Patent classifications
G08B13/22
SYSTEM, APPARATUS, AND METHOD FOR SUBTERRANEAN TERMITE CONTROL
A system, apparatus, and method for use in controlling subterranean insect population and for use in irrigation is provided. Characteristics are monitored in a plurality of under and above soil level regions. The characteristics may include, for example, thermal heat or moisture level characteristics; seismic-type, vibrational, or acoustic characteristics indicative of air pockets or tunnels created by a subterranean insect population; or sound or acoustic levels produced by a subterranean insect population. It is determined whether one or more of the characteristics in one or more of the soil regions are indicative of a subterranean insect population exceeding a threshold or have a need for irrigation. Based on the determining, a treatment need is identified for the one or more soil regions. The treatment need is executed at regions corresponding to the one or more soil regions.
SYSTEM, APPARATUS, AND METHOD FOR SUBTERRANEAN TERMITE CONTROL
A system, apparatus, and method for use in controlling subterranean insect population and for use in irrigation is provided. Characteristics are monitored in a plurality of under and above soil level regions. The characteristics may include, for example, thermal heat or moisture level characteristics; seismic-type, vibrational, or acoustic characteristics indicative of air pockets or tunnels created by a subterranean insect population; or sound or acoustic levels produced by a subterranean insect population. It is determined whether one or more of the characteristics in one or more of the soil regions are indicative of a subterranean insect population exceeding a threshold or have a need for irrigation. Based on the determining, a treatment need is identified for the one or more soil regions. The treatment need is executed at regions corresponding to the one or more soil regions.
AUTHENTICATED AND FUNCTIONAL SMS LINKS
A computer system for creating pre-authenticated, functional URLs within SMS messages is disclosed. The computer system includes a computer having non-transitory memory for storing machine instructions that are to be executed by the computer. The machine instructions when executed by the computer implement the following functions: receiving a login ID and passcode of an alarm management system user; receiving a specific function to be utilized by the alarm management system user; generating a URL that embeds the login ID, passcode and specific function to create a pre-authenticated, functional URL; combining a text message string with the pre-authenticated, functional URL to create an SMS message; and transmitting the SMS message.
Systems and methods for presenting security questions via connected security system
The various implementations described herein include methods, devices and systems for detecting trigger events and executing security protocols. In one aspect, a method is performed at a server system that is coupled to a smart device system and a client device, the smart device system located at a premises. The server system: (1) detects an unverified user within the premises based on data collected by the smart device system, wherein the data is communicated to the server system via the wide area networks; (2) provides a notification regarding the unverified user to authorized users via the wide area networks; (3) receives, from a first authorized user, a first user input in response to the notification; and (4) in response to receiving the first user input, executes a security operation at the premises based on the first user input.
Systems and methods for presenting security questions via connected security system
The various implementations described herein include methods, devices and systems for detecting trigger events and executing security protocols. In one aspect, a method is performed at a server system that is coupled to a smart device system and a client device, the smart device system located at a premises. The server system: (1) detects an unverified user within the premises based on data collected by the smart device system, wherein the data is communicated to the server system via the wide area networks; (2) provides a notification regarding the unverified user to authorized users via the wide area networks; (3) receives, from a first authorized user, a first user input in response to the notification; and (4) in response to receiving the first user input, executes a security operation at the premises based on the first user input.
Remote interface for digital configuration and security of safety equipment
In some examples, a system includes: a plurality of different articles of personal protection equipment (PPE) that are all controlled by a particular user, and a computing device. The computing device may include one or more computer processors configured to receive sets of data from each of the different articles of PPE, wherein each set of data is based at least in part on a type of each of the different articles of PPE; generate for display a user interface that contemporaneously includes a plurality of graphical elements that are based at least in part on at least two sets of data that correspond to at least two different articles of PPE of the plurality of different articles of PPE; and in response to receiving an indication of user input that corresponds to at least one of the plurality of graphical elements, perform at least one operation.
Remote interface for digital configuration and security of safety equipment
In some examples, a system includes: a plurality of different articles of personal protection equipment (PPE) that are all controlled by a particular user, and a computing device. The computing device may include one or more computer processors configured to receive sets of data from each of the different articles of PPE, wherein each set of data is based at least in part on a type of each of the different articles of PPE; generate for display a user interface that contemporaneously includes a plurality of graphical elements that are based at least in part on at least two sets of data that correspond to at least two different articles of PPE of the plurality of different articles of PPE; and in response to receiving an indication of user input that corresponds to at least one of the plurality of graphical elements, perform at least one operation.
Unauthorized intrusion prevention device, unauthorized intrusion prevention method, and unauthorized intrusion prevention program
An unauthorized intrusion prevention device is provided that, in response to detection of abnormality in an electronic control device mounted in a movable body, gives an instruction for executing measures for the movable body. The unauthorized intrusion prevention device acquires first information related to a protection function of the electronic control device and second information related to a function of the electronic control device other than the protection function. The unauthorized intrusion prevention device, using the first information, performs a first determination of whether the protection function is normal. The unauthorized intrusion prevention device, using the second information, performs a second determination of whether the function other than the protection function is normal or abnormal. The unauthorized intrusion prevention device, using results of first and second determination, determines as the measures a blocking method of blocking unauthorized information in the movable object.
Unauthorized intrusion prevention device, unauthorized intrusion prevention method, and unauthorized intrusion prevention program
An unauthorized intrusion prevention device is provided that, in response to detection of abnormality in an electronic control device mounted in a movable body, gives an instruction for executing measures for the movable body. The unauthorized intrusion prevention device acquires first information related to a protection function of the electronic control device and second information related to a function of the electronic control device other than the protection function. The unauthorized intrusion prevention device, using the first information, performs a first determination of whether the protection function is normal. The unauthorized intrusion prevention device, using the second information, performs a second determination of whether the function other than the protection function is normal or abnormal. The unauthorized intrusion prevention device, using results of first and second determination, determines as the measures a blocking method of blocking unauthorized information in the movable object.
PEST CONTROL SYSTEM AND METHOD
A system for integrated pest management in an environment includes devices positioned within the environment. The devices each include a communications facility that enables transmitting signals to and receiving signals from a network device. The system further includes a network to provide communication between the network device to the devices. The network device receives communication and control functions from a remote computer for distribution to the devices. The system further includes a sensor positioned within the environment to transmit sensor data to the remote computer. The sensor is configured to detect and transmit a parameter for the environment to the remote computer. The system further includes a controller to control the emission of a fluid from a source of the fluid in fluid communication with the devices. The controller is configured to set or adjust an operation parameter of the devices in response to the sensor data.