Patent classifications
G08B26/007
METHOD FOR ALLOWING DRONE ACTIVITY TO MODIFY EVENT DETECTION BY A MONITORING SYSTEM
Methods, systems, and apparatus, including computer programs encoded on a storage device, for enabling drone activity in a property monitored by a property monitoring system without triggering a false alarm. In one aspect, the method includes actions of obtaining a location of the drone, identifying a first sensor installed at the property that is within a predetermined distance of the drone, detecting first sensor data generated by the first sensor that is within a predetermined distance of the drone, wherein the first sensor data includes data that is indicative of an event, determining whether a second sensor that is mounted to the drone is generating second sensor data that corroborates the event indicated by the first sensor data, and disregarding, by the property monitoring system, the first sensor data in determining whether to trigger an alarm.
ALARM ROUTING OPTIMIZATION STRATEGIES IN TARGETED ALARM SYSTEM
A targeted alarm system is described that includes a network probe for sending test data to terminal devices connected to a network and deriving reliability data of the terminal devices and the network. When a targeted alarm message needs to be sent, the system identifies a targeted terminal device based on the reliability data for sending the targeted alarm message. Related methods, apparatus, and non-transitory computer readable media are also disclosed.
System and method for automatically disarming an intrusion detection system
A system for automatically disarming an intrusion detection system protecting a premises and having at least an armed state of operation and a disarmed state of operation, the system for automatically disarming the intrusion detection system including an intrusion detection system state of operation ascertainer operable for receiving an indication of activation of an armed state of operation of the intrusion detection system; and a registered mobile communicator proximity detector communicating with the intrusion detection system state of operation ascertainer and operable, responsive to receiving the indication of activation of the armed state of operation by the intrusion detection system state of operation ascertainer for ascertaining at least a subset of a multiplicity of registered mobile communicators which are located in a vicinity of the premises during an activation time of the armed state of operation and for deactivating the subset of the multiplicity of registered mobile communicators.
Assessing the security situation by means of IoT activity sensors
A method and/or system for assessing the security situation in a building through an evaluation of sensor values provided by activity sensors situated in the building, in particular, in the accommodation region, an estimate of the number of persons actually present in the building, determining the number of persons to be expected in the building by an evaluation of administrative data (HR, Outlook, events, occupancies, etc.). Based upon a comparison of the number of persons to be expected with the number of actual persons, an indicator is determined for assessing the actual security situation in the building or in the accommodation region.
Systems and methods for activating a security action responsive to proximal detection and identification of a wireless device
Systems and methods for activating a security action responsive to proximal detection and identification of a wireless device are provided. Such systems and methods can include a wireless radio of a door mounted contact sensor of a security system receiving a broadcast message that includes a device identifier from the wireless device. Then, such systems and methods can include determining whether the device identifier corresponds to any of a plurality of authorized devices enrolled with the security system, determining whether a signal parameter of the broadcast message satisfies a preconfigured access condition, and responsive thereto, performing the security action.
Systems and methods for efficient utilization of wireless bandwidth
Systems and methods are provided that include an access point receiving a request from a device to join a first network defined by a first protocol, the access point allocating a slot of a superframe to the device, and the access point allocating remaining slots of the superframe to communication by the access point on a second network defined by a second protocol. Additionally or alternatively, some methods can include the access point enabling a first transceiver communicating via the first protocol and either, when the first transceiver receives first data from the device via the first protocol within a predetermined time of a beginning of the slot, receiving second data from the device via the first protocol for a remainder of the slot or, when the first transceiver module fails to receive the first data, the access point enabling a second transceiver for the remainder of the slot.
Method for allowing drone activity to modify event detection by a monitoring system
Methods, systems, and apparatus, including computer programs encoded on a storage device, for enabling drone activity in a property monitored by a property monitoring system without triggering a false alarm. In one aspect, the method includes actions of obtaining a location of the drone, identifying a first sensor installed at the property that is within a predetermined distance of the drone, detecting first sensor data generated by the first sensor that is within a predetermined distance of the drone, wherein the first sensor data includes data that is indicative of an event, determining whether a second sensor that is mounted to the drone is generating second sensor data that corroborates the event indicated by the first sensor data, and disregarding, by the property monitoring system, the first sensor data in determining whether to trigger an alarm.
SYSTEMS AND METHODS FOR ACTIVATING A SECURITY ACTION RESPONSIVE TO PROXIMAL DETECTION AND IDENTIFICATION OF A WIRELESS DEVICE
Systems and methods for activating a security action responsive to proximal detection and identification of a wireless device are provided. Such systems and methods can include a wireless radio of a door mounted contact sensor of a security system receiving a broadcast message that includes a device identifier from the wireless device. Then, such systems and methods can include determining whether the device identifier corresponds to any of a plurality of authorized devices enrolled with the security system, determining whether a signal parameter of the broadcast message satisfies a preconfigured access condition, and responsive thereto, performing the security action.
Alarm routing optimization strategies in targeted alarm system
A targeted alarm system is described that includes a network probe for sending test data to terminal devices connected to a network and deriving reliability data of the terminal devices and the network. When a targeted alarm message needs to be sent, the system identifies a targeted terminal device based on the reliability data for sending the targeted alarm message. Related methods, apparatus, and non-transitory computer readable media are also disclosed.
ESTABLISHING AN AUDIO/VIDEO LINK TO A CENTRAL MONITORING STATION
Provided are embodiments for an alarm system including one or more sensors configured to detect an alarm condition, and one or more client stations. The alarm system also includes a controller of a security panel operably coupled to the one or more client stations, and a central station operably coupled to the control panel over a network, wherein the central station is configured to initiate a conference between the one or more client stations and the central station. Also provided are embodiments for a method to establish an audio/video link to a central monitoring station.