G08B29/00

Method and apparatus for environmental sensing
11665024 · 2023-05-30 · ·

A method for verifying an alarm condition in an environmental sensing system includes monitoring data received from environmental sensors; detecting anomalous data received from one of the plurality of environmental sensors; determining the context in which the anomalous data was acquired is consistent with typical usage activities; and providing an alarm condition alert when the determined context is not consistent with typical activities. A system for intelligently monitoring environmental conditions includes environmental sensors configured to monitor first and second environmental conditions and to communicate with an intelligent analysis module. The intelligent analysis module is configured with logic to determine whether anomalous data has been collected by the environmental sensors, to determine the context in which the anomalous data was collected, to determine whether the anomalous data can be attributed to a routine activity, and to provide an alarm condition if the anomalous data cannot be attributed to a routine activity.

Dynamic partition of a security system
11626010 · 2023-04-11 · ·

A method for dynamically partitioning a security system is described. A security system identifies sensors registered with the security system. The security system then identifies a first partition attribute of a first group of sensors of the sensors. The first partition attribute indicates a primary partition of the security system. The security system then identifies a second partition attribute of a second group of sensors of the sensors. The second partition attribute indicates a secondary partition of the security system. The security system forms a dynamic partition of the security system based on a combination of the first and second partition attributes.

Personal monitoring device with multi-filament tamper strap
11468752 · 2022-10-11 · ·

A clip is provided. The clip includes first and second shells shaped to mate around a band. An inward facing surface of the first shell has a lateral groove shaped to accommodate the fiber optic filament of the band and at least one protrusion. When the first and second shells are mated around the band the at least one protrusion passes through one of the holes in the band and engages a matching groove in an inward facing surface of the second shell. The first and second shells have a shape such that, when the first shell and the second shell mate around the band and lock into the connector, the first shell and the second shell collectively block any exterior light from reaching the light detection circuitry of the connector along the path of the band other than light through the fiber optic filament.

SAFETY SYSTEM AND METHOD FOR VEHICLES AND VEHICLE USERS

The present invention relates to security systems and methods for vehicles and/or vehicle users that prevent the theft of vehicles, and/or that guarantee the security of the vehicle user. In order to achieve the above, the system of the present invention has an enabling system that controls the ignition of the vehicle, and/or a device for helmets intended for the monitoring of the security of the user, and makes it possible to determine, for example, whether the user is wearing the helmet and is using the same correctly, or whether the vehicle user has suffered an impact. Specifically, the system of the present invention has an interactive system (mobile device) associated with the user which, depending on the need, signals the enabling system to enable the vehicle ignition, provided that at least one condition is fulfilled, where a condition may be that the interactive system is close to the enabling system and/or emits an alert message to the external device of a third party if any novelty is detected in the helmet device.

Method and system for monitoring an alarm system
09852611 · 2017-12-26 · ·

The problem of the vulnerability of an alarm system when its communication with an alarm central is lost or nonexistent is solved by maintaining a monitoring channel with the alarm system. A server establishes and maintains the communication channel with the alarm system via an interface module connected to the alarm system, and if the alarm system is unable to communicate with an alarm central receiver, or if the first communication channel is closed, then the server connects to one or both of the alarm central receiver and a user's phone, so as to communicate a message thereto indicative of a breach or failure of the alarm system. The alarm system is connected to the alarm central through the monitoring server which then acts as a gateway.

Method and monitoring centre for monitoring occurrence of an event

A method and monitoring center for monitoring occurrence of events in a monitored area, where a monitoring equipment displays information that reflects sensor data reported from sensors in the monitored area. When the monitoring center detects an abnormal event, it identifies a set of sensors which are potentially impacted by the event, and triggers the sensors to enter a vigilance state of elevated operation and to deliver enhanced sensor data. Further, a representation of the abnormal event is auto-zoomed on the monitoring equipment based on the enhanced sensor data from the sensors to increase resolution of the displayed representation.

System and method for alarm signaling during alarm system destruction

A system and method provide for the immediate transmission of a potential alarm to a remote alarm signal escrow site and from the escrow site to a host station in the event where a control panel or an alarm signaling device is tampered with or destroyed by a disablement tactic, e.g., a “crash and smash intrusion.” A system and method may also send an alarm signal during such an attack by using predictive analysis of real-time events.

System and method for alarm signaling during alarm system destruction

A system and method provide for the immediate transmission of a potential alarm to a remote alarm signal escrow site and from the escrow site to a host station in the event where a control panel or an alarm signaling device is tampered with or destroyed by a disablement tactic, e.g., a “crash and smash intrusion.” A system and method may also send an alarm signal during such an attack by using predictive analysis of real-time events.

Devices, systems, and methods for monitoring controlled spaces for transitory uses

The invention includes electronic monitoring-device for monitoring controlled spaces, as well as systems and methods for such monitoring. The monitoring-devices may be battery powered devices, with various sensors and capable of wireless communications. Installation of the monitoring-device may not require any wiring. These monitoring-devices may be installed at a given controlled space to monitor that given controlled space and to electronically communicate occurrences of that given controlled space to various interested stakeholders, such as, but not limited to, a tenant of the given controlled space, facility operators of the given controlled space, the provider of the electronic monitoring-device, and/or third-parties (e.g., insurance companies, first responders, and/or law enforcement). The monitoring-device may provide details, information, alerts, reminders, notices, notifications, alarms, and/or the like to various authorized stakeholders of the occurrences within that given controlled space. One example of a controlled space is a self-storage unit.

Smoke detector test device
09842487 · 2017-12-12 ·

A device for testing smoke detectors comprises a barrel, an end-piece coupled to one end of the barrel and which is capable of covering at least a sensing area of a smoke detector, and a device body coupled to the opposite end of the barrel and which is capable of carrying a pressurized dispensing container having a smoke-simulating substance.