Patent classifications
G08B13/22
SYSTEMS AND METHODS FOR THREAT MONITORING
The present invention is directed to systems and processes for monitoring threats in a defined monitoring zone including a server, a radio frequency transmitter positioning system, a position database. The radio frequency transmitter positioning system includes one or more radio frequency receivers and a location module configured to provide location of radio frequency transmitters within the defined monitoring zone. The position database is configured to store radio frequency transmitter fingerprint data and associated person information. The system is configured to determine threat risk by comparison of the stored radio frequency transmitter fingerprint data with the fingerprints of active radio frequency transmitter fingerprint data within the defined monitoring zone.
TRUSTED MONITORING SYSTEM AND METHOD
Methods and apparatus for monitoring remotely located objects with a system including at least one master data collection unit, remote sensor units, and a central data collection server are described. The master unit is configured to monitor any object, mobile or stationary, including monitoring multiple remote sensor units associated with the monitored objects. The master unit may be in a fixed location or attached to a mobile object. The master unit is configured for monitoring objects that enter and leave an area. The master unit may act as a parent controller for one or more child devices including remote sensors or monitors of measurable conditions including environmental conditions, substance identification, product identification, and/or biometric identification. The master unit may discover remote sensor units as they enter or leave the area where the master unit is located. The master unit can be remotely reprogrammed such as with authenticated instructions.
TRUSTED MONITORING SYSTEM AND METHOD
Methods and apparatus for monitoring remotely located objects with a system including at least one master data collection unit, remote sensor units, and a central data collection server are described. The master unit is configured to monitor any object, mobile or stationary, including monitoring multiple remote sensor units associated with the monitored objects. The master unit may be in a fixed location or attached to a mobile object. The master unit is configured for monitoring objects that enter and leave an area. The master unit may act as a parent controller for one or more child devices including remote sensors or monitors of measurable conditions including environmental conditions, substance identification, product identification, and/or biometric identification. The master unit may discover remote sensor units as they enter or leave the area where the master unit is located. The master unit can be remotely reprogrammed such as with authenticated instructions.
CROSS-CLIENT SENSOR USER INTERFACE IN AN INTEGRATED SECURITY NETWORK
An integrated system includes a system user interface (SUI) that provides an iconic, at-a-glance representation of integrated security system status. The SUI is for use across all client devices including mobile or cellular telephones, a mobile portal, a web portal, and a touchscreen device. The SUI includes a number of display elements presented across all types of client devices for monitoring status of the integrated security system. The display elements of the SUI include an orb icon, text summary, security button, device warnings, system warnings, interesting sensors, and quiet sensors. The SUI thus provides system status summary information agnostically across all clients. Additionally, the SUI provides consistent iconography, terminology, and display rules across all clients as well as consistent sensor and system detail across clients.
CROSS-CLIENT SENSOR USER INTERFACE IN AN INTEGRATED SECURITY NETWORK
An integrated system includes a system user interface (SUI) that provides an iconic, at-a-glance representation of integrated security system status. The SUI is for use across all client devices including mobile or cellular telephones, a mobile portal, a web portal, and a touchscreen device. The SUI includes a number of display elements presented across all types of client devices for monitoring status of the integrated security system. The display elements of the SUI include an orb icon, text summary, security button, device warnings, system warnings, interesting sensors, and quiet sensors. The SUI thus provides system status summary information agnostically across all clients. Additionally, the SUI provides consistent iconography, terminology, and display rules across all clients as well as consistent sensor and system detail across clients.
Method for provisioning a device with an information element allowing to identify unauthorized users in a restricted area
This invention relates to a method for provisioning a wireless control device with an information element allowing to identify visually at least one unauthorized user in a restricted area, the restricted area comprising a gateless control area being equipped with at least an image sensor and an electronic reader supporting a short range radio technology allowing to read data memorized into a wearable device carried by a user. The method comprises the steps of: providing by the image sensor a digital image of at least one user that is detected as passing through the gateless control area; extracting from the provided digital image of the detected user a first face detection dataset; providing by the electronic reader a second face detection dataset memorized in a wearable device carried by said detected user; applying facial recognition over the first and second face detection datasets in order to determine if the user associated to the first face detection dataset is the same as the one associated to the second face detection dataset, the detected user being identified as authorized in that case and identified as unauthorized otherwise; sending to a wireless control device a message comprising an information item adapted to ease the visual identification of an unauthorized user.
MANAGEMENT OF A SECURITY SYSTEM AT A PREMISES
A security system is described for managing a premises. The security system comprises security system components and a first controller. A takeover component receives security data of the security system from the first controller. The security data is used to configure a second controller to communicate with the security system. The second controller communicates with the security system components and replaces the first controller in management of the security system.
Motorized vehicle comprising a connected fork crown
A motorized vehicle including: a front fork; a steering shaft able to rotate inside a steering column; at least one fork crown coupled to the steering shaft and to the front fork; and at least one electronic component intended to collect and/or transmit data relating to the operation of the motorised vehicle. The fork crown has a body in which there is formed a cavity closed by a cover and an electronic board housed in the cavity and able to centralize and/or process the data supplied by the at least one electronic component.
Loop conductor security alarm system
The present invention provides a loop conductor based alarm and security system to secure a number of valuable objects together in such a manner that if an attempt to remove any one object in the linked group is made, an alarm will sound (locally and remotely, if desired). The system uses electronic controllers that monitor the condition of an electrically conductive loop path that has been established around and/or through the valuable objects, connecting them to a generally immovable object such as a vehicle or trailer. A unique “lasso” termination element is used in connection with a standard electrical extension cord or a standard trailer plug connector wiring harness. A loop conductor electronic controller is used in each case. The electronic controller may be connected to existing security systems for the vehicle as well as to ancillary components such as sirens, wireless telemetry devices, and other vehicle security system components.
Loop conductor security alarm system
The present invention provides a loop conductor based alarm and security system to secure a number of valuable objects together in such a manner that if an attempt to remove any one object in the linked group is made, an alarm will sound (locally and remotely, if desired). The system uses electronic controllers that monitor the condition of an electrically conductive loop path that has been established around and/or through the valuable objects, connecting them to a generally immovable object such as a vehicle or trailer. A unique “lasso” termination element is used in connection with a standard electrical extension cord or a standard trailer plug connector wiring harness. A loop conductor electronic controller is used in each case. The electronic controller may be connected to existing security systems for the vehicle as well as to ancillary components such as sirens, wireless telemetry devices, and other vehicle security system components.