Patent classifications
G08B29/00
Adaptive BLE and UWB based connection rate control for mobile access devices of vehicular passive access systems
A mobile access device includes a transceiver and a control module. The transceiver transmits and receives ultra-wideband signals including a first challenge signal. The control module: transmits via the transceiver the first challenge signal to a vehicle, where the first challenge signal is associated with a passive entry or a passive start operation of the vehicle, based on the first challenge signal, receive a response signal from the vehicle, determine a distance between the mobile access device and the vehicle based on the response signal, determine a wait period based on the distance, wait a minimum period, where the minimum period is a minimum of (i) the wait period and (ii) an advertisement period or a predetermined ranging period, and subsequent to waiting the minimum period, transmit a second challenge signal to the vehicle to update the distance between the mobile access device and the vehicle.
Mission critical signaling failover in cloud computing ecosystem
Methods and systems, including computer programs encoded on computer storage media, for reducing the likelihood of signaling failover in an alarm system, the method including identifying alarm events detected at monitored properties by monitoring systems that are located at the monitored properties; tracking the ability of a primary application infrastructure to transmit, to a central monitoring station server, the alarm events; detecting disruption in the ability of the primary application infrastructure to transmit the alarm events to the central monitoring station server; based on the detected disruption, enabling a signal transmission switch that switches a path for alarm events from the primary application infrastructure to a secondary application infrastructure, the secondary application infrastructure being an infrastructure operated by a cloud service provider; and based on enablement of the transmission switch, transmitting, by the secondary application infrastructure, at least one alarm event to the central monitoring station server.
Method for identity verification, consumable box and storage medium
A method for identity verification, a consumable box and a storage medium are provided. The method includes a first key verification and a second key verification. The second key verification includes: receiving, by a consumable chip, a reading instruction for serial number reading; sending, by the consumable chip, a first serial number based on the reading instruction; sending, by the consumable chip, a first status code in response to a first verification code, wherein the first verification code is obtained based on the first serial number; receiving again, by the consumable chip, the reading instruction for serial number reading; and sending, by the consumable chip, a second serial number based on the reading instruction, and completing, the identity verification based on the second serial number.
Firearm authentication and tracking system
A system and method for managing one or more firearms having an authentication device is described. The method may receive a profile of one or more firearm users. The profile of the one or more firearm users may be registered to access one or more authentication devices coupled to one or more firearms. A usage of the one or more firearms coupled to the authentication devices may be tracked via the profile of the firearm user. The system can include a central server, a secure management station with a secure application, a docking station, a respective firearm lock or authentication device for each firearm and an enrollment station, each communicating in a secure manner, to globally manage a plurality of firearms.
Devices, systems, and methods for monitoring controlled spaces for transitory uses
The invention includes electronic monitoring-device for monitoring controlled spaces, as well as systems and methods for such monitoring. The monitoring-devices may be battery powered devices, with various sensors and capable of wireless communications. Installation of the monitoring-device may not require any wiring. These monitoring-devices may be installed at a given controlled space to monitor that given controlled space and to electronically communicate occurrences of that given controlled space to various interested stakeholders, such as, but not limited to, a tenant of the given controlled space, facility operators of the given controlled space, the provider of the electronic monitoring-device, and/or third-parties (e.g., insurance companies, first responders, and/or law enforcement). The monitoring-device may provide details, information, alerts, reminders, notices, notifications, alarms, and/or the like to various authorized stakeholders of the occurrences within that given controlled space. One example of a controlled space is a self-storage unit.
Information handling system with consolidated external user presence detection
An information handling system includes a host device and multiple monitor devices. One of the monitor devices is configured as a parent monitor device, and the remaining monitor devices are configured as child monitor devices. The parent monitor device receives a user presence detect (UPD) status signal, and queries all of the child monitor devices for a current UPD status. In response to the queries, the parent monitor consolidates the current UPD status from each of the child monitor devices and the current UPD status of the parent monitor device. Based on the consolidated current UPD status and based on a UPD policy, the parent monitor device sets a current user status as a user absence or presence. In response to the processor being in a low power state and the current user status being the user presence, the patent monitor device provides a wake notification to the host device.
Information handling system with consolidated external user presence detection
An information handling system includes a host device and multiple monitor devices. One of the monitor devices is configured as a parent monitor device, and the remaining monitor devices are configured as child monitor devices. The parent monitor device receives a user presence detect (UPD) status signal, and queries all of the child monitor devices for a current UPD status. In response to the queries, the parent monitor consolidates the current UPD status from each of the child monitor devices and the current UPD status of the parent monitor device. Based on the consolidated current UPD status and based on a UPD policy, the parent monitor device sets a current user status as a user absence or presence. In response to the processor being in a low power state and the current user status being the user presence, the patent monitor device provides a wake notification to the host device.
Aberration engine
An aberration engine that collects data sensed by a monitoring system that monitors a property of a user and aggregates the collected data over a period of a time. The aberration engine detects, within the aggregated data, patterns of recurring events and, based on detecting the patterns of recurring events within the aggregated data, takes action related to the monitoring system based on the detected patterns of recurring events within the aggregated data.
Aberration engine
An aberration engine that collects data sensed by a monitoring system that monitors a property of a user and aggregates the collected data over a period of a time. The aberration engine detects, within the aggregated data, patterns of recurring events and, based on detecting the patterns of recurring events within the aggregated data, takes action related to the monitoring system based on the detected patterns of recurring events within the aggregated data.
Assurance services system and method
A security assurance system for a building including one or more security assets includes one or more memory devices having instructions stored thereon that, when executed by one or more processors, cause the one or more processors to perform operations including receiving first data indicating a layout of the building, receiving second data indicating a location of the one or more security assets within the building, generating location data for the one or more security assets indicating the location of the one or more security assets within the layout of the building, monitoring a status including at least one of a health, a service status, or a regulatory compliance of the one or more security assets, and presenting, via a user interface, the location data of the one or more security assets.