G08B29/16

System and method of preventing hijacking of security systems and components
09769182 · 2017-09-19 · ·

A decentralized component is provided as an overly for a centralized system architecture as represented, for example, by a regional monitoring system. The decentralized component provides additional authentication of communications with a displaced monitoring service. Where agents of the decentralized component detect the presence of an unauthenticated monitoring service, messages can be generated or other actions can be taken to respond to that monitoring service.

Mission critical signaling failover in cloud computing ecosystem
09761119 · 2017-09-12 · ·

Methods and systems, including computer programs encoded on computer storage media, for reducing the likelihood of signaling failover in an alarm system, the method including identifying alarm events detected at monitored properties by monitoring systems that are located at the monitored properties; tracking the ability of a primary application infrastructure to transmit, to a central monitoring station server, the alarm events; detecting disruption in the ability of the primary application infrastructure to transmit the alarm events to the central monitoring station server; based on the detected disruption, enabling a signal transmission switch that switches a path for alarm events from the primary application infrastructure to a secondary application infrastructure, the secondary application infrastructure being an infrastructure operated by a cloud service provider; and based on enablement of the transmission switch, transmitting, by the secondary application infrastructure, at least one alarm event to the central monitoring station server.

TRUSTED MONITORING SYSTEM AND METHOD
20220237997 · 2022-07-28 ·

Methods and apparatus for monitoring remotely located objects with a system including at least one master data collection unit, remote sensor units, and a central data collection server are described. The master unit is configured to monitor any object, mobile or stationary, including monitoring multiple remote sensor units associated with the monitored objects. The master unit may be in a fixed location or attached to a mobile object. The master unit is configured for monitoring objects that enter and leave an area. The master unit may act as a parent controller for one or more child devices including remote sensors or monitors of measurable conditions including environmental conditions, substance identification, product identification, and/or biometric identification. The master unit may discover remote sensor units as they enter or leave the area where the master unit is located. The master unit can be remotely reprogrammed such as with authenticated instructions.

TRUSTED MONITORING SYSTEM AND METHOD
20220237997 · 2022-07-28 ·

Methods and apparatus for monitoring remotely located objects with a system including at least one master data collection unit, remote sensor units, and a central data collection server are described. The master unit is configured to monitor any object, mobile or stationary, including monitoring multiple remote sensor units associated with the monitored objects. The master unit may be in a fixed location or attached to a mobile object. The master unit is configured for monitoring objects that enter and leave an area. The master unit may act as a parent controller for one or more child devices including remote sensors or monitors of measurable conditions including environmental conditions, substance identification, product identification, and/or biometric identification. The master unit may discover remote sensor units as they enter or leave the area where the master unit is located. The master unit can be remotely reprogrammed such as with authenticated instructions.

Hardware configurable security, monitoring and automation controller having modular communication protocol interfaces

A single platform for controller functionality for each of security, monitoring and automation, as well as providing a capacity to function as a bidirectional Internet gateway, is provided. Embodiments of the present invention provide such functionality by virtue of a configurable architecture that enables a user to adapt the system for the user's specific needs. Embodiments of the present invention further provide such functionality by providing for installation of removable, modular communication adapters for communication with a variety of devices external to the security, monitoring and automation controller.

Hardware configurable security, monitoring and automation controller having modular communication protocol interfaces

A single platform for controller functionality for each of security, monitoring and automation, as well as providing a capacity to function as a bidirectional Internet gateway, is provided. Embodiments of the present invention provide such functionality by virtue of a configurable architecture that enables a user to adapt the system for the user's specific needs. Embodiments of the present invention further provide such functionality by providing for installation of removable, modular communication adapters for communication with a variety of devices external to the security, monitoring and automation controller.

SYSTEM AND METHOD FOR ALARM SIGNALING DURING ALARM SYSTEM DESTRUCTION

A system and method provide for the immediate transmission of a potential alarm to a remote alarm signal escrow site and from the escrow site to a host station in the event where a control panel or an alarm signaling device is tampered with or destroyed by a disablement tactic, e.g., a “crash and smash intrusion.” A system and method may also send an alarm signal during such an attack by using predictive analysis of real-time events.

SYSTEM AND METHOD FOR ALARM SIGNALING DURING ALARM SYSTEM DESTRUCTION

A system and method provide for the immediate transmission of a potential alarm to a remote alarm signal escrow site and from the escrow site to a host station in the event where a control panel or an alarm signaling device is tampered with or destroyed by a disablement tactic, e.g., a “crash and smash intrusion.” A system and method may also send an alarm signal during such an attack by using predictive analysis of real-time events.

Method and apparatus for monitoring the status of a boat
11345443 · 2022-05-31 · ·

A status monitoring system and the devices used for the status monitoring system is disclosed. The status monitoring system includes a controller device, a plurality of rod monitoring devices, and a motor monitoring device which works together to provide a layered approach to securing the boat. The controller device is configured to communicate with a smart device via cellular network. The controller device triggers an alert once it detects unexpected events on the boat or receives intrusion notifications from other devices in the status monitoring system. Unexpected events can include the boat moving out of the geofence, boat vibration, and unexpected starting of the vehicle. A method for monitoring the status of the boat is also disclosed. The method can include receiving an activation signal, receiving a GPS signal, receiving vibration signals, energizing the siren and transmitting notification and boat location to the cloud when detecting at least one trigger.

Method and apparatus for monitoring the status of a boat
11345443 · 2022-05-31 · ·

A status monitoring system and the devices used for the status monitoring system is disclosed. The status monitoring system includes a controller device, a plurality of rod monitoring devices, and a motor monitoring device which works together to provide a layered approach to securing the boat. The controller device is configured to communicate with a smart device via cellular network. The controller device triggers an alert once it detects unexpected events on the boat or receives intrusion notifications from other devices in the status monitoring system. Unexpected events can include the boat moving out of the geofence, boat vibration, and unexpected starting of the vehicle. A method for monitoring the status of the boat is also disclosed. The method can include receiving an activation signal, receiving a GPS signal, receiving vibration signals, energizing the siren and transmitting notification and boat location to the cloud when detecting at least one trigger.