G08B25/003

Methods, systems, and products for security services

Methods, systems, and products notify of alarms associated with security systems. An alarm is detected by an alarm controller, and an alarm message is sent to notify of the alarm. The alarm message identifies a unique network address assigned to the alarm controller. The alarm controller then receives a Voice-over Internet Protocol call to the unique network address to verify the alarm.

Processing Sensor Data

Methods, systems, computer-readable media, and apparatuses for processing sensor data are presented. An example method comprises accessing, by a computing device at a premises, sensor information associated with a plurality of sensors located at the premises, receiving, by the computing device, first sensor data from a first security sensor of the plurality of sensors, receiving, by the computing device, second sensor data from a second security sensor of the plurality of sensors, and in response to determining, by the computing device and based on the sensor information, that the first sensor data is associated with a higher priority than the second sensor data processing, by the computing device, the first sensor data, and transmitting, by the computing device, the second sensor data to a remote computing device for processing, wherein the remote computing device is at a location different from the premises.

CAPACITIVE SWITCH DETECTOR ADDRESSING
20220020263 · 2022-01-20 ·

An emergency alarm system peripheral, such as a hazard detector, intrusion detector, or a notification appliance, includes a base that is permanently installed on a wall or ceiling, and a head which mounts to the base. Various embodiments and methods are provided to easily and efficiently assign addresses to the peripherals in the system.

Automated Robot Alert System
20210358290 · 2021-11-18 ·

A robot alert system includes a robot server that receives contextualized sensor data from one or more mobile robots and generates alerts to one or more individuals according to a set of configured alert rules. The contextualized sensor data includes location data indicating a location of the mobile robot and sensor data obtained by the mobile robot representing sensed conditions of an environment associated with the location. The robot server accesses staff member data associated with each of a plurality of staff members from a staff member database and accesses a set of stored alert rules specifying alert criteria for triggering the alert. Responsive to determining that the contextualized sensor data meets the alert criteria for s target staff member, the robot server generates and transmits an alert to a client device associated with the target staff member.

Device tamper detection

One embodiment provides a method, including: identifying, using a tamper detection switch of an information handling device, a tampering event; determining, using a processor, contextual data associated with the tampering event; constructing, based on the determining, a signal comprising the contextual data; and broadcasting, using a radio transmission beacon, the signal. Other aspects are described and claimed.

Configuration system and computer program product for configuration of a control center

The invention relates to a computer program product for configuration of a control center, in particular a fire alarm and/or extinguishing control center, and to an associated method. The computer program product comprises: a hardware configuration component for configuration of hardware components such as modules and/or front panel components of the control center, a logic configuration component for configuration of a functional logic of the control center, wherein the logic configuration component is designed to provide functional components. The functional components are decoupled from the hardware of the control center and embodied in such a way that reversible assignment of functional component to hardware component is made possible.

Method for Automatic Identification of Fire Detectors
20230326327 · 2023-10-12 · ·

Various embodiments include a method for automatic identification of fire detectors in a fire alarm system of a building, wherein the fire alarm system includes a plurality of fire detectors, a panel, and a transmission line. The method may include: determining linear distance spacings between fire detectors using a floor plan; determining line distances between fire detectors by measurement along the transmission line; using the line distances to determine a fire detector sequence; and creating a graph using the distance spacings and the line distances with a set of potential connection orders. The method may include determining a potential connection order matching the fire detector sequence based on the set of potential connection orders and determining a correspondence of the designations representing the identification of the fire detectors.

Emergency evacuation container and service for protection of valuables

A container for the storage of valuables and a service to retrieve the container is disclosed. The container is designed to contain valuables and important documents, and protect these contents during an emergency evacuation situation. The container is waterproof and can float in water. The container can also be made of a flame-resistant material. The container can emit a homing signal to facilitate the retrieval of the container in the event of an emergency situation. A container retrieval service can initiate a retrieval of the container in response to a determination that a disaster is likely to occur in the region where the container is located.

Fire alarm peripheral addressing using a unique identifier

An emergency alarm system peripheral, such as a hazard detector, intrusion detector, or a notification appliance, includes a base that is permanently installed on a wall or ceiling, and a head which mounts to the base. Various embodiments and methods are provided to easily and efficiently assign addresses to the peripherals in the system.

Managing sensors and computing devices associated with a premises

Methods, systems, computer-readable media, and apparatuses for managing sensors and computing devices associated with a premises are presented. An example method comprises receiving, by a computing device and from a mobile device at a premises: an image of a sensor, and a request to add the sensor to an account associated with the premises, performing object recognition on the image, and based on the object recognition, adding the sensor to a list of sensors associated with the account.