G08B13/22

SYSTEM AND METHOD FOR GUIDING INTRUSION SENSOR INSTALLATION
20230110861 · 2023-04-13 ·

A representation of a building space is displayed on a display. A user is allowed to enter a user input via a user interface in order to place a representation of each of a plurality of intrusion sensors at a location on the representation of the building space that corresponds to an actual or planned installation location of the corresponding intrusion sensor in the building space, each of the plurality of intrusion sensors being a non-video based motion sensor and/or a glass break sensor and each having a predefined detection zone representative of a geographic area that the corresponding intrusion sensor covers. The representation of a building space and the placement location of each of the plurality of intrusion sensors is stored. A visual representation of the predefined detection zone for each of the placed intrusion sensors is displayed on the representation of the building space.

Management of a security system at a premises

A security system is described for managing a premises. The security system comprises security system components and a first controller. A takeover component receives security data of the security system from the first controller. The security data is used to configure a second controller to communicate with the security system. The second controller communicates with the security system components and replaces the first controller in management of the security system.

Management of a security system at a premises

A security system is described for managing a premises. The security system comprises security system components and a first controller. A takeover component receives security data of the security system from the first controller. The security data is used to configure a second controller to communicate with the security system. The second controller communicates with the security system components and replaces the first controller in management of the security system.

SYSTEMS AND METHODS FOR DETECTING ANOMALOUS ACTIVITY OVER A COMPUTER NETWORK
20230153833 · 2023-05-18 ·

Computing systems and methods for detecting anomalous activity over a computer network are described herein. A computing system receives a real-time stream of electronic messages, each of the electronic messages including a first identifier, wherein a portion of the first identifier includes a second identifier. The computing system applies a detection model to the real-time stream of electronic messages, wherein the detection model is programmed to apply at least one machine learning algorithm trained to detect that a velocity of the electronic messages for a range of first identifiers having a common value second identifier exceeds a threshold. In response to the threshold being exceeded, a time period associated with anomalous activity is identified and an anomalous activity flag is appended to messages initiated during the time period associated with anomalous activity which include a first identifier having the common value in the second identifier.

SYSTEMS AND METHODS FOR DETECTING ANOMALOUS ACTIVITY OVER A COMPUTER NETWORK
20230153833 · 2023-05-18 ·

Computing systems and methods for detecting anomalous activity over a computer network are described herein. A computing system receives a real-time stream of electronic messages, each of the electronic messages including a first identifier, wherein a portion of the first identifier includes a second identifier. The computing system applies a detection model to the real-time stream of electronic messages, wherein the detection model is programmed to apply at least one machine learning algorithm trained to detect that a velocity of the electronic messages for a range of first identifiers having a common value second identifier exceeds a threshold. In response to the threshold being exceeded, a time period associated with anomalous activity is identified and an anomalous activity flag is appended to messages initiated during the time period associated with anomalous activity which include a first identifier having the common value in the second identifier.

SYSTEM FOR MOUNTING AND CONTROLLING ACCUMULATORS IN WORKSTATIONS

ASSEMBLY AND CONTROL SYSTEM FOR ACCUMULATORS IN WORKSTATIONS, presenting a system intended for battery control in radio-base stations rack comprising a processing center which controls a switching system, batteries, electromagnetic locks and sensors, in order to prevent non-authorized actions of such batteries inside the racks from occurring.

WIRELESS DOOR LOCK SYSTEM WITH AN EMERGENCY REPORTING FUNCTION AND METHOD FOR OPERATING THE SAME
20170372550 · 2017-12-28 · ·

A wireless door lock system with an emergency reporting function includes a user device, a door lock device, a network server and at least one recipient device. When the user device transmits a request signal for reporting an emergency condition to the door lock device, the door lock device determines if the user device is a paired device of the door lock device according to the request signal and further sends an emergency condition confirmation signal to the user device by way of wireless communication. The user device is then connected to the network server through the Internet and transmits an emergency condition signal to activate the network server to perform a push notification service and send an emergency condition message to the at least one recipient device. Given the push notification, the emergency condition message can be instantly provided to right recipients for emergency condition notification.

WIRELESS DOOR LOCK SYSTEM WITH AN EMERGENCY REPORTING FUNCTION AND METHOD FOR OPERATING THE SAME
20170372550 · 2017-12-28 · ·

A wireless door lock system with an emergency reporting function includes a user device, a door lock device, a network server and at least one recipient device. When the user device transmits a request signal for reporting an emergency condition to the door lock device, the door lock device determines if the user device is a paired device of the door lock device according to the request signal and further sends an emergency condition confirmation signal to the user device by way of wireless communication. The user device is then connected to the network server through the Internet and transmits an emergency condition signal to activate the network server to perform a push notification service and send an emergency condition message to the at least one recipient device. Given the push notification, the emergency condition message can be instantly provided to right recipients for emergency condition notification.

Smart power background to validate user

Technologies are generally described to implement intrusion detection based on smart power background. In some examples, upon detection of an attempt to access a resource, a power line ambiance may be determined at a location of a device on which the attempt to access the resource is executed. The power line ambiance may be based on a connection of the device and/or one or more other devices at the location to a power line. The captured/received power profiles may identify device signatures enabling generation of a digest of the location. An intrusion detection system (IDS), may receive the digest of the location and compare the digest to previous digests associated with an authorized client of the resource to evaluate an authenticity of the attempt. If the authenticity of the attempt is suspicious, the IDS may elevate security by employing one or more verification levels and/or one or more authentication techniques.

Smart power background to validate user

Technologies are generally described to implement intrusion detection based on smart power background. In some examples, upon detection of an attempt to access a resource, a power line ambiance may be determined at a location of a device on which the attempt to access the resource is executed. The power line ambiance may be based on a connection of the device and/or one or more other devices at the location to a power line. The captured/received power profiles may identify device signatures enabling generation of a digest of the location. An intrusion detection system (IDS), may receive the digest of the location and compare the digest to previous digests associated with an authorized client of the resource to evaluate an authenticity of the attempt. If the authenticity of the attempt is suspicious, the IDS may elevate security by employing one or more verification levels and/or one or more authentication techniques.