Patent classifications
G08B25/004
System and method for identifying alarm system problems
A method and apparatus include a processor of an Internet router monitoring a parameter of messages between a security panel that protects a secured area and a central monitoring station of the secured area, detecting an interruption in the messages by comparing the parameter with a threshold value, and notifying at least the central monitoring station of the interruption via an e-mail or SMS message, wherein the interruption includes one of disconnection of the security panel, disconnection of the central monitoring station, and impersonation of the central monitoring station.
Mission critical signaling failover in cloud computing ecosystem
Methods and systems, including computer programs encoded on computer storage media, for reducing the likelihood of signaling failover in an alarm system, the method including identifying alarm events detected at monitored properties by monitoring systems that are located at the monitored properties; tracking the ability of a primary application infrastructure to transmit, to a central monitoring station server, the alarm events; detecting disruption in the ability of the primary application infrastructure to transmit the alarm events to the central monitoring station server; based on the detected disruption, enabling a signal transmission switch that switches a path for alarm events from the primary application infrastructure to a secondary application infrastructure, the secondary application infrastructure being an infrastructure operated by a cloud service provider; and based on enablement of the transmission switch, transmitting, by the secondary application infrastructure, at least one alarm event to the central monitoring station server.
INFORMATION PROCESSING DEVICE, VEHICLE, INFORMATION PROCESSING METHOD, AND NON-TRANSITORY STORAGE MEDIUM
An information processing device associated with a vehicle includes a processor. The processor is configured to presume that a person or an item has been left behind in a rear seat of the vehicle, based on whether a rear door was opened and closed in a predetermined period before running of the vehicle and whether the rear door was opened and closed in a predetermined period after running of the vehicle. The processor is configured to perform sensing of the rear seat based on a presumption result. The processor is configured to notify the user based on a sensing result.
METHOD AND SYSTEM FOR PROVIDING ALTERNATE NETWORK ACCESS
Methods and systems for configuring communication at a premises are described. A network device at a premises may be configured to use a first communication mode and a second communication mode. The network device may receive data from a device located at the premises. The network device may transmit the data using the first communication mode or the second communication mode based on configuration data, which may be received from a computing device located external to the premises.
SHIELDED ELECTRICAL CABLE
A shielded electrical cable includes conductor sets extending along a length of the cable and spaced apart from each other along a width of the cable. First and second shielding films are disposed on opposite sides of the cable and include cover portions and pinched portions arranged such that, in transverse cross section, the cover portions of the films in combination substantially surround each conductor set. An adhesive layer bonds the shielding films together in the pinched portions of the cable. A transverse bending of the cable at a cable location of no more than 180 degrees over an inner radius of at most 2 mm causes a cable impedance of the selected insulated conductor proximate the cable location to vary by no more than 2 percent from an initial cable impedance measured at the cable location in an unbent configuration.
PROVIDING INTERNET ACCESS THROUGH A PROPERTY MONITORING SYSTEM
Methods and systems, including computer programs encoded on computer storage media, for providing internet access through a control panel of an alarm system, the method including establishing, by a control panel of an alarm system in a property, a first connection to an alarm system monitoring server across a cellular network, determining that a known source of internet within the property is not available, in response to determining that the known source of internet within the property is not available, establishing, by the control panel, a second connection to the internet across the cellular network, providing internet access to one or more devices in the property through the second connection, determining that the known source of internet within the property is available, and in response to determining that the known source of internet within the property is available, terminating, by the control panel, the second connection.
Apparatus and Method for Communication Between Devices in a Social Care Alarm System
A social care alarm system includes a client terminal unit configured to be installed in a dwelling of a client, and a remote monitoring center coupled by a set of data carriers over one or more communications networks. The client terminal unit communicates with the monitoring center in a master-slave communication session using a selected data carrier, which includes raising an alarm event and supporting a voice call. The client terminal unit is also able to send session less short status messages at predetermined intervals to the monitoring center using the selected data carrier without forming the master-slave communication session, in order to monitor viability of the selected data carrier with reduced bandwidth consumption.
Hardware configurable security, monitoring and automation controller having modular communication protocol interfaces
A single platform for controller functionality for each of security, monitoring and automation, as well as providing a capacity to function as a bidirectional Internet gateway, is provided. Embodiments of the present invention provide such functionality by virtue of a configurable architecture that enables a user to adapt the system for the user's specific needs. Embodiments of the present invention further provide such functionality by providing for installation of removable, modular communication adapters for communication with a variety of devices external to the security, monitoring and automation controller.
Incident location reporting using isodistance
In a method for calculating a location of a traffic incident a processor receives a first alarm message. The alarm message has a device identification, an event time stamp indicating detection of an incident, and a first distance vector. The processor calculates first isodistance information from the first distance vector and receives a second alarm message that has the device identification, the event time stamp, and a second distance vector. The processor calculates a second isodistance information for the second alarm message, and calculates a location of the incident based on the first isodistance information and the second isodistance information.
Shielded electrical cable
A shielded electrical cable includes conductor sets extending along a length of the cable and spaced apart from each other along a width of the cable. First and second shielding films are disposed on opposite sides of the cable and include cover portions and pinched portions arranged such that, in transverse cross section, the cover portions of the films in combination substantially surround each conductor set. An adhesive layer bonds the shielding films together in the pinched portions of the cable. A transverse bending of the cable at a cable location of no more than 180 degrees over an inner radius of at most 2 mm causes a cable impedance of the selected insulated conductor proximate the cable location to vary by no more than 2 percent from an initial cable impedance measured at the cable location in an unbent configuration.