G08B29/00

System and method for alarm signaling during alarm system destruction

A system and method provide for the immediate transmission of a potential alarm to a remote alarm signal escrow site and from the escrow site to a host station in the event where a control panel or an alarm signaling device is tampered with or destroyed by a disablement tactic, e.g., a “crash and smash intrusion.” A system and method may also send an alarm signal during such an attack by using predictive analysis of real-time events.

System and method for alarm signaling during alarm system destruction

A system and method provide for the immediate transmission of a potential alarm to a remote alarm signal escrow site and from the escrow site to a host station in the event where a control panel or an alarm signaling device is tampered with or destroyed by a disablement tactic, e.g., a “crash and smash intrusion.” A system and method may also send an alarm signal during such an attack by using predictive analysis of real-time events.

Device and method for biometric authentication
09792420 · 2017-10-17 · ·

A biometric authentication device includes: a storage unit to store a first enrolled template and first information including a parameter representing an input environment of the first enrolled template; a receiving unit to receive biometric information from the terminal device, a second enrolled template stored in the terminal device, and second information including a parameter representing an input environment of the second enrolled template; an authentication unit to perform authentication by matching the received biometric information and the first enrolled template; a selecting unit to select the first enrolled template or the second enrolled template, based on the first and second information, when the biometric information is accepted; and an updating unit to update the first enrolled template stored in the storage unit to the second enrolled template when the second enrolled template is selected.

Emergency lighting fixture with remote control

A processing unit in a dual-mode lighting fixture receives, via a light pipe of the lighting fixture, a test command signal from a remote control and initiates, based on the test command signal, testing for emergency condition lighting of the lighting fixture. The processing unit receives, via the light pipe, a control command signal from the remote control and controls, based on the control command signal, normal condition lighting of the lighting fixture. The processing unit also monitors feedback loops from a battery, a charger, or a set of LED lamps in the lighting fixture and presents, via the light pipe, a status color indication based on the monitored feedback.

Antenna diversity implementation for wireless locks

An electronic lock system including an access control device configured to provide system instructions, an interface module electrically coupled to the access control device and configured to transmit RF signals in response to system instructions received from the access control device, and a plurality of wireless electronic door locks each configured to wirelessly communicate with the interface module. Each of the wireless electronic door locks includes a controller and a wireless receiver operatively connected to the controller, the wireless receiver including a first antenna defined as a circuit board trace and a second antenna, spaced from the first antenna and defined as a circuit board trace. Each of the first antenna and the second antenna include one of a monopole antenna and a fractal antenna. The controller is configured to switch between the first antenna and the second antenna to receive a wireless signal having a greater signal strength.

Systems and methods for managing smart alarms

A method of analyzing events for an electrical system includes: receiving event stream(s) of events occurring in the electrical system, the events being identified from captured energy-related signals in the system; analyzing, an event stream(s) of the events to identify different actionable triggers therefrom, the different triggers including a scenario in which a group of events satisfies one or more predetermined triggering conditions; analyzing, over time, the different actionable triggers to identify a combination of occurring and/or non-occurring actionable triggers which satisfies a predefined trigger combination condition and an analysis time constraint; and in response to the observation of the combination, taking one or more actions to address the events. The analysis time constraint can be a time period duration and/or sequence within which time-stamped data of events in the event stream(s) and the associated actionable triggers are considered or not considered in the analysis to identify the combination.

Configuration of security devices using spatially-encoded optical machine-readable indicia

A method and system for configuring security devices on a security network. A mobile computing device reads spatially-encoded optical machine-readable indicia, decodes the indicia, and extracts encoded configuration information for the security devices. The configuration information from the indicia is then transmitted to a monitoring station, which uses the configuration information to configure communication with the security devices on the security network.

Detecting destruction of an automation system component
09786156 · 2017-10-10 · ·

A control panel is used to monitor events within a security system or other automation system. In the event an intruder enters a physical location, the intruder may attempt to damage the control panel to disrupt its operation. One or more sensors of the control panel may detect disruption in the operation of the control panel. Example sensors may detect an impact force, sudden acceleration, removal from a mounted location, or disruption of communication with an input/output element, such as a display device. When an event is detected at the control panel itself, the control panel can send a signal to a remote service provider, and the remote service provider can follow-up with the customer. The control panel and/or remote service provider may also determine when the control panel loses partial or complete power loss to identify the disruption as a potential crash-and-smash entry.

System-based control of programmable devices

A requirement exists for machine-to-machine communications between the multiple Smart Devices and Networks (SDNs) a user has without in today's environment of ubiquitous electronically enabled devices, sub-systems, systems, and networks. For example, a user's SDNs may include a multitude of network-controllable devices and networked interfaced devices within an environment of wired and wireless networks and a security system. The combined data/knowledge of these multiple SDNs can be employed to trigger actions for one or more SDNs based upon the combined states of all the SDNs. However, rather than requiring users purchase and install new systems and devices remote cloud based analytics, rule engines, etc. are employed to provide many users with smart home or office automation.

Reducing nuisance notifications from a building automation system

Reducing nuisance notifications from building automation systems is described herein. One device includes a memory, and a processor configured to execute executable instructions stored in the memory to receive a notification of an alarm from a building automation system, compare attributes of the alarm to attributes of alarms included in a database of suppressed alarms, refrain from transmitting a notification of the alarm to a mobile device in response to the attributes of the alarm matching attributes of any of the alarms in the database, and transmit a notification of the alarm to a mobile device in response to the attributes of the alarm not matching the attributes of any of the alarms in the database.