Patent classifications
G08B13/22
Elongated wireless sensor assembly
A sensor assembly as part of a wireless alarm system for building entrances like windows and doors. An elongated sensor assembly for detecting a change of state comprising at least one sensor switch configured to detect a given state and a change of state between the given state and at least one other state, a microprocessor configured to detect the change of state of the at least one sensor switch, an antenna system, a wireless transmitter configured to receive a signal from the microprocessor identifying a change of the state of the at least one sensor switch and transmit the signal by means of the antenna system, and a power source for providing electric power, wherein the at least one sensor switch, the microprocessor, the antenna system, the wireless transmitter, and the power source are incorporated in the elongated sensor assembly having a maximum height of less than 5 mm.
Tag apparatus for attaching things based on human body communication
Disclosed is a tag apparatus for attaching things based on human body communication, including: a tag main body for human body communication configured to be attached to a thing to transmit identification information on a thing to a human body communication receiving device through human body communication during the contact of the human body with the thing; a case configured to protect the tag main body for human body communication; and a thing attachment portion configured to be exposed to an outside of the case to be attached to a particular part of the thing, detect when the human body contacts or approaches the thing, and forms a human body communication channel to output identification information on the thing.
REMOTE ACTIVATION OR DEACTIVATION OF A DEVICE FOR THEFT DETERRENCE
In some aspects, a server device may obtain information relating to a location of a device that is to be delivered to a physical location associated with a recipient. The server device may transmit, based at least in part on the information indicating that the location of the device is at the physical location of the recipient, a first communication prompting the recipient to indicate whether the recipient is in possession of the device. The server device may receive a second communication indicating whether the recipient is in possession of the device. The server device may transmit a signal to cause a change of an activation state of one or more operations of the device based at least in part on whether the second communication indicates that the recipient is in possession of the device. Numerous other aspects are described.
REMOTE ACTIVATION OR DEACTIVATION OF A DEVICE FOR THEFT DETERRENCE
In some aspects, a server device may obtain information relating to a location of a device that is to be delivered to a physical location associated with a recipient. The server device may transmit, based at least in part on the information indicating that the location of the device is at the physical location of the recipient, a first communication prompting the recipient to indicate whether the recipient is in possession of the device. The server device may receive a second communication indicating whether the recipient is in possession of the device. The server device may transmit a signal to cause a change of an activation state of one or more operations of the device based at least in part on whether the second communication indicates that the recipient is in possession of the device. Numerous other aspects are described.
Security adaptor devices for a third-party sensors in premises security systems
According to one or more embodiments, a premises security system includes a sensor adaptor device mountable on a third-party sensor. The sensor adaptor device comprises at least one terminal in electrical communication with a preconfigured premises device of a premise security system, and processing circuitry configured to: store a mapping of a plurality of third-party sensor signals to a plurality of translated third-party signals, detect a first third-party sensor signal emitted from the third-party sensor, determine that the first third-party sensor signal maps to a first translated third-party signal based on the mapping, and in response to determining that the first third-party sensor signal maps to the first translated third-party signal, trigger, via the at least one terminal where the preconfigured premises device to cause the preconfigured premise device to transmit an alert signal to the premises security system.
Security adaptor devices for a third-party sensors in premises security systems
According to one or more embodiments, a premises security system includes a sensor adaptor device mountable on a third-party sensor. The sensor adaptor device comprises at least one terminal in electrical communication with a preconfigured premises device of a premise security system, and processing circuitry configured to: store a mapping of a plurality of third-party sensor signals to a plurality of translated third-party signals, detect a first third-party sensor signal emitted from the third-party sensor, determine that the first third-party sensor signal maps to a first translated third-party signal based on the mapping, and in response to determining that the first third-party sensor signal maps to the first translated third-party signal, trigger, via the at least one terminal where the preconfigured premises device to cause the preconfigured premise device to transmit an alert signal to the premises security system.
"Security system that notifies cell phone"
Cell Secure Phone is a newly invented security system for vehicles designed to identify and photograph a vehicle intruder or thief. The system is paired with a software application, allowing an in-vehicle camera to take a photograph of the thief and automatically send the photo to the software application for immediate identification
The ‘Cell Secure Phone’ main body part was constructed by plastic molding injection method. In other words, plastic pellets are heated to high temperature where it becomes molten liquid at a superheated temperature. The liquefied plastic is poured into special made prefab, forged cast iron which is in the shape preferred to form the casing and the cover that will carry the electronic equipment to protect the integrity of the equipment. The nature of the built is tough to resist easy breakage because of the plastic material used for durability and longevity.
In my research investigation, it was established that there are some similarities between ‘Cell Secure Phone’ invention and the references made in QIAHE and BECKER. The main differences with Qiahe are that (i) My Invention do not use GPS to locate stolen cars. It actually prevents the car from being driven away or far from the original parking spot. (ii) With ‘Cell Secure System’, the Alarm does not go off when the door entry point is breached but the alarm goes off only when the thief sit behind the steering wheel in an attempt to steal and drive away. (iii) Becker's inventions are more related historically to inventions in the early twentieth century but technology has since moved on.
Overall we conclude that “Cell Secure Phone” will reduce or eradicate car thefts and protect motorist and assure them that their vehicles that are safely parked anywhere and everywhere will not experience any case of theft. This will also protect the auto insurance industry to prevent potential financial loses as result of payment or replacement to owners. This will ultimately increase the productivity and profitability of the auto insurance and vehicle manufacturing industry and boost the improvement of the industry.
"Security system that notifies cell phone"
Cell Secure Phone is a newly invented security system for vehicles designed to identify and photograph a vehicle intruder or thief. The system is paired with a software application, allowing an in-vehicle camera to take a photograph of the thief and automatically send the photo to the software application for immediate identification
The ‘Cell Secure Phone’ main body part was constructed by plastic molding injection method. In other words, plastic pellets are heated to high temperature where it becomes molten liquid at a superheated temperature. The liquefied plastic is poured into special made prefab, forged cast iron which is in the shape preferred to form the casing and the cover that will carry the electronic equipment to protect the integrity of the equipment. The nature of the built is tough to resist easy breakage because of the plastic material used for durability and longevity.
In my research investigation, it was established that there are some similarities between ‘Cell Secure Phone’ invention and the references made in QIAHE and BECKER. The main differences with Qiahe are that (i) My Invention do not use GPS to locate stolen cars. It actually prevents the car from being driven away or far from the original parking spot. (ii) With ‘Cell Secure System’, the Alarm does not go off when the door entry point is breached but the alarm goes off only when the thief sit behind the steering wheel in an attempt to steal and drive away. (iii) Becker's inventions are more related historically to inventions in the early twentieth century but technology has since moved on.
Overall we conclude that “Cell Secure Phone” will reduce or eradicate car thefts and protect motorist and assure them that their vehicles that are safely parked anywhere and everywhere will not experience any case of theft. This will also protect the auto insurance industry to prevent potential financial loses as result of payment or replacement to owners. This will ultimately increase the productivity and profitability of the auto insurance and vehicle manufacturing industry and boost the improvement of the industry.
Audio/video recording and communication doorbell devices with supercapacitors
In implementations described herein, /V recording and communication doorbell devices (“A/V doorbells”) may include supercapacitors to supply power to functional components of the A/V doorbells. For example, the A/V doorbells described herein may include one or more supercapacitors to supply power to one or more functional components in situations where doorbell power circuitry is unable to supply sufficient power for the one or more functional components to operate. The A/V doorbells described herein may also include a power control system and supercapacitor control circuitry to regulate the charging and discharging of the one or more supercapacitors. In various implementations, the supercapacitor control circuitry may control the amount of current supplied from the one or more supercapacitors to one or more functional components of the A/V doorbells.
Audio/video recording and communication doorbell devices with supercapacitors
In implementations described herein, /V recording and communication doorbell devices (“A/V doorbells”) may include supercapacitors to supply power to functional components of the A/V doorbells. For example, the A/V doorbells described herein may include one or more supercapacitors to supply power to one or more functional components in situations where doorbell power circuitry is unable to supply sufficient power for the one or more functional components to operate. The A/V doorbells described herein may also include a power control system and supercapacitor control circuitry to regulate the charging and discharging of the one or more supercapacitors. In various implementations, the supercapacitor control circuitry may control the amount of current supplied from the one or more supercapacitors to one or more functional components of the A/V doorbells.