G08B13/00

AN INTRUSION DETECTOR FOR A LORRY
20230066825 · 2023-03-02 ·

For various political, commercial and humanitarian reasons there is a desire to detect intrusion of stowaways into lorries and other freight vehicles. Many traditional intrusion detectors operate on the bases of detecting an increase in carbon dioxide within a space as indicator of presence of a human. A problem arises when the freight vehicle is carrying perishable goods such as fruits and vegetables which give off CO.sub.2 as they perish which makes it difficult to reliably attribute the cause of an elevation in CO.sub.2 concentration.

An embodiment of the invention overcomes this problem by detecting a sudden decrease in CO.sub.2 concentration within the freight vehicle from a concentration that is much elevated from a background atmospheric concentration of around 400 ppm. This sudden decrease can be attributed to opening of a door of a trailer allowing the escape of CO.sub.2 that has built up as the freight perishes.

System providing self-service access to locked merchandise
11631089 · 2023-04-18 · ·

A system providing self-service access to locked merchandise comprising: (a) providing a fixture that restricts access to the locked merchandise, wherein the fixture can automatically lock or unlock, allowing or restricting access to the locked merchandise; (b) providing a means of uniquely identifying an individual attempting to access the merchandise; (c) measuring a set of behaviors of the individual during any time the fixture is an open mode; (d) assessing whether the set of behaviors of the individual are suspicious or not relative to a set of suspicious event thresholds; (e) storing the individual and their set of behaviors as accessible records in at least one database; and (f) providing an algorithm which determines future access privileges of the individual to the enclosure based on a set of variables.

Invisible acoustic safe
11631307 · 2023-04-18 · ·

The present disclosure describes a system and method designed to protect the contents of a region or space within a facility (e.g., building, home, vehicle, outdoor space, etc.). The system is configured to identify an area to be protected (e.g., nightstand, medicine cabinet, safe), monitor surroundings, and manage and deploy response(s) to threats to the region or space under protection. The system may also be configured to provide incremental warnings, interventions, or countermeasures to deter people or animals from accessing the Protected Space.

Server-based notification of alarm event subsequent to communication failure with armed security system

A server-based environment for reporting a status of a security, monitoring and automation controller is provided. Detecting cessation of an always-on persistent network connection between the SMA controller and the server is also provided. Reporting the cessation of the network connection to an end user and defined others is further provided. A further aspect provides for automatically reporting an alarm event to a central station, the end user, and others, in the event the cessation of the network connection occurs while the SMA controller is aimed and after a zone fault event, and not receiving a disarm notification prior to expiration of a preset entry delay.

Server-based notification of alarm event subsequent to communication failure with armed security system

A server-based environment for reporting a status of a security, monitoring and automation controller is provided. Detecting cessation of an always-on persistent network connection between the SMA controller and the server is also provided. Reporting the cessation of the network connection to an end user and defined others is further provided. A further aspect provides for automatically reporting an alarm event to a central station, the end user, and others, in the event the cessation of the network connection occurs while the SMA controller is aimed and after a zone fault event, and not receiving a disarm notification prior to expiration of a preset entry delay.

Detecting tampering in assets and authenticating authorized users
11663889 · 2023-05-30 ·

In some implementations, a wireless sensing system may receive sensor data associated with an asset. The sensor data may be associated with a tampering event and the tampering event may include an action performed on the asset. The wireless sensing system may further determine whether the tampering event is performed by an authorized user of the wireless sensing system. The wireless sensing system may further determine whether the tampering event is performed within an authorized location of the wireless sensing system. The wireless sensing system may transmit a notification to a user of the wireless sensing system. The notification may alert the user of the wireless sensing system that the tampering event has occurred.

Detecting tampering in assets and authenticating authorized users
11663889 · 2023-05-30 ·

In some implementations, a wireless sensing system may receive sensor data associated with an asset. The sensor data may be associated with a tampering event and the tampering event may include an action performed on the asset. The wireless sensing system may further determine whether the tampering event is performed by an authorized user of the wireless sensing system. The wireless sensing system may further determine whether the tampering event is performed within an authorized location of the wireless sensing system. The wireless sensing system may transmit a notification to a user of the wireless sensing system. The notification may alert the user of the wireless sensing system that the tampering event has occurred.

Two-level LED security light with motion sensor
11657691 · 2023-05-23 · ·

A technology for configuring a lifestyle LED light with a tunable light color temperature is disclosed. The technology of tuning the light color temperature is made possible by blending two LED loads emitting light with different color temperatures thru a light diffuser with an arrangement that a first electric power delivered to a first LED load emitting light with a low color temperature and a second electric power delivered to a second LED load emitting light with a high color temperature are reversely and complementarily adjusted for tuning a diffused light color temperature such that a total light intensity generated by the LED light is kept essentially unchanged.

Integrated security system with parallel processing architecture

An integrated security system that includes a security coprocessor coupled to a conventional security system panel and an interactive security system. The integrated security system enables conventional security system features as well as the consumer-oriented interactive features and functions of an interactive security system without sacrificing reliability or the significant burden and cost associated with frequent software updates associated with conventional security systems. The integrated security system also minimizes or eliminates the need for new battery backup circuitry or larger batteries.

Integrated security system with parallel processing architecture

An integrated security system that includes a security coprocessor coupled to a conventional security system panel and an interactive security system. The integrated security system enables conventional security system features as well as the consumer-oriented interactive features and functions of an interactive security system without sacrificing reliability or the significant burden and cost associated with frequent software updates associated with conventional security systems. The integrated security system also minimizes or eliminates the need for new battery backup circuitry or larger batteries.