Patent classifications
G08B13/00
Intrusion detectors for lorries
According to an aspect of intrusion detectors for lorries, there is provided a method of detecting intrusion of one or more persons into cargo hold of a vehicle carrying goods that emit carbon dioxide the method comprising identifying an intrusion event by detecting a decrease in concentration of carbon dioxide within the cargo hold. For example, the intrusion evident may be identified by detecting a decrease in concentration of carbon dioxide within the cargo hold of at least 400 ppm. A decrease in CO.sub.2 can be attributed to unauthorised access being made into the cargo hold as cargo holds typically remain closed during a journey.
METHOD AND SYSTEM FOR DETERMINATION OF FALSE ALARM
A system and method for determining a false alarm includes receiving a provisional alarm signal from a safety alarm system, the provisional alarm signal indicating an alarm type. At least one sensor senses at least one present condition of a type corresponding to the alarm type indicated by the provisional alarm signal. A normal alarm signal is transmitted based on the at least one present condition sensed by the sensor.
Method of implementing GPS based extended chime and special escort mode in security panel
A system is provided that includes a security system that protects a secured geographic area, a geographic location outside of the secured area of an authorized human user of the security system saved in a memory of the security system, and a processor of the security system that tracks activity of the authorized user by geographic location outside of the secured area and generates an alert upon detecting that a difference between the tracked geographic location of the authorized user and saved location exceeds a threshold value.
Method of implementing GPS based extended chime and special escort mode in security panel
A system is provided that includes a security system that protects a secured geographic area, a geographic location outside of the secured area of an authorized human user of the security system saved in a memory of the security system, and a processor of the security system that tracks activity of the authorized user by geographic location outside of the secured area and generates an alert upon detecting that a difference between the tracked geographic location of the authorized user and saved location exceeds a threshold value.
Devices, systems, and methods for monitoring controlled spaces for transitory uses
The invention includes electronic monitoring-device for monitoring controlled spaces, as well as systems and methods for such monitoring. The monitoring-devices may be battery powered devices, with various sensors and capable of wireless communications. Installation of the monitoring-device may not require any wiring. These monitoring-devices may be installed at a given controlled space to monitor that given controlled space and to electronically communicate occurrences of that given controlled space to various interested stakeholders, such as, but not limited to, a tenant of the given controlled space, facility operators of the given controlled space, the provider of the electronic monitoring-device, and/or third-parties (e.g., insurance companies, first responders, and/or law enforcement). The monitoring-device may provide details, information, alerts, reminders, notices, notifications, alarms, and/or the like to various authorized stakeholders of the occurrences within that given controlled space. One example of a controlled space is a self-storage unit.
CUSTOM CONTENT FOR PREMISES MANAGEMENT
Methods and systems for managing a premises are described. A premises or devices at a premises may be associated with one or more premises zones. The one or more premises zones may be associated with corresponding content. If data is received from a device associated with a particular premises zone, then the content may be output. The content may be used to notify a user of an event, state change, or other indication associated with the particular premises zone.
CUSTOM CONTENT FOR PREMISES MANAGEMENT
Methods and systems for managing a premises are described. A premises or devices at a premises may be associated with one or more premises zones. The one or more premises zones may be associated with corresponding content. If data is received from a device associated with a particular premises zone, then the content may be output. The content may be used to notify a user of an event, state change, or other indication associated with the particular premises zone.
Realtime, location-based cell phone enhancements, uses, and applications
Enhancements of and to cell phone operations are based in whole or in part on determining the location of the cell phone. Systems and methods select and determine locations or areas of importance or relevance, and based on that information and other programmed factors affect or alter the operations of the cell phone. While the systems and methods are illustrated by use of cell phone embodiments and applications, they are equally applicable to virtually any portable or mobile communication device, including for example, wireless laptop computers and PDAs.
Realtime, location-based cell phone enhancements, uses, and applications
Enhancements of and to cell phone operations are based in whole or in part on determining the location of the cell phone. Systems and methods select and determine locations or areas of importance or relevance, and based on that information and other programmed factors affect or alter the operations of the cell phone. While the systems and methods are illustrated by use of cell phone embodiments and applications, they are equally applicable to virtually any portable or mobile communication device, including for example, wireless laptop computers and PDAs.
Data-secure sensor system
In some embodiments, a data-secure sensor system includes one or more processors configured to receive sensor data (e.g., image data, audio data, etc.) and generate descriptive data based on the sensor data that corresponds to a physical area that corresponds to information about identified objects or activity in physical area, an input/output (I/O) port, and an I/O choke communicatively coupled between the one or more processors and the I/O port, the I/O choke configured to limit a communication bandwidth of the I/O port to a maximum data rate. The one or more processors can be configured to prevent the sensor data from being accessible via any external port of the data-secure camera system, including the I/O port, and allow the descriptive data to be accessible via the I/O port.