G08B25/008

MEDICINE ADMINISTRATION AND TRACKING SYSTEMS AND METHODS INCLUDING CUSTOMIZED USER ALERTS

A method, and a system configured to perform a method, for customizing user alerts in a medicine administration and tracking system including detecting an alertable condition for which a medicine administration and tracking system is configured to monitor, generating a custom alert for the alertable condition based at least in part on historical data indicating a responsiveness to previous alerts for the same alertable condition, delivering the generated custom alert to a user, determining the user's response to the generated custom alert, and updating the historical data to include the alertable condition, the generated custom alert, and the user's level of responsiveness to the generated custom alert.

GESTURE BASED INTERFACE FOR A PREMISES SECURITY SYSTEM
20230096207 · 2023-03-30 ·

A control device in a premises security system configured to communicate with a premises device that includes a radar sensor for sensing hand gestures is provided. The control device receives signaling from the premises device indicative of a hand gesture, performs a first correlation of the hand gesture to a predetermined premises security system command, performs a second correlation of a verbal security password, a speaker voice recognition, a presence of the user's phone near the control device, a presence of a registered wearable near the control device, a camera viewing a registered home occupant inside the premises, or biometrics to the predetermined premises security system command, and performs a first action based on the first correlation and second correlation, such as arming or disarming the premises security system.

Automated bulk location-based actions
11495122 · 2022-11-08 · ·

Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for automating bulk location-based actions in response to disaster events. A system obtains data defining zones related to different geographic locations and configures a set of preferences for each zone. One of the preferences is a command for responding to an event. The system detects a disaster event and determines that a location affected by the event is related to a zone defined at the system. The system obtains sensor data generated by a sensor in the zone that is connected to a monitoring system for the zone. The system generates an alert based on the sensor data and the command and provides the alert to a client device of an entity that manages properties in the zone. The alert provides an assessment of how the disaster event affects items at properties in the zone.

HANDLING DURESS INPUT

Techniques are described for handling duress input. For example, techniques are described for handling duress input provided to a mobile application that controls a monitoring system located at a fixed property.

Gateway-based anti-theft security system and method

Improved systems and techniques are disclosed for controlling the security states of anti theft security systems such as product display assemblies using security fobs. The tasks relating to fob authentication are offloaded to a computer system, and these authentications can be based on identifiers for the different security fobs. The computer system can maintain a list of identifiers for authorized security fobs that is easily updated when new security fobs are added to or existing security fobs are de-authorized from the system.

Server-based notification of alarm event subsequent to communication failure with armed security system

A server-based environment for reporting a status of a security, monitoring and automation controller is provided. Detecting cessation of an always-on persistent network connection between the SMA controller and the server is also provided. Reporting the cessation of the network connection to an end user and defined others is further provided. A further aspect provides for automatically reporting an alarm event to a central station, the end user, and others, in the event the cessation of the network connection occurs while the SMA controller is armed and after a zone fault event, and not receiving a disarm notification prior to expiration of a preset entry delay.

Premises management configuration and control
11601397 · 2023-03-07 · ·

Disclosed are methods, systems, and devices for management of a premises. The premises may comprise one or more devices, such as a gateway device, a control device, or a premises device. The gateway device may receive data and send the data to the control device. The data may comprise a command, an update, a configuration, or other information. Communication between the control device and any of the other devices at the premises may be configurable by a server device.

POINT-TO-POINT VISUAL COMMUNICATIONS IN A SECURITY MONITORING SYSTEM
20230119879 · 2023-04-20 ·

A monitoring system includes a doorbell unit that includes a camera and a display and that is configured to receive a request to access the property. The monitoring system includes a monitor control unit that is configured to determine an authentication protocol for determining whether to grant the visitor access to the property. The monitor control unit generates a first image and transmits authentication data to a computing device. The monitor control unit provides the first image and instructions to output the first image on the display of the doorbell unit. The monitor control unit receives a second image captured by the camera of the doorbell unit. The monitor control unit determines whether the second image includes a representation of data that is based on processing the first image in combination with the authentication data. The monitor control unit grants or denies the visitor access to the property.

SYSTEM AND METHOD OF LOCATING INSTALLED DEVICES
20230069435 · 2023-03-02 ·

A graphically based tool and method for generating programming for a fire monitoring system. The locations of existing devices, such as detectors, in a building being monitored, can be visually presented in the context of the building. New devices can be installed, or the location of existing devices changed since all devices report their locations in the building to the tool. Device location information can be combined with building information to create a multi-dimensional representation of parts of the building being monitored.

AUTHENTICATION OF WEARABLE DEVICES ASSOCIATED WITH A PREMISES SECURITY SYSTEM
20230118816 · 2023-04-20 ·

In some embodiments, an authentication device is provided. The authentication device configured to determine that the wearable device is authorized to participate in the premises security system, cause transmission of a first security token that is usable to validate that the wearable device is authorized to participate in the premises security system, in response to the status update, request the first security token from the wearable device, validate that the wearable device is authorized to participate in the premises security system based at least in part on the first security token received from the wearable device and in response to validating that the wearable device is authorized to participate in the premises security system, cause transmission of a second security token to the wearable device where the second security token is usable to trigger a premises security system action.