Patent classifications
G08B13/183
Restricted area automated security system and method
A security system includes a plurality of laser scanners to establish light shields in an area to be monitored, with each of the light shields including at least one detection zone, and a controller to detect unauthorized entry to the area to be monitored based on a position and timing of breaks in the detection zones of the light shields.
Notification system and notification device
This notification device (100) of a notification system (10) detects a portion of the body of a person from distance information from a proximity sensor (110) and image information from an image sensor (120) when an approaching object is a person, and causes an ultrasonic irradiation device (130) to irradiate the detected portion of the body of the person with ultrasonic waves that can generate tactile sensation.
Light curtain
Display with high visibility without impairing rigidity of a housing is performed. A light curtain includes: a housing in which one element of a pair of elements disposed inside along a longitudinal direction in order to form the plurality of optical axes at intervals, the housing including a metal case and end members connected to both ends of the metal case; a cover that transmits light from a light projecting element, which is the one element, and is attached to the housing so as to cross the optical axe; an indicator lamp that is a light diffusing member disposed outside an outer surface of at least one of the cover and the housing along the longitudinal direction or formed in series with the cover; and an indicator lamp light source that is accommodated in the housing and supplies light for displaying toward the indicator lamp.
User selectable remote programming for cascade-connected light curtains
Apparatus and associated methods relate to activating a blanking programming mode, such as fixed blanking (FB) or floating blanking (FLB), for example, for at least one user-selectable light curtain segment proximally connected to a distal-most segment in a string of cascaded light curtain segments. In an illustrative example, the selective activation may be initiated in response to a request signal from a remote request generator. The remote request generator may, in some examples, communicate the request signal to initiate the programming mode via a wireless communication link. In some embodiments, a request interface module may receive the request signal while releasably plugged into a terminal end of the distal-most segment. In various implementations, the remote selective activation may advantageously empower operators to rapidly configure cascaded light curtain systems that require programming modes for functions such as, for example, FB, FLB, or reduced resolution.
User selectable remote programming for cascade-connected light curtains
Apparatus and associated methods relate to activating a blanking programming mode, such as fixed blanking (FB) or floating blanking (FLB), for example, for at least one user-selectable light curtain segment proximally connected to a distal-most segment in a string of cascaded light curtain segments. In an illustrative example, the selective activation may be initiated in response to a request signal from a remote request generator. The remote request generator may, in some examples, communicate the request signal to initiate the programming mode via a wireless communication link. In some embodiments, a request interface module may receive the request signal while releasably plugged into a terminal end of the distal-most segment. In various implementations, the remote selective activation may advantageously empower operators to rapidly configure cascaded light curtain systems that require programming modes for functions such as, for example, FB, FLB, or reduced resolution.
Tamper detection system
A system for detecting tampering. The system comprises a first luminescent layer adjacent to a first item of value and an optical detector operably connected to an alarm. The first luminescent layer emits a light beam, which is detected by the optical detector. Upon detection of the light beam, the optical detector activates the alarm.
Tamper detection system
A system for detecting tampering. The system comprises a first luminescent layer adjacent to a first item of value and an optical detector operably connected to an alarm. The first luminescent layer emits a light beam, which is detected by the optical detector. Upon detection of the light beam, the optical detector activates the alarm.
LASER SYSTEM WITH PROTECTION DEVICE
A protection device for a laser system having at least one active laser and having at least one beam guide. Eye safety and/or protection for an exposed person is achieved using at least one additional laser as a warning laser which, operating in a visible spectral range, is used shortly before the active laser is used, and which, can cause at least one person to close his or her eyes and/or change his or her viewing direction away from the receptor point of the active laser beam on a target.
LASER SYSTEM WITH PROTECTION DEVICE
A protection device for a laser system having at least one active laser and having at least one beam guide. Eye safety and/or protection for an exposed person is achieved using at least one additional laser as a warning laser which, operating in a visible spectral range, is used shortly before the active laser is used, and which, can cause at least one person to close his or her eyes and/or change his or her viewing direction away from the receptor point of the active laser beam on a target.
System And Method For Identifying And Mitigating A Threat In A Facility
A system for mitigating a threat in a facility according to the present disclosure includes a threat identification module and at least one group of drones. The threat identification module is configured to generate a threat identification signal indicating that the threat has been identified in the facility and transmit the threat identification signal to a central command center. The at least one group of drones is configured to move toward the threat in response to at least one of the threat identification signal and a command from the central command center.