Patent classifications
G08B13/00
Processing Alarm Signals
Methods, systems, computer-readable media, and apparatuses for processing alarm signals are presented. In some embodiments, a mobile device may be registered with a security system that is installed at a premises. Subsequently, an alarm trigger associated with the security system may be received. Based on receiving the alarm trigger, the location of the mobile device may be determined. A response to the alarm trigger then may be determined based on the location of the mobile device.
Criminal act detection system
A criminal act detection system may include a device processor; and a non-transitory computer readable medium including instructions executable by the device processor to perform the following steps: receiving data from a plurality of geographically distributed personal electronic devices; determining, based on the data received from the personal electronic devices, that conduct consistent with a criminal act has occurred; and sending information pertaining to the conduct consistent with a criminal act to one or more of the personal electronic devices.
Pedestal alarm
A pedestal antenna for anti-theft systems in commercial establishment's entrances, which has the advantage or benefit of allowing the exhibit of physical or physical objects for exhibit or immediate access for the client as a display window which is immediately perceived by the client when they walk into the premises, as they also do when leaving the premises, as this product showcasing spot is in the same pedestal antenna, located at the access door.
Pedestal alarm
A pedestal antenna for anti-theft systems in commercial establishment's entrances, which has the advantage or benefit of allowing the exhibit of physical or physical objects for exhibit or immediate access for the client as a display window which is immediately perceived by the client when they walk into the premises, as they also do when leaving the premises, as this product showcasing spot is in the same pedestal antenna, located at the access door.
METHODS FOR EMBEDDING PROTECTED VEHICLE IDENTIFIER INFORMATION IN CELLULAR VEHICLE-TO-EVERYTHING (C-V2X) MESSAGES
Various embodiments include methods that may be performed in a computing device of a vehicle for communicating permanent vehicle identification information in vehicle communications in response to detecting that there is a need to send the vehicle permanent identification information to a concerned party. The computing device may generate a message including the vehicle permanent identification information, and transmit the generated message to a roadside unit for routing to the concerned party. In some embodiments, the permanent vehicle identification information may be included in cellular vehicle-to-everything (C-V2X) protocol messages.
Geofence Information Delivery Systems and Methods
The present invention is directed to methods and systems for requesting information from a mobile device with a fencing agent. The fencing agent determines a position with a DNS resolver, queries geofences with an IP address, receives an anchor point with an IP address from the DNS resolver. The device with the fencing agent is able to receive multiple anchor points within multiple geofences within an ROI and translate fence points into fence geometries. Geofence information is stored and registered in a database of geofences, and each geofence is associated with a plurality of geographic designators, wherein each of the plurality of geographic designators is associated with an IP address.
Geofence Information Delivery Systems and Methods
The present invention is directed to methods and systems for requesting information from a mobile device with a fencing agent. The fencing agent determines a position with a DNS resolver, queries geofences with an IP address, receives an anchor point with an IP address from the DNS resolver. The device with the fencing agent is able to receive multiple anchor points within multiple geofences within an ROI and translate fence points into fence geometries. Geofence information is stored and registered in a database of geofences, and each geofence is associated with a plurality of geographic designators, wherein each of the plurality of geographic designators is associated with an IP address.
Digital fingerprint tracking
Techniques are described for tracking intruders of a monitored property by the unique identifying characteristics or “digital fingerprints” of electronic devices carried by the intruders. A system detects an alarm event at a monitored property based on output from at least one sensor located at the monitored property. In response to detecting the alarm event at the monitored property, the system initiates a process to gather electronic identifiers for mobile electronic devices located within the monitored property at a time corresponding to the detected alarm event. The system determines electronic identifiers for the mobile electronic devices located within the monitored property at a time corresponding to the detected alarm event. The system stores in electronic storage, information indicating the determined electronic identifiers for the mobile electronic devices located within the monitored property at a time corresponding to the detected alarm event.
Quantum computing-based video alert system
A quantum computing based video alert system converts captured video and audio signals, in real time, into a sequence of video qubits and a sequence of audio qubits. An entanglement score is generated based on a comparison of the video qubits to historical video qubits that are verified to show malicious activity. A second entanglement score is generated based on a comparison of the audio qubits to historical audio qubits that are verified to show malicious activity. A probability score is generated for each segment of the video qubit sequence and for each segment of the audio qubit sequence. If the probability score for the video qubit sequence, the audio qubit sequence, or a combination of probability scores for both the video qubit sequence and the audio qubit sequence meet a threshold, then an alert is generated to identify possible malicious activity at the location of a CCTV camera capturing the real-time data.
Quantum computing-based video alert system
A quantum computing based video alert system converts captured video and audio signals, in real time, into a sequence of video qubits and a sequence of audio qubits. An entanglement score is generated based on a comparison of the video qubits to historical video qubits that are verified to show malicious activity. A second entanglement score is generated based on a comparison of the audio qubits to historical audio qubits that are verified to show malicious activity. A probability score is generated for each segment of the video qubit sequence and for each segment of the audio qubit sequence. If the probability score for the video qubit sequence, the audio qubit sequence, or a combination of probability scores for both the video qubit sequence and the audio qubit sequence meet a threshold, then an alert is generated to identify possible malicious activity at the location of a CCTV camera capturing the real-time data.