G08B13/181

METHODS AND SYSTEMS FOR DETECTING INTRUSIONS IN A MONITORED VOLUME
20200175844 · 2020-06-04 ·

A method for detecting intrusions in a monitored volume in which: N tridimensional sensors acquire local point clouds in respective local coordinate systems; a central processing unit receives the acquired local point clouds and, for each sensor; computes updated tridimensional position and orientation of the sensor in a global coordinate system of the monitored volume by aligning a local point cloud acquired by the tridimensional sensor with a global tridimensional map of the monitored volume; and generates an aligned local point cloud on the basis of the updated tridimensional position and orientation of the sensor; the central processing unit monitors an intrusion in the monitored volume by comparing a free space of the aligned local point cloud with a free space of the global tridimensional map.

CHILDREN FACE DISTANCE ALERT SYSTEM
20200151432 · 2020-05-14 ·

In an embodiment, a children face alert system is provided for use with a smart device with a display screen. A neural network model trained with dataset images with embedded distance information can run in the background of the smart device. When receiving a captured image frame of the face of a child using the smart device, the neural network model can determine that the captured image frame is from a child, and further determine whether the face of the child is within a predetermined distance to the display screen based on a size of the face on the captured image frame. If the face is within the predetermined distance, the smart device can display an alert that the face of the child is too close to the display screen and pause one or more user applications until the child's face moves outside of the predetermined distance.

SYSTEMS AND APPARATUSES FOR DETECTING UNMANNED AERIAL VEHICLE
20200100065 · 2020-03-26 · ·

Apparatuses, methods, and computer program products disclosed herein provide improved unmanned aerial vehicle (UAV) detection. A method may include receiving data including wireless signal strength collected by one or more devices, monitoring the data including the wireless signal strength to determine if the wireless signal strength of a wireless signal source increases over time in a manner to satisfy a predefined threshold in order to be indicative of a UAV, determining a trajectory of the UAV based upon the data including the wireless signal strength, and generating an alert based on, at least, the trajectory of the UAV as indicated by the data including the wireless signal strength.

Offline tuning system for detecting new motion zones in a motion detection system

In a general aspect, an offline system detects new motion zones for a motion detection system. In some examples, observed channel response data is obtained from a motion detection system. The observed channel response data is associated with a plurality of subcarriers for each wireless link over a period of time. Estimated channel response data is generated for each wireless link. Transitions between zones of activity are identified in the estimated channel response data for each of the plurality of subcarriers for each wireless link. A new motion zone of the motion detection system is detected based on the estimated channel response data and the identified transitions.

System and method to improve the privacy of homes and other buildings having a connected home security/control system and subject to intrusions by unmanned aerial vehicles
10551810 · 2020-02-04 · ·

A privacy protection method and system (10) is provided for a building, home, apartment, or other area (12) protected by a connected security system (14). The system (10) includes a detector drone (16) and the security system (14). The drone (16) includes at least one drone detecting sensor (24) and automatically initiates a wireless signal (30) in response to the sensor (24) indicating the presence of a foreign drone (17). The security system (14) includes a central processor (40) and at least one electronic device (46) having a privacy condition wherein the device (46) protects against privacy intrusions by a foreign drone (17) and a non-privacy condition wherein the device (46) does not protect from the privacy intrusion. The processor (40) is configured to command the device (46) to change from the non-privacy condition to the privacy condition in response to the wireless signal (30) from the detector drone (16).

ELECTRONIC ANTI-TAMPER DEVICE
20200026888 · 2020-01-23 ·

This invention relates to an anti-tamper assembly for a circuit board comprising one or more electronic components, the assembly comprising: a container having side walls, a first, closed end and a second, opposing, open end, the container being configured to be mounted on said circuit board at said open end, over at least one of said electrical components, to form, in use, a sealed cavity around said at least one of said electrical components; a source of radioactive particles mounted within said container; an image sensor for capturing image frames within said sealed cavity, in use, wherein said image sensor comprises a detector region defining an array of pixels; and a processor for receiving said captured image frames, monitoring said image frames for changes in the statistical distribution of active pixels and, in the event that statistical distribution of active pixels indicates the presence of a feature in an image frame, generating a tamper alert.

ELECTRONIC ANTI-TAMPER DEVICE
20200026888 · 2020-01-23 ·

This invention relates to an anti-tamper assembly for a circuit board comprising one or more electronic components, the assembly comprising: a container having side walls, a first, closed end and a second, opposing, open end, the container being configured to be mounted on said circuit board at said open end, over at least one of said electrical components, to form, in use, a sealed cavity around said at least one of said electrical components; a source of radioactive particles mounted within said container; an image sensor for capturing image frames within said sealed cavity, in use, wherein said image sensor comprises a detector region defining an array of pixels; and a processor for receiving said captured image frames, monitoring said image frames for changes in the statistical distribution of active pixels and, in the event that statistical distribution of active pixels indicates the presence of a feature in an image frame, generating a tamper alert.

Boundary protection method and system of radiation detection robot

A boundary protection method and system of a radiation detection robot. The boundary protection method comprises: a first laser radar and a second laser radar are arranged diagonally, a first marking rod and a second marking rod are arranged diagonally; a boundary of an interlocking zone is defined by the first laser radar, the second laser radar, the first marking rod and the second marking rod; the object to be detected is placed in the interlocking zone; the radiation detection robot uses rays to detect the object to be detected in the interlocking zone; an early warning zone is provided outside the interlocking zone; wherein when it is detected that a person or object has intruded into the interlocking zone, the radiation detection robot stops emitting rays; and when it is detected that a person or object has intruded into the early warning zone, a warning is issued directly.

System and method for facilitating detecting an unauthorized access to an object
11941963 · 2024-03-26 · ·

In accordance with a first aspect of the present disclosure, a system is provided for facilitating detecting an unauthorized access to an object, the system comprising: a plurality of ultra-wideband (UWB) communication nodes; a controller operatively coupled to said plurality of UWB communication nodes, wherein the controller is configured to: cause at least one of the UWB communication nodes to transmit one or more UWB messages to other UWB communication nodes of said plurality of UWB communication nodes; receive a channel impulse response (CIR) estimate and/or one or more parameters relating to said CIR output by the UWB communication nodes in response to receiving said UWB messages; analyze said CIR estimate and/or said parameters relating to the CIR to detect said unauthorized access to the object. In accordance with a second aspect of the present disclosure, a corresponding method is conceived for facilitating detecting an unauthorized access to an object. In accordance with a third aspect of the present disclosure, a computer program is provided for carrying out said method.

System and method for dynamic vehicular threat detection perimeter modification for an exited vehicular occupant

A process for dynamic vehicular threat detection perimeter modification for an exited vehicular occupant includes prior to detecting a vehicular occupant exiting the vehicle, establishing a first sized vehicular geofence surrounding the vehicle as a function of one or more stored vehicular perimeter distances. The first sized vehicular geofence is monitored for a first breach via one of a 360 degree vehicular light imaging and radio wave distancing system. In response to detecting that the vehicular occupant previously inside the vehicle has exited the vehicle, the one or more stored vehicular perimeter distances is modified as a function of a detected location of the exited vehicular occupant to establish a second sized vehicular geofence surrounding the vehicle different than the first sized vehicular geofence. The second sized vehicular geofence is monitored for a second breach via one of the 360 degree vehicular light imaging and radio wave distancing system.