G08B21/0297

FACIAL RECOGNITION SYSTEMS FOR ENHANCED SECURITY IN VEHICLES AND OTHER DEVICES
20200238952 · 2020-07-30 ·

Security systems for secured assets such as vehicles, are described in which facial recognition systems or other biometrics systems provide enhanced security for an authorized user. Subtle or covert cues provided by the user during authentication or subsequent monitoring of the user by the facial recognition system and other input systems are used to invoke user-editable personal security rules that respond to the cues to implement the user's desired responses for added security in various situations. Related security systems, methods, and devices are described to protect an asset such as an automobile or other vehicle or other secured asset through the use of biometrics and personal security rules. In such systems, a training module may provide periodic training and practice sessions to assist the user in being prepared to properly use the personal rules system in response to various scenarios and threats, and can guide adjustment of personal rules for better success.

Building lockdown system
10726697 · 2020-07-28 · ·

A building lockdown system for a building with multiple rooms with doors providing access to the rooms, the system including smart light fixtures positioned inside and outside at least some of the rooms, at least some of the smart light fixtures configured to be selectively illuminated in each of a plurality of colors, and room lockdown components provided in the plurality of rooms, the room lockdown components adapted to block or secure the doors of the rooms against opening in a deployed condition of the lockdown components. The smart light fixtures and the room lockdown components are equipped with BLE sensors defining a BLE mesh network. The room lockdown components are adapted to communicate, via the BLE mesh network, whether they are in the deployed condition thereof, and are further adapted to provide audio and/or visual signals. At least one primary communication and control (PCC) device is disposed in the building and in communication with at least some of the smart light fixtures via the BLE mesh network. The PCC device receives information via the BLE mesh network as to whether the room lockdown components are in the deployed condition thereof. The PCC device is operative to initiate a lockdown of all or part of the building by effecting a change in the color of at least some of the smart light fixtures via the BLE mesh network and/or effecting the activation of audio and/or visual signals from the room lockdown components.

Systems and methods for commissioning a security system

Systems and methods are provided that can include receiving a plurality of cause and effect rules for a security system that protects a secured area, simulating a plurality of cause and effect rules responsive to user input identifying an emergency event in one of a plurality of zones of the secured area, and during simulation, displaying on a graphical user interface a first indicator that identifies a first output of a first of the plurality of cause and effect rules within a first of the plurality of zones.

Remote alert generation based on trigger events indicating attack
10637995 · 2020-04-28 ·

A method and apparatus for detecting a crime is presented. The apparatus includes a Portable Wireless Communications Device having a processor, a memory, a location determination chip, a camera, a microphone, a speaker, a wireless communications circuitry, and a coupling site. The apparatus also includes a connector having a first portion that detachably couples to the coupling site and a second portion that attaches to a person or an item worn by a person, wherein the portable wireless communications device automatically transmits an alert upon sensing a detachment of the connector from the coupling site. When an attack happens, the sudden motion or jerk causes the connector to detach from the coupling site, causing an alert transmission. The alert may be sent to a predesignated phone number or email address so that there is immediate notification of a crime. An alert phrase may be used instead of detachment.

SYSTEMS AND METHODS FOR MANAGING ALERT NOTIFICATIONS FROM A SECURED AREA

Systems and methods for managing alert notifications from a secured area are provided. Such systems and methods can include a surveillance device monitoring the secured area and transmitting data captured from the secured area to an artificial intelligence module, the artificial intelligence module using the data to identify a scenario associated with the secured area and a notification priority of the scenario, and when the notification priority is at or above a preconfigured level, the artificial intelligence module transmitting an alert notification to a cloud server indicative of the scenario.

HOME SECURITY RESPONSE USING BIOMETRIC AND ENVIRONMENTAL OBSERVATIONS
20200116468 · 2020-04-16 ·

Various arrangements for handling a potential security situation using a home automation system are presented. A biometric measurement of a user may be received. The biometric measurement of the user may exceed a defined threshold value for the biometric measurement. A security alert from a home automation device in wireless communication with the home automation host system may be received. If the biometric measurement is associated with the security alert, a security response action may be performed.

Theft resistant handbag assembly
10617188 · 2020-04-14 ·

A theft resistant handbag assembly for thwarting purse snatchers includes a shell, a trigger, and an antitheft module, which is operationally coupled to an actuator and comprises an alarm and a heater. The shell, which defines an interior space, has a top that is open. A handle that is coupled to the shell is configured for a user to carry the shell. A line is coupled to and extends between the trigger and a wrist strap, which is configured to position around a wrist of the user. Decoupling of the trigger, which is removably coupled to the actuator, activates the actuator. In an event the shell is snatched, the line is positioned to pull the trigger to decouple it from the actuator, positioning the actuator to actuate the alarm, to sound to draw attention to a purse snatcher, and the heater so that the purse snatcher drops the shell.

Danger detection system
10616396 · 2020-04-07 ·

A danger detection system is provided. The system includes a user computing device programmed to receive from a microphone of the computing device a signal indicating a gunshot-like sound and automatically determine if the gunshot-like sound is a gunshot. The user computing device is also programmed to automatically determine a location of the gunshot; and to automatically generate and send to a display of the user computing device a safety notification in response to determining if the gunshot is within a predetermined distance.

REMOTE ALERT GENERATION BASED ON TRIGGER EVENTS INDICATING ATTACK
20200076956 · 2020-03-05 ·

A method and apparatus for detecting a crime is presented. The apparatus includes a Portable Wireless Communications Device having a processor, a memory, a location determination chip, a camera, a microphone, a speaker, a wireless communications circuitry, and a coupling site. The apparatus also includes a connector having a first portion that detachably couples to the coupling site and a second portion that attaches to a person or an item worn by a person, wherein the portable wireless communications device automatically transmits an alert upon sensing a detachment of the connector from the coupling site. When an attack happens, the sudden motion or jerk causes the connector to detach from the coupling site, causing an alert transmission. The alert may be sent to a predesignated phone number or email address so that there is immediate notification of a crime. An alert phrase may be used instead of detachment.

Home security response using biometric and environmental observations
10580265 · 2020-03-03 · ·

Various arrangements for handling a potential security situation using a home automation system are presented. During a defined active monitoring time period, a biometric measurement of a user may be received. The biometric measurement of the user may exceed a defined threshold value for the biometric measurement. A security alert from a home automation device in wireless communication with the home automation host system may be received. If the time period between the biometric measurement is within a threshold time period of the security alert being received a security response action may be performed.