G08B26/008

Facility monitoring apparatus and method
10902711 · 2021-01-26 ·

An autonomous facility monitoring apparatus and method in a facility can remain on at all times and functions to determine whether an unauthorized person has entered or is attempting to enter the facility and/or whether an environmental danger exists or is predicted. Continuously monitoring physical characteristics of a person and/or location of a person in the facility provides information for automatically detecting and signaling a detrimental health condition, for automatically controlling operation of apparatus of the facility, for operating gaming features, and so on.

COMMUNITY-BASED SECURITY SYSTEM
20210012646 · 2021-01-14 ·

A server accesses a security system profile of a first security system. The security system profile identifies a plurality of sensors connected to the first security system. The server identifies a second security system based on at least a first sensor of the plurality of sensors coupled to the first security system. The server then generates a notification sharing profile for the first security system based on the security system profile. The notification sharing profile indicates that the second security system corresponds to the first sensor. A first event triggered by the first sensor causes a first notification to the second security system.

Security system with smart connection module
10871961 · 2020-12-22 · ·

Systems and techniques are described for a sensor designed to connect to and monitor devices in an ecosystem. In some implementations, a system monitors a property that includes the sensor configured to generate sensor data reflecting an attribute of the property. The sensor includes a host board that generates the sensor data and a core board connected to the host board. The core board identifies a type of the host board and communicates with a monitor control unit. The monitor control unit receives a request for firmware associated with the type of the host board from the sensor. In response, the monitor control unit accesses the firmware and transmits the firmware to the sensor. The core board of the sensor receives the firmware and stores the firmware. The core board receives the sensor data from the host board and transmits the sensor data to the monitor control unit.

Community-based security system

A server accesses a security system profile of a first security system. The security system profile identifies a plurality of sensors connected to the first security system. The server identifies a second security system based on at least a first sensor of the plurality of sensors coupled to the first security system. The server then generates a notification sharing profile for the first security system based on the security system profile. The notification sharing profile indicates that the second security system corresponds to the first sensor. A first event triggered by the first sensor causes a first notification to the second security system.

SYSTEM AND METHOD FOR MANAGING AN AIRCRAFT PERSONAL SAFETY DEVICE
20200357267 · 2020-11-12 · ·

A system and method for managing an aircraft personal safety device can include an RF signaling device configured to monitor a state or condition of the aircraft personal safety device, and a management device configured to determine the state or condition of the aircraft personal safety device based on communication with the RF signaling device. The method can include associating the RF signaling device with the aircraft personal safety device, and monitoring the state or condition of the aircraft personal safety device by using the management device to receive information from the RF signaling device.

SECURITY SYSTEM INCLUDING AUTOMATION NOTIFICATION AND SURVEILLANCE INTEGRATION

A security system including automated notification and surveillance integration is provided. In the security system of the present disclosure, when any of the devices are locked, unlocked, interacted with, alarmed or triggered, a notification or communication signal is sent to at least one other device. The at least one other device may be a receiver, camera, smart phone, smart watch, laptop, desktop, and/or an Internet connected or Internet of Things (IoT) device. Additionally, a system is provided including at least one alarm module that generates an audible sound when an alarm condition is detected; at least one sensor that detects the audible sound and determines if the audible sound is within a predetermined frequency range and an interface that receives at least one first communication signal from the at least one sensor upon detecting an alarm and transmits at least one second communication signal to at least one device.

ALARM SYSTEM SUPERVISORY BY ZONE
20200312121 · 2020-10-01 ·

A premises alarm system includes multiple alarm sensors and a control panel. Each alarm sensor is configured to send a status signal. The control panel includes a processor, a wireless transceiver, and a storage medium. The storage medium stores instructions for execution by the processor. The processor can receive an assignment of the alarm sensors to different ones of multiple supervisory zones. The processor can receive a specified polling rate for each of the supervisory zones. The specified polling rate of one supervisory zone is different from the specified polling rate of another supervisory zone. The processor monitors for the status signal from each of the alarm sensors. The processor causes an alarm signal in response to determining that a status signal was not received from any one of the alarm sensors at the specified polling rate for the assigned supervisory zone.

REDIRECTING TRAFFIC FROM MOBILE DEVICE TO INITIAL SLICE SELECTOR FOR CONNECTION

Some embodiments provide a method for a first network slice selector that selects network slices for connections from endpoint devices located within a first geographic range. The method selects a network slice for a connection between a mobile endpoint device and a network domain that originates when the mobile endpoint device is located within the first geographic range. The method stores state that maps the connection to the selected network slice. The method forwards data traffic belonging to the connection from the mobile endpoint device onto the selected network slice using the stored state. After the mobile endpoint device moves from the first geographic range to a second geographic range, the method receives data traffic belonging to the connection from a second network slice selector that selects network slices for connections from endpoint devices within the second geographic range and forwards said received data traffic onto the selected network slice.

System and method for managing an aircraft personal safety device
10748413 · 2020-08-18 · ·

A system and method for managing an aircraft personal safety device can include an RF signaling device configured to monitor a state or condition of the aircraft personal safety device, and a management device configured to determine the state or condition of the aircraft personal safety device based on communication with the RF signaling device. The method can include associating the RF signaling device with the aircraft personal safety device, and monitoring the state or condition of the aircraft personal safety device by using the management device to receive information from the RF signaling device.

Leveraging fifth generation (5G) cellular capabilities for transmission and reception of emergency notifications and responses
10735936 · 2020-08-04 · ·

Aspects of the disclosure relate to transmission of emergency event notifications and reception of responses corresponding to the emergency event notifications. A computing platform may receive emergency event information. The computing device may identify, based on the emergency event information, a first target device. The computing device may transmit, a first notification to the first target device. Thereafter, the computing device may receive, from the first target device, a response corresponding to the first notification. The computing device may identify, based on the first response and the emergency event information, a second target device. Then, the computing device may transmit a second notification to the second target device. The second notification may comprise information that is different from information in the first notification.