G08B13/00

SECURING DEVICE FOR OBJECTS
20170323536 · 2017-11-09 · ·

In a securing device for attachment of an object which is to be secured, wherein the securing device has a housing with a base plate and a lid as well as means for generating an alarm when the securing device is removed from the object without authorization, wherein the securing device is attached to the object by a double-adhesive strip having a double-adhesive first section and a non-adhesive second section. The first section has an initial adhesiveness which is lost when the strip is stretched. The second section forms a grip for stretching the double-adhesive strip. The double-adhesive strip is attached on one side to the underside of the base plate so that it is covered by the base plate and on the other side to the object. The non-adhesive second section is placed between the base plate and the lid in its closed state such the grip is only accessible only in the open state of the housing. Also disclosed is an object securing system having a housing for being secured to an object by two belts crossing each other, the housing having a base plate, a lid, a locking mechanism and an alarm triggering apparatus. The base plate can be slid between the surface of the object and the belts, so that the belts cross at the center of the base plate to hold the housing on the object. The locking mechanism when in the locked state prevents the base plate from being slid out from between the object and the belts, and an alarm is triggered when the securing device is detached from the object without authorization.

Anti-Theft Method and Apparatus
20170323554 · 2017-11-09 ·

An anti-theft method and apparatus relating to the field of anti-theft technologies, and to reduce costs. The anti-theft method includes obtaining a detection signal from a terminal device, where the detection signal is a signal sent by the terminal device when the terminal device detects an available network, and performs an alarm operation when the detection signal meets a preset condition. The anti-theft method may be applied in daily life in order to ensure family property security.

Do-not-disturb system and apparatus

A product for detecting people approaching an isolated user, discouraging the detected people from disturbing the user, and for taking messages from the approaching people. The product may be embodied in noise-canceling headphones that the user is wearing, for example. The product can include a camera and a microphone that can detect approaching people. The product can also include an externally-facing speaker that can play an audio message to the approaching person to attempt to discourage the person from disturbing the user. The product can also prompt the person to leave a message for the user and then record the subsequent message. The user can review the message at a later time.

6lowpan based multidisciplinary wireless sensor protocol for connected home security systems

A system is provided that includes a control panel having a wireless transceiver that operates under a 6LowPan/IPv6/IoT protocol, wherein the 6LowPan/IPv6/IoT protocol supports one or more of a 6LowPan protocol, an IEEE802.15.4 protocol, and IEEE802.11 coordination, a plurality of remotely located, wireless devices each having a wireless transceiver that exchanges messages with the control panel within a time division multiple access (TDMA) slot on a radio frequency (RF) channel, and a respective processor within the control panel and each of the plurality of wireless devices that controls transmission and reception of messages within TDMA slots of a repeating super frame, wherein at least some of the plurality of wireless devices select TDMA slots of the super frame under a carrier sense multiple access with collision avoidance (CSMA/CA) algorithm/mechanism and some other of the plurality of wireless devices select TDMA slots of the super frame under a WiFi protocol.

GPS directed intrusion system with data acquisition
09767663 · 2017-09-19 · ·

A GPS directed intrusion system with data acquisition is provided. Some methods can include detecting a threat event associated with a monitored facility, collecting data relevant to the threat event, and transmitting the data relevant to the threat event to a mobile device of an authority figure dispatched to the monitored facility. Some methods can also include placing a surveillance device associated with the monitored facility in a tracking mode, tracking motion captured by the surveillance device, and transmitting data representative of the motion to a mobile device of an authority figure dispatched to the monitored facility.

Utilizing a high generation cellular network for identifying devices associated with unauthorized activities and notifying enterprise facilities

Aspects of the disclosure relate to utilizing a high generation cellular network for identifying devices associated with unauthorized activities and notifying enterprise facilities. A computing platform may collect device information for a plurality of user devices at a first location. Then, the computing platform may receive, from a first device at the first location, a message related to a first activity in a vicinity of the first location. Then, the computing platform may identify a sub-plurality of the plurality of user devices, wherein the sub-plurality of user devices are located at the first location at a time of occurrence of the first activity. Then, the computing platform may generate an alert notification comprising information related to the first activity and device information for the sub-plurality of user devices. Subsequently, the computing platform may send the alert notification to a collection of devices at a plurality of locations.

Detection and classification of abnormal sounds

An audio surveillance system includes a plurality of nodes and each node includes a microphone, a speaker, and a control unit. The microphone is configured to detect sound and the speaker is configured to provide sound. The control unit is configured to receive a plurality of inputs from the plurality of nodes and the plurality of inputs are based on a detected sound; determine a location of the source of the detected sound based on the plurality of inputs; classify the detected sound according to predefined alert conditions and based on the location of the source of the detected sound; provide an alert to a monitoring device regarding the detected sound based on the classification of the detected sound; and control at least one node from the plurality of nodes to provide an audio response to the detected sound.

Abberation detection technology
09767680 · 2017-09-19 · ·

In some implementations, techniques are described for detecting abnormal installations in a property monitored by a monitoring (e.g., security) system. For instance, an aberration engine may be used to detect an abnormal sensor or system installation within a property based on comparing detected installation data against local installation patterns of local providers within a certain proximity to the property. In some examples, the attributes (e.g., installation time, components used, number of tests performed, etc.) of a monitoring system installation, including installation of components of the monitoring system, may be compared to average installation times of other nearby installations to detect abnormalities in the installation.

Housing and wall mount casing for google nest guard or similar article
11252828 · 2022-02-15 ·

A table-top or wall-mount case houses a control box unit for a home security system. A main housing component seats the control box, and a lid or cap fits into (or onto) the main component and holds the control box in place. A circular opening or window in the cap provides access to the keys or buttons of the key pad. A ring of a plastic foam or other yielding resilient material retains the control unit and holds it in position inside the case. A cord opening and a channel or groove are provided in the base for the power or data cord.

Seismic intrusion detection with object recognition
11250691 · 2022-02-15 · ·

Methods and a system for detecting physical intrusion are providing, including sampling a set of seismic signals from a vibration sensor of a buried sensor intrusion device, determining that the set of seismic signals matches a seismic threat pattern and responsively generating a seismic alert, recording a surveillance video of an area under which the sensor device has been buried, processing the surveillance video to determine whether a human figure is present and, responsively to determining that a human figure is present and to the generation of the seismic alert, issuing an threat detection alert.