Patent classifications
G08B29/00
Secure transport container
A transport container for secure transport of packages. In one embodiment, the transport container includes a body, a cover, a cover lock, a locking bar, and an electronic controller. The cover is coupled to the body. The cover is movable from a closed state covering the opening to an open state. The cover lock is configured to engage the cover and keep the cover in the closed state. The locking bar is coupled to the base. The locking bar is configured for attachment to anchor points. The electronic controller is electrically coupled to the cover lock and to the locking bar. The electronic controller is configured to adjust the cover lock between a locked state and an unlocked state. The electronic controller is also configured to adjust the locking bar between the locked state and the unlocked state.
Realistic training scenario simulations and simulation techniques
In one embodiment, a system includes a signal generator operatively coupleable to one or more detectors; and a controller, the controller being both operably coupled to the signal generator and configured to cause the signal generator to: generate one or more signals each signal being representative of at least one emergency event; and communicate one or more of the generated signal(s) to a detector to which the signal generator is operably coupled. In another embodiment, a method includes: receiving data corresponding to one or more emergency events; generating at least one signal based on the data; and communicating the generated signal(s) to a detector.
Controller doorbell circuit and methods of converting a standard doorbell circuit to a controller doorbell circuit
A controller doorbell circuit includes a first terminal of a button wired to a first terminal of a transformer, a second terminal of the transformer wired to an input transformer terminal of a controller wired to a battery power source and coupled in signal communication to a mobile device, a transformer terminal of a signaling device wired to an output transformer terminal of the controller, and a second terminal of the button and an alarm terminal of the signaling device wired to an alarm terminal of the controller. The controller opens disabling the controller doorbell circuit disabling the signaling device from sounding an alarm when the button is pressed, in response to a first signal from the mobile device. The controller closes enabling the controller doorbell circuit enabling the signaling device to sound the alarm when the button is pressed, in response to a second signal from the mobile device.
Systems and Methods for Monitoring Altitude Sensing Beacons
Various embodiments of the present inventions are related to monitoring physical location of a monitored target, but not limited to, use of beacon location information.
Method for preventing security breaches of a passive remove keyless entry system
The present invention relates to a method for preventing security breaches of a passive remote keyless entry system for authorizing access to a vehicle. The passive remote keyless entry system comprises a base station located at the vehicle and a mobile device, in particular a remote key, wherein the base station comprises a first processor unit and a first transceiver unit, the first transceiver unit comprises a timing device, the mobile device comprises a second processor unit and a second transceiver unit, an air travel time T of a single message sent back and forth from the base station to the mobile device is measured, and access to the vehicle is granted depending on the measured air travel time T.
METHOD FOR VERIFYING POSITIONS OF A PLURALITY OF MONITORING DEVICES
A method for verifying positions of a plurality of monitoring devices includes selecting a second monitoring device by a first monitoring device. A first number of monitoring devices out of the plurality of monitoring devices is supervised, the plurality of monitoring devices being positioned such that each monitoring device of the plurality of monitoring devices can be monitored by at least one other monitoring device of the plurality of monitoring devices. Correct positions of the plurality of monitoring devices have been determined and stored prior to verification, and security information for secure communication has been exchanged between two of the plurality of monitoring devices for all of the plurality of monitoring devices.
ABERRATION ENGINE
An aberration engine that collects data sensed by a monitoring system that monitors a property of a user and aggregates the collected data over a period of a time. The aberration engine detects, within the aggregated data, patterns of recurring events and, based on detecting the patterns of recurring events within the aggregated data, takes action related to the monitoring system based on the detected patterns of recurring events within the aggregated data.
ABERRATION ENGINE
An aberration engine that collects data sensed by a monitoring system that monitors a property of a user and aggregates the collected data over a period of a time. The aberration engine detects, within the aggregated data, patterns of recurring events and, based on detecting the patterns of recurring events within the aggregated data, takes action related to the monitoring system based on the detected patterns of recurring events within the aggregated data.
Biometric data apparatus
The present disclosure provides a cover for an electronic device and a biometric data apparatus for communication with an electronic device, wherein the biometric data apparatus comprises: a body; and a biometric data input element formed on the body; wherein at least part of the body is configured such that the biometric data apparatus may be releasably coupled to the electronic device when the cover for the electronic device is fitted to the electronic device.
Physical and logical threat analysis in access control systems using BIM
An apparatus including a building information model (BIM) of a secured area having a plurality of different portions, the BIM embodied in a memory, a processor that identifies portions of the secured area having different levels of security and a processor that alerts a user of a security weakness based upon an interaction between the security levels and physical characteristics of the secured area defined by the BIM.