G08B13/2491

Near-far security sensor
10565843 · 2020-02-18 · ·

Described is a security sensor comprising two or more sub-sensors for use in a variety of installations where different magnetic fields may be experienced by the security sensor as a result of the variety of installations. One of the sub-sensors may have a low magnetic sensitivity while the other sub-sensor may have a much higher sensitivity to magnetic fields. In operation, one or both sub-sensors are used to determine if a door or a window has been opened.

Mobile Robot Map Generation
20200039081 · 2020-02-06 ·

A mobile robot is configured for operation in a commercial or industrial setting, such as an office building or retail store. The robot can patrol one or more routes within a building, and can detect violations of security policies by objects, building infrastructure and security systems, or individuals. In response to the detected violations, the robot can perform one or more security operations. The robot can include a removable fabric panel, enabling sensors within the robot body to capture signals that propagate through the fabric. In addition, the robot can scan RFID tags of objects within an area, for instance coupled to store inventory. Likewise, the robot can generate or update one or more semantic maps for use by the robot in navigating an area and for measuring compliance with security policies.

Method and apparatus for evaluating risk based on sensor monitoring
10552914 · 2020-02-04 · ·

Described are techniques for determining a quotation score that would be applicable across lines of insurance and/or carriers, and which involves the collection in real time of sensor information from plural groups of sensors deployed in a specific premises and associated with intrusion detection, access control, burglar, fire alarm systems and surveillance systems and/or other systems that monitor for physical/chemical/biological conditions. The techniques execute unsupervised learning models to continually analyze the collected sensor information to produce sequences of state transitions that are assign scores and from which a quotation score is produced.

Systems and methods of device-free motion detection and presence detection
10539439 · 2020-01-21 · ·

Systems and methods are provided for device-free motion detection and presence detection within an area of interest. A plurality of nodes, configured to be arranged around the area of interest, form a wireless network. The plurality of nodes transmit wireless signals as radio waves and receive transmitted wireless signals. The received signal strength (RSS) of the transmitted wireless signals between the plurality of nodes are measured and a value is reported. A computing device receives the reported values for the measured RSS and tracks the reported values over time. The computing device processes the reported values using an aggregate disturbance calculation to detect motion and presence within the area of interest. The computing device may notify notification device of a detected disturbance within the area of interest.

FIXED PROPERTY MONITORING WITH MOVING ASSET LOCATION TRACKING
20200020216 · 2020-01-16 ·

Techniques are described for moving asset location tracking and monitoring system technology. A system monitors for events related to a monitoring system that monitors a fixed property and the system detects an event related to the monitoring system based on the monitoring. The system performs an operation that leverages geographic location tracking of at least one mobile asset associated with the fixed property based on the detected event.

METHODS AND APPARATUS FOR MANAGEMENT OF INTRUSION DETECTION SYSTEMS USING VERIFIED IDENTITY

Disclosed are techniques for configuring an intrusion detection system, by receiving from a user device, a set of identity credentials, sending the set of identity credentials to an identity service to verify a user's identity that is associated with the set of credentials, receiving a result of the verification of the identity; and when verified, configuring the intrusion detection system to operate in a mode pre-selected based on the verified identity.

Detecting unauthorized physical access via wireless electronic device identifiers

Monitoring a physical area for detection of a wireless device includes scanning for signals from a wireless device within a scanning range defining the physical area, detecting a wireless signal from a wireless device within the scanning range, determining a wireless device ID associated with the wireless device detected within the scanning range and determining whether the wireless device ID is unknown. In response to determining that the wireless device ID is unknown, analyzing the wireless signal to determine scan data representative of the wireless signal, monitoring the scan data over time, determining a scan data pattern as a function of time based on the monitored scan data, comparing the scan data pattern to scan data patterns stored in a database and in response to determining that the scan data pattern based on the monitored scan data matches a scan data pattern in the database, activate a first alert.

Wall-Mounted Smart Switches and Outlets for Use in Building Wiring for Load Control, Home Automation, and/or Security Purposes
20200006023 · 2020-01-02 ·

Electrical switch devices are installed at in-wall electrical boxes of a building. Each device features a switch module with multiple electrically controlled switches for respective connection of multiple load circuits. A control panel with a user interface is mountable over the electrical box and is connected or connectable to the switch module. A communications transceiver of each device is operable to transmit and receive communications to and from each of the other devices. The control panel has a touch-screen display, and is configured to display virtual on-screen switches, including at least one virtual switch whose output is assigned to a respective one of the electrically controlled switches of the other devices. The at least one virtual switch at one device is thereby operable to control at least one load at another of said devices. User selected names are assignable to the switches, and used to label the virtual switches.

Artificial reef datacenter

Examples of the disclosure provide for an apparatus for actively promoting marine life. The apparatus includes a datacenter implemented in a body of water and coupled to a network, a pressure vessel that houses the datacenter, and one or more components coupled to the pressure vessel and adapted to actively promote reef life and sustain a surrounding ecosystem.

SYSTEM AND METHODS FOR IDENTIFYING A SUBJECT THROUGH DEVICE-FREE AND DEVICE-ORIENTED SENSING TECHNOLOGIES

The systems and method proposed herein aim to identify a mobile device or devices worn by an individual or a subject that has entered an area monitored by a passive motion detection system that uses wireless signals to sense motion in the space. The system will collect as much signals as possible from both the devices worn by the individual and from the system performing the passive (device-free) motion detection for identifying the individual or person of interest. The individual or person of interest may be a user of a product or an intruder.