Patent classifications
G08B25/14
Control system user interface
Embodiments include systems and methods comprising a gateway located at a premise forming at least one network on the premise that includes a plurality of premise devices. A sensor user interface (SUI) is coupled to the gateway and presented to a user via a remote device. The SUI includes at least one display element. The at least one display element includes a floor plan display that represents at least one floor of the premise. The floor plan display visually and separately indicates a location and a current state of each premise device of the plurality of premise devices.
Control system user interface
Embodiments include systems and methods comprising a gateway located at a premise forming at least one network on the premise that includes a plurality of premise devices. A sensor user interface (SUI) is coupled to the gateway and presented to a user via a remote device. The SUI includes at least one display element. The at least one display element includes a floor plan display that represents at least one floor of the premise. The floor plan display visually and separately indicates a location and a current state of each premise device of the plurality of premise devices.
METHODS AND SYSTEMS FOR MANAGING EXECUTION OF STANDARD OPERATING PROCEDURES BY AN OPERATOR TO ADDRESS ALARMS GENERATED BY A FACILITY MANAGEMENT SYSTEM
A computer assisted facility monitoring method provides users with predefined operating procedures that are recommended for addressing one or more alarms acknowledged by the user. The predefined operating procedures are created and stored prior to the occurrence of the alarms. In some examples, after acknowledging an alarm occurrence, the user may be provided with an option for bypassing or disregarding the alarm, as some such acknowledgements may have been for false alarms. In some examples, the predefined operating procedure may specify multiple action steps for addressing an alarm. In such examples, the user can close out or settle an alarm incident even without completing all of the action steps, provided the user enters a valid reason for doing so. In some examples, a user can batch-select a group of alarms, wherein perhaps only some of the acknowledged alarms in the group have corresponding predefined operating procedures.
DOORBELL COMMUNICATION SYSTEMS AND METHODS
A method of operating a doorbell system can include receiving, by a remote computing device, a notification of an emergency event and in response to the receiving, illuminating at least one light of a doorbell to indicate an occurrence of the emergency event. The method can further include, in response to receiving the notification, initiating a communication with an emergency dispatcher and/or an emergency contact. The at least one light can illuminate in a variety of colors and illumination patterns corresponding to the type of emergency event.
DOORBELL COMMUNICATION SYSTEMS AND METHODS
A method of operating a doorbell system can include receiving, by a remote computing device, a notification of an emergency event and in response to the receiving, illuminating at least one light of a doorbell to indicate an occurrence of the emergency event. The method can further include, in response to receiving the notification, initiating a communication with an emergency dispatcher and/or an emergency contact. The at least one light can illuminate in a variety of colors and illumination patterns corresponding to the type of emergency event.
SYSTEMS AND METHODS FOR MANAGING SECURITY EVENTS USING A GRAPHICAL USER INTERFACE
Example implementations include a method, apparatus and computer-readable medium for managing security events via a graphical user interface (GUI), comprising receiving an indication of a first security event occurring in an environment, determining a priority value of the first security event, and creating a first identifier of the first security event, wherein the first identifier is a visual icon of a given shape. The implementations further include assigning a size and color to the first identifier of the first security event based on the priority value and generating, for display on the GUI, the first identifier of the first security event, wherein the GUI is configured to display identifiers of one or more security events in a selectable layout of a plurality of selectable layouts, wherein selection of the first identifier generates a panel of selectable actions that can be executed to address the first security event.
SECURE COMMUNICATIONS FOR MONITORED FACILITIES
Systems and methods relating to secure communications for use with monitored facilities. A segregated private network is provided where the network only allows properly credentialed users to use the network. Only traffic destined for addresses internal to the private network are allowed within the network. Access nodes control access to the private network while other types of traffic for the network, including radio and text messaging traffic may also use the private network for a secure communications link between source and destination nodes. Preferably, the communication links are end to end encrypted. As well, preferably, video and data streams from monitored facilities are transmitted to central monitoring offices using the private network.
SECURE COMMUNICATIONS FOR MONITORED FACILITIES
Systems and methods relating to secure communications for use with monitored facilities. A segregated private network is provided where the network only allows properly credentialed users to use the network. Only traffic destined for addresses internal to the private network are allowed within the network. Access nodes control access to the private network while other types of traffic for the network, including radio and text messaging traffic may also use the private network for a secure communications link between source and destination nodes. Preferably, the communication links are end to end encrypted. As well, preferably, video and data streams from monitored facilities are transmitted to central monitoring offices using the private network.
EMERGENCY SITUATION DETECTION AND RESPONSE BASED ON PROTECTIVE EQUIPMENT SENSOR DATA
Sensor data from one or more protective equipment sensors of protective equipment worn by a person are received. In response to determining based at least on the sensor data that no emergency situation occurred for the person, sensor data is sent from the body-worn hub to a server when a route of communication is available. In response to determining based at least on the sensor data that an emergency situation occurred for the person and at least one route of communication is currently available, the sensor data is sent from the body-worn hub to the server via at least one route of communication. However, in response to determining based at least on the sensor data that an emergency situation occurred for the person and there is no available route of communication, the sensor data is analyzed at the body-worn hub to determine whether the person is injured.
EMERGENCY SITUATION DETECTION AND RESPONSE BASED ON PROTECTIVE EQUIPMENT SENSOR DATA
Sensor data from one or more protective equipment sensors of protective equipment worn by a person are received. In response to determining based at least on the sensor data that no emergency situation occurred for the person, sensor data is sent from the body-worn hub to a server when a route of communication is available. In response to determining based at least on the sensor data that an emergency situation occurred for the person and at least one route of communication is currently available, the sensor data is sent from the body-worn hub to the server via at least one route of communication. However, in response to determining based at least on the sensor data that an emergency situation occurred for the person and there is no available route of communication, the sensor data is analyzed at the body-worn hub to determine whether the person is injured.