G08B19/00

Security systems, apparatuses, methods, and integrated technologies involving the same
11242692 · 2022-02-08 · ·

This disclosure relates to systems, methods, and apparatuses for providing security at sites to protect against active shooter situations and other dangerous threats. In certain embodiments, a security system comprises one or more security boxes that are in communication with an electronic security platform. The security boxes house equipment that can be utilized by individuals to protect themselves against security threats and to secure their immediate location. The security boxes also include various electronic components that enable detecting security threats and communicating with the electronic security platform.

Cross-client sensor user interface in an integrated security network

An integrated system includes a system user interface (SUI) that provides an iconic, at-a-glance representation of integrated security system status. The SUI is for use across all client devices including mobile or cellular telephones, a mobile portal, a web portal, and a touchscreen device. The SUI includes a number of display elements presented across all types of client devices for monitoring status of the integrated security system. The display elements of the SUI include an orb icon, text summary, security button, device warnings, system warnings, interesting sensors, and quiet sensors. The SUI thus provides system status summary information agnostically across all clients. Additionally, the SUI provides consistent iconography, terminology, and display rules across all clients as well as consistent sensor and system detail across clients.

Smart monitoring system

Methods, systems, and devices for a smart monitoring system are described. A system may include a camera-enabled device configured to monitor a physical environment using the camera-enabled device. The system may detect a trigger in the physical environment based on the monitoring, where the trigger includes an object, a person, an event, or any combination thereof. The system may select, based on the detecting, a direction of a set of directions to emit light via a light emitting source. The system may activate the light emitting source based on the selecting. The system may emit, via the light emitting source, the light in the direction based on the activating and the detected trigger. The techniques described herein may deter an intruder from an intended action (e.g., theft, property damage, etc.) and/or provide lighting to a user of the security and automation system, among other benefits.

Electronic device system to display biometric feedback

Particular embodiments described herein provide for an electronic device, such as a wrist worn electronic device. One particular example implementation of the electronic device may include a main housing, a main display in the main housing, a wrist strap that allows the main housing to be secured to a user such that the main display is located on top of a wrist of the user, and a secondary display located on the wrist strap, where the secondary display communicates information to the user without the user having to turn the wrist.

System, Method and Apparatus for Sensor Activation
20220038796 · 2022-02-03 ·

A configured mode of operation of a wireless sensor node unit can selectively activate a first subset of sensor channels of data and selectively deactivate a second subset of sensor channels of data. The configured mode of operation customizes the sensor functionality in the wireless sensor node unit in support of the delivery of data streams to customers.

ELECTRONIC APPARATUS AND METHOD

According to one embodiment, a method executed by an electronic apparatus including storage configured to store device information including first position information indicating a position of a device installed in a particular range and risk information associated with use of the device is provided. The method includes receiving second position information indicating a position of a user wearing an eyeglasses-type wearable terminal and working within the particular range, from the eyeglasses-type wearable terminal and estimating a status of the user, based at least in part on the first position information and the risk information included in the device information, and the second position information.

ELECTRONIC APPARATUS AND METHOD

According to one embodiment, a method executed by an electronic apparatus including storage configured to store device information including first position information indicating a position of a device installed in a particular range and risk information associated with use of the device is provided. The method includes receiving second position information indicating a position of a user wearing an eyeglasses-type wearable terminal and working within the particular range, from the eyeglasses-type wearable terminal and estimating a status of the user, based at least in part on the first position information and the risk information included in the device information, and the second position information.

ALARM SYSTEM RESPONSE TIME REDUCTION
20170236404 · 2017-08-17 ·

An alarm system is monitored, by an alert system that supplements the capabilities of the alarm system. The sensors, such as door, window, fire, and CO sensor can be monitored by the alarm system which can raise an alarm when a sensor is triggered. The alert system detects that the alarm system has raised an alarm. The alert system can then communicate the alarm locally to other alert system installations. People at those other alert system installations are thereby alerted to the alarm and can respond to it.

Systems and methods for adaptive monitoring of a shipping container for an environmental anomaly

An adaptive method and system for monitoring a shipping container for an environmental anomaly uses sensor-based ID nodes within the container and a command node. Sensors on each ID node generate sensor data about an environmental condition proximate the ID node as disposed within the container. Each ID node periodically broadcasts the sensor data. The command node monitors a first group of sensor data from the ID nodes over a first time period to detect an initial environmental threshold condition related to the container, then monitors a subsequent group of sensor data over a second time period under a modified monitoring parameter to detect a secondary environmental threshold condition related to the container as the anomaly. In response to detecting the secondary condition, the command node generates an alert notification and transmits the alert notification to an external transceiver to initiate a mediation response related to the anomaly.

Accessing secure areas based on identification via personal device

Systems and methods for using proximity positioning systems to determine a location of a user, identify the user and provide additional services and/or functionality to the user based on the determined location and/or identity are presented. In some examples, a low-power radio signal emitted from a location beacon may be received or detected by a personal computing device. The location of the beacon, and the device detecting the signal, may be determined. The location information, as well as a unique identifier associated with the personal computing device, may be used to identify a user associated with the personal computing device and the location of the user. This information may be used to provide additional services and/or functionality to the user. For instance, the location and identity information may be used to provide the user with access to secure areas within a location.