Patent classifications
G08B25/005
Systems and Methods for Managing Patient Devices
An alarm manager identifies responders that are confirmed to be available to receive an alarm notification pertaining to a patient device through one or more computing devices. An alarm of the patient device may be suppressed in response to verifying that responders are available to receive the alarm notification. The alarm notification may be transmitted to the identified responders, and verification of receipt, acceptance, and/or completion of the alarm notification is received. An alarm notification may be retransmitted in response to a failure to verify receipt, acceptance, and/or completion within a time threshold.
eReceptionist and eNeighborhood watch system for crime prevention and/or verification
A system comprising a camera sensor, a circuit and an identification device. The camera sensor may be configured to generate video data of an environment. The circuit may be configured to (A) communicate with a network through a wireless connection, (B) provide an electrical connection to (i) a plurality of components and (ii) the camera sensor and (C) enable at least one of (i) the components and (ii) the camera sensor in response to an authentication signal. The identification device may be configured to generate the authentication signal. The plurality of components may be configured to implement a virtual receptionist. The video data may be transmitted to the network. The authentication signal may be transmitted using the network. The notifications may be generated by the components.
Portable personal monitor device and associated methods
The technology relates to portable personal monitor device and associated methods. In particular, the technology provides for improving the capability of personal monitor device systems by enabling functions such as two-way communications from the personal monitor; associating possible threats with one or more locations; and dynamically determining safe locations and potential evacuation routes. Also described herein are monitors which improve the detection of possible threats or risks by allowing a base unit to be used with various replacement sensor modules.
Data driven emergency notification application and system
An emergency notification method which includes receiving an alert signal triggered by a user from a first remote device during an emergency situation, receiving user identification data of the user from the first remote device, sending a response request signal to a plurality of first responders with a second remote device, receiving location information from the user and the plurality of first responders from the first and second remote device, respectively, and sending the alert signal to authorized first responders of the plurality of first responders to respond to the emergency situation.
SECURITY SYSTEMS AND METHODS OF OPERATION
A security system and methods for managing same are disclosed. The security system include an on-site security system including one or more alarm condition sensors and at least one site control unit configured to communicate with the alarm condition sensors, and a security management service located remotely from the on-site security system and configured to communicate with the site control unit and at least one authorised user associated with the on-site security system. The service issues an alarm notification to at least one authorised user, the alarm notification identifying at least a sensor triggering issuance of the alarm notification, a location of the sensor, and a time of the sensor being triggered. The service monitors for acknowledgement of the alarm notification from the authorised user, and issues a response request to at least one security responder in the absence of an acknowledgement.
ADVANCED BEHAVIOR-BASED SAFETY NOTIFICATION SYSTEMS AND METHODS
The present disclosure is directed to systems and methods for an advanced behavior-based safety system. In some embodiments, the advanced behavior-based safety system receives data associated with one or more observed safety violations, each with a set of assessment parameters, at a location. Based upon the assessment parameters, an observed safety violation can be evaluated as to whether it exceeds a notification threshold according to a risk assessment protocol. Depending on whether the notification threshold is exceeded, a notice of the observed safety violation may be transmitted or scheduled for transmission to a management entity having a unique notification address. In some embodiments, an aggregation of the assessment parameters of all observed safety violations can also be determined, and the aggregation further evaluated to determine whether a notice of the observed safety violations should be transmitted to a management entity.
Alarm signaling technology
Techniques are described for handling an event where a control panel or an alarm signaling device is tampered with or destroyed by a disablement tactic, e.g., a “crash and smash intrusion.”
Artificial intelligence applications for computer-aided dispatch systems
Exemplary embodiments of the present invention provide a virtual dispatch assist system in which various types of Intelligent Agents are deployed (e.g., as part of a new CAD system architecture or as add-ons to existing CAD systems) to analyze vast amounts of historic operational data and provide various types of dispatch assist notifications and recommendations that can be used by a dispatcher or by the CAD system itself (e.g., autonomously) to make dispatch decisions.
VOICE ACTIVATION OF AN ALARM VIA A COMMUNICATION NETWORK
A method for activating an alarm is described. The method is performed by an alarm device connected to a communication network and arranged in the vicinity of a user. The method includes receiving voice data generated by the user, comparing the received voice data with voice data recorded in the alarm device, and, when the received voice data matches recorded voice data, transmitting to a server, via the communication network, textual information known to the server, in order to request assistance for the user, the textual information being non-representative of the voice data generated by the user.
REMOTELY MONITORING USERS AND GENERATING EMERGENCY EVENT CODE TEMPORARILY ALLOWING EMERGENCY DISPATCHER TO ACCESS COLLECTED DATA FOR USER EXPERIENCING EMERGENCY
A system for remote user monitoring includes a user monitoring device and a controller. The controller receives sensor data from the user monitoring device and updates stored user data accordingly. Upon confirmation of an emergency associated with a particular user, the controller generates an emergency event code, associates the code with the particular user, and sends the code to a monitoring operator to provide to emergency dispatch. When receiving a user data access request including the emergency event code from an emergency dispatcher, the controller only provides user data associated with the particular user when determining that the emergency event code received from the emergency dispatcher is active. The user monitoring device may store an on-shift configuration specifying which information to send to the controller during an on-shift mode and an off-shift configuration specifying which information to send during an off-shift mode, and may dynamically change modes at different times.