Patent classifications
G08B13/22
Anti-theft security system and method to operate the anti-theft security system
A first functionality of anti-theft security system infrastructure provides at least signal reception capabilities and enables the anti-theft security system infrastructure to detect mobile anti-theft devices by receiving advertising signals therefrom and to hand over a respectively detected mobile anti-theft device to a second functionality of the anti-theft security system infrastructure, wherein the second functionality provides at least signal transmission capabilities and enables the anti-theft security system infrastructure to communicate with an handed-over mobile anti-theft device including the sending of a release command to the handed-over anti-theft device, automatically after the handing-over or if at least one release condition is fulfilled.
PORTABLE ALARM DEVICE
A portable alarm device connected to a mobile device, the portable alarm including a main body having a hand held size, at least one sensor disposed on and within at least a portion of the main body to illuminate a color in response to detecting movement within a predetermined distance therefrom, and a communication unit disposed on and within at least a portion of the main body to transmit an alert signal from the at least one sensor to the mobile device in response to the at least one sensor detecting movement within the predetermined distance.
PORTABLE ALARM DEVICE
A portable alarm device connected to a mobile device, the portable alarm including a main body having a hand held size, at least one sensor disposed on and within at least a portion of the main body to illuminate a color in response to detecting movement within a predetermined distance therefrom, and a communication unit disposed on and within at least a portion of the main body to transmit an alert signal from the at least one sensor to the mobile device in response to the at least one sensor detecting movement within the predetermined distance.
ARTIFICIAL INTELLIGENCE (AI)-BASED SECURITY SYSTEMS FOR MONITORING AND SECURING PHYSICAL LOCATIONS
Various aspects of the disclosure relate to monitoring a physical location to determine and/or predict anomalous activities. One or more machine learning algorithms may be used to analyze inputs from one or more sensors, cameras, audio recording equipment, and/or any other types of sensors to detect anomalous measurements/patterns. Notifications may be sent one or more devices in a network based on the detection.
ARTIFICIAL INTELLIGENCE (AI)-BASED SECURITY SYSTEMS FOR MONITORING AND SECURING PHYSICAL LOCATIONS
Various aspects of the disclosure relate to monitoring a physical location to determine and/or predict anomalous activities. One or more machine learning algorithms may be used to analyze inputs from one or more sensors, cameras, audio recording equipment, and/or any other types of sensors to detect anomalous measurements/patterns. Notifications may be sent one or more devices in a network based on the detection.
Mounting mechanism and electronic device having the same
A mechanism for mounting an electronic device to a ceiling or a wall includes a fixing seat with a mounting hole, a trigger button in the mounting hole, two clamping members slidably connected to the fixing seat, and two first elastic members. The clamping members abut opposing ends of the first positioning portion when the trigger button is at a first position, and the clamping members move toward each other by a resilient force when the trigger button moves toward the second position. In a second position two ends of the fixing member are clamped, thereby the electronic device is mounted firmly and stably to the fixing member. An electronic device having the mounting mechanism is also disclosed.
SYSTEM AND METHOD FOR FACILITATING DETECTING AN UNAUTHORIZED ACCESS TO AN OBJECT
In accordance with a first aspect of the present disclosure, a system is provided for facilitating detecting an unauthorized access to an object, the system comprising: a plurality of ultra-wideband (UWB) communication nodes; a controller operatively coupled to said plurality of UWB communication nodes, wherein the controller is configured to: cause at least one of the UWB communication nodes to transmit one or more UWB messages to other UWB communication nodes of said plurality of UWB communication nodes; receive a channel impulse response (CIR) estimate and/or one or more parameters relating to said CIR output by the UWB communication nodes in response to receiving said UWB messages; analyze said CIR estimate and/or said parameters relating to the CIR to detect said unauthorized access to the object. In accordance with a second aspect of the present disclosure, a corresponding method is conceived for facilitating detecting an unauthorized access to an object. In accordance with a third aspect of the present disclosure, a computer program is provided for carrying out said method.
SYSTEM AND METHOD FOR FACILITATING DETECTING AN UNAUTHORIZED ACCESS TO AN OBJECT
In accordance with a first aspect of the present disclosure, a system is provided for facilitating detecting an unauthorized access to an object, the system comprising: a plurality of ultra-wideband (UWB) communication nodes; a controller operatively coupled to said plurality of UWB communication nodes, wherein the controller is configured to: cause at least one of the UWB communication nodes to transmit one or more UWB messages to other UWB communication nodes of said plurality of UWB communication nodes; receive a channel impulse response (CIR) estimate and/or one or more parameters relating to said CIR output by the UWB communication nodes in response to receiving said UWB messages; analyze said CIR estimate and/or said parameters relating to the CIR to detect said unauthorized access to the object. In accordance with a second aspect of the present disclosure, a corresponding method is conceived for facilitating detecting an unauthorized access to an object. In accordance with a third aspect of the present disclosure, a computer program is provided for carrying out said method.
Systems and methods for averting crime with look-ahead analytics
Systems and methods for operating a security system. The methods comprise: monitoring an area for a presence of an individual or vehicle using wireless signals of a first type that are received by a first radio of the security system; operating the first radio as a wireless sensor for generating sensor data; determining whether the individual or vehicle is exhibiting an unusual behavior using the sensor data and pre-programmed or machine learned patterns of unusual behavior; changing an operating frequency of the first radio when a determination is made that the individual or vehicle is exhibiting unusual behavior; and communicating a wireless signal of a second type from the first radio when the individual or vehicle is exhibiting unusual behavior, where the second type is different than the first type.
Systems and methods for averting crime with look-ahead analytics
Systems and methods for operating a security system. The methods comprise: monitoring an area for a presence of an individual or vehicle using wireless signals of a first type that are received by a first radio of the security system; operating the first radio as a wireless sensor for generating sensor data; determining whether the individual or vehicle is exhibiting an unusual behavior using the sensor data and pre-programmed or machine learned patterns of unusual behavior; changing an operating frequency of the first radio when a determination is made that the individual or vehicle is exhibiting unusual behavior; and communicating a wireless signal of a second type from the first radio when the individual or vehicle is exhibiting unusual behavior, where the second type is different than the first type.