Patent classifications
G08B19/00
Visual indication of data center conditions
In one embodiment, an apparatus is disclosed that includes one or more device interfaces, a processor coupled to the one or more device interfaces and configured to execute a process, and a memory configured to store the process executable by the processor. The process when executed is operable to receive condition data regarding a measured condition of a zone of a data center. The process when executed is also operable to determine a visual effect for a portion of a light strip based on the condition data. The portion of the light strip is associated with the zone and is located in the zone. The process when executed is further operable to control the portion of the light strip to display the determined visual effect.
Systems and methods for building water-leak detection and alert
Aspects include a water-leak-detection and -monitoring system for a building including a first area, comprising a memory, a communication interface configured to be communicatively coupled to a water-flow sensor coupled to a pipe in the first area, at least one of a humidity sensor, a temperature sensor, or a liquid-water sensor configured to sense information indicative of a presence of water in the first area, and an analytical engine in communication with a base unit, the memory, the communication interface, and the at least one of the humidity sensor, the temperature sensor, or the liquid-water sensor, the analytical engine being configured to determine whether a leak is present in the building based on data from the water-flow sensor, and determine, responsive to determining that the leak is present, if the leak is in the first area based on the information indicative of the presence of water in the first area.
Home automation sound detection and positioning
Systems, methods, devices, non-transitory computer-readable mediums, and apparatuses are presented for detecting and positioning sound in a home automation system. Indications of sounds and timestamps may be received from various home automation devices. Using the received indications, a sound magnitude for the sound and whether the sound originated inside or outside of the structure can be determined. The sound magnitude may be compared to an inside sound threshold level if the sound was determined to originate inside the structure or compared to an outside sound threshold level if the sound was determined to originate outside the structure. Sound information corresponding to the sound may be logged if the sound was determined to originate inside and the sound magnitude exceeds the inside sound threshold level or the sound was determined to originate outside and the sound magnitude exceeds the outside sound threshold level.
Methods for monitoring security
Methods are disclosed that, in some aspects, provide detecting an alarm event, determining whether the alarm event is a deviation from predefined criteria, and transmitting an alert notification to users of the security system if the alarm event is a deviation from the predefined criteria. The predefined criteria may relate to the location or type of one or more sensors of the security system, the location of users of the security system, the time of day, activities within the premises, and/or behavioral patterns of the users learned by the security system. Information transmitted in the alert notification may relate to the location of one or more users of the security system, the data recorded by one or more sensors of the security system, the state of alert of the security system, and/or confidential information required to terminate the alarm event.
Methods for monitoring security
Methods are disclosed that, in some aspects, provide detecting an alarm event, determining whether the alarm event is a deviation from predefined criteria, and transmitting an alert notification to users of the security system if the alarm event is a deviation from the predefined criteria. The predefined criteria may relate to the location or type of one or more sensors of the security system, the location of users of the security system, the time of day, activities within the premises, and/or behavioral patterns of the users learned by the security system. Information transmitted in the alert notification may relate to the location of one or more users of the security system, the data recorded by one or more sensors of the security system, the state of alert of the security system, and/or confidential information required to terminate the alarm event.
System and method for automatically disarming an intrusion detection system
A system for automatically disarming an intrusion detection system, the intrusion detection system protecting a premises and having an armed state and a disarmed state of operation, including an intrusion detection system state of operation ascertainer operable, responsive to receiving an indication of detection of an intrusion, for ascertaining whether the intrusion detection system is in the armed state; a registered mobile communicator proximity detector communicating with the intrusion detection system state of operation ascertainer and operable, responsive to ascertaining that the intrusion detection system is in the armed state of operation, for ascertaining whether at least registered mobile communicator is in a vicinity of the premises; and an automatic intrusion detection system disarmer communicating with the registered mobile communicator proximity detector and operable, responsive to the ascertaining that at least one registered mobile communicator is in the vicinity of the premises, for automatically disarming the intrusion detection system.
Safety automation system
A safety automation system for an occupiable structure includes a computing management system including a computer processor, and a computer readable storage medium configured to run embedded software and cloud server software. A fire detection device of the automation system is adapted to detect a fire condition and output an associated fire condition detected signal to the computing management system. A condition deterrence device is configured to accept a wireless command signal from the computing management system associated with the fire condition detected signal and for actuating an appliance to at least reduce risk presented by the condition.
Evacuation system
A method for monitoring devices based at least in part on detected conditions includes accumulating, by one or more sensory nodes, sensed information in an area that includes a controllable device. The method also includes analyzing the sensed information to identify historical information regarding the area that includes the controllable device. The method also includes sensing a condition within the area by the one or more sensory nodes. The method also includes determining, based at least in part on the sensed condition and at least in part on the historical information, that the sensed condition relates to the controllable device. The method further includes generating, responsive to said determining, an alert regarding the controllable device.
Evacuation system
A method for monitoring devices based at least in part on detected conditions includes accumulating, by one or more sensory nodes, sensed information in an area that includes a controllable device. The method also includes analyzing the sensed information to identify historical information regarding the area that includes the controllable device. The method also includes sensing a condition within the area by the one or more sensory nodes. The method also includes determining, based at least in part on the sensed condition and at least in part on the historical information, that the sensed condition relates to the controllable device. The method further includes generating, responsive to said determining, an alert regarding the controllable device.
Apparatus, Systems and Methods For Providing Alarm and Sensor Data To Emergency Networks
A disclosed method includes: receiving an alarm notification; determining that there is a verification for the alarm notification such that the alarm notification is not a false alarm; and pushing the alarm notification to an emergency network entity along with an indication that the alarm has been verified in response to determining that there is a verification. Another disclosed method includes monitoring an emergency queue at an emergency network entity for incoming queue entries from an emergency data manager; determining correlations for the incoming queue entries based on data associated with each incoming queue entry; and generating a link for each correlated queue entry linking each correlated queue entry to a primary queue entry in response to determining correlations.