G08B21/0297

Systems, methods, components, and software for detection and/or display of rear security threats
09697721 · 2017-07-04 ·

Across the planet, the fear of physical attacks is experienced daily by millions of men and women, especially those walking or running alone in secluded areas. In many instances, attacks start from behind, exploiting a weakness in our forward-facing vision system. To address this, the present inventor devised, among other things, a rear-facing clip-on sensor that attaches to the back of a user, detecting rear-approaching objects or persons, and vibrating or beeping to alert the user. In some embodiments, the clip-on sensor includes a digital camera and a wireless transceiver to communicate with a smartphone or smartwatch, not only allowing the smartphone or smartwatch to alert the user via audible, visible, and/or tactile (haptic) alarms, but also to send SOS signals and real-time audio and/or video signals to designated persons or security services.

Device for detecting the theft of an object

A device for detecting the theft of an object, intended to be integrated to said object, includes an antenna for receiving a remote-supply signal and means for detecting an interruption of the remote-supply signal. Means for delivering an alarm signal when the interruption of the remote-supply signal is detected are also provided.

Detecting Object Theft Using Smart Textiles

A smart textile garment includes a smart textile pocket, a near field communication (NFC) transmitter, an NFC receiver, an electromyography (EMG) sensor, an event processor, and an alert device. The smart textile pocket has a first pocket side and a second pocket side. The NFC transmitter is embedded in the first pocket side, and the NFC receiver is embedded in the second pocket side. The EMG sensor is embedded in a sleeve of the smart textile garment, and indicates a physical movement of a hand of a wearer of the smart textile garment in real time. Based on readings from the NFC receiver and the EMG sensor, the event processor determines that the object has been removed from the smart textile pocket by someone other than the wearer of the smart textile garment.

PROGNOSTICATING PANIC SITUATIONS AND PRE-SET PANIC NOTIFICATION IN A SECURITY SYSTEM

A system including a security system that protects a secured geographic area, a delayed alarm process executing on a processor of the security system, the delayed alarm process is activated by an authorized person through a user input of the security system, a timer of the delayed alarm process that delays sending an alarm message to a predetermined destination for a predetermined time period first following activation of the delayed alarm process by the person through the user input and a cancel feature of the delayed alarm process that disables the delayed alarm process upon receipt of an instruction from the authorized user wherein upon expiration of the predetermined time period without receipt of a reset, the delayed alarm process sends the alarm message to the predetermined destination.

Eyewear with Proximity Sensors to Detect Outside Line of Sight Presence and Corresponding Methods
20170032646 · 2017-02-02 ·

Eyewear includes a frame and one or more stems extending distally from the frame. One or more processors are disposed within one or more of the frame or the stems, and one or more proximity sensor components are disposed within the stems defining thermal reception beams oriented in a rearward facing direction. Each proximity sensor component can include an infrared signal receiver to receive an infrared emission from an object. The one or more processors can execute a control operation when the proximity sensor components receive the infrared emission from the object.

Mobile gunshot detection devices and systems

Devices, systems and methods for identifying a gunshot occurrence. Microphone, location, and movement data are acquired from a mobile device and provided to a central server. Based on a criterion, a determination is made as to whether a gunshot has been produced and whether the user is in motion. Data from a plurality of sources is compiled and provided to a monitor for a secondary user. A user can press a button to call for help.