G08B15/02

SELF-DEFENSE AND ALERT SYSTEM
20220051550 · 2022-02-17 ·

Self-defense devices, methods, and computer program products such as a pepper spray may take one or more photographs of the assailant and send the photos and/or other data (e.g., time, location) to an emergency responder with the location. The self-defense device may also send a message to the user's emergency contacts alerting the contacts that their contact has used the self-defense device and may include the location of where the self-defense device was activated and other information about the situation and/or user.

SYSTEM AND METHOD FOR DETERRING THEFT OF PACKAGE, AND DEVICE THEREFOR
20220051182 · 2022-02-17 ·

A system, method, and a package tracking device for tracking the movement of a package to prevent theft of the package are described. According to an embodiment, a package tracking device adapted to be attached with a package is described. The package tracking device having a unique device identification number allows a user, through an application interface running of a wireless communication device, to associate a geographical boundary (geo-fencing) with the delivery address of the package. The package tracking device operates in a passive tracking mode when the package is within the defined geographical boundary, generates a first signal when the package is moved from a drop location, generates a second signal when the package is moved out from the geofencing associated with the delivery address and operates in active tracking mode when the package is moved out from the geofencing associated with the delivery address.

SYSTEM AND METHOD FOR DETERRING THEFT OF PACKAGE, AND DEVICE THEREFOR
20220051182 · 2022-02-17 ·

A system, method, and a package tracking device for tracking the movement of a package to prevent theft of the package are described. According to an embodiment, a package tracking device adapted to be attached with a package is described. The package tracking device having a unique device identification number allows a user, through an application interface running of a wireless communication device, to associate a geographical boundary (geo-fencing) with the delivery address of the package. The package tracking device operates in a passive tracking mode when the package is within the defined geographical boundary, generates a first signal when the package is moved from a drop location, generates a second signal when the package is moved out from the geofencing associated with the delivery address and operates in active tracking mode when the package is moved out from the geofencing associated with the delivery address.

Campus Crime Neutralization Method Using Dual-Tone Multi-Frequency Enhanced 2-Way Radio
20170263096 · 2017-09-14 ·

Disclosed is a Crime on Campus Neutralization System comprising a communication network of 2-way radios connecting a USER to a USER-REPEATER, subsequently to a LINK-REPEATER, enabling a USER to ultimately initiate a LOCK-DOWN procedure on a CAMPUS. Further disclosed, here within, are methods that enable the system to work effectively. This system is very cost effective, consisting of components that can be bought off the shelf. The system is unique in that it does not use the internet, a cell-phone device, a tablet, a computer, or any other device that, by its design, could be “hacked” or “compromised” by outside parties. The system is not complex, unlike other systems which rely on extensive software programs, but instead relies on a 6 decade proven technology.

Campus Crime Neutralization Method Using Dual-Tone Multi-Frequency Enhanced 2-Way Radio
20170263096 · 2017-09-14 ·

Disclosed is a Crime on Campus Neutralization System comprising a communication network of 2-way radios connecting a USER to a USER-REPEATER, subsequently to a LINK-REPEATER, enabling a USER to ultimately initiate a LOCK-DOWN procedure on a CAMPUS. Further disclosed, here within, are methods that enable the system to work effectively. This system is very cost effective, consisting of components that can be bought off the shelf. The system is unique in that it does not use the internet, a cell-phone device, a tablet, a computer, or any other device that, by its design, could be “hacked” or “compromised” by outside parties. The system is not complex, unlike other systems which rely on extensive software programs, but instead relies on a 6 decade proven technology.

OBSCURATION CLOUD GENERATOR

An obscuration cloud generation device (100) comprises a housing (101) having a door (102) and a frame (103) sized and shaped to accommodate an obscuration cloud generating canister (110) when the door (102) is in a closed state. Activation of the canister (110) emits a composition for forming the cloud. The door (102) has an operably open state in which the door (102) is open at least a predefined minimum extent for exiting of the emitted composition. A door checking system (104) applies a force for opening the door (102) and generates an indication of whether the door (102) is open at least to the minimum extent. A controller (105) is adapted to instruct the checking system (104) to apply the force and to receive the indication to determine, before activating the canister (110), that the door (102) is not blocked from reaching the operably open state.

OBSCURATION CLOUD GENERATOR

An obscuration cloud generation device (100) comprises a housing (101) having a door (102) and a frame (103) sized and shaped to accommodate an obscuration cloud generating canister (110) when the door (102) is in a closed state. Activation of the canister (110) emits a composition for forming the cloud. The door (102) has an operably open state in which the door (102) is open at least a predefined minimum extent for exiting of the emitted composition. A door checking system (104) applies a force for opening the door (102) and generates an indication of whether the door (102) is open at least to the minimum extent. A controller (105) is adapted to instruct the checking system (104) to apply the force and to receive the indication to determine, before activating the canister (110), that the door (102) is not blocked from reaching the operably open state.

OBSCURATION CLOUD GENERATOR

An obscuration cloud generation device (100) is disclosed. It may comprise a container (104) for holding an obscuration cloud generating canister (110), wherein a composition for forming the obscuration cloud is emitted from the obscuration cloud generating canister (110) in response to activating the obscuration cloud generating canister (110). It may further comprise a housing (101) having a frame (103) wherein the container (101) is removably held inside the frame (103). The housing (101) has an opening (105) and a door (102), the door (102) being movable between a closed state for covering the opening (105) and an open state for emission of the composition from the device (100) via the opening (105). The opening (105) is shaped and sized to allow the container (104) to be extracted from the housing (101) through the opening (105) when the door (102) is open to replace the obscuration cloud generating canister (110).

OBSCURATION CLOUD GENERATOR

An obscuration cloud generation device (100) is disclosed. It may comprise a container (104) for holding an obscuration cloud generating canister (110), wherein a composition for forming the obscuration cloud is emitted from the obscuration cloud generating canister (110) in response to activating the obscuration cloud generating canister (110). It may further comprise a housing (101) having a frame (103) wherein the container (101) is removably held inside the frame (103). The housing (101) has an opening (105) and a door (102), the door (102) being movable between a closed state for covering the opening (105) and an open state for emission of the composition from the device (100) via the opening (105). The opening (105) is shaped and sized to allow the container (104) to be extracted from the housing (101) through the opening (105) when the door (102) is open to replace the obscuration cloud generating canister (110).

Mobile valuables transport system

Valuables transport bag tampering detection and controlled triggering of smoke dispenser in response to said detection. Additionally, techniques are addressed to pair a valuables transport bag with a user fob or user fobs in response to a pairing control signal from a supervisory fob. With a valuables transport bag having a zipper closure, techniques to issue proper zipper closure and detection of such closure are also addressed.