Patent classifications
G08B25/001
Integrative security system and method
A method for monitoring and securing a facility without employing a manned control center, according to which a server acquires surveillance data from each of a plurality of distributed surveillance devices deployed within or adjacent to a given security sensitive facility. Then the server receives an intrusion alert from a guard, or from one or more of the plurality of surveillance devices to initiate a triggering event, if the acquired surveillance data is indicative of activity that has been detected at an indicated location. A first guard is alerted and presented with a full situational awareness image to assess the severity of the detected activity and the triggering event is terminated if found by the first guard to be of a low severity, or an interception operation initiated by self-dispatching or dispatching one or more additional guards to a close by location that holds tactical advantage relative to the indicated location if the triggering event was found by the first guard to be of a high severity.
DIY MONITORING APPARATUS AND METHOD
The present disclosure relates to a software application used on mobile devices that enables professional monitoring services to DIY monitoring systems that lack an ability to communicate with remote monitoring facilities. In one embodiment, alert messages are transmitted by a monitoring system gateway and received by a personal communication device. The alert messages indicate occurrences of events at a monitored premises. When the software application determines that an incoming communication is an alert message, an indication is provided to a user of the mobile device that an event has occurred at the premises, and giving the user a predetermined time period in which to respond to the indication. If the user fails to respond to the indication within a predetermined time period, a message is transmitted to a remote monitoring facility, alerting the remote monitoring facility of the event.
Intelligent Integration, Analysis, and Presentation of Notifications in Mobile Health Systems
Systems and methods can support managing clinical alerts presented to clinical care users. An integration management system can maintain models of clinical alert events in the context of user behaviors and in the context of patients. Alarm indications associated with the patient may be received along with context information associated with the patient. Patient information may be received from an electronic medical record system. Integrated decision processing can integrate two or more of the alarm indication, the models of clinical alert events, the patient context, and the information from the electronic medical record system. The integrated decision processing can determine if a clinical alert is to be generated, what type, and to whom. The clinical alert can be transmitted to a target user. A response can be received and interpreted. Information associated with the patient may be updated into the electronic medical record system.
AUTHENTICATED AND FUNCTIONAL SMS LINKS
A computer system for creating pre-authenticated, functional URLs within SMS messages is disclosed. The computer system includes a computer having non-transitory memory for storing machine instructions that are to be executed by the computer. The machine instructions when executed by the computer implement the following functions: receiving a login ID and passcode of an alarm management system user; receiving a specific function to be utilized by the alarm management system user; generating a URL that embeds the login ID, passcode and specific function to create a pre-authenticated, functional URL; combining a text message string with the pre-authenticated, functional URL to create an SMS message; and transmitting the SMS message.
FALSE ALARM REDUCTION SYSTEM, METHOD AND APPARATUS
Systems, methods and apparatus are described for reducing the occurrence of false alarms by determining the identify of people, typically via their mobile devices, in or near a monitored premises. A security system employing the embodiments described herein monitors a home or business to determine the presence of mobile devices in or near the premises, and determines whether such mobile devices are authorized, or not, to enter the premises after the security system has been armed. When an intrusion is detected, the security system determines whether any unauthorized mobile devices are present in or near the premises. If so, one or more escalated alarm responses are initiated by the security system. If no unauthorized mobile devices are in or near the premises when intrusion is detected, the security system ignores the intrusion and refrains from performing the escalated alarm responses.
SYSTEMS AND METHODS FOR MONITORING SANITATION AGENTS IN A LAUNDRY SYSTEM
A system for monitoring sanitation agents in a laundry machine comprises a plurality of channels. Each channel has an input port, an output port, and a glass tube. Each input port and output port is adapted to be fluidly coupled to the laundry machine. The system includes a monitoring unit associated with each of the glass tubes. Each monitoring unit includes a bubble detector and a flow rate measurement unit. A beeper is configured to generate an indication of an alarm condition based on a determination made by any one of the monitoring units. The system has a display screen, a memory storing computer-readable instructions, and a controller communicatively coupled to each of the monitoring units. The controller is configured to execute the instructions to wirelessly communicate to a web page a volume of a sanitation agent that has passed through each of the glass tubes.
Alarm notification system
A system and method providing for ascertaining the status of a user and escalating an alarm in the event the user is ascertained to be disposed in a dangerous condition. The of the invention attempts to contact the user at a predetermined check-in time, and notifies a pre-designated third-party which may be an emergency responder such as law enforcement or other emergency contact in the event that the user fails to respond to the check in request or signals that they are in danger using an escalate feature of the invention. The system operates autonomously to notify pre-designated emergency contacts or emergency responders in the case in which a user has been rendered unable to respond. The user may identify specific individuals with whom they plan to meet and the invention may also track the user's geo-location. The invention may also monitor biometric data of the user.
Medical device alarm management
It is determined, during monitoring of a patient, that a plurality of alarm conditions has been initiated. The alarm conditions characterize a measurement by and/or operation of at least one medical device and have an associated grade among a plurality of prioritized grades. Thereafter, alarms can be generated that corresponding to some or all of the plurality of alarm conditions such that among concurrent active alarms: (i) an alarm corresponding to an alarm condition having a highest priority grade is conveyed at a first level upon initiation and, if such alarm condition remains active for a pre-defined time period, at the first level upon expiration of the pre-defined time period, and (ii) alarms corresponding to alarm conditions having equal or lower priority grades than the priority grade of the current highest priority grade alarm condition are conveyed at a second level, the second level being different from the first level.
METHOD AND APPARATUS FOR AUTOMATED DISPATCH OF MOBILE DEVICES IN A COMMUNICATION SYSTEM
A method and apparatus for automated dispatch of mobile devices is provided herein. An infrastructure controller device receives one of an alert and request for a response with respect to an associated location and identifies a first set of mobile devices for responding to the one of the alert and request. The device transmits a first dispatch request to each mobile device in the first set requesting dispatch to the associated location. The device subsequently identifies a higher priority mobile device for responding to the one of the alert and request relative to a lower priority mobile device. Responsive to this identification, the device transmits a second dispatch request to the higher priority mobile device requesting dispatch to the associated location, and further transmits a recall notice to the lower priority mobile device withdrawing the first dispatch request to the lower priority mobile device.
Reducing nuisance notifications from a building automation system
Reducing nuisance notifications from building automation systems is described herein. One device includes a memory, and a processor configured to execute executable instructions stored in the memory to receive a notification of an alarm from a building automation system, compare attributes of the alarm to attributes of alarms included in a database of suppressed alarms, refrain from transmitting a notification of the alarm to a mobile device in response to the attributes of the alarm matching attributes of any of the alarms in the database, and transmit a notification of the alarm to a mobile device in response to the attributes of the alarm not matching the attributes of any of the alarms in the database.