmitted to a centralized alarm processing device where the reduced image dataset is evaluated to determine an alarm condition. | 08-06-2009 |
20090207020 | MULTITHREAT SAFETY AND SECURITY SYSTEM AND SPECIFICATION METHOD THEREOF - The invention relates to a safety and security system designed to protect a designated area. The system comprises sensors of various types (radars, infrared detectors for instance) and sources of intelligence. Correlation is run between instant-track data and non-instant-track data before the level of threat of the tracks is analysed. Reliability of this analysis is thus greatly enhanced. Also a method is provided to develop systems of this type which provides an integrated specification and design method which covers technical and human factors. | 08-20-2009 |
20090212943 | System and method for intrusion detection - Present day intrusion detection systems frequently cause false alarms by mistaking occupants as intruders, and it is desirable to reduce such false alarms. This invention comprises a processor that employs various software algorithms. The processor receives signals over temporal periods and software algorithms statistically discern various activities, thereby reducing false alarms and detection failures. The software algorithms are adaptive to the level of detected activity such that a rate of false alarms may be predetermined. As such, the processor and software algorithms comprise an artificial intelligence system. This artificial intelligence system may be employed in intruder and vehicle alarm systems composed of a multiplicity of detectors and within such detectors. A second aspect of this invention is an improved infrasound detection method that may be employed in such artificial intelligence. | 08-27-2009 |
20090212944 | INTEGRATED MULTI-SPECTRUM INTRUSION THREAT DETECTION DEVICE AND METHOD FOR OPERATION - A security apparatus comprising a plurality of sensing elements, each adapted to detect intrusion into protected premises, each sensing element outputs a sensing signal representing a detected event, a signal processing section for examining each sensing signal and outputting a signature for each sensing signal, a computing section for translating each signature into a normalized threat value, ranging from “0” to “1”, modifying each normalized threat values by multiplying a weighting coefficient corresponding to a type of sensing element, storing for a temporary period of time, each modified normalized threat value, and an alarm generating section for adding each of the stored modified normalized threat values, outputting an aggregate threat value and generating an alarm enable signal based upon an analysis of the aggregate threat value. | 08-27-2009 |
20090212945 | INTRUSION DETECTION SYSTEMS FOR DETECTING INTRUSION CONDITIONS WITH RESPECT TO ELECTRONIC COMPONENT ENCLOSURES - Intrusion detection systems for detecting intrusion conditions with respect to electronic component enclosures are disclosed herein. An intrusion detection system in accordance with the subject matter disclosed herein may include a conductive component that at least partially surrounds a space. The conductive component may cover at least a portion of an electronic component to be protected. Further, the system may include a first conductive trace positioned to contact the conductive component. A second conductive trace may include a portion positioned in the space at least partially surrounded by the conductive component. The system may also include a detection circuit for determining whether at least one of the first conductive trace and the conductive component are not conductively connected and for determining that the second conductive trace is conductively connected to the first conductive trace. Further, the detection circuit may detect an intrusion condition in response to determining at least one of the first conductive trace and the conductive component are not conductively connected. | 08-27-2009 |
20090212946 | System and Method for Detecting an Invalid Camera in Video Surveillance - A system having a camera ( | 08-27-2009 |
20090212947 | INTRUDER DETERRENT SYSTEM - A system and a method for operating an intruder deterrent system by which a smoke screen is generated in response to an intruder being detected, a smoke screen generator operatively linked to the intruder detecting. To achieve an intruder deterrent system that can operate for a longer period after interruption in the power supply, latent heat is stored in a heat storage, and smoke can be generated by transferring the latent heat from the heat storage to a liquid, which liquid is evaporated. The use of the heat storage has led to the unexpected result that the smoke generator can operate independently of power to the heating elements for a very long period. | 08-27-2009 |
20090237246 | DRIVEWAY ALERT SYSTEM WITH CAR ID - A security/notification or alert system and method including a specified secure area and an electronic identification device coupled to a trespassing or visiting entity. The electronic identification device transmits a particular identification when the trespassing/visiting entity enters the specified area. A sensor device detects entry of the trespassing/visiting entity into the specified area and transmits an alert signal to a control device when the trespassing/visiting entity is detected. The control device communicates that the trespassing/visiting entity has entered the specified area, and also identifies the entity and communicates the particular identification of the trespassing/visiting entity. | 09-24-2009 |
20090237247 | REMOTE AREA MONITORING SYSTEM - A Remote Area Monitoring System (RAMS) for detecting movement in a disallowed direction through a passageway (P). The RAMS monitors two volumetric spaces that are established by the system, both of which spaces are defined with respect to depth, width, and height. Both a warning zone and an alarm zone are defined for each space. The warning zone protects against inadvertent incursion into the protected spaces; while the alarm zone protects against intentional intrusions thereinto by movement in the disallowed direction. The RAMS automatically monitors both zones and does not require human vigilance to detect and warn of an incursion or intrusion. Human traffic, in both directions through the zones, is monitored; as well as the movement of objects. Movement of humans is detected using a sensor ( | 09-24-2009 |
20090243850 | MICROWAVE RECEIVER AND MICROWAVE SENSOR SYSTEM - A microwave receiving apparatus according to an embodiment of the invention includes a local transmitter which supplies a local signal having a frequency according to a supplied voltage, a mixer which combines a received microwave signal with the local signal to supply an intermediate frequency signal, a filter which passes the intermediate frequency signal, a phase shifter which shifts a phase of the intermediate frequency signal passed through the filter by a predetermined angle, and a phase detection unit which supplies a voltage to the local oscillator according to a phase difference between the intermediate frequency signal passed through the filter and output of the phase shifter. | 10-01-2009 |
20090243851 | FSOC/Radio Intrusion Detection System - Certain exemplary embodiments provide a method comprising sensing an intruder within a predetermined vicinity of a Free Space Optical Communication (FSOC) system; and reducing an emitted power of the FSOC system. Certain exemplary embodiments provide a system comprising a Free Space Optical Communication (FSOC) subsystem; a sensor adapted to detect an intruder within a predetermined vicinity of the FSOC subsystem; and a switch adapted to reduce an emitted power of the FSOC subsystem, said switch coupled to said sensor. | 10-01-2009 |
20090243852 | Remote Location Monitoring - A remote location monitoring system, for example, a home monitoring or weather monitoring system may include one or more sensors and/or receivers at a remote location such as a residence or business to be monitored. The sensors and receivers may communicate with a central server via a gateway device, and may be controlled by users locally or remotely via the server. Users may register to receive remote notifications of weather events and other home monitoring events. Users may also access remotely sensors and receivers to configure alerts, notifications, and automatic responses for the devices and integrated appliances at the remote location. | 10-01-2009 |
20090267764 | "Catch One" system - The system will consist of components/materials that are readily available in the marketplace and will not require any development and subsequent approval of new technologies or materials. The system components (deadbolt mechanisms, pushbutton stations, and central connection/control panel) will be hardwired to ensure that the system's operation will not be hindered or disabled by any external signal source that could unintentionally or deliberately interfere with the operating frequency of a wireless control system. The system will be powered via a 120VAC, 60 Hz circuit provided by a dedicated circuit within a power panel located in the bank's electrical/mechanical room. Details of system operation are provided in the attached System Narrative and sketches labeled FIG. | 10-29-2009 |
20090273472 | APPARATUS, SYSTEM, AND METHOD FOR SAFELY AND SECURELY STORING MATERIALS - An apparatus, system, and method are disclosed for safely and securely storing materials. A plurality of smart tiles sense traffic and generate traffic data. A network transmits the traffic data from the smart tiles. A computer determines a plurality of normal traffic patterns from the traffic data. In addition, the computer detects an abnormal traffic pattern from the traffic data. The computer activates a security response in response to the abnormal traffic pattern. | 11-05-2009 |
20090295577 | Area Monitoring Sensor - Provided is an area monitoring sensor capable of recording sensing information of an intruder that has triggered to output an operation disable signal, and displaying the information as needed. The area monitoring sensor includes: an intruder sensing unit that emits detection light in different emitting directions and senses an intruder within a previously set monitor area based on reflection of the detection light; a signal output unit that outputs an operation disable signal based on a result of the sensing by the intruder sensing unit; a sensing history recording unit that stores a position of the intruder that has been sensed by the intruder sensing unit as sensing history; and a sensing history display unit that displays the sensing history in the sensing history recording unit based on an input signal from the operation input unit. | 12-03-2009 |
20090309722 | TAMPER-INDICATING MONETARY PACKAGE - A monetary package capable of detecting and communicating tampering is described. The monetary package may comprise a container having a volume configured to hold monetary items such as currency, checks, and negotiable instruments, a sensor configured to detect an opening of the container, a device coupled to the sensor and configured to store data responsive to the sensor detecting the opening of the container, and a transmitter configured to wirelessly send the stored data | 12-17-2009 |
20090315712 | SURVEILLANCE METHOD AND SYSTEM USING OBJECT BASED RULE CHECKING - Surveillance method and system for monitoring a location. One ore more sensors, e.g. camera's, are used to acquire sensor data from the location. The sensor data is processed in order to obtain an extracted object list, including object attributes. A number of virtual objects, such as a virtual fence, are defined, and a rule set is applied. The rule set defines possible responses depending on the list of extracted objects and the virtual objects. Rule sets may be adapted, and amended responses may be assessed immediately. | 12-24-2009 |
20090322527 | SERVER BASED DISTRIBUTED SECURITY SYSTEM - A security system including one or more sensors for detecting a predetermined security event. One or more communications modules include a transmitting device for communicating with the sensor and transmitting an alert signal of the security event. A remotely located computer system controls the communications between the transmitting device of the communication module for receiving a signal from and transmitting to the communications module. After receiving the alert signal, the computer system communicates an alarm signal. | 12-31-2009 |
20100026487 | SECURITY SYSTEM CONTROL PANEL - A security system is operable in a stay mode in which protected premises perimeter sensors or detectors are armed wherein a delay is provided between detection of breach of the perimeter and generating an alarm. The security system is able to authenticate a user during the delay and to restore the stay mode without generating the alarm and without disarming the protected premises perimeter sensors or detectors. | 02-04-2010 |
20100033326 | MULTIPLE SENSOR LIGHTING SYSTEM - A circuit for operating a plurality of electrical devices such as lamps for outdoor illumination includes a plurality of motion sensor circuits for detecting motion relative thereto and a plurality of outputs conditioned upon motion detection. Additionally, a photocell sensor circuit for detecting a low ambient illumination level has an output command conditioned upon the detection of a predetermined illumination level that is electrically coupled to the control circuit for illumination of lamps at low ambient lighting levels. The present invention enables the activation of lamps by a plurality of motion sensors having differing fields of view. | 02-11-2010 |
20100039258 | INITIATIVE WARNING SYSTEM - An initiative warning system comprises a protective area for accommodating objects and defining an area network, a plurality of sensors respectively installed on the objects, a detecting mainframe connected with the area network, and a terminal communicated with the detecting mainframe through the area network. Wherein, the arrangement of the area network promotes the connection between the detecting main frame and substitutes the conventional wiring allocation, so as to streamline installations of the detecting mainframe and the sensors. Additionally, the sensors can regularly transmit oscillating signals to the detecting mainframe for a further recognition and comparison. Thus, a controlling signal would be timely sent to trigger a warning command showing on the terminal through the area network when the compatible signals between the sensors and the detecting mainframe are not detected by the detecting mainframe, thereby preferably attaining an active warning effect. | 02-18-2010 |
20100039259 | SYSTEM AND METHOD FOR BOARDING AREA SECURITY - A security method that includes defining rules specifying permitted movements of passengers in a transportation terminal. Passengers entering the terminal may be issued a boarding pass having a Radio Frequency Identification (RFID) tag attached thereto. The location of the RFID tag may be measured and responsive to the measured location of the RFID tag, a violation of at least one of the rules by the passenger may be detected. An action with respect to the detected violation may be taken. The rules may define a region that is forbidden for access, a region in which the passengers are expected to be in motion, a region in which the passengers are expected not to be stationary for more than a given time period, etc. | 02-18-2010 |
20100045460 | Security system and method with automatic language selection - A security system and method of operation thereof are provided in which users of the security system are each assigned a preferred language. A user interface of the security system communicates information to particular users in their assigned preferred languages. | 02-25-2010 |
20100045461 | Security system with activity pattern recognition - A security system and method of operation thereof stores information related to a plurality of detected events and determines an activity pattern based on the stored information. The system and method then determines a type of alarm, if any, to issue in response to a detected trigger event based at least in part on the determined activity pattern. | 02-25-2010 |
20100052902 | RELIABLE SECURITY SYSTEM BY TRIANGULATION - The present invention is a security system and a method for reliably detecting an intruder without false alarms. The security system includes at least three motion detectors and processor circuitry adapted to collect a plurality of location samples and analyze them to determine if a target has transitioned from a first region to a second region, and when the target has transitioned from a first region to a second region, initiating a predetermined action. Each location sample is determined by: detecting motion from a target with each of the three motion detectors, determining the distance to the target for each of the three motion detectors, and triangulating the three determined distances to produce a two-dimensional location. The security system determines if a target has transitioned from a first region to a second protected region by comparing the plurality of location samples to perimeter location data stored in memory. Different modes of operation cause the security system to take different actions before and after the transition, such as generating an alarm or a warning signal. The security system may also include a display to show the location of one or more targets, which may be the intruder or the occupants of the premises. | 03-04-2010 |
20100052903 | Voice recorder based position registration - A system and method for monitoring a location having at least one sensor for sensing a change in at least one condition using voice tags to announce alarms. The system includes a registration process where a voice recorder and a digital conversion unit form digital voice tags from recorded speech representing the type and location of sensors. The voice tag is sent as part of an alarm message or pre-stored in a control panel for later retrieval such that the type and location of an alarm is reproduced vocally at the time of the alarm. The registration process may be completed with a registration module which may be a keypad or the voice recorder may be included in the sensors. Additional features include sensor location change notification to ensure the stored voice tag represents the current location of the sensor. | 03-04-2010 |
20100052904 | ABNORMALITY DETECTING DEVICE - The abnormality detecting device of this invention comprises a movement detecting unit detecting a presence of a movement of a body based on a video signal in a monitored area, a body detecting unit detecting a predetermined body existence based on the video signal, a brightness level detecting unit detecting a brightness level of the video signal, a determining unit determining whether the detected brightness level is within a predetermined range, a first abnormality detecting unit, in case the brightness level is determined within the predetermined range, detecting the abnormal state occurrence when the movement of the body is detected and the predetermined body is detected, and a second abnormality detecting unit, in case the brightness level is determined to be outside the predetermined range, detecting the abnormal state occurrence when a movement of a body is detected, and detecting the abnormal state occurrence when the predetermined body is detected. | 03-04-2010 |
20100060451 | GIFT BAG WITH MOVEMENT SENSOR AND ALARM - A gift bag having an audio message playback device is activate by a motion detector to play an audio message upon detection of movement of the gift bag or in the vicinity of the gift bag. The gift bag includes a plurality of side walls and a bottom to define an interior for receiving a gift. The audio message, played upon the detection of movement of or in the vicinity of the gift bag, may include siren noises, music and/or spoken messages. | 03-11-2010 |
20100073164 | METHOD FOR DETERMINING SENSOR COVERAGE, A DESIGN TOOL AND A BORDER PROTECTION SYSTEM USING THE METHOD - A method is disclosed for determining sensor performance of a border element of homogeneous terrain, weather and vegetation properties. The border element includes a number of areas of interest, as well as a plurality of sensors. The method includes determining coordinates of the border element and areas, and determining performance data for each sensor. The coordinates and performance data is used as input parameters to a Line-Of-Sight tool for determining a coverage factor of each sensor. The coverage factor is modified for time per time unit in which function of each sensor is impaired by conditions such as bad weather, light or mobility. Then, the modified coverage factors for each sensor are summed to obtain a total sensor performance for the border element. | 03-25-2010 |
20100085186 | Tamperproof Non-Contact Switch - A non-defeatable magnetically actuatable switch device is shown and described for restricting access to industrial controls. The non-contact switch device employs one or more non-contact access switches, and an access key removably disposed in close proximity to each access switch. Removal or installation of an access key alters the electrical state of a corresponding access switch. A connected control unit determines a mode of operation, or grants permissions, based on the combination of access keys that are present or absent from the device. A lockable or sealable cover is provided over the access keys to limit unauthorized access. A tamper detection switch is also provided for the sole purpose of identifying foreign magnetic sources in the vicinity of the access switches to ensure that the device is non-defeatable. Furthermore, all access and tamper detection switches are magnetically actuatable and thus provide a completely contact-free means of securing and restricting access to sensitive controls and parameters. | 04-08-2010 |
20100085187 | SECURITY SYSTEM INCLUDING GENETIC SAMPLING DEVICE - A security system includes a sensor for sensing a presence of an intruder within a protected space. A genetic sample-gathering mechanism takes a genetic sample from the intruder in response to a signal from the sensor. | 04-08-2010 |
20100090829 | METHOD FOR MONITORING AUTHORIZED AND UNAUTHORIZED PERSONS WITHIN A SECURITY PERIMETER AROUND AN APPARATUS - The invention relates to the automatic detection of the presence of non-authorized persons in the vicinity of an apparatus of the aircraft type. To this end, the invention comprises equipping persons with radio transmitters for identifying them as authorized personnel. The aircraft are also fitted, such as at the existing PODs, with a transceiver device of a radio identification system of the RFID type for recognition of the persons wearing the radio transmitters. Only the persons who are not authorized in the vicinity of the aircraft initiate an alarm procedure. | 04-15-2010 |
20100102962 | OCCUPANCY SENSING WITH SELECTIVE EMISSION - An occupancy sensing system includes a driver to emit energy in a space, and a sensor to detect energy reflected within the space. An electrical load for the space is controlled in response to an occupancy condition determined in response to the detected energy. The driver may be selectively de-energized. In some embodiments, the driver may be de-energized during all or a portion of an unoccupied period. In other embodiments, the driver may be de-energized during all or a portion of an occupied period. In some further embodiments, the driver may be de-energized in response to detecting other sources of the type of energy emitted by the driver. | 04-29-2010 |
20100123579 | VIRTUAL WATCH - Embodiments of the disclosed invention include a system and a method for monitoring a location. For example, the disclosed embodiments may be utilized to monitor a border, such as, but not limited to, the border between the United States and Mexico. In addition, the disclosed embodiments may be utilized to monitor any location including, but not limited to, residential locations, businesses, warehouses, and mass transportation facilities. In one embodiment, a web portal is provided in which the general public may view streaming video and/or still images associated with cameras placed along the monitored location. A user viewing one or more selected cameras is provided with an option to report suspicious activities seen on the one or more selected cameras. The report is sent to one or more local law enforcement agencies associated with the location of the camera. | 05-20-2010 |
20100127865 | SECURITY SYSTEM INCLUDING AUDIO ALARM DETECTION - A building security arrangement includes a sensor for emitting an audible alarm signal. A security system installed in the building detects the audible alarm signal and transmits an electrical alarm signal over a public switched telephone network in response to the detection of the audible alarm signal. A central monitoring station receives the electrical alarm signal over the public switched telephone network and notifies an alarm authority in response to receiving the electrical alarm signal. | 05-27-2010 |
20100127866 | CONTROLLING AN ALARM STATE BASED ON THE PRESENCE OR ABSENCE OF A CAREGIVER IN A PATIENT'S ROOM - Systems and methods for controlling an alarm state, such as volume, based on the presence or absence of a caregiver in a patient's room. More specifically, a local sound producing device provides an audible alarm within a room when a caregiver is in the room, while a remote sound producing device provides an audible alarm external of the room when the caregiver is not in the room. Accordingly, volume levels of the sound producing devices depend on the sensed presence or absence of the caregiver within the room. For example, when the caregiver leaves the room, the local sound producing device is deactivated and/or the remote sound producing device is activated, thereby allowing the patient to enjoy a more relaxed environment within the room, yet still continue to be monitored. Conversely, when the caregiver enters the room, the local sound producing device is activated and/or the remote sound producing device is deactivated, thereby allowing the caregiver to monitor the patient when within the room, yet allow decreased monitoring external of the room. | 05-27-2010 |
20100134285 | METHOD OF SENSOR DATA FUSION FOR PHYSICAL SECURITY SYSTEMS - A method of sensor data fusion in a physical security system of a monitored area is provided. The method comprises receiving data inputs from one or more sensors in the physical security system, with the monitored area being overlaid with a grid defining a plurality of locations. The method further comprise selecting one or more potential paths of one or more potential intruders through the monitored area using an iterative process, which takes into consideration a sequence of sensor inputs and assumed limitations on the mobility of the one or more potential intruders. A confidence metric is then produced for each selected potential path. | 06-03-2010 |
20100141442 | HOME NETWORK, AREA NETWORK USING THE SAME, PROGRAM FOR COMPUTER TO EXECUTE OPERATION IN HOME NETWORK, AND COMPUTER-READABLE RECORDING MEDIUM STORING THE PROGRAM - Slaves are respectively provided corresponding to electric devices, measure, in real time, power usage states and disposed positions of the electric devices to transmit to a master. The master detects operational states of electric devices on operation based on power usage states received from the slaves, and detects a positional relation between electric devices on operation based on disposed positions of the electric devices. Then, the master estimates the number of residents in the house by determining achievability of operational states of electric devices based on the detected operational states and positional relation of electric devices. | 06-10-2010 |
20100156636 | INTRUDER IDENTIFYING METHOD, INTRUDER IDENTIFYING DEVICE AND INTRUDER IDENTIFYING SENSOR DEVICE - In an intruder identifying method and device, an intruder identifying sensor device identifies an intruder as a detection target to be originally detected by determining whether a variation style for a predetermined time of intruder intrusion state information based on the reception signal of the electric wave receiving unit during a time period from the time when the intruder identifying sensor device detects an intruder till the time when the intruder identifying sensor device does not detect the intruder is a predetermined variation style. | 06-24-2010 |
20100156637 | Method for detecting an intruder's path - A Sophisticated algorithm for processing sensors data in a four dimensional space including location and time, includes a method for detecting an intruder's path in a location and time space, comprising: a. Measuring signals from a plurality of sensors distributed in a protected location; b. storing the measured sensors data, together with a time stamp for each measurement; c. transmitting the sensors data to a processing center; d. processing the sensors data using the location and time relationships to detect movement of a source of the signals; and e. issuing an alarm if and when a movement of the source is detected. A method for detecting unauthorized access to oil, gas or other pipes, by monitoring the protective cathodic voltage and detecting changes in the voltage which are indicative of a technical failure or a deliberate attack on the pipe. | 06-24-2010 |
20100164719 | Method and Apparatus for a Cooperative Alarm Network - Devices and methods using wireless or wired network communications to form cooperative alarm networks centered on themselves. Intrusion detection alarms broadcast signals notifying other intrusion detection alarms of its status. When an alarm system experiences a security event, such as an attempted break-in, it notifies its network of its security event and other alarm systems within a cooperative network commence security measures, such as honking horns and flashing headlights. The cooperative response of the networked alarm systems increases decibel level and, in turn, the likelihood of a deterrent intervention, such as the perpetrator being apprehended, as well as increases the deterrence capability of the alarm systems. | 07-01-2010 |
20100164720 | APPARATUS AND METHOD FOR LOCATION-BASED ACCESS CONTROL IN WIRELESS NETWORKS - A method includes receiving wireless signals from a device at a wireless access point associated with a wireless network. The method also includes estimating a location of the device and determining whether the estimated location is within a specified area. In addition, the method includes allowing the device to communicate over the wireless network in response to determining that the estimated location is within the specified area. Estimating the device's location could include estimating a direction of the device with respect to the wireless access point and/or estimating a distance of the device from the wireless access point. Estimating the direction of the device could include using a direction of arrival of at least one wireless message received at the wireless access point from the device. Estimating the distance of the device could include transmitting multiple messages to the device at different power levels and receiving one or more responses from the device. | 07-01-2010 |
20100176944 | LIFT APPARATUS - A lift apparatus configured to move a passenger platform of the lift apparatus between a first position and an elevated second position. A stairway of the example lift apparatus may be used as a stairway when the passenger platform is arranged in the first position. As the passenger platform is raised to the elevated second position, hinged steps of the stairway are transformed into a horizontal surface. | 07-15-2010 |
20100182147 | REMOTE STORAGE OF DATA IN PHASE-CHANGE MEMORY - A security circuit comprising including a sensor located remotely from a central alarm handler and configured to sense an attack, and a phase-change memory cell coupled to and located remotely with the sensor, and configured to store an alarm event when the attack is sensed. | 07-22-2010 |
20100188217 | Refrigeration Case Motion Detector - Disclosed is a triple-sensor motion detector for illuminating the approach to a display case or other object. The triple-sensor motion detector provides a field of detection that spans the front width of the case, yet does not include the areas along the sides of the case. The detector reduces inadvertent triggering of the illumination by persons approaching the side of the case or approaching another case on the other side of an aisle. | 07-29-2010 |
20100201517 | DEVICE AND METHOD FOR PROTECTION AGAINST INTRUSION INTO THE LANDING GEAR HOUSING OF AIRCRAFT - The invention relates to a device for protection against intrusions into the landing gear housings of an aircraft, including at least one sensor, for at least one housing, covering at least one housing entry area and connected to a calculator ( | 08-12-2010 |
20100207761 | METHOD AND PROTOCOL FOR REAL TIME SECURITY SYSTEM - A security system comprises one or more sensor devices configured to detect conditions at one or more sites; one or more checkpoints at each of said one or more sites configured to receive signals from the one or more sensor devices; and a central headquarters processor configured to receive signals indicative of the conditions detected at said one or more sites from the one or more checkpoints. The central headquarters processor is configured to process the signals to determine if an event has occurred. | 08-19-2010 |
20100207762 | SYSTEM AND METHOD FOR PREDICTING ABNORMAL BEHAVIOR - A system and method for predictive abnormal behavior detection is disclosed. The system receives surveillance data such as video data and can create and update a plurality of prediction models. The system may also receive video data relating to a moving object and may generate a prediction of the future locations of the moving object based on the generated prediction models. The predicted motion may be scored by a scoring engine to determine if the predicted motion is unsafe or otherwise undesirable. | 08-19-2010 |
20100231386 | SOLAR-POWERED SENSING - A solar cell generates electricity, a housing for the solar cell and/or sensor is configured to suit an environment in which the housing is to be deployed so that a person who is in the environment and in eye contact with the housing is unaware that the housing is associated with a solar cell and/or sensor. A port couples the generated electricity to a device that senses human activity in the vicinity of the apparatus. | 09-16-2010 |
20100231387 | RFID SYSTEM USING CIRCULAR POLARIZED ANTENNA - The present disclosure relates to an RFID (Radio frequency identification) system using circular polarized antennas, wherein a reader emits electromagnetic wave through reader antennas to recognize a tag and to read out customer information if a customer proximity is detected, where the reader antennas are installed at a kiosk body and at a rear proximity position of a floor surface on which a customer using the kiosk stands, and the reader antennas installed at the rear proximity position of the floor surface emits circular polarizing wave toward the kiosk, whereby the tag can be accurately recognized regardless of position of the tag of the customer. | 09-16-2010 |
20100245087 | System and Method for Adjusting a Security Level and Signaling Alarms in Controlled Areas - An access control system responds to both a user's access data and information as to the presence of one or more individuals in a region. A determination can be automatically made that an authorized individual, or an unauthorized individual, or, an intruder has been detected. The security level can be adjusted in response to the class of the individual seeking access. | 09-30-2010 |
20100259382 | Interactive Hospitality System - A hospitality system has at least one database for storing guest preferences regarding environment variables, for storing a national and/or regional origin or personal attributes of the guest. According to embodiments, advanced evacuation systems and entertainment systems are provided which fit the guest's preferences and origin. | 10-14-2010 |
20100265064 | CONSTANT OPTICAL OUTPUT ILLUMINATION SYSTEM - The present invention is an illuminator for CCTV surveillance and security applications that maintains constant optical output from an array of LEDs by employing output compensation, feedback and enhancement. This constant optical output illuminator system enables reliable long-duration low-light imaging and data capture for surveillance and security applications, via an array of LEDs, LED power supply circuitry, and output feedback and compensation circuitry in which a photodetector circuit provides a voltage signal proportional to an amount of light falling on a photosensor and the voltage signal is fed to a drive control circuit for electrical current to the LEDs to achieve a desired optical output as measured by a photosensor voltage setpoint across the photodetector circuit. | 10-21-2010 |
20100265065 | RFID SYSTEM AND RFID TAG READING METHOD - Tag data stored in a specific RFID tag is stored in a specific-data storing unit. Tag data is read from an RFID tag present in a communication area by an RFID reader through radio communication according to detection of a specific object by a sensor for detecting the object. When tag data same as the tag data stored in the specific-data storing unit is not included in the tag data read by the RFID reader, the read tag data is transmitted to a host apparatus. | 10-21-2010 |
20100265066 | Actively Protecting an Area - An active protection system and a method of protecting an area from trespassers. The system comprises a sensing unit arranged to detect the presence and the location of the trespasser, a targeting unit and a discharging unit arranged to discharge a charge onto the trespasser detected by the sensing unit according to data from the targeting unit. The charge is selected to neutralize or mark the trespasser. | 10-21-2010 |
20100271205 | Intruder Deterrent Lighting - A zoned interactive control area ( | 10-28-2010 |
20100283607 | GLASS-BREAK SHOCK SENSOR WITH VALIDATION - An intrusion detector and method for detecting both the breaking of a glass in a window or a door and motion within a protected area. The detector comprises a single sensing section for detecting mechanical impact in a form of an acoustic signal on the window or glass and for detecting motion in a form of a motion induced signal within a protected area, a lens for focusing the motion induced signal, a first filter for filtering out a portion of the motion induced signal which is not in a preset frequency band, a second filter for attenuation a portion of the acoustic signal outside a second preset frequency band, a microprocessor for determining if the detected acoustic signal is consistent with that required to break glass and if the detected motion induced signal is indicative of motion with the protected area, and an alarm generating section for generating an alarm based upon the determination of the microprocessor. | 11-11-2010 |
20100283608 | Intrusion Warning and Reporting Network - A system for detection of intrusions and reporting those intrusions, including a plurality of sensors, the plurality of sensors providing a corresponding plurality of detection outputs to a remote controller, the remote controller operative to receive at least one of the plurality of detection outputs and to provide a high speed output indication of intrusion presence. | 11-11-2010 |
20100283609 | PERSONAL SAFETY SYSTEM, METHOD, AND APPARATUS - A personal safety system, method, and apparatus provides image, audio, and data capture and transport system (IADCTS) features wherein an electronic device placed on a user can capture data associated with a potential perpetrator of a crime against the user. The electronic device sends the captured data (such as images or audio) to a secure and remote storage location. The capturing and sending of the data cannot be reversed or canceled by the user or potential perpetrator. The potential perpetrator is notified that the potential perpetrator's data has been captured by the electronic device, thereby discouraging the potential perpetrator from further proceeding with the crime. | 11-11-2010 |
20100289641 | SYSTEM AND METHOD FOR INTRUDER DETECTION - Systems and methods for detecting presence and movement of intruders. Various embodiments of an intruder detection system can be based on, for example, a beam-interrupt detector or a thermal imaging device. The beam-interrupt detection based system can provide functionalities such as counting of intruders crossing a given beam. A plurality of such beams at different heights can also allow distinguishing different-sized intruders. The thermal imaging based detection system can provide functionalities such as tracking movement of intruders. A recording can be triggered by detection of intruder movement, thereby improving the efficiency of recording and reviewing information indicative of presence and movement of intruders in a monitored area. In one embodiment, non-intruders can be distinguished from intruders by querying an RFID tag carried by non-intruders. In one embodiment, non-intruders can be distinguished from intruders by facial recognition. | 11-18-2010 |
20100289642 | IDENTIFICATION, STORAGE AND DISPLAY OF LAND DATA ON A WEBSITE - Disclosed is a land website that provides a personalized database on which data can be stored, retrieved, customized and communicated (e.g., by e-mail) relating to a particular piece of property. The database can be accessible via a password and a security code over the Internet and may be encrypted for transmission. Land websites can be established that contain image data, map libraries, virtual tours, legal descriptions, title information, e-documents, actual pictures of property and various other information. Information stored on the land website may be obtained by searching the Internet. The land website provides a unique way of packaging information relating to a piece of land in a single, accessible location. A boundary applet tool is provided on the land website portal that allows a user to simply and easily draw boundaries and/or create boundaries automatically around the property of interest and then submit an order for more detailed information about the property of interest. Properties of interest can be easily accessed by a global coordinate system or by searching on map data that is provided on a wide range of scales. Further, boundaries may be monitored for items changing or moving on the property and/or items entering or leaving the property. | 11-18-2010 |
20100295679 | CONTAINER DEFENSE SYSTEM - A method for scanning and securing a container including a plurality of at least partially composite panels defining an interior volume is disclosed. The method includes: storing unique identification information in an identification element within container; sealing the container; monitoring the container for intrusion; without breaching the seal of the container, remotely identifying the container based on the unique identity information without breaching the seal of the container; without breaching the seal of the container; scanning the identified container to determine the presence or absence of a nuclear weapon in the interior volume; and if the scan determines no nuclear weapon is present remotely storing certificate information associated with the identity of the container in a remote monitor unit. | 11-25-2010 |
20100315232 | FIBER BRAGG GRATING PERIMETER SECURITY SYSTEM - A security system lays out a sensing optical fiber tautly at the perimeter of an area to be secured. The sensing optical fiber has at least one sensing Fiber Bragg Grating (FBG) which is stretched when the sensing optical fiber is stretched by an intruder. The center wavelength of reflection of the stretched sensing FBG shifts towards longer wavelengths. The shifted center wavelength of reflection is detected using a reference FBG with a longer center wavelength of reflection. The sensing optical fiber has a loose buffer coating for isolating the sensing optical fiber and the sensing FBG from nuisance disturbances and noise such as vibrations caused by wind. Trip wires may be attached to the sensing optical fiber for enhancing intruder detection. A cut of the sensing optical fiber may be detected by monitoring the optical power exiting the far end of the sensing optical fiber. | 12-16-2010 |
20110006895 | Expendable Tamper Evident Security Seal - An expendable tamper evident seal system for monitoring a mechanism to which physical access is required in order to open or close an access-way, comprising: an embedding material moldable into a shape conforming to the mechanism and adapted to be applied to the mechanism; circuit components randomly embedded in the embedding material so as to be arranged in positions and orientations corresponding to the shape, whereby physical access to the mechanism that alters the shape of the embedding material correspondingly alters the positions and orientations of the circuit components in the material; and an electronic interrogation device (EID) including components that induce in the circuit components an electromagnetic spectral response indicative of the position of the EID relative to the positions and orientations of the circuit components in the material, and measure the spectral response. | 01-13-2011 |
20110012734 | Portable Boundary Sensor System and Method - A method and system that creates a boundary with an alert and deterring function when the boundary is crossed. The system employs a base unit and one or more portable IR motion sensors which are capable of discriminating between objects of differing physical characteristics, and notifies the user when the parameters for sufficient obstruction have been met. Both sensors and base unit have audio and visual deterring capabilities to frighten away unwanted intruders. The method and system can be utilized in camping situations to deter dangerous wildlife and can be configured to notify users when children exit from an area. The system can be used to create a contiguous perimeter, or any boundary arrangement desired. | 01-20-2011 |
20110043362 | DEVICE FOR ENTRY DETECTION AND RECOGNITION OF TRANSPONDER BADGES, SURVEILLANCE SYSTEM COMPRISING IT, AND PROCESS FOR SURVEILLANCE IMPLEMENTED BY SAID SYSTEM - Device for detection of entry in a protected space ( | 02-24-2011 |
20110050418 | SECURITY SYSTEM - A security system comprising: a controller; and a plurality of dispensing devices, wherein the controller is configured to receive signals from a plurality of remote detectors and transmit signals to the plurality of dispensing devices, the controller being adapted to determine which of the plurality of detectors has transmitted a signal and transmit a signal to a selected one or more dispensing devices to dispense a fluid based on said determination, wherein each dispensing device is configured to receive signals from the controller and dispense fluid when a signal is received. | 03-03-2011 |
20110063109 | DEVICE FOR MONITORING A SPACE BY SERIES-CONNECTED NORMALLY-OPEN CONTACTS, IN PARTICULAR COVER INTERLOCK SWITCHES IN A SECURITY ENCLOSURE - A device for monitoring a space by changing a sequence of a serial interconnection of closing contacts, in particular of cover switches in a security housing, having a series circuit variation apparatus, a security cover, at least two closing contacts, and a protective circuit, wherein said at least two closing contacts each have an open, electrically nonconductive state and a closed, electrically conductive state, wherein said security cover is set up to put each of said at least two closing contacts in a closed, electrically conductive state, wherein said protective circuit is set up to detect an opening of at least one of said at least two closing contacts, wherein said series circuit variation apparatus serially interconnects said at least two closing contacts, wherein the sequence of the serial interconnection of said at least two closing contacts can be changed by said series circuit variation apparatus. | 03-17-2011 |
20110074578 | FACILITIES MANAGEMENT FOR AN AUTOMATED INTERACTIVE CUSTOMER INTERFACE FOR AN AUTOMOTIVE FACILITY - A system for managing exterior lighting levels and for communicating with intruders and potential customers after hours at an automotive sales and/or service facility. The system has sensors for monitoring the premises for human activity after hours. Lighting levels may be raised and lowered responsively to sensed intrusions. A speaker may warn intruders of consequences, and identify and assist customers who wish to conduct after hours activities at an automated interactive interface device. The interactive interface device may accept manually input data to initiate purchase and service transactions, and may establish live connection to remote security service personnel. | 03-31-2011 |
20110074579 | METHOD FOR USING RECORDING RULES AND PREVIOUS VALUE SELECTION RULES FOR PRESENCE INFORMATION IN A COMMUNICATIONS SYSTEM - In a communications system, a presence server maintains and distributes presence information in accordance with recording rules and previous value selection rules. The presence server: associates a recording rule with each presence information element in a subset of a plurality of presence information elements for a presentity; maintains a set of previous values according to the recording rule associated with the presence information element, for each presence information element in the subset; receives an initial subscribe request from a watcher for one or more presence information elements in the subset; and in response to the initial subscribe request, notifies the watcher of a number of the previous values maintained for each presence information elements in the subscribe request, wherein the number of the previous values that is sent is determined by a previous value selection rule associated with each presence information element. | 03-31-2011 |
20110074580 | System, Method, and Apparatus for Triggering an Alarm - According to some example embodiments, systems, apparatus, methods and computer program products are provided for triggering an alarm. In this regard, one example apparatus includes means for receiving an instruction to alarm a security gate device, and means for tuning a security resonator at a location such that a field generated by the security gate device interacts with the security resonator to cause the security gate device to trigger an alarm in response to at least receiving the instruction to alarm the security gate device. | 03-31-2011 |
20110084836 | Alarm System Interaction with a Movable Barrier Operator Method and Apparatus - A secure communication link ( | 04-14-2011 |
20110090083 | Systems and methods of searching based on trademarks - A system and method of searching the world wide web for relevant web sites by a user. The system provides a means for indexing relationship information, such as owners of trademarks, in the search engine and retrieval thereof. The user can select particular relationship elements to rank at the top of the web list, and/or the search engine can automatically retrieve one or more categories of relationship information. New classes of META tags are defined in one embodiment for supporting the invention while third party data can be utilized, or in conjunction with META tag information. | 04-21-2011 |
20110090084 | Systems And Methods For Repeating Area Denial - Systems and methods inhibit locomotion of a human or animal target in a denial zone. Acquiring the target includes forming a prediction of at least two locations of impact on the target and testing the prediction according to criteria that may include whether the locations are within a boundary corresponding to the target and whether the locations are separated by a minimum physical and/or electrical distance. The two locations may serve for conducting a current through the target for impeding locomotion by the target. The current may be repeated in response to determining that locomotion was not sufficiently impeded. Determination may depend on analysis of video of the target. | 04-21-2011 |
20110095887 | CONTAINER SECURITY DEVICES, SYSTEMS, AND METHOD - A dosimeter is disclosed for use in container including outer walls defining an interior volume, the dosimeter including: a radon detection element adapted to detect a radon level for the interior volume; a neutron detection element adapted detect a neutron level for the interior volume. The dosimeter is adapted to measure the radon level and neutron level for a period of time, compare the measured radon level to a first threshold, compare the measured neutron level to a second threshold, and determine information indicative of the presence or absence of fissile material within the interior volume based on the comparisons. | 04-28-2011 |
20110102178 | INTRUSION DETECTION SYSTEM AND ITS SENSORS - An intrusion detection system, that comprises a multi sensors array deployable along a physical barrier means and linkable to it in a manner that enables sensing various phenomena (one or more), typically take place when an attempted intrusion act occurs through the physical barrier means, and generation of an indication when such a phenomenon is sensed, characterized by that, that at least in one of the sensors there is installed a processing component that belongs and is specifically allocated to the sensor and enables local analyzing of the sensed phenomena within said sensor. | 05-05-2011 |
20110115627 | See ya alarm system - A stand-alone motion sensing, lighting and alarming system for indoor use includes a box with mounting brackets and face plate, a motion sensor and alarm for receiving motion sensor and audible alarm electronics therein, a light holder pivotally mounted to the unit box, for receiving light therein. The unit box also includes an eight-foot cord and a grounded plug to establish electrical and mechanical connections with a source of 115 V.A.C. electrical power, a double pole single throw toggle switch for powering alarm, a double pole singe throw light switch for powering unit, and adjusters for the photocell and light/alarm duration. | 05-19-2011 |
20110115628 | High-security self-adhesive stickers - The invention comprises two different versions of a self-adhesive label, or “sticker,” that may be manufactured in various dimensions and may be utilized to seal and protect the confidentiality of documents and other papers contained in file folders or other such storage media: | 05-19-2011 |
20110121971 | ILLUMINATED WALL-MOUNTABLE OBJECT CONTROLLED BY PIR SENSOR - An ornamental wall-mounted or freestanding décor object, such as a cross or crucifix, which utilizes LEDs or some other form of lighting technology to illuminate itself in a decorative and aesthetic fashion when a PIR (Passive Infrared) motion sensor detects motion in the vicinity of the object. | 05-26-2011 |
20110128150 | SYSTEM AND METHOD FOR ELECTRONIC SURVEILLANCE - A system and method for surveillance of a scene comprising the steps of: capturing a scene via at least two image streams; processing the first of the two image streams to detect an act, event or object; and, wherein when an act, event or object is detected, storing portions of the second image stream corresponding to the act, event or object independently of the first image stream. | 06-02-2011 |
20110140891 | Electrode for an Occupant Sensing System Having Fault Detection and Method of Operating the Same - An electrode formed of electrically conductive material and configured for use in an occupant sensing system. The electrode includes an antenna portion and a diagnostic portion. The antenna portion is configured to provide an electrical impedance indicative of an occupant presence. The diagnostic loop portion is configured to provide an electrical conductivity indicative of a condition of the electrode. | 06-16-2011 |
20110140892 | SYSTEM AND METHOD FOR DETECTING MULTI-LEVEL INTRUSION EVENTS AND COMPUTER PROGRAM PRODUCT THEREOF - A system and a method for detecting multi-level intrusion events are provided. The system includes an area recognition module and an area classification module. The area recognition module performs a geometric topology operation to recognize a plurality of areas in a ground plane that has a plurality of boundaries and a plurality of gates, and each of the areas is constituted of at least one of the boundaries and at least one of the gates. The area classification module defines a plurality of security levels and classifies each of the areas recognized by the area recognition module as one of the security levels. Accordingly, the system is able to automatically recognize the areas in the ground plane, set the security levels of the areas, and generate the corresponding detection areas and tripwires according to the security levels of the areas. | 06-16-2011 |
20110148633 | USING TRAJECTORY FOR AUTHENTICATION - An authentication system authenticates a device based on a detected trajectory of that device within a physical environment. The device includes a wireless transmitter that communicates with sensors distributed throughout the environment. As the device moves throughout the environment, the sensors send location information to an authentication system. The authentication system tracks the trajectory or dynamic location of the device and authenticates the device based on whether the observed trajectory of the device conforms with a predicted trajectory or behavior. | 06-23-2011 |
20110148634 | PREDICTIVE GEOFENCE CROSSING - A predictive geofence system predicts a geofence crossing for a distance-horizon and/or a time-horizon. The predictive geofence system includes a predictive geofence platform that predicts future positions of objects, and generates an alert if the predicted future positions of the objects result in a geofence crossing or the predicted future positions cross a geofence in less than a set time. | 06-23-2011 |
20110156904 | SYSTEM AND METHOD FOR EXTENSION OF ENTRY DELAY IN A SECURITY SYSTEM - A system and method are provided for extending the expiration of an entry delay period for disarming a security system based on the entry of a keypress that matches a valid access code before expiration of a preprogrammed entry delay period. The security system includes a plurality of detection devices to detect any number of conditions, a user interface such as a keypad, and a control panel communicating with each of the detection devices and the user interface. The system extends the entry delay period based on the input of each keypress using the user interface that matches a symbol of a valid access code. | 06-30-2011 |
20110169637 | Control System, Security System, and Method of Monitoring a Location - A control system for a security system having a plurality of sensors includes a sensor communication device configured to communicatively couple to the plurality of sensors and to receive a plurality of sensor notifications from the plurality of sensors. Each sensor notification of the plurality of sensor notifications includes at least one of a detection type, a detection location, and a detection duration. The control system also includes a processor configured to receive the plurality of sensor notifications from the sensor communication device, associate a plurality of detection states with the plurality of sensor notifications such that at least one detection state of the plurality of detection states is entered upon receiving at least one combination of sensor notifications of the plurality of sensor notifications, and associate at least one detection response with each detection state of the plurality of detection states. | 07-14-2011 |
20110181412 | ENERGY MANAGEMENT AND SECURITY IN MULTI-UNIT FACILITIES - Methods, systems, and devices for managing energy consumption in multi-room facilities are provided. In particular, intelligent mechanisms for determining a room occupancy state and then for managing energy settings of that room are provided. Some logic for implementing these mechanisms may be provided in an in-room device, such as a motion detector, thermostat, door, lock, television, set top box, etc. | 07-28-2011 |
20110181413 | AUTOMATED VAULT MAPPING AND SECURITY SYSTEM - A system and method to enhance vault security and management. An identity of a user is electronically validated. A floor plan of the vault and associated location of an authorized resource is retrieved in access computer. The user is then signaled a location of the resource within the vault. | 07-28-2011 |
20110181414 | ACCESS CONTROL SYSTEM BASED UPON BEHAVIORAL PATTERNS - A method and apparatus for detecting behavioral changes in a security system is provided. The method includes the steps of providing a secured area having a plurality of security zones where access to each is controlled by an access controller, detecting entrances to at least some of the plurality of security zones by an authorized person through respective access controllers of the plurality of zones over a predetermined previous time period, forming a probability model of entry into each of the plurality of security zones from the detected entrances over the previous time period, detecting access requests for the authorized user from the access controllers during a current time period, and generating a security alert upon determining that an access request of the current access requests exceeds a probability threshold value associated with the probability model. | 07-28-2011 |
20110187530 | Portable Security Container - A process and security container that enable local protection and remote transportation of items found with the environment of a contemporary office, while generating a log of users who have gained access to the container. e container may be constructed with one or more sidewalls bearing a removable lid. The container may have a closed interior while the lid is in complete engagement with the sidewalls, and have an open interior able to removably receive items within the interior while the lid is dislodged from its complete engagement. A port is exposed through one of said sidewalls to receive data signals and a control stage with a non-volatile a memory, is mounted within the container and operationally coupled to a host computer to provide communication with the interior of the container via the port. A microprocessor based host computer sited externally to the container, has a keyboard initiating formation of the data signals and a monitor driven by the host computer to visually display video images. The host computer is operationally coupled to the port to participate in the communication by generating the data signals. The controller may generate a control signal and allow access to the interior of the container in response to occurrence of a coincidence between a data key received From the host computer among the data signals via the port and a data sequence obtained by the control stage in dependence upon information stored within the memory. | 08-04-2011 |
20110193700 | Apparatus And Method For Operating Devices Based Upon Vehicle Detection - A movable barrier operator controls access to a secured area which houses vehicles. The movable barrier operator is operable to move a movable barrier from an open to a closed position. A sensor controls the operation of a service-providing device through the controller of a movable barrier operator or by direct communication to a controller for the service-providing device. The sensing device senses whether a vehicle is present in the secured area. The sensor is operatively connected to the moveable barrier operator and is used to control the operation of at least one service-providing device without necessarily effecting movement of a barrier by the movable barrier operator. Operation of the service-providing device is effected upon sensing whether a vehicle is present in the secured area to effect an operation of the service-providing device. | 08-11-2011 |
20110227731 | MARINE OPTIC FIBER SECURITY FENCE - A fence for establishing a secure marine perimeter includes a floating platform, at least two uprights extending to a predetermined height, at least one anchor, at least one anchor line, an optic fiber net extending from a first predetermined point above the surface of the body of water to a second predetermined point below the surface of the body of water, the optic fiber net including at least one optic fiber with an input end and an output end, a light transmitter connected to the input end introducing an input optic signal into the optic fiber, a light receiver connected to the output end receiving an output optic signal from the optic fiber, and a processor comparing the output optic signal with the input optic signal and generating an alarm if a difference between the input optic signal and the output optic signal exceeds a predetermined alarm threshold. | 09-22-2011 |
20110227732 | ACCESSORY ACTUATOR - An accessory actuator device includes a housing member with an opening. The housing member comprises a detachable front cover, back cover and mounting plate. The actuator activates when a sensor located in the opening senses movement. The sensor then communicates a signal to an accessory activating unit, which in turn activates an indicator unit to output an audio or visual component in the form of a greeting, song and/or flashing lights. | 09-22-2011 |
20110227733 | Animal Detection System And Method - A system for detecting an animal proximate a roadway is disclosed. In one embodiment of the invention, there is at least one warning station, a plurality of sensor stations, and a processor. Each of the plurality of sensor stations may have a first sensor and a second sensor. The processor may be configured to detect an animal using information provided by the first sensor and the second sensor, and to cause transmission of a warning signal to the at least one warning station when the animal is detected. | 09-22-2011 |
20110241881 | SYSTEMS AND METHODS FOR OPTICAL SECURE ALARMED PROTECTIVE FIBER DISTRIBUTION SYSTEMS AND MANAGEMENT - A fiber optic network has alarmed fiber optic lines in the cables connecting a secured junction box to plural user lock boxes. An outgoing alarm line and return alarm line in each cable connect the junction box to each user box. The outgoing alarm line is looped to the return alarm line inside the user lock box. The return alarm line is looped to the outgoing alarm line of a different cable inside the junction box to interconnect a plurality of alarm lines passing through a plurality of user boxes. A detector detects an alarm signal in the connected alarm lines to trigger an intrusion alarm. | 10-06-2011 |
20110291831 | TIME BASED VISUAL REVIEW OF MULTI-POLAR INCIDENTS - A system and method for time based review of multi-polar incidents is provided. The method includes selecting at least one past alarm incident, and populating a floor plan map with representations of the past alarm incident and a set of alarms that were active during the past alarm incident. | 12-01-2011 |
20110291832 | PRESENCE DETECTION SYSTEM AND METHOD - A presence detection system for detecting objects which move through an entrance of a space. The system is based on the idea to create a signature of a moving object which can be used to determine whether the object is a human being. | 12-01-2011 |
20110291833 | INTERCOM EXCHANGE - An intercom exchange is connected to multiple terminals, and includes multiple communication paths, a digital switch circuit for switching connections between the terminals and the communication paths, and a CPU that controls the DSPs and the switch circuit. The CPU performs control for preferentially allocating a communication path to the first terminal, and the allocated DSP determines whether a sound from the first terminal that has been received as input via the switch circuit is an abnormal sound. Upon determining that the sound is an abnormal sound, the allocated DSP notifies the CPU, and upon receiving the notification, the CPU determines an alert destination based on the notification and performs alert processing for sending an alert to the alert destination. | 12-01-2011 |
20110316700 | DEVICE FOR DETECTING ENTRY AND/OR EXIT MONITORING DEVICE, AND METHOD FOR DETECTING ENTRY AND/OR EXIT - A reliability extracting section ( | 12-29-2011 |
20120001756 | SYSTEM, METHOD, AND APPARATUS FOR TRIGGERING AN ALARM - According to some example embodiments, systems, apparatus, methods and computer program products are provided for triggering an alarm. In this regard, one example apparatus includes means for receiving an instruction to alarm a security gate device, and means for tuning a security resonator at a location such that a field generated by the security gate device interacts with the security resonator to cause the security gate device to trigger an alarm in response to at least receiving the instruction to alarm the security gate device. | 01-05-2012 |
20120013464 | SECURITY SYSTEM FOR A MEDICAL EMERGENCY CRASH CART - A utility cart includes a sensor or plurality of sensors to determine the state of a cart and secure cart contents. A sensor may be used to determine whether the contents of the cart have been accessed. When the sensor determines that the cart has been accessed, an alarm sequence that sounds an alarm or activates a visual indicator will be initiated. The alarm sequence may be terminated by a kill switch or by using an input device to deactivate the alarm. After the cart is used, the cart is re-stocked and the alarm controller is re-armed to return the cart's alarm system to an access sensing state. | 01-19-2012 |
20120013465 | SYSTEM FOR MONITORING CAREGIVERS AND EQUIPMENT AT A PATIENT LOCATION - A hospital monitoring system for monitoring hospital personnel, a plurality of patient locations for patients, and associated devices is configured to control the associated devices based on the presence of hospital personnel or alarms. | 01-19-2012 |
20120025983 | SECURE DATA ENTRY DEVICE - A secure data entry device including a housing, tamper sensitive circuitry located within the housing and tampering alarm indication circuitry arranged to provide an alarm indication in response to attempted access to the tamper sensitive circuitry, the tampering alarm indication circuitry including at least one conductor, a signal generator operative to transmit a signal along the at least one conductor and a signal analyzer operative to receive the signal transmitted along the at least one conductor and to sense tampering with the at least one conductor, the signal analyzer being operative to sense the tampering by sensing changes in at least one of a rise time and a fall time of the signal. | 02-02-2012 |
20120081226 | BURGLARPROOF SECURITY SYSTEM AND INSTALLING METHOD THEREOF - A burglarproof security system includes a substrate, a conducting wire layer, a sensing control unit, an alarm device and a power supply. The conducting wire layer is disposed on the substrate, and includes plural conducting wires. The plural conducting wires collectively define either a resistive sensing circuit or a capacitive sensing circuit. The sensing control unit is electrically connected with the plural conducting wires of the conducting wire layer for controlling and selectively switching the plural conducting wires to define either the resistive sensing circuit or the capacitive sensing circuit, and detecting the resistive sensing circuit or the capacitive sensing circuit, thereby generating a detecting signal. When the detecting signal from the sensing control unit is received by the alarm device, the alarm device generates a warning signal. The power supply is electrically connected with the sensing control unit and the alarm device for providing electric power. | 04-05-2012 |
20120092162 | INFECTIOUS DISEASE WARNING SYSTEM - A system comprising a portable unit which can be temporarily placed outside a patient room comprising a processor, memory, a speaker or voice generator, and programming to allow an authorized user to select (A) a disease or medical condition which corresponds to preprogrammed simulated voice warnings, for example “wash hands,” “wear gown,” “wear gloves,” “wear mask,” “dispose of gown,” “use hand sanitizer,” “wash hands with soap and water after removing protective clothing,” and combinations of said voice warnings; or (B) one or more of said preprogrammed voice warnings; a room entry detector programmed to activate the simulated voice warnings, the system configured so that when entry to the room is detected, one or a combination of the simulated voice warnings is emitted by the system. | 04-19-2012 |
20120092163 | INTRUDER DETECTION AND INTERDICTION SYSTEM AND METHODS FOR USING THE SAME - Intruder detection and interdiction system and method for using the same. An intruder detection system comprises sensor devices, countermeasure devices, and a control unit connected to the sensor and countermeasure devices. Sensor devices include voice recognition components. The system may detect intruders with the sensor devices, query for identification by a verbal response to be checked by the voice recognition components and activate countermeasure devices if there is no response or if the response is not an authorized voice. In further embodiments, the control unit may be connected to a network or a phone line. Further embodiments comprise a transportable alert device connected to the control unit. | 04-19-2012 |
20120098661 | DETECTOR AND OPTICAL SYSTEM - Embodiments of the present invention relate to a detector comprising first and second lenses for use with respective first and second sensing means; each lens comprising a plurality of Fresnel facets having respective fields of view adapted such that the fields of view of the first lens are alternately arranged with the fields of view of the second lens such that the fields of view of the first lens are adjacent only to, but do not overlap with, the fields of view of the second lense in a single direction | 04-26-2012 |
20120105229 | SYSTEM AND METHOD FOR INTRUDER DETECTION - A beam-interrupt detection based system can provide functionalities such as counting of intruders crossing a given beam. A plurality of such beams at different heights can also allow distinguishing different-sized intruders. A recording can be triggered by detection of intruder movement, thereby improving the efficiency of recording and reviewing information indicative of presence and movement of intruders in a monitored area. Non-intruders can be distinguished from intruders by querying an RFID tag carried by non-intruders. | 05-03-2012 |
20120119907 | WARNING STANCHION - A warning stanchion that has a vertical support structure, a belt receptacle affixed to the vertical support structure, a tilt sensor, and a warning signal generator in communication with the belt receptacle and the tilt sensor. Typically, a plurality of the warning stanchions are used to created a warning barrier around an object so that the warning signal generates a signal when the warning barrier is breached. The warning signal generator may emit a visual warning, an audio warning, or a frequency signal. | 05-17-2012 |
20120126977 | ALARM SYSTEM HAVING AN INDICATOR LIGHT THAT IS EXTERNAL TO AN ENCLOSED SPACE FOR INDICATING AN INTRUSION INTO THE ENCLOSED SPACE AND A METHOD FOR INSTALLING THE ALARM SYSTEM - An alarm system having an indicator light that is external to an enclosed space for indicating intrusion into the enclosed space, and a method for installing the alarm system, are disclosed. The alarm system detects an intrusion into the enclosed space, the intrusion thereby causing an indicator light outside the enclosed space to illuminate, thereby indicating that intrusion has occurred. The enclosed space can be an entire building, or a particular section or room of a building. At least one interior sensor is located within the enclosed space, and is configured to generate an intrusion signal in response to movement therein, while the indicator light is located outside the enclosed space, and within an outer perimeter zone of the enclosed space. Upon receiving the intrusion signal, the indicator light emits light that is visible from outside the outer perimeter zone of the enclosed space. | 05-24-2012 |
20120126978 | ALARM SYSTEM HAVING AN INDICATOR LIGHT THAT IS EXTERNAL TO AN ENCLOSED SPACE FOR INDICATING THE SPECIFIC LOCATION OF AN INTRUSION INTO THE ENCLOSED SPACE AND A METHOD FOR INSTALLING THE ALARM SYSTEM - An alarm system for indicating the specific location of an intrusion into an enclosed space, as well as a method for installing the alarm system, are disclosed. The intrusion causes illumination of an indicator light outside the enclosed space and within the outer perimeter zone of the enclosed space, thereby indicating the specific location of the intrusion. At least one interior sensor located within the enclosed space generates a specific intrusion location signal in response to movement therein. A control system responsive to the specific intrusion location signal causes the indicator light to emit light that is visible from outside the outer perimeter zone of the enclosed space. The emitted light can indicate the specific location of an intrusion by directing light towards the specific intrusion location, and/or by surrounding the specific intrusion location, and/or by activating a light display that produces readable output of the specific intrusion location. | 05-24-2012 |
20120133511 | METHOD AND APPARATUS FOR DETECTING CONTROL PANEL ATTACKS IN A SECURITY SYSTEM - A method and apparatus for detecting intruders. The method includes the steps of a control panel of a security system detecting an intrusion of a secured area, the control panel entering a delay period before reporting the intrusion in order to allow entry of a disarm code through a control panel disposed on a structural surface proximate an entrance to the secured area, a sensor monitoring the control panel for movement and the control panel reporting the intrusion before expiration of the delay period upon detecting movement. | 05-31-2012 |
20120146791 | Lifestyle Multimedia Security System - A method is disclosed for remote monitoring of a premises, comprising the steps of operatively coupling a geographically remote client to a security system server which is capable of authenticating a user of the remote client, operatively coupling the remote client to a security gateway which is capable of managing the monitoring of the premises, activating a signal at the premises for notifying an occupant at the premises that remote monitoring is occurring, and transferring information between the security gateway and the remote client. The transfer of information between the security gateway and the remote client is controlled by the user of the remote client. The security gateway may be operably coupled to at least one camera at the premises and to at least one audio station at the premises. | 06-14-2012 |
20120154150 | SECURITY SYSTEM - A security system comprises a plurality of alarm points distributed at a plurality of positions in a building; signal processing module for receiving alarm signals from at least an alarm point when alarm occurs at the at least an alarm point, transmitting the alarm signals to a server; a database for storing several sets of user information, map data, several sets of alarm point information; the server for receiving user requests from a plurality of clients, responding to the user requests according to the user information, the data map and the alarm point information, and then reverting responses to clients; the clients for sending the user request to the server and receiving and output responses. The present security system is of the advantage that it could be fully computerized and could satisfy the requirements of usage at the same time at several different sites by a plurality of different users. | 06-21-2012 |
20120188081 | SECURITY SYSTEM AND METHOD TO SECURE AN AREA - A security system to secure an area, the system having a sensor system to determine a location of a moving object within said area, the sensor system including a radar system; a control device connected to said sensor system; an illumination device to provide a light beam said light beam being directable to different locations in said area; and an actuator controlled by said control device to direct said light beam to a desired location, wherein said control device is configured to direct the light beam to a location where the presence of a living body is determined by said sensor system. | 07-26-2012 |
20120249328 | Cross Monitoring Method and System Based on Voiceprint Recognition and Location Tracking - The invention discloses a cross monitoring method and system based on voiceprint recognition and location tracking, belonging to the field of monitoring systems. The invention collects personal information and voice samples of a monitored individual and constructs a voiceprint model thereof, and collects location information thereof and voiceprint information through a positioning communication device and/or wireless communication network service, which are compared with the stored information in a repository; output a complete report reflecting the human body movement trace and actual non-compliance with the restrictions for a supervisory staff or other person of authority to inspect and evaluate the performance of the monitored individual. The supervisory staff can request and evaluate the statistical analysis report concerning the activity performance of the monitored individual, observe the movement trace and the state thereof, and/or adjust the monitoring scheme thereof according to the performance. The invention realizes the remote location tracking of the monitored individual, also realizes non-contact biological identity recognition of the monitored individual and satisfies the need of remote and non-contact monitoring of the monitored individual. The invention can be widely applied to the non-contact electronic monitoring and identity recognition field. | 10-04-2012 |
20120268273 | SECURITY SYSTEMS AND METHODS FOR CONTINUOUSLY MONITORING THE WEIGHT OF A CONTAINER - Various embodiments disclosed herein are directed to weight monitoring systems for recovering, processing, monitoring, and managing various commodities or products stored in a container. | 10-25-2012 |
20120299728 | Occupancy Sensor with Stored Occupancy Schedule - An occupancy sensor detects expected and unexpected occupancies in a monitored area with an expected occupancy schedule. The occupancy sensor includes a real time clock, a memory, a sensor element, a processor, indicator lights and a network interface. The occupancy sensor transmits an occupancy correction signal to a network if the actual occupancy of the monitored area does not match the expected occupancy state of the monitored area. | 11-29-2012 |
20120313782 | DISTRIBUTED SENSORS FOR INTRUSION DETECTION - An array of paired V-band sensors is provided to act as a virtual fence to detect human intrusion. Each sensor includes a rotating circuit board that includes an antenna array. The sensor pivots the circuit board with regard to a weight base to align with an opposing sensor. By alternatively transmitting and receiving with regard to the opposing sensor, a V-band bistatic radar system is enabled that detects human intrusion between the opposing sensors. | 12-13-2012 |
20120319843 | INTRUSION DETECTION SYSTEM AND INTRUSION DETECTION APPARATUS - For one setting operator being able to readily adjust a threshold by oneself, by means of reporting units that issue a report to indicate the amount of variation in a received electric wave when an intruding object has intruded between a transmitting leaking transmission path and a receiving leaking transmission path, and a remote controller that generates a signal which changes a threshold in the table through the receiving leaking transmission path, the threshold is adjusted properly for each of the blocks with the remote controller based on the report issued from the reporting unit to indicate the amount of variation in the received electric wave caused by a trial intrusion between the two transmission paths by a threshold setting operator. | 12-20-2012 |
20120319844 | PERIMETER SECURITY SYSTEM - A security system for detecting physical intrusion in a monitored area including a plurality of radio units arranged in a network around the monitored area to determine received signal strength and pass variations thereof through the radio units to a base station. | 12-20-2012 |
20120326867 | System and method for sensing a gate tampering - A system and method for detecting a tampering of a moveable gate barrier. A singular or a plurality of vibration sensors are strategically positioned on the gate and a gate operator to detect tampering while the gate is closed. If the sensor outputs exceed preset thresholds of duration and/or magnitude, an alarm is activated to alert personnel to an attempted breach of the gate barrier. | 12-27-2012 |
20120326868 | AUTHORIZATION SYSTEM AND A METHOD OF AUTHORIZATION - An access control system for a secure facility includes an authorization system having an interface, in the form of an interrogator, for receiving the request signal indicative of a user seeking authorization for a predetermined action, such as gaining access through a door. In one example, an authorization system may include an interface for receiving a request signal indicative of a party seeking authorization for a predetermined action. A first processor, that is responsive to the request signal, determines if the authorization is to be granted. If so, the first processor may generate an authorization signal that includes information that is securely coded, and which is indicative of the determination. An operating device, physically spaced from the first processor, may receive the authorization signal, and may decode the securely coded information and subsequently initiating the action, if appropriate. | 12-27-2012 |
20130021156 | Electronic Security System for Monitoring Mechanical Keys and Other Items - A security system with a security container and an electronic lock circuit is used to securely store mechanical keys or other valuable items. Items to be protected are placed in a secured location in the security container. A detector of the security system detects whether the items are indeed in the secured location, such as by means of receiving signals from a transponder attached to the items. The security container is locked only if the items are detected to be in the secured location. Audit trail records for the locking and unlocking events of the security container may be transmitted to a device remote to the security container for analysis. A monitoring device with a location identification device, such as a GPS sensor, may be attached to items to be monitored for tracking locations and activities of the items. | 01-24-2013 |
20130027203 | Delayed Entry Alert & Detection Switch - An intrusion detection device including microcontroller, a light emitting diode ( | 01-31-2013 |
20130033379 | SECURITY MONITORING SYSTEM - In one embodiment, a monitoring system is provided. The system includes one or more monitoring devices configured to generate respective video signals, and a control circuit. The control circuit is configured to allow a user remote access to the video signals in response to a request for remote access by the user via the WAN interface and the control circuit operating in an alarm state. The control circuit is configured to deny the user access to the video signals in response to a request for remote access by the user via the WAN interface and the control circuit operating in a non-alarm state. | 02-07-2013 |
20130038448 | Access Control System - An access control system is disclosed comprising a credential reader arranged to gather at least one credential from a person desiring to pass through an access point associated with the access control system, the system being arranged to use the at least one credential to provide an indication about the identity of the person. The system also comprises at least one access control device controlling access through a respective access point such that a person is allowed or denied access dependent on whether the person is positively identified, and a data storage device that stores data indicative of a current security level applicable for each access point associated with the system, the security level defining the criteria required to provide a positive identification of the person. Stored security level data can be modified to change the criteria required for positively identifying a person. | 02-14-2013 |
20130057403 | METHOD AND DEVICE FOR DETECTING AND REPORTING ACTIVITY - A device and methods are provided for monitoring and reporting activity including providing an alert based on detected activity. In one embodiment, a method includes is monitoring activity relative to a device based on activity detected by the device, determining a baseline activity level for the device, and detecting a change in the baseline activity level. The method may further include transmitting an electronic message via a network connection based on the change in baseline line activity, the electronic message providing an alert based on the change in baseline activity level. The device and methods may advantageously allow for providing alerts based on inactivity. | 03-07-2013 |
20130063265 | Systems and Methods for Remote Building Security and Automation - A system and method for remotely monitoring and controlling building security are provided. A controller is communicatively coupled to security devices of a building and can communicate an activity event detected by one of the security devices to a remote user device. The controller can then establish a communication session between the remote device and a security device via the controller, thereby allowing the user to communicate with any visitors. Video from a security device can be transmitted by the controller to the user device or an alternative user-device. Access instructions can be provided by the user, in response to which the controller can deactivate various building security measures. Security measures can be reactivated by the controller automatically or in response to a user command. Additionally, the controller can monitor visitor compliance with the deactivated security measures and activate alarms or notify security agencies if necessary. | 03-14-2013 |
20130099925 | Intelligent Observation And Identification Database System - An intelligent video/audio observation and identification database system may define a security zone or group of zones. The system may identify vehicles and individuals entering or exiting the zone through image recognition of the vehicle or individual as compared to prerecorded information stored in a database. The system may alert security personnel as to warrants or other information discovered pertaining to the recognized vehicle or individual resulting from a database search. The system may compare images of a suspect vehicle, such as an undercarriage image, to standard vehicle images stored in the database and alert security personnel as to potential vehicle overloading or foreign objects detected, such as potential bombs. The system may track individuals or vehicles within a zone or between zones. The system may further learn the standard times and locations of vehicles or individuals tracked by the system and alert security personnel upon deviation from standard activity. | 04-25-2013 |
20130106605 | INTRUDER DETERRENT SYSTEM | 05-02-2013 |
20130106606 | POINT OF SALE TERMINAL HAVING ENHANCED SECURITY | 05-02-2013 |
20130113624 | Multi-Tiered Predator Protection Device - A device for protecting property from predators without a physical barrier or obstacle to entry. The device includes a plurality of warning elements and at least one motion sensor. The sensor is configured to initiate a systematic escalating sequence of activation of warning elements responsive to detection of a predator within a predetermined range. A preferred embodiment has a first protection stage including activation of a first warning light element in a flash pattern, and activation of motion sensors. A second protection stage, including bright illumination by a second light element, is initiated by the motion sensors in response to detection of a predator. Motion sensors either initiate a third protection stage, including emission of a sound by a third warning sound element in response to continued detection of the predator or deactivates the second tier warning lights and returns the device to the first protection stage. | 05-09-2013 |
20130113625 | SYSTEM AND METHOD FOR BEYOND PERIMETER DETECTION AND EARLY WARNING - A system for beyond perimeter detection and early warning may comprise multiple sensors positioned in a first field, a number of reflectors positioned in a second field outside a first perimeter defined by the first field, and one or more transceivers. Each transceiver may comprise a transmitter to transmit radio frequency (RF) signals, a first and a second receiver to receive signals from some of a set of the of the multiple sensors and reflected signals from some/all of the reflectors in response to the transmitted RF signals. The transceiver may also include a monitor module to detect a perturbed signal resulting from the received sensor signals and reflected signals, and an alarm module to generate an early warning alarm signal based on the detection of the perturbed signal to indicate that an intruder has crossed a second perimeter defined by the second field. | 05-09-2013 |
20130141238 | SYSTEM AND METHOD FOR MONITORING RESTRICTED AREAS BELOW BUCKET TRUCKS, LINEWORKERS ON POWER DISTRIBUTION POLES OR OTHER ELEVATED LOADS - A method and system ( | 06-06-2013 |
20130141239 | Method of Using Spring GPS Data to Supplement Location Data in a Surveillance System - A building security system includes a security sensor for sensing a security breach associated with a building. An electronic location-detecting device senses fixed geographic coordinates of the building. An electronic processor responds to a security breach sensed by the security sensor by transmitting an alarm signal to a central monitoring station. The alarm signal includes the fixed geographic coordinates of the building sensed by the location-detecting device. | 06-06-2013 |
20130187776 | SECURE DATA ENTRY DEVICE - A secure data entry device including a housing, tamper sensitive circuitry located within the housing and tampering alarm indication circuitry arranged to provide an alarm indication in response to attempted access to the tamper sensitive circuitry, the tampering alarm indication circuitry including at least one conductor, a signal generator operative to transmit a signal along the at least one conductor and a signal analyzer operative to receive the signal transmitted along the at least one conductor and to sense tampering with the at least one conductor, the signal analyzer being operative to sense the tampering by sensing changes in at least one of a rise time and a fall time of the signal. | 07-25-2013 |
20130249691 | APPARATUS HAVING A HOUSING, WITH INTRUSION DETECTION - An embodiment of an apparatus has a closed housing accommodating an element to be protected, and a pressure sensor coupled to a control unit configured to detect pressure variations within the housing upon opening the housing. The control unit is configured to activate countermeasures upon detecting opening of the housing. For example, the apparatus may be a set-top box, a cell phone, a television set, a printer ink cartridge of toner cartridge, or a meter, wherein the element to be protected is a semiconductor chip and relevant couplings, storing an enabling code or key. | 09-26-2013 |
20130278422 | METHOD AND APPARATUS FOR PROCESSING SENSOR DATA OF DETECTED OBJECTS - A system that incorporates teachings of the subject disclosure may include, for example, a method for detecting, by a system including at least one processor, a presence of an object from sensor data generated by a sensor device, retrieving, by the system, from a memory device a plurality of profiles biometrically descriptive of approved objects, asserting, by the system, an alarm responsive to determining from the sensor data that the detected object is not biometrically correlated to any of the plurality of profiles, classifying, by the system, the detected object as an authorized object responsive to determining from the sensor data that the detected object is biometrically correlated to at least one of the plurality of profiles, and notifying, by the system, at least one neighboring device responsive to asserting the alarm or responsive to classifying the detected object as the authorized object. Other embodiments are disclosed. | 10-24-2013 |
20130293379 | VISUAL PERCEPTION AND ACUITY DISRUPTION TECHNIQUES AND SYSTEMS - Exemplary security lighting routines are tailored to disrupt visual perception and/or acuity so as to significantly reduce the ability of a person or persons, who has breached security, to function within a secured space. A routine triggered in response to a security breach includes a flash at a relatively high intensity, some number of times brighter than normal illumination for the space. Some exemplary routines include a warning light and/or a pre-flash light emission such as dim lighting or a flicker, to effectively prepare the person in the space for maximum effectiveness of the flash. Exemplary routines may also include a post-flash sequence of multiple color light emissions, such as alternating emissions in sequence of pulses of different colors of light using emission and/or off time parameters that vary in an irregular manner. | 11-07-2013 |
20130293380 | RADIO CONTROLLED SAFETY STOP SYSTEM FOR FORKLIFT TRUCKS WITH RFID - A security system including an RFID subsystem for detecting entry of an RFID tag within a monitored area; an RFID token associated with a person accessing the monitored area; and an indicator system for providing an indication when the person enters into the monitored area. | 11-07-2013 |
20130314232 | TAILGATING DETECTION - Methods, systems, and computer-readable media for tailgating detection are described herein. One method includes collecting, via a computing device, access log data associated with a profile; processing, by a processor coupled to the computing device, the access log data to obtain a statistical access model; detecting, by the processor, a tailgating sequence based on the statistical access model; and providing, by the processor, a notification that the tailgating sequence has occurred. | 11-28-2013 |
20130321150 | System and Method for Alarm System Tamper Detection and Reporting - An alarm system for detecting and reporting “smash and crash” intrusions is described. The alarm system includes a plurality of intrusion sensors and a security alarm panel in communication with each of the plurality of intrusion sensors at the site of the alarm system. An alarm gateway is provided remote from the security alarm panel, the alarm gateway monitoring the status of the security alarm panel for indications of tampering. A central station is in communication with the alarm gateway and monitors the status of the alarm system, where the alarm gateway sends an alarm condition to the central station when tampering at the security alarm panel is detected. | 12-05-2013 |
20140022076 | Compact Multifunction Perimeter and Personal Security Alarm System - An alarm system includes a battery-powered base unit having an audible alarm, a switched constant on constant off light which can be used as a flashlight, and a strobed light providing a visible position indicator. The audible alarm and strobed light are activated simultaneously upon the release of a pull pin from a pair of electrical contacts within the base unit. The strobed light can be visible or infrared. A trip line can be connected to the pull pin to provide a secure line of entry or a secured enclosed area. | 01-23-2014 |
20140070946 | SYSTEMS AND METHODS FOR SECURITY CHECKPOINT CONDITION INFORMATION AND SHARING - Various embodiments discussed herein disclose a system comprising a user location engine, a checkpoint identification engine, a checkpoint identification engine, a presence notification engine, a checkpoint information engine, and an interuser connection engine. The user location engine determines an initial location when a user enters a given distance of a security checkpoint. The checkpoint identification engine provides a checkpoint identifier of the security checkpoint when the user is at the initial location. The presence notification engine receives a selection of the checkpoint identifier. The checkpoint information engine that receives user-generated information about the security checkpoint and also comprises a condition crowdsourcing engine to integrate the user-generated information into crowdsourced condition data associated with the security checkpoint. The interuser connection engine that provides the crowdsourced condition data to another user. Various systems and methods discussed herein may also discloses related methods and related computer-readable media. | 03-13-2014 |
20140070947 | Cognitive Security System and Method - A cognitive system and method for predicting and detecting security breaches is provided which yields cognitive inputs to a security management interface accessible by a human operator. The system utilizes symbolic cognitive architectures and inference processing algebras allowing the system to respond to open, incomplete, and/or unknown problem domains, offering flexibility in the case of unexpected changes in the security environment. The system is also capable of intelligently, and in real-time, adapting security peripheral configurations to further probe and analyze the real-time security environment, provided real-time data that can be processed with symbolic cognitive architectures and inference process algebras enabling the identification of new and emerging threat profiles leading to the prediction and detection of security breaches. | 03-13-2014 |
20140077949 | Security Film - A tamper indication device has a film attached and connected within the circuit that generates a signal in response to a tamper event. The tamper indication device can be incorporated into a bullet proof vest. The sensor circuit in the bullet proof vest does not only detects a bullet strike but also determines the location of the strike base in the sensor zone where the sensor zone has been struck. This circuitry includes a cell phone module with a built in GPS sensor for supplying GPS coordinates and communicating by dispatcher with the vest wearer's name and other identifying information. | 03-20-2014 |
20140091928 | DETECTION, IDENTIFICATION AND INTEGRATION OF OFFICE SQUATTERS - A computer receives a reservation for a location. The computer detects if a user is present in the location. The computer then determines if the user is allowed to be present in the location by comparing identification information of the user with identification information of the reservation. | 04-03-2014 |
20140091929 | Systems and Methods for Secure Alarmed Armored Protective Distribution Systems and Management - A fiber optic network has alarmed fiber optic lines in the cables connecting a secured junction box to plural user lock boxes. An outgoing alarm line and return alarm line in each cable connect the junction box to each user box. The outgoing alarm line is looped to the return alarm line inside the user lock box. The return alarm line is looped to the outgoing alarm line of a different cable inside the junction box to interconnect a plurality of alarm lines passing through a plurality of user boxes. A detector detects an alarm signal in the connected alarm lines to trigger an intrusion alarm. | 04-03-2014 |
20140091930 | SECURE POINT OF SALE TERMINAL - A data entry device including a housing formed of at least two portions, data entry circuitry located within the housing, at least one case-open switch assembly operative to sense when the housing is opened and tamper indication circuitry operative to receive an input from the at least one case-open switch assembly and to provide an output indication of possible tampering with the data entry circuitry located within the housing, the at least one case-open switch assembly including an arrangement of electrical contacts including at least first, second and third contacts and a displaceable conductive element, the tamper indication circuitry and the third contact together being operative such that when the third contact is short circuited to at least one of the first contact, the second contact and another contact, an output indication of possible tampering is provided. | 04-03-2014 |
20140139337 | ENTRANCE SECURITY SYSTEM - An entrance denial security system comprises an entrance barrier closing an entrance into a secured area having a plurality of structural tubular elements with hollow cores forming a rigid integral barrier. At least one optical fiber sensor line is laced through the hollow cores of the structural elements for detecting a fault condition signifying an unauthorized intrusion attempt. A processor in communication with the fiber sensor line generates a fault signal in response to a fault signal level. A communication device operatively associated with the processor communicates the fault signal and an alarm. The system also includes a plurality of tubular elements lying a common plane and the sensor line is routed through the tubular elements. In one instance, the tubular elements are PVC pipe. | 05-22-2014 |
20140152439 | Security System - A security system and method which includes a main automatically acting circuit | 06-05-2014 |
20140167961 | PROVIDING ALERTS, VOUCHERS, OR COUPONS ONCE A PLURALITY OF GEO-FENCES HAVE BEEN BREACHED A NUMBER OF TIMES - The disclosure is directed to providing a notification based on breaching a plurality of geo-fence perimeters. An embodiment detects a breach related to the plurality of geo-fence perimeters, the breach corresponding to a breach of one of the plurality of geo-fence perimeters, records the breach as one of a plurality of breaches, determines whether the plurality of breaches meet one or more conditions, and if the plurality of breaches meet the condition, issues a notification. | 06-19-2014 |
20140184411 | ALARM CONDITION PROCESSING IN NETWORK ELEMENT - Techniques for alarm condition processing in communication networks. In one example, a method comprises the following steps. An alarm condition associated with a network element of a communication network is detected. Alarm indication data is generated based on the alarm condition detected. The alarm indication data is protected using a cryptographic key to generate protected alarm indication data. The protected alarm indication data (e.g., tamper evidence) is stored in a non-volatile memory, and may be reset either autonomously (e.g., timer expiration) or from the communication network. | 07-03-2014 |
20140218195 | Apparatus and Method for Rapid Human Detection with Pet Immunity - A method and apparatus where the apparatus performs the steps of detecting a moving object within a secured area, determining a size of the moving object, determining that the size exceeds a predetermined threshold value associated with an animal, determining an aspect ratio of the moving object, determining that the aspect ratio meets a predetermined aspect threshold value associated with an animal or crawling human, but not an upright human, retrieving an indicator from memory that establishes whether an animal is present or not present within the secured area and setting an alarm upon detecting that the moving object exceeds the predetermined size threshold, that the determined aspect ratio meets the aspect ratio of an animal or crawling human and that the indicator establishes that there is no animal present in the secured area. | 08-07-2014 |
20140247128 | DETECTION DEVICE - A device for the detection of an open and unattended closure of an enclosure to prevent theft comprises a detector adapted to detect if the closure is open and a detector adapted to detect if the closure is unattended, the detectors being operably connected to an effector adapted to alert a user to the open and unattended condition of the closure. | 09-04-2014 |
20140253329 | Smart Home Defense Chamber (SHDC) - The Smart Home Defense Chamber (SHDC) is a wall chamber that is installed within a wall for the purpose of storing, hiding, securing and protecting firearms and valuables so as to provide an invisible storage chamber that can be equipped with or without a means to alarm to prevent tampering, unauthorized entry and security away from children and thieves. The wall chamber also provides the owner/user an advantageous means of access in the event of an emergency. The SHDC uniqueness is that it is designed and installed to look exactly like the wall it lives within so only the owner/user knows of its location, presence and contents. This allows the owner/user the ability to install many SHDC's in various locations around the home, office or any place they choose without having to worry about unauthorized entry or tampering from children or thieves. | 09-11-2014 |
20140266719 | METHODS FOR PROMPTING A USER TO USE ENHANCED AUTOMATION SYSTEM FEATURES, AND SYSTEMS AND DEVICES RELATED THERETO - A control panel is used to control and/or monitor an automation system. The automation system may also be used in connection with one or more enhanced services, such as a remote access service. The remote access service may allow a user to control or monitor some or all aspects of the automation system through a remote computing device. To use the remote access service, or other enhanced services, the user may register to associate the user with the control panel of the automation system. If it is determined that the user has not registered, the service provider may send a message to the control panel. The message may prompt the user to register for the enhanced service. Optionally, contact information may be requested to allow a message to be sent to a personal device of the user to facilitate registration or use of the enhanced service. | 09-18-2014 |
20140266720 | PERMISSIONS-BASED ALARM SYSTEM AND METHOD - Embodiments of the present disclosure provide a permissions-based alarm system for use in climbing environment. The permissions-based alarm system includes an identification device storing a permission setting relating to an aspect of the climbing environment and a detection module in communication with the identification device. The detection module detects the permission setting stored on the identification device and detects proximity of the identification device to an area restricted by the permission setting. When the identification device enters the restricted area of the climbing environment, an alert is provided. | 09-18-2014 |
20140266721 | IMMEDIATE RESPONSE SECURITY SYSTEM - Aspects of the present disclosure involve an intelligent and immediate response security system configured to provide continuous and immediate security data to requesting users in the event of a threat, potential threat, and/or the like. Additionally aspects of the present disclosure involve systems capable of initiating and performing various security commands to ensure the personal safety of individuals located within a certain type of facility, venue, location, etc. | 09-18-2014 |
20140266722 | CRIME PREVENTION SYSTEM USING SENSOR MODULE - Provided is a crime prevention system using a sensor module capable of sensing all directions. The crime prevention system using a sensor module may be applied to buildings in which internal structures and crime prevention environments are various, have relatively low power consumption, and be simply installed. | 09-18-2014 |
20140313034 | AUTOMATED SECURITY SYSTEM FOR STRUCTURES - Disclosed are various embodiments for providing security to a structure. A network of security devices may be accessed and/or controlled by one or more monitoring devices, wherein each of the one or more monitoring devices are configured to monitor one or more signals emitted by one or more security devices. In response to a signal received from at least one of the security devices indicating a breach of the structure, a compartmentalization of the structure may be initiated, wherein the compartmentalization comprises initiating a lockdown of the structure utilizing at least one of the one or more security devices. | 10-23-2014 |
20140354428 | LOOKDOWN ENABLE/DISABLE FOR DETECTORS - An intrusion detector comprises a housing including a cover and baseplate mounting a circuit board. The cover and baseplate are removably mountable to a base. A motion sensor and bracket are mounted to the circuit board. The cover has a lower lookdown window. A lookdown enable/disable actuator extends from a rear side of the circuit board and is accessible through the baseplate. The actuator is operable to move a door pivotally mounted to the bracket between an on position to enable a lookdown function and an off position to disable the lookdown function. The detector is normally mounted on a wall by securing the base to the wall. The cover and baseplate can be removed from the base. A screwdriver can be used to turn the actuator. The cover and baseplate can then be remounted to the base. | 12-04-2014 |
20140354429 | Detecting Presence Using a Presence Sensor Network - Concepts and technologies are disclosed herein for detecting presence using a presence sensor network. In some embodiments, a computer executing a presence service generates a user interface for display at a user device. The user interface can include a control that, when selected, generates room data defining a monitored location. The computer can sensor identifier data that identifies a presence sensor located at the monitored location and a location of the presence sensor at the monitored location. The computer can provide the user interface to the user device to obtain the room data and obtain the room data. The computer also can store the room data and the sensor identifier data. | 12-04-2014 |
20140361894 | SECURITY APPARATUS AND SYSTEM USING MILLIMETER-WAVE COMMUNICATIONS, AND METHOD FOR THE SAME - Disclosed are a security apparatus and a security system using millimeter-wave communications. The security apparatus comprises a sensing part comprising at least one sensor and providing a detection signal by detecting an intruder; a control part generating intruder detection information according to the provided detection signal; and a communication part transmitting an intruder detection signal including the intruder detection information through a millimeter-wave frequency band. Therefore, a wireless security system can be implemented easily only. Also, it can be made easy to install and manage a security system as compared to configuring a security system by using wired networks, and so installation cost of the security system may be reduced. | 12-11-2014 |
20140361895 | ACCESS ALARM - An alarm system comprises a tripwire having at least one end attached to a detection assembly comprising an elongate shank, a housing supporting the elongate shank, a coil spring mounted on the shank which provides a restoring force to movement of the shank outwardly from the housing, a micro switch operatively associated with the shank and an alarm electrically connected to the micro switch such that tripping of the wire activates the alarm. | 12-11-2014 |
20140368343 | Mobile Cash Transport System with Tampering Triggered Ink Deployment - A device designed to transport paper currency in a protected fashion. While being transported, the device monitors for tampering or break-in attempts and subsequently generates warning notifications, devalues currency with indelible ink, or sounds an alarm depending on configuration and the type of tampering detected. Further, techniques are described for transferring indelible ink efficiently and reliably to a cash compartment area of the transport case. | 12-18-2014 |
20140375453 | System for Detecting an Intrusion Attempt Inside a Perimeter Defined by a Fence - The present invention relates to a system for detecting an intrusion attempt inside a perimeter defined by a fence including panels attached onto posts, comprising a means for detecting shocks and/or vibrations ( | 12-25-2014 |
20150022355 | SURVEILLANCE SYSTEMS AND METHODS - Surveillance systems and methods are described herein. Surveillance systems and methods can include detecting a number of interactions within a building, determining an event based on the number of interactions, and sending a message to a number of contacts relating to the event | 01-22-2015 |
20150061869 | Building Intruder Defensive Shield - This invention relates to a building intruder defensive shield system to deter, delay and distract intruders from causing damage or harm upon entering and roaming buildings. The defensive shield system includes a cold water supply plumbed to an expansion tank capable of pressurizing the water with a zone valve and nozzle. A motion sensor, control relay, and a central processing unit communicate signals to and from each other and the zone valve to disperse a timed, forced spray of water, preferably containing dye or a chemical irritant, on the intruder. Manual or gunshot detection means are included to identify and locate the intruder. | 03-05-2015 |
20150070167 | METHOD AND A SYSTEM FOR SUPERVISING INTRUDER ALARM SYSTEMS - A method of supervising intruder alarm systems, each alarm system comprising a plurality of alarm sensors and at least one gateway communicating with a remote alarm receiving centre. The method includes the steps: a) receiving in a first intruder alarm system radio signals transmitted from a second intruder alarm system, b) transmitting from said first intruder alarm system information relating to the received radio signals to said remote alarm receiving centre, c) analysing in said remote alarm receiving centre information received from intruder alarm systems to identify at least one first intruder alarm system and at least one second intruder alarm system capable of exchanging information via radio signals, d) transmitting from said remote alarm receiving centre control signals to said first intruder alarm system and to said second intruder alarm system to operate as a supervising system by monitoring radio signals from the other intruder alarm system operating as a supervised system, e) observing in either one of said first intruder alarm system and said second intruder alarm system absence of the monitored radio signals, and f) transmitting from a supervising alarm system an alarm signal when absence of said monitored signals is detected. | 03-12-2015 |
20150077250 | SECURITY SYSTEM COMMUNICATIONS MANAGEMENT - Methods, systems, and apparatus, including computer programs encoded on computer storage media, for managing communications. One of the systems includes a plurality of security systems, each security system including a secure network coupling a plurality of security devices; a plurality of user devices authorized to send and receive communications associated with a respective security system of the plurality of security systems; and a service provider system configured to manage communications for each of the plurality of security systems with respective user devices, wherein, the service provider system or the user devices are configured to communicate with a push service to send push notifications. | 03-19-2015 |
20150077251 | Notification of Security Alerts - Remote notifications are provided by a security system. When the security system detects a visitor, a first notification is sent to an authorized user. The first notification may include an image or video, thus allowing the user to recognize the visitor. If the user approves the visitor, the security system deactivates for a period of time. The visitor may thus enter a home or business for some purpose. However, if the visitor lingers beyond the period of time, the security system reactivates and sends a second notification. | 03-19-2015 |
20150130614 | Home Security System Using Wireless Communication - The invention relates to a method for monitoring the security of an area, a corresponding security monitor device and a wireless access device. The method comprises steps of: determining whether there is at least one first mobile device accessing a wireless access device that serves said area; starting to monitor a breach of security conditions, if there is no at least one first mobile device accessing the wireless access device; and, generating an alarm signal and sending said signal to one of said at least one first mobile device, if the breach of security conditions is detected. With this method, it does not need the host to turn on the security monitoring device every time he leaves home and effectively eliminates the possibility of forgetting to turn on the security monitoring procedure by the user, making the security device more reliable and convenient. | 05-14-2015 |
20150294543 | SYSTEMS AND METHODS FOR CROWDSOURCING DETECTED EVENTS - A computer-implemented method for crowdsourcing detected events is described. In one embodiment, an event is detected via one or more sensors located at a first location within a predetermined geographic area. Data from the one or more sensors is analyzed to determine a scope of the event. Upon determining the scope of the event affects a second location within the predetermined geographic area, a notification is sent to a user associated with a location within the predetermined geographic area that does not include a sensor of a type that detects the event. | 10-15-2015 |
20150310713 | SMART SCREENING BARRIER AND SYSTEM - A barrier and system for the protection of a crowd from terrorists, by evaluating each individual for any concealed prohibited items. Each individual is exposed to one or more screening mechanisms, controlled by a monitoring unit, while passing in an organized fashion through an enclosed walkway containing the screening mechanism, and exiting on the other side. When a prohibited object is detected, response is provided and the smart door device is locked to detain and isolate the suspected individual in the device structure's interior. The structure of the invention is also configured to deflect the blast created by a potential explosion and prevent harm to other individuals and structures nearby. | 10-29-2015 |
20150339900 | Home satellite surveillance defense - Patent for home defense against satellite surveillance. | 11-26-2015 |
20150356839 | SECURITY DEVICE FOR INTRUSION DETECTION - The present invention relates to a security device for detecting an intrusion including at least one sensor frame including a sensor, a first connection frame for connecting a signal sensed from the sensor frame, and a signal processing frame for detecting an intrusion from the sensed signal received from the first connection frame or the sensor frame, wherein the at least one sensor frame is detachably connected to the security device. Accordingly, the security device can be easily installed, use a variety of sensors, and be changed in size. | 12-10-2015 |
20150362313 | LIGHT-EMITTING DEVICE FOR DETECTING PASSAGE OR SMOKE AND METHOD FOR MANUFACTURING SUCH A DEVICE - A light-emitting device to detect passage or smoke in the emitted beam. The device includes a source of invisible radiation, a source of visible laser radiation, an alignment component to align the central axis of the visible radiation with an axis parallel to the central axis of the invisible radiation, and a switch to turn off the visible laser source. The device can further include a housing containing both sources of radiation. The switch is configured to be controlled by the closing of the housing and the source of visible laser radiation is turned off in response to the closure of the housing. | 12-17-2015 |
20150364020 | Human Identification Detection System, Method and Device - The invention provides a system, device and method designed to detect, alert and identify unwanted entry into areas by intruders. The invention is also designed to prevent escape from secured facilities. If escape from such a secured facility is realized, the system will identify and mark the intruder or escapee for immediate or later capture by local and or federal law enforcement authorities. The system will accomplish this by mechanical, electronic and chemical means. The system is also designed to be a territory denial system. Although the system will accomplish its means by clandestine deployment, the unseen but known presence of the device will cause a profound psychological block to any would be intruder to a given area that it is deployed in. The devices are deployed below ground just below the surface as a non-lethal landmine and subterranean several feet below ground as an anti-tunneling device. | 12-17-2015 |
20150364029 | Methods, Systems, and Products for Security Services - Methods, systems, and products notify of alarms in security systems. Sensor data is received from an alarm sensor, and an alarm controller determines an alarm condition. Video data associated with the alarm sensor is retrieved. An alarm message may be sent over a wireless network connection, while the video data may be sent over a wireline broadband connection. | 12-17-2015 |
20150371512 | SYSTEM AND METHOD FOR HOME AUTOMATION AND SECURITY - Systems and methods for home automation and security are disclosed. Example methods disclosed herein include detecting an entrant at a first location at a first time. Disclosed example methods also include determining, according to an occupancy schedule, that a person is expected to be at the first location at the first time. Disclosed example methods further include, in response to an indication from a device at a second location different than the first location that the person is located at the second location at the first time, activating an alarm without initiating a prompt for the entrant to enter a security pass code. | 12-24-2015 |
20160012697 | System and Method for Generating Protective Obscuring Haze | 01-14-2016 |
20160012713 | Intrusion Detection System | 01-14-2016 |
20160027262 | Integrated Home Lighting and Notification System - An integrated lighting and notification system includes a light fixture connected to an electrical power supply, a camera, a control unit, and a trigger device. The electrical power supply provides electrical power to the light source unit and the camera. The control unit transmits a signal via a network in response to receiving a signal transmitted by the trigger device. | 01-28-2016 |
20160035196 | SYSTEM OF LIVING - A system and method used for surveillance around a living space through characterizing detected occupants with properties in accordance with time, location and tracked traversal path. The intruder as a detected occupant is distinguished from the tenant, property management staff, and visitor. There is provided an apparatus generates a signal in response to receiving an alert indication from a server, the alert indicative of a condition threatening security of inhabitant or property. A message is transmitted in response to the alert generated by the server to a mobile device that is operated by a user. The system also uses the information to control the elevator operation in accordance with detected intrusion. | 02-04-2016 |
20160035198 | SURVEILLANCE OF A SECURE AREA - Embodiments of the invention are directed to a system, method, and computer program product for surveillance of a secure area. The present invention typically includes a memory, a processor, and a module configured to monitor the secure area. In this regard, an embodiment of the present invention may receive an indication that a user is within the secure area and determine, using an authentication device sensor, whether the user has the authentication device to remain within the confines of the secure area. The user may have continued access to the secure area if the authentication device detected. On the other hand, the security personnel associated with the secure area may be notified of an unauthorized user when the authentication device is not detected. | 02-04-2016 |
20160042618 | FENCE MONITORING - A fence alarm, having a plurality of laterally spaced electrically conductive fence elements, the fence elements electrically being connected in series with each other, a sensing arrangement electrically connected to the plurality of conductive fence elements, the sensing arrangement being calibrated to a nominal electrical value, the sensing arrangement further being operable to sense a predefined deviation from the nominal electrical value caused by a deviation in an electrical property of the conductive fence elements. | 02-11-2016 |
20160093176 | Residential Security Using Game Platform - A security system includes sensor devices, a security panel that receives signals from the sensor devices and that executes algorithms to determine the presence of an alarm that is sent to a game console coupled to a monitor. The game console includes a processor and memory, a graphics processor, and a network interface that receives data from the security panel and causes a message regarding the alarm condition to be displayed on the monitor. | 03-31-2016 |
20160093179 | Alarm System for Passageways - An improved alarm system for monitoring movement through a passageway defined by opposing sidewalls. The alarm system has a lower passage indicator disposed toward the lower ends of the sidewalls, an upper passage indicator disposed toward the upper ends of the sidewalls and a control mechanism configured to sound an alarm if the lower passage indicator indicates passage through the passageway and the upper passage indicator does not. In one embodiment, each of the passage indicator comprises transducers that are configured to direct and receive sound waves, such as ultrasound waves, and provide lower and upper ultrasound waves that act as lower and upper barriers. If only the lower barrier is interrupted, indicating a child passing through the passageway, the control mechanism will generate an alarm signal. If both barriers are interrupted, indicating an adult passing through the passageway, the control mechanism will not generate the alarm signal. | 03-31-2016 |
20160110978 | GPS DIRECTED INTRUSION SYSTEM WITH DATA ACQUISITION - A GPS directed intrusion system with data acquisition is provided. Some methods can include detecting a threat event associated with a monitored facility, collecting data relevant to the threat event, and transmitting the data relevant to the threat event to a mobile device of an authority figure dispatched to the monitored facility. Some methods can also include placing a surveillance device associated with the monitored facility in a tracking mode, tracking motion captured by the surveillance device, and transmitting data representative of the motion to a mobile device of an authority figure dispatched to the monitored facility. | 04-21-2016 |
20160171854 | PERMISSIONS-BASED ALARM SYSTEM AND METHOD | 06-16-2016 |
20160180676 | THEFT DETERRENT DEVICE, SYSTEM, AND METHOD | 06-23-2016 |
20160189505 | SYSTEMS AND METHODS OF PROVIDING STATUS INFORMATION IN A SMART HOME SECURITY DETECTION SYSTEM - Systems and methods of providing a security system which presents operational status information to a user are disclosed. A sensor can detect a security event and receive identifying information from an electronic device. A controller device is communicatively coupled to the sensor to receive the security event, to determine whether the identifying information detected with the sensor is from the electronic device of an authorized user, and to provide an operational status message to the electronic device via a communications link when it is determined to be authorized. The electronic device provides identifying information to the sensor, receives the operational status message via the communications link, and displays the operational status message. | 06-30-2016 |
20160189509 | LEARNED OVERRIDES FOR HOME SECURITY - Systems and techniques are provided for learned overrides for home security. A sensor of a security system may be armed. A trip signal may be received indicating a tripping of the sensor. It may be determined that the trip signal can be automatically overridden based on matching an identity of the sensor and a state of the security system with a pattern in a model. The pattern may represent a state of the security system in which automatically overriding the trip signal from the sensor is permitted. The trip signal from the sensor may be automatically overridden without input from a user. | 06-30-2016 |
20160189510 | DIGITAL FINGERPRINT TRACKING - Techniques are described for tracking intruders of a monitored property by the unique identifying characteristics or “digital fingerprints” of electronic devices carried by the intruders. A system detects an alarm event at a monitored property based on output from at least one sensor located at the monitored property. In response to detecting the alarm event at the monitored property, the system initiates a process to gather electronic identifiers for mobile electronic devices located within the monitored property at a time corresponding to the detected alarm event. The system determines electronic identifiers for the mobile electronic devices located within the monitored property at a time corresponding to the detected alarm event. The system stores in electronic storage, information indicating the determined electronic identifiers for the mobile electronic devices located within the monitored property at a time corresponding to the detected alarm event. | 06-30-2016 |
20160189525 | Multi-Channel Public Announcement and Voice Alarm System Architecture to Support Addressable Devices, Wireless Expansion and Intercom - An apparatus including a security system that protects a secured geographic area, an audio annunciator of the security system, a pair of conductors that connects the annunciator to a control panel of the security system wherein the pair of conductors supply power to the annunciator and a transceiver of the annunciator that exchanges messages with the control panel under a time division multiple access (TDMA) format through the pair of conductors and wherein the annunciator receives streaming audio messages from the control panel through the pair of conductors. | 06-30-2016 |
20160189526 | Home Security System With Automatic Context-Sensitive Transition To Different Modes - A home security system may infer a mode of operation based on indications it receives regarding a user's behavior. The disclosed implementations provide for a vacation mode of operation that defines a response for a security event that differs from the response that would be provided by the home security system for the same security event if it operated in another mode such as an away mode. | 06-30-2016 |
20160189527 | Intelligent Object-Based Alarm System - A second security system, which may exist inside the perimeter of a first security system, may utilize one or more sensors to observe an object. The first security system may have a “home” mode and an “away” mode. In the event the first security system is in the home mode, the second security system may be in an away mode for the object. If the first security system changes to an away mode, the second security system may change to a home mode for the object. | 06-30-2016 |
20160189528 | SYSTEMS AND METHODS OF PROVIDING ALLOWANCES FOR A SECURITY SYSTEM - Systems and methods of security are provided, including a sensor to detect a location of at least one user, and generate detection data according to the detected location of the at least one user, a processor communicatively coupled to the sensor to receive the detection data, to determine whether the at least one user is occupying a building according to the detection data, and to store allowance data that sets one or more preferences for the at least one user, and an alarm device, communicatively coupled to at least the processor, that is armed or disarmed by the processor according to the allowance data and the determination as to whether the at least one user is occupying the building. | 06-30-2016 |
20160189529 | SYSTEMS AND METHODS OF AUTOMATED ARMING AND DISARMING OF A SECURITY SYSTEM - Systems and methods of security are provided, including at least one of a plurality of sensors to detect a location of at least one user, and generate detection data according to the detected location of the at least one user. A processor may be communicatively coupled to the at least one of the plurality of sensors to receive the detection data and to determine whether the at least one user is occupying a building according to the detection data. An alarm device, communicatively coupled to the processor, can be armed or disarmed by the processor according to the determination as to whether the at least one user is occupying the building. | 06-30-2016 |
20160253884 | HOME AUTOMATION SYSTEMS, METHODS, AND COMPUTER-READABLE MEDIA | 09-01-2016 |
20160253898 | Notification of Visitors | 09-01-2016 |
20160379456 | SYSTEMS AND METHODS OF HOME-SPECIFIC SOUND EVENT DETECTION - Systems and methods of a security system are provided, including detecting, by a sensor, a sound event, and selecting, by a processor coupled to the sensor, at least a portion of sound data captured by the sensor that corresponds to at least one sound feature of the detected sound event. The systems and methods include classifying the at least one sound feature into one or more sound categories, and determining, by a processor, based upon a database of home-specific sound data, whether the at least one sound feature is a human-generated sound. A notification can be transmitted to a computing device according to the sound event. | 12-29-2016 |
20180025300 | METHODS FOR PROMPTING A USER TO USE ENHANCED AUTOMATION SYSTEM FEATURES, AND SYSTEMS AND DEVICES RELATED THERETO | 01-25-2018 |
20180025620 | PREDICTIVE MOTION ALERTS FOR SECURITY DEVICES | 01-25-2018 |
20180025623 | Securing Property | 01-25-2018 |