G08B29/16

System and method of alerting CMS and registered users about a potential duress situation using a mobile application

Systems and methods of alerting a central monitoring station and registered users about a potential duress situation using a mobile application are provided. Some methods can include receiving user input to access a remote security system, responsive to receiving the user input, determining whether the user input includes a first type of user input or a second type of user input, when the user input includes the second type of user input, collecting additional information from an ambient environment, transmitting a duress message to a central monitoring station, the duress message including the additional information.

Method, apparatus, and system for managing alarms

A method, an apparatus, and a system for managing alarms is provided. In one aspect, the method includes detecting a fault in one of a plurality of alarm systems, wherein each of the alarm systems is configured to generate at least one alarm associated with an event in the technical installation. The method further includes invoking a proxy of the faulty alarm system upon detecting the fault condition, wherein the proxy, when invoked, is configured to perform the functions of the faulty alarm system. Additionally, the method includes processing, by the proxy, event data associated with the event in the technical installation. Furthermore, the method includes generating at least one alarm by the proxy based on the processing of the event in the technical installation and outputting an alarm condition on a device associated with a user of the technical installation.

Method, apparatus, and system for managing alarms

A method, an apparatus, and a system for managing alarms is provided. In one aspect, the method includes detecting a fault in one of a plurality of alarm systems, wherein each of the alarm systems is configured to generate at least one alarm associated with an event in the technical installation. The method further includes invoking a proxy of the faulty alarm system upon detecting the fault condition, wherein the proxy, when invoked, is configured to perform the functions of the faulty alarm system. Additionally, the method includes processing, by the proxy, event data associated with the event in the technical installation. Furthermore, the method includes generating at least one alarm by the proxy based on the processing of the event in the technical installation and outputting an alarm condition on a device associated with a user of the technical installation.

Active intruder mitigation system and method

A life safety system for mitigating injuries and fatalities to occupants of a multi-zone structure comprising a plurality of controllers, and coupled to said controller, a plurality of digital imaging devices, a plurality of locking mechanisms, a plurality of dispersion points for the dispersion of at least one dispersible substance, and a plurality of thermostatic members. The life safety system further comprises at least one monitoring location physically removed from at least one of said controllers and from at least one of said dispersion points and from at least one of said locking mechanisms and from at least one of said thermostatic members.

OPTICAL FIBER SENSING SYSTEM AND OPTICAL FIBER SENSING METHOD
20220307871 · 2022-09-29 · ·

The optical fiber sensing method according to the present disclosure includes: sensing optical fibers being redundantly laid (10A1, 10A2); an execution unit (22) that executes sensing with the sensing optical fibers (10A1, 10A2); a detection unit (23) that detects occurrence of a fault in the sensing optical fiber (10A1) of an active system among the sensing optical fibers (10A1, 10A2); and a switching unit (21) that performs switching in such a way that the execution unit (22) executes sensing with the sensing optical fiber (10A2) of a standby system among the sensing optical fibers (10A1, 10A2) when the detection unit (23) detects occurrence of a fault.

INTELLIGENT MEDICAL ESCALATION PROCESS
20170228516 · 2017-08-10 ·

A medical network service can replace or supplement some or all of an expensive internally staffed clinical facility network with a cloud-based networking service. The medical network service in certain embodiments can provide networking services via software as a service technologies, platform as a service technologies, and/or infrastructure as a service technologies. The medical network service can provide these services to large existing clinical facilities such as metropolitan hospitals as well as to smaller clinical facilities such as specialized surgical centers. The medical network service can replace and/or supplement existing IT networks in hospitals and other clinical facilities and can therefore reduce costs and increase security and reliability of those networks. In addition, the medical network service can provide synergistic benefits that can improve patient outcomes and patient care. In addition, a medical edge router can provide redundant communications features for transmitting patient data to the medical network service.

Electronic Device

We disclose herein an electronic device comprising: a state machine for receiving an output signal from a sensor; a comparator operatively coupled with the state machine; and a first processor operatively coupled with the comparator. The state machine is configured to receive the output signal from the at least one sensor to obtain sensor measurement data and configured to pass the obtained sensor measurement data to the comparator. The comparator is configured to process the obtained sensor measurement data into first processed sensor data, and configured to compare the first processed sensor data with a first predetermined threshold limit. The comparator is configured to inform the first processor about the obtained sensor measurement data if the first processed sensor data exceed the first predetermined threshold limit.

Security system storage of persistent data

A security system including devices generating persistent data, a local control system (LCS) including a microprocessor and non-volatile memory and receiving persistent data from the devices, and a server remote from the LCS. The remote server is in communication with the LCS microprocessor which periodically transmits logical portions of persistent data (each including a timestamp) to the remote server where it is saved. The microprocessor also periodically saves the persistent data portions in LCS non-volatile memory less frequently than the persistent data portions are periodically saved in the remote data storage, and saves the timestamp in the local data storage for each persistent data portion saved only at the remote server. When rebooting the LCS, the microprocessor retrieves from the remote data storage only the persistent data portions having timestamps subsequent to the timestamp saved in the local data control system non-volatile memory.

Security system storage of persistent data

A security system including devices generating persistent data, a local control system (LCS) including a microprocessor and non-volatile memory and receiving persistent data from the devices, and a server remote from the LCS. The remote server is in communication with the LCS microprocessor which periodically transmits logical portions of persistent data (each including a timestamp) to the remote server where it is saved. The microprocessor also periodically saves the persistent data portions in LCS non-volatile memory less frequently than the persistent data portions are periodically saved in the remote data storage, and saves the timestamp in the local data storage for each persistent data portion saved only at the remote server. When rebooting the LCS, the microprocessor retrieves from the remote data storage only the persistent data portions having timestamps subsequent to the timestamp saved in the local data control system non-volatile memory.

System and method of preventing hijacking of security systems and components
09769182 · 2017-09-19 · ·

A decentralized component is provided as an overly for a centralized system architecture as represented, for example, by a regional monitoring system. The decentralized component provides additional authentication of communications with a displaced monitoring service. Where agents of the decentralized component detect the presence of an unauthenticated monitoring service, messages can be generated or other actions can be taken to respond to that monitoring service.