Patent classifications
G08B13/02
Controlling operational state of a sensor device for break-in detection
A method is provided for controlling an operational state of a sensor device for break-in detection. The method is performed in the sensor device and comprises the steps of: determining, while in a low-power state, that a wake-up condition is true when a vibration measurement associated with a barrier is greater than a wake-up threshold; transitioning, when the wake-up condition is true, to an active state; determining, while in the active state, when an activity condition is true, the activity condition being based on vibration measurements associated with the barrier; increasing the wake-up threshold, and transitioning to the low-power state when the activity condition is not determined to be true within a first duration while in the active state; and decreasing the wake-up threshold, when the sensor device stays in the low-power state longer than a second duration.
Security tag holder and assembly for use with package having curved surfaces
A security tag holder including a flexible attachment member and a holder body is provided. The holder body defines a central cavity for holding a security tag. The holder body includes a pair of angled wings on opposed ends of the holder body. The angled wings are oriented to cooperate with the non-flat outer periphery of a product. The angled wings extend rearward of a back of the holder body. The holder body includes a rear opening in the back thereof for extension of a push button therethrough. A security tag assembly including the security tag is provided.
Security tag holder and assembly for use with package having curved surfaces
A security tag holder including a flexible attachment member and a holder body is provided. The holder body defines a central cavity for holding a security tag. The holder body includes a pair of angled wings on opposed ends of the holder body. The angled wings are oriented to cooperate with the non-flat outer periphery of a product. The angled wings extend rearward of a back of the holder body. The holder body includes a rear opening in the back thereof for extension of a push button therethrough. A security tag assembly including the security tag is provided.
EMERGENCY DOORBELL COMMUNICATOR
Systems, apparatuses, and methods relating to security and/or automation systems are described. In one embodiment, a method may include determining an emergency condition at a structure, detecting a user such as an emergency responder at a boundary of the structure, determining a characteristic of the user at the boundary, and communicating information to the user at the boundary based at least in part on the determined emergency condition and the determined user characteristic. In some cases, this communication may include visual or audio information relating to the emergency condition, including a type of emergency condition, a location of an injured person, or a location related to the structure or the emergency itself, among other things.
Network jamming detection and remediation
Methods and systems for remediation of jammed networks are provided. Exemplary methods include determining by a base unit of a jammed network and if outside connectivity available. The connectivity can include wired and wireless broadband networks. If connectivity is available, at least one external service is notified. Further, a user device can be notified. A local alert can be generated in the form of a phone call or test message. Also, a local action can be taken. Information associated with the jammed network is stored for later delivery if connectivity is not available where the base unit is located in a residence. Further, an alert can be issued in response to the detected network jamming, the alert being at least one of: sounding an audible alarm, showing a visual alarm indication, communicating with law enforcement, and communicating with an alarm monitoring station.
Network jamming detection and remediation
Methods and systems for remediation of jammed networks are provided. Exemplary methods include determining by a base unit of a jammed network and if outside connectivity available. The connectivity can include wired and wireless broadband networks. If connectivity is available, at least one external service is notified. Further, a user device can be notified. A local alert can be generated in the form of a phone call or test message. Also, a local action can be taken. Information associated with the jammed network is stored for later delivery if connectivity is not available where the base unit is located in a residence. Further, an alert can be issued in response to the detected network jamming, the alert being at least one of: sounding an audible alarm, showing a visual alarm indication, communicating with law enforcement, and communicating with an alarm monitoring station.
Expandable security system
A computer-implemented method includes receiving, by a base station of a first security system, an identification of a portable security system. The method further includes adding, by the base station, the portable security system as a sensor to a plurality of sensors monitored by the first security system. The method further includes configuring, by the base station, the portable security system in protect-mode, wherein the portable security system sounds an alarm in response to a sensor from the second system indicating a security-breach. The method further includes in response to the alarm from the portable security system, generating, by the base station, an alarm event of the first security system.
Expandable security system
A computer-implemented method includes receiving, by a base station of a first security system, an identification of a portable security system. The method further includes adding, by the base station, the portable security system as a sensor to a plurality of sensors monitored by the first security system. The method further includes configuring, by the base station, the portable security system in protect-mode, wherein the portable security system sounds an alarm in response to a sensor from the second system indicating a security-breach. The method further includes in response to the alarm from the portable security system, generating, by the base station, an alarm event of the first security system.
ALARM DEVICE
Proposed invention is an alarm device for protecting various type of locks of premises, buildings, apartments, rooms, vehicles, safes, money terminals and for other objects by means of timely, more early informing, interaction with alarm system or digital-electronic device of persons observing protected object in result of attempts of burglary, unauthorized opening, damaging or even preliminary studying the lock by attacker.
ALARM DEVICE
Proposed invention is an alarm device for protecting various type of locks of premises, buildings, apartments, rooms, vehicles, safes, money terminals and for other objects by means of timely, more early informing, interaction with alarm system or digital-electronic device of persons observing protected object in result of attempts of burglary, unauthorized opening, damaging or even preliminary studying the lock by attacker.