Patent classifications
G08B29/16
SECURED SENSOR INTERFACE
Examples are disclosed that relate to the securing of a distributed sensor system. One example provides a security component configured to be communicatively coupled between a trusted element and a distributed sensor system. The security component includes a configuration table configured to store sensor configurations for the distributed sensor system, and a security controller configured to secure the configuration table by limiting access to the configuration table according to a selected security protocol. The security component further includes a feedback controller configured to receive signals from the distributed sensor system and send feedback instructions to the trusted element based at least on a comparison of the signals received from the distributed sensor system with values in the configuration table.
SECURED SENSOR INTERFACE
Examples are disclosed that relate to the securing of a distributed sensor system. One example provides a security component configured to be communicatively coupled between a trusted element and a distributed sensor system. The security component includes a configuration table configured to store sensor configurations for the distributed sensor system, and a security controller configured to secure the configuration table by limiting access to the configuration table according to a selected security protocol. The security component further includes a feedback controller configured to receive signals from the distributed sensor system and send feedback instructions to the trusted element based at least on a comparison of the signals received from the distributed sensor system with values in the configuration table.
EVENT DETECTION USING DISTRIBUTED EVENT DEVICES
Devices, systems, and methods for event detection using distributed event devices are described herein. In some examples, one or more embodiments include a first event device and a second event device, where the first event device is configured to detect an event in an area and wirelessly transmit a notification of the detected event and location information associated with the first event device to the second event device, and where the second event device is configured to receive the notification of the detected event and the location information from the first event device, determine whether the location information matches a location included in a database in response to receiving the detected event, and perform an activation action responsive to determining the location information matches a location included in the database.
NOTIFICATION OF EVENT SUBSEQUENT TO COMMUNICATION FAILURE WITH SECURITY SYSTEM
Methods and systems for monitoring a premises are described. A server external to the premises may be in communication with a system at the premises. The server may receive status data from the system from one or more interfaces. If a loss of communication occurs on one interface, then the status data may be received via a second interface. The server may determine timing information for status data received via the first interface and for status data received via the second interface. The server may send, based on the timing information, a message to a computing device indicating the loss of communication.
Fire alarm system
A fire alarm system according to an embodiment of the inventive concept includes a plurality of sensing systems, each sensing whether a fire has occurred, and a plurality of relay systems each corresponding to any one of the plurality of sensing systems, performing Radio Frequency (RF) communication with the plurality of sensing systems, and performing RF communication with each other, wherein each of the plurality of sensing systems includes a plurality of sensing units having different address information, wherein when detecting a fire, each of the plurality of sensing units transmits alarm information to a corresponding relay system among the plurality of relay systems, wherein when receiving alarm information from another adjacent sensing unit, each of the plurality of sensing units transmits the alarm information to a corresponding relay system among the plurality of relay systems, wherein each of the plurality of relay systems includes a memory in which information of parties corresponding to the address information is stored, and a reception unit configured to receive the alarm information from the plurality of sensing units, wherein when receiving the alarm information, the reception unit transmits a warning message to devices corresponding to the parties, and transmits the alarm information to adjacent relay systems among the plurality of relay systems.
FALSE ALARM REDUCTION SYSTEM, METHOD AND APPARATUS
Systems, methods and apparatus are described for reducing the occurrence of false alarms by determining the identify of people, typically via their mobile devices, in or near a monitored premises. A security system employing the embodiments described herein monitors a home or business to determine the presence of mobile devices in or near the premises, and determines whether such mobile devices are authorized, or not, to enter the premises after the security system has been armed. When an intrusion is detected, the security system determines whether any unauthorized mobile devices are present in or near the premises. If so, one or more escalated alarm responses are initiated by the security system. If no unauthorized mobile devices are in or near the premises when intrusion is detected, the security system ignores the intrusion and refrains from performing the escalated alarm responses.
FALSE ALARM REDUCTION SYSTEM, METHOD AND APPARATUS
Systems, methods and apparatus are described for reducing the occurrence of false alarms by determining the identify of people, typically via their mobile devices, in or near a monitored premises. A security system employing the embodiments described herein monitors a home or business to determine the presence of mobile devices in or near the premises, and determines whether such mobile devices are authorized, or not, to enter the premises after the security system has been armed. When an intrusion is detected, the security system determines whether any unauthorized mobile devices are present in or near the premises. If so, one or more escalated alarm responses are initiated by the security system. If no unauthorized mobile devices are in or near the premises when intrusion is detected, the security system ignores the intrusion and refrains from performing the escalated alarm responses.
System and method for alarm signaling during alarm system destruction
A system and method provide for the immediate transmission of a potential alarm to a remote alarm signal escrow site and from the escrow site to a host station in the event where a control panel or an alarm signaling device is tampered with or destroyed by a disablement tactic, e.g., a “crash and smash intrusion.” A system and method may also send an alarm signal during such an attack by using predictive analysis of real-time events.
System and method for alarm signaling during alarm system destruction
A system and method provide for the immediate transmission of a potential alarm to a remote alarm signal escrow site and from the escrow site to a host station in the event where a control panel or an alarm signaling device is tampered with or destroyed by a disablement tactic, e.g., a “crash and smash intrusion.” A system and method may also send an alarm signal during such an attack by using predictive analysis of real-time events.
System and method of alerting CMS and registered users about a potential duress situation using a mobile application
Systems and methods of alerting a central monitoring station and registered users about a potential duress situation using a mobile application are provided. Some methods can include receiving user input to access a remote security system, responsive to receiving the user input, determining whether the user input includes a first type of user input or a second type of user input, when the user input includes the second type of user input, collecting additional information from an ambient environment, transmitting a duress message to a central monitoring station, the duress message including the additional information.