Patent classifications
G08B25/014
Detecting threat events
One or more computing devices, systems, and/or methods are provided. One or more first signals received from one or more first devices may be monitored. One or more first threat indicators within a first signal of the one or more first signals may be detected. One or more second signals may be analyzed to determine a probability of a threat event. One or more second devices of a plurality of devices may be selected, based upon the probability, for transmission of one or more messages associated with the threat event.
TARGETED VISITOR NOTIFICATIONS
Methods, systems, and apparatus, including computer programs encoded on computer storage media, for providing targeted notifications. One of the methods includes determining a likely identity of a visitor who arrived at a property that is associated with two or more people, selecting, from the two or more people, a target person using the likely identity of the visitor, and sending, to a device of the target person, a notification that indicates that the visitor arrived at the property.
Personal monitoring apparatus and method
A method, including providing a device for an individual, storing information regarding a travel schedule or itinerary of the individual, determining a location of the device with a global positioning device, automatically and continuously monitoring the location of the device, comparing the location of the device with the travel schedule or itinerary, detecting a deviation of the device from a travel schedule or itinerary, or detecting an absence of, or a leaving of, the device from an expected location on the travel schedule or itinerary, generating a travel route deviation message and transmitting the travel route deviation message to a first communication device.
PORTABLE ALARM SYSTEM
A portable alarm system has a base unit including a processor electrically connected to a wireless transceiver configured to communicate wireless signals to an external location. The base unit is further configured to receive wireless alarm signals from at least a first sensor and a second sensor, both of the first and second sensors being physically separated from the base unit. The processor is configured to be selectively programmed by a user to cause the base unit to communicate with a remote monitoring station in response to receiving an alarm signal from the first sensor, but not in response to receiving an alarm signal from the second sensor. Instead, when an alarm signal is received from the second sensor, the processor causes a different action, other than communicating with the monitoring station, to occur. Such action can include, for example, sending a wireless communication to a mobile electronic device.
TEMPORARY ANALYTIC WITHIN SECURITY SYSTEM SITE
A computer-implemented method includes detecting, by operation of video analytics, an object within a portion of initial video captured by a security camera. The security camera is within and forms a part of a security system site. The computer-implemented method also includes transmitting, to at least one computing device that is remote from the security system site, a request that includes video data. The request relates to the object and the initial video. A response is received from the at least one computing device. The response includes computer readable instructions, retrieved from storage remote from the security system site, for at least one temporary analytic. The at least one temporary analytic is initiated to act upon the initial video or subsequent video captured by the security camera.
Lawful Intercept (LI) for Vehicles Using Cameras Installed/Mounted on Connected and/or Autonomous Vehicles Using Their any G (2G/3G/4G/5G) Connectivity
Methods are disclosed for providing Lawful Intercept (LI) for vehicles. In one embodiment the method includes providing, to at least one autonomous vehicle, at least one vehicle number of a vehicle being tracked and using a camera of the at least one autonomous vehicle, determining a vehicle number of the a vehicle the autonomous vehicle has encountered. The method further includes comparing the vehicle number of the vehicle the autonomous vehicle encountered to the vehicle number of the vehicle being tracked, and when the vehicle number of the vehicle the autonomous vehicle encountered matches the vehicle number of the vehicle being tracked, sending a message to law enforcement that the vehicle being tracked has been encountered.
AUTONOMOUS VEHICLE REFUELING
Methods and systems for autonomous vehicle recharging or refueling are disclosed. Autonomous vehicles may be automatically refueled by routing the vehicles to available fueling stations when not in operation, according to methods described herein. A fuel level within a tank of an autonomous vehicle may be monitored until it reaches a refueling threshold, at which point an on-board computer may generate a predicted use profile for the vehicle. Based upon the predicted use profile, a time and location for the vehicle to refuel the vehicle may be determined. In some embodiments, the vehicle may be controlled to automatically travel to a fueling station, refill a fuel tank, and return to its starting location in order to refuel when not in use.
SYSTEM AND METHOD FOR CALLING ATTENTION
A system for calling attention according to the present disclosure includes: at least one sensor configured to detect environmental information; a storage device in which condition data representing a condition under which a specific incident occurs is stored; determination means for determining a possibility of an occurrence of the specific incident based on a result of the detection by the sensor and the condition data stored in the storage device; and calling attention means for calling attention to a fact that there is the possibility of the occurrence of the specific incident, in which when the determination means determines that there is the possibility of the occurrence of the specific incident, the calling attention means calls attention to the fact that there is the possibility of the occurrence of the specific incident.
IOT BASED FIRE AND DISASTER MANAGEMENT SYSTEMS AND METHODS
Some embodiments are directed to a system that includes multiple fire sensors and equipment, and mobile devices of the users of the system. These fire sensors and equipment are configured in a network so as to allow communication with a processor. A processor in the system interrogates the status of the fire sensors and fire safety elements on a continuous basis. Upon a change in system status, the processor interprets the change and classifies according to operation state or probability of a fire or other imminent threat. The data, processing and storage provide the means by which occupants and potential occupants can better navigate a building during the occurrence of a fire. The system enables communication between users of the system through their mobile devices used and communication between devices that may be present in the
PERSONAL MONITORING APPARATUS AND METHOD
In an apparatus including a personal monitoring device which includes a microphone, speaker, camera, memory or database, global positioning device, controller, and transmitter, the improvement including a wearable device configured to include at least one of more components of the personal monitoring device on, with, or within, the wearable device, and a smoke detector, the fire detector, or the carbon monoxide (CO) detector. The microphone, speaker, or camera is located on an exterior of the wearable device. The smoke detector, fire detector, or carbon monoxide (CO) detector, is located on an exterior of the wearable device. The smoke detector, fire detector, or carbon monoxide (CO) detector, detects a presence of smoke, a fire, or a presence of carbon monoxide, and the speaker emits an alarm, a siren blare, or an audible and verbal message. The transmitter transmits a message to a computer or communication device.