Patent classifications
G08B25/008
Processing Alarm Signals
Methods, systems, computer-readable media, and apparatuses for processing alarm signals are presented. In some embodiments, a mobile device may be registered with a security system that is installed at a premises. Subsequently, an alarm trigger associated with the security system may be received. Based on receiving the alarm trigger, the location of the mobile device may be determined. A response to the alarm trigger then may be determined based on the location of the mobile device.
REDUCED FALSE ALARM SECURITY SYSTEM
Embodiments of a central security monitoring device for reducing incidences of false alarms in a security system is disclosed. In one embodiment, a method is described, comprising receiving an alarm signal from an occupancy sensor via a receiver, receiving a second alarm signal from a barrier alarm device after receiving the alarm signal, determining, by a processor, an elapsed time from when the alarm signal from the occupancy sensor was received to when the second alarm signal from the barrier alarm device was received, transmitting, by the processor via a network interface, a message to a personal communication device indicating that a false alarm has occurred when the elapsed time is less than the predetermined time.
Smart home robot assistant
Methods and systems are described for robot transportation of objects into or out of a home automation system. One example may include determining, by a mobile robotic device, that an object is available to cross a boundary of the home automation system. The method may include deactivating at least a portion of the home automation system. The method also include retrieving, by the mobile robotic device, the object and transporting, by the mobile robotic device, the object across the boundary. The method further includes leaving, by the mobile robotic device, the object at a drop-off location. The method may also include reactivating at least the portion of the home automation system.
Systems and methods for alarm processing
System and method for alarm processing are provided. The system may include a plurality of security devices. The plurality of security devices may be divided into at least one group. One group of the at least one group may include a first security device and one or more second security devices. The first security device may receive, from the one or more second security devices, one or more first alarms generated by the one or more second security devices. The first security device may determine that an alarm condition is satisfied based at least on one of the one or more first alarms and one or more second alarms generated by the first security device. The first security device may send, based on the determination, at least one of the one or more first alarms and the one or more second alarms to a user terminal.
Smart device for use with an electronic key
A merchandise security system for protecting an item of merchandise from theft. The merchandise security system comprises a smart device and an electronic key coupled to the smart device. The electronic key is configured to communicate with a merchandise security device for operating a merchandise security device.
Sensor-based item transport system
A sensor-based item transport system, and a method therefore are described. The system includes, for example, a cart station, within a restricted area including a plurality of automated drive. A light curtain is adjacent to the cart station. A first sensor and a second sensor are spaced apart from the first sensor within the cart station. A first mode associated with the light curtain is maintained causing an alarm system associated with the light curtain to remain armed. The first mode is caused to change to a second mode associated with the light curtain, the second mode causing the alarm system to be muted, based at least in part on the identity of the cart. The identity is determined based at least in part on one or more signals received from the first sensor and the second sensor.
Tracking conditions concerning an area to automatically generate artificial intelligence based responsive actions
Logical boundaries enclosing a physical area are defined. A segment of the logical boundaries is defined as a directional gate, wherein traversing the gate into the physical area is defined as an ingress and traversing the gate out of the physical area is defined as an egress. The directional gate is monitored, and ingresses and egresses are detected. An occupancy count of the physical area is maintained, based on monitoring the gate and detecting ingresses and egresses. One or more conditions are tracked in addition to the occupancy count. Artificial intelligence (AI) processing is applied to the maintained occupancy count and the additional tracked condition(s), in real-time as the monitoring, maintaining and tracking are occurring. One or more responsive actions are automatically taken as a result of applying the AI processing to the maintained occupancy count and the additional tracked condition(s).
Falls risk management
Automatically gathering and processing data relating to risk of patient falls. The data is analyzed to determine a level of risk each patient has for falling. Patient risk for falls is stratified and protocols are implemented to mitigate that risk. The system communicates instructions and alerts to caregivers to complete tasks or provide aid to patients. Updates to patient medical information and updates to best practices in fall risk management result in updates to patient risk stratifications. In turn, tasks and alerts are updated to reflect updates to patient risk stratifications.
Methods, systems, and apparatuses for presence detection
Methods, systems, and apparatuses for managing a wireless network are described herein. A wireless network may include a gateway device, an access point, and a group of client devices. An analytics engine may determine a signal characteristic data for a client device, which may indicate network telemetry data for each of the client devices or associated locations during a time period. The analytics engine may utilize a trained classifier to determine that a signal characteristic indicated by the signal characteristic data for a client device satisfies a threshold.
Systematic integration via an intrusion detection device
A vehicle theft-prevention apparatus can include at least one computing device couple to a plurality of sensors and a wireless transceiver. The plurality of sensors can be configured to sense measurements proximate to a vehicle. The at least one computing device can be configured to read a plurality of first measurements of a first sensor of the plurality of sensors. Based on the plurality of first measurements from the first sensor, the at least one computing device can determine that a key fob moved outside of a range of the first sensor. In response to the key fob moving outside of the range of the first sensor, the at least one computing device can transition to an armed state. The at least one computing device can read a plurality of second measurements from a subset of the plurality of sensors. Based on the plurality of second measurements, the at least one computing device can determine that a person has entered the vehicle.