G08B29/185

Detecting threat events

One or more computing devices, systems, and/or methods are provided. One or more first signals received from one or more first devices may be monitored. One or more first threat indicators within a first signal of the one or more first signals may be detected. One or more second signals may be analyzed to determine a probability of a threat event. One or more second devices of a plurality of devices may be selected, based upon the probability, for transmission of one or more messages associated with the threat event.

Methods and systems for managing execution of standard operating procedures by an operator to address alarms generated by a facility management system

A computer assisted facility monitoring method provides users with predefined operating procedures that are recommended for addressing one or more alarms acknowledged by the user. The predefined operating procedures are created and stored prior to the occurrence of the alarms. In some examples, after acknowledging an alarm occurrence, the user may be provided with an option for bypassing or disregarding the alarm, as some such acknowledgements may have been for false alarms. In some examples, the predefined operating procedure may specify multiple action steps for addressing an alarm. In such examples, the user can close out or settle an alarm incident even without completing all of the action steps, provided the user enters a valid reason for doing so. In some examples, a user can batch-select a group of alarms, wherein perhaps only some of the acknowledged alarms in the group have corresponding predefined operating procedures.

SECURITY SURVEILLANCE MICROWAVE SENSOR HAVING REDUCED FALSE REPORT RATE BY MEANS OF BIOLOGICAL SIGNAL DETECTION
20220392334 · 2022-12-08 ·

The present invention relates to a security surveillance microwave sensor having a reduced false report rate by means of biological signal detection, which monitors and determines a malfunction state or a false alarm generated by environmental factors by detecting humans, animals or objects approaching within a predetermined distance using a microwave signal. The present invention may extend the monitoring distance of security surveillance, set an IF frequency band disturbed by a human body, amplify the IF frequency or use a change in the voltage level to extend the monitoring distance, manage a monitoring state by double-checking transmission and reception of security signals, and reduce the false report rate by distinguishing the false alarms or the malfunction state of the sensor.

Cloud-based fire protection system and method

A system performs cloud-based fire protection. The system receives, by a cloud platform, data from one or more initiating devices. The system stores the data in a persistent data storage of the cloud platform over a period of time. The system applies machine learning to the data to build or adjust a predictive detection model. The system processes, by computing resources of the cloud platform, the data using the predictive detection model to determine an existence of a safety event. The system then transmits, to at least one notification device, an event notification in response to the existence of the safety event.

Fire detection system—end-to-end solution for fire detection design framework

A method of designing a fire detection system including: determining a location of one or more fire detection devices within the building; and generating a map that displays the location of one or more fire detection device.

Automated methods and apparatus for facilitating the design and deployment of monitoring systems
11595223 · 2023-02-28 · ·

Methods and apparatus for automating various aspects relating to the design and/or deployment of monitoring systems, e.g., systems which can monitor for fire, break-ins and/or other conditions are described. In various embodiments a customer provides location and customer premises layout information as well as an indication of what is to be monitored. A rules database is accessed and a plan that is compliant with local rules is automatically generated. A user is walked through deployment of components, e.g., on his cell phone or other handheld communications device, in an easy to follow manner with monitoring device position, wireless communications ability, and function being checked automatically as part of the process as each sensor is deployed. If wireless connectivity is a problem suggestions are presented to the user for moving a sensor, e.g., camera. At the end of the process the system is activated and monitoring of the premises initiated.

Proximity detection using device-to-device communication links

Techniques for performing high-precision presence detection by establishing and monitoring peer-to-peer communication links between user devices residing in a same physical environment. A user device that resides in the environment may establish communication links with multiple other user devices residing in the environment. The user device may monitor the channel properties for those communication links to detect fluctuations in the channel properties caused by a user moving through a signal of the communication links. In examples where the user device detects fluctuations in channel properties for multiple communication links, the user device may determine that the user had moved though signals of the communication links. The user device may determine that, because the user moved through signals of multiple communication links, the user may be in close proximity to the user device, such as in the same room. Thus, the user device monitors multiple communication links to perform presence-detection techniques.

Reducing false alarms in security system

A security system includes a security system controller and a plurality of security sensors that are operably coupled with the security system controller. The security system includes a plurality of configuration settings that define when particular alarms are to be issued by the security system based at least in part on events that are detected by the security sensors. The security system controller receives each of the events detected by the security sensors. The security system controller stores event data that includes an event type, a time value indicating when the event occurred, and an identifier of the security sensor that detected the event. The security system controller analyzes the stored event data to identify and output one or more changes to one or more of the plurality of configuration settings in order to reduce false alarms issued by a security system.

TEMPORARY ANALYTIC WITHIN SECURITY SYSTEM SITE
20220366275 · 2022-11-17 ·

A computer-implemented method includes detecting, by operation of video analytics, an object within a portion of initial video captured by a security camera. The security camera is within and forms a part of a security system site. The computer-implemented method also includes transmitting, to at least one computing device that is remote from the security system site, a request that includes video data. The request relates to the object and the initial video. A response is received from the at least one computing device. The response includes computer readable instructions, retrieved from storage remote from the security system site, for at least one temporary analytic. The at least one temporary analytic is initiated to act upon the initial video or subsequent video captured by the security camera.

Pest Control System Having Event Monitoring

Pest control systems and methods are described. The systems comprise a portable electronic device which is configured to identify one or more of multiple PCDs within a range of a portable electric device which have been activated, and to provide an indication to a user corresponding to at least one of the identified activated PCDs.