Patent classifications
G08B13/22
SYSTEMS AND METHODS FOR AVERTING CRIME WITH LOOK-AHEAD ANALYTICS
Systems and methods for operating a security system. The methods comprise: monitoring an area for a presence of an individual or vehicle using wireless signals of a first type that are received by a first radio of the security system; operating the first radio as a wireless sensor for generating sensor data; determining whether the individual or vehicle is exhibiting an unusual behavior using the sensor data and pre-programmed or machine learned patterns of unusual behavior; changing an operating frequency of the first radio when a determination is made that the individual or vehicle is exhibiting unusual behavior; and communicating a wireless signal of a second type from the first radio when the individual or vehicle is exhibiting unusual behavior, where the second type is different than the first type.
SYSTEMS AND METHODS FOR AVERTING CRIME WITH LOOK-AHEAD ANALYTICS
Systems and methods for operating a security system. The methods comprise: monitoring an area for a presence of an individual or vehicle using wireless signals of a first type that are received by a first radio of the security system; operating the first radio as a wireless sensor for generating sensor data; determining whether the individual or vehicle is exhibiting an unusual behavior using the sensor data and pre-programmed or machine learned patterns of unusual behavior; changing an operating frequency of the first radio when a determination is made that the individual or vehicle is exhibiting unusual behavior; and communicating a wireless signal of a second type from the first radio when the individual or vehicle is exhibiting unusual behavior, where the second type is different than the first type.
System and method for context aware access control with weapons detection
Techniques for context aware access control with weapons detection are provided. An indication of an identity of a person is received at an access control system. The indication of the identity of the person includes a confidence level of the identification. An indication of a threat level of the person is received at a threat detection system. The threat level including a confidence level of the threat level. At least one of an identification threshold or a threat level threshold is modified based on the threat level confidence level or the confidence level of the identification. At least one of allowing access, allowing access with an alarm indication, or denying access to the person is based in part on the modified identification threshold or threat level threshold.
System and method for context aware access control with weapons detection
Techniques for context aware access control with weapons detection are provided. An indication of an identity of a person is received at an access control system. The indication of the identity of the person includes a confidence level of the identification. An indication of a threat level of the person is received at a threat detection system. The threat level including a confidence level of the threat level. At least one of an identification threshold or a threat level threshold is modified based on the threat level confidence level or the confidence level of the identification. At least one of allowing access, allowing access with an alarm indication, or denying access to the person is based in part on the modified identification threshold or threat level threshold.
CONTROL DEVICE, VEHICLE, CONTROL SYSTEM, CONTROL METHOD, AND RECORDING MEDIUM STORING CONTROL PROGRAM
A control device comprising a processor, wherein the processor is configured to: acquire a warning level indicating a warning measure related to an abnormality that has occurred in a vehicle, from a device installed externally to the vehicle; detect an abnormality that has occurred in the vehicle, from equipment mounted to the vehicle; perform thinning control on a detection result of the abnormality detected according to the warning level; and transmit the detection result resulting from thinning to the device.
CONTROL DEVICE, VEHICLE, CONTROL SYSTEM, CONTROL METHOD, AND RECORDING MEDIUM STORING CONTROL PROGRAM
A control device comprising a processor, wherein the processor is configured to: acquire a warning level indicating a warning measure related to an abnormality that has occurred in a vehicle, from a device installed externally to the vehicle; detect an abnormality that has occurred in the vehicle, from equipment mounted to the vehicle; perform thinning control on a detection result of the abnormality detected according to the warning level; and transmit the detection result resulting from thinning to the device.
Alert system, delivery system and method and door bell system
An alert device includes electronic circuitry and at least a first antenna. The circuitry is designed for sending out a first signal, for wireless communication with at least a first hand held communication device, and at least a second signal for wireless communication with at least a second hand held communication device. The second signal differs from the first signal, preferably in at least one of transmitting energy, transmitting frequency, coding and pulse length. The device includes a switch for switching between: a first mode in which only the first signal is transmitted and a second mode wherein the first and second signal are transmitted; or a first mode wherein only the first signal is transmitted and a second mode wherein only the second signal is transmitted.
Alert system, delivery system and method and door bell system
An alert device includes electronic circuitry and at least a first antenna. The circuitry is designed for sending out a first signal, for wireless communication with at least a first hand held communication device, and at least a second signal for wireless communication with at least a second hand held communication device. The second signal differs from the first signal, preferably in at least one of transmitting energy, transmitting frequency, coding and pulse length. The device includes a switch for switching between: a first mode in which only the first signal is transmitted and a second mode wherein the first and second signal are transmitted; or a first mode wherein only the first signal is transmitted and a second mode wherein only the second signal is transmitted.
Systems and methods for managing smart devices based upon electrical usage data
Managing the operation of devices within a home or other property based upon electrical usage data. With customer knowledge or consent, a home controller may retrieve and analyze electrical usage data corresponding to a device, such as by comparing it to certain threshold data. If the analysis results in a trigger condition, the controller may generate a command, and transmit the command to the device for implementation, allowing modification of device operation to address any issues indicated in the electrical usage data. The controller may notify a home owner/occupant. As a result, faulty devices may be managed prior to their faults causing damage to the device and/or the property, and/or property owners may be timely prompted to investigate, repair, and/or replace a failing device. Insurance discounts may be provided based upon the risk mitigation/prevention functionality.
SYSTEM AND METHOD FOR GUIDING INTRUSION SENSOR INSTALLATION
A representation of a building space is displayed on a display. A user is allowed to enter a user input via a user interface in order to place a representation of each of a plurality of intrusion sensors at a location on the representation of the building space that corresponds to an actual or planned installation location of the corresponding intrusion sensor in the building space, each of the plurality of intrusion sensors being a non-video based motion sensor and/or a glass break sensor and each having a predefined detection zone representative of a geographic area that the corresponding intrusion sensor covers. The representation of a building space and the placement location of each of the plurality of intrusion sensors is stored. A visual representation of the predefined detection zone for each of the placed intrusion sensors is displayed on the representation of the building space.