G08B13/00

VEHICULAR ACCESS CONTROL BASED ON VIRTUAL INDUCTIVE LOOP

Methods, systems, and apparatus, including computer programs encoded on computer storage media, for monitoring events using a Virtual Inductive Loop system. In some implementations, image data is obtained from cameras. A region depicted in the obtained image data is identified, the region comprising lines spaced by a distance that satisfies a distance threshold. For each line included in the region: an object depicted crossing the line is determined whether to satisfy a height criteria indicating that the line is activated. In response to determining that an object depicted crossing the line satisfies the height criteria, an event is determined to have likely occurred using data indicating (i) which lines of the lines were activated and (ii) an order in which each of the lines were activated. In response to determining that an event likely occurred, actions are performed using at least some of the data.

Processing alarm signals

Methods, systems, computer-readable media, and apparatuses for processing alarm signals are presented. In some embodiments, a mobile device may be registered with a security system that is installed at a premises. Subsequently, an alarm trigger associated with the security system may be received. Based on receiving the alarm trigger, the location of the mobile device may be determined. A response to the alarm trigger then may be determined based on the location of the mobile device.

Processing alarm signals

Methods, systems, computer-readable media, and apparatuses for processing alarm signals are presented. In some embodiments, a mobile device may be registered with a security system that is installed at a premises. Subsequently, an alarm trigger associated with the security system may be received. Based on receiving the alarm trigger, the location of the mobile device may be determined. A response to the alarm trigger then may be determined based on the location of the mobile device.

PORTABLE STORAGE CONTAINER
20230043043 · 2023-02-09 ·

A portable storage container that is constructed so as to provide a first technique and a second technique to access the interior volume. The portable storage container of the present invention includes a base platform having a housing that is superposed the base platform and operable to be removed therefrom. The base platform includes apertures that are configured to align with mounting pins of the housing. The base platform includes wheel assemblies that are configured to assist in movement of the assembled portable storage container. A pair of lifting members are secured to the top of the housing and are configured to operably engage with forklift tongues so as to provide removal of the housing from the base platform. A door is provided on one end of the housing wherein the door provides an alternate technique to access the interior volume in addition to the lifting of the housing.

PORTABLE STORAGE CONTAINER
20230043043 · 2023-02-09 ·

A portable storage container that is constructed so as to provide a first technique and a second technique to access the interior volume. The portable storage container of the present invention includes a base platform having a housing that is superposed the base platform and operable to be removed therefrom. The base platform includes apertures that are configured to align with mounting pins of the housing. The base platform includes wheel assemblies that are configured to assist in movement of the assembled portable storage container. A pair of lifting members are secured to the top of the housing and are configured to operably engage with forklift tongues so as to provide removal of the housing from the base platform. A door is provided on one end of the housing wherein the door provides an alternate technique to access the interior volume in addition to the lifting of the housing.

Visual-based security compliance processing

Multiple cameras capture videos within a secure room. When individuals are detected as entering the room, identities of the individuals are resolved. When an asset is exposed in a field of view of one of the cameras, the individuals' eye and head movements are tracked from the videos with respect to one another and the asset. Additionally, touches made by any of the individuals on the asset are tracked from the videos. The eye and head movements are correlated with the touches or lack of touches according to a security policy for the asset. Any violations of the security policy are written to a secure audit log for the room and the asset.

System and method for intrusion detection
11593530 · 2023-02-28 · ·

An information handling system includes an intrusion detection circuit having two inductors and an amplifier circuit. The amplifier circuit is configured to identify an increase in inductive coupling between the inductors in response to a change in position of a cover.

System and method for intrusion detection
11593530 · 2023-02-28 · ·

An information handling system includes an intrusion detection circuit having two inductors and an amplifier circuit. The amplifier circuit is configured to identify an increase in inductive coupling between the inductors in response to a change in position of a cover.

METHOD AND APPARATUS FOR SPACE STATUS DETECTION BASED ON ACOUSTIC CHIRP SIGNALS

A method and an apparatus for space status detection based on acoustic chirp signals are provided. The method includes following steps. One of a plurality of acoustic chirp signals is transmitted into a space respectively at a plurality of different time points. A plurality of acoustic waves that are the transmitted acoustic chirp signals varied in the space are sequentially received to generate a plurality of acoustic spatial response signals, and a plurality of space features of the space are obtained based on the acoustic spatial response signals. A status change of the space is detected by comparing two of the space features.

Processing Alarm Signals
20230237898 · 2023-07-27 ·

Methods, systems, computer-readable media, and apparatuses for processing alarm signals are presented. In some embodiments, a mobile device may be registered with a security system that is installed at a premises. Subsequently, an alarm trigger associated with the security system may be received. Based on receiving the alarm trigger, the location of the mobile device may be determined. A response to the alarm trigger then may be determined based on the location of the mobile device.