G08B13/2491

Providing safety and environmental features using human presence detection

Disclosed herein are system, method, and computer program product embodiments for the detection of human presence in front of a plurality of sensors such as those of speakers and a device with a processor, such as a television. Data gathered from the plurality of sensors may be analyzed by the processor to determine if one or more humans are present proximate to the device. Based on the determined presence or absence of one or more humans, further actions including, inter alia, activating a sleep mode for the one or more humans, shutting off the device in a green mode, or alerting an owner-user to the presence of an intruder can be taken.

SYSTEM AND METHODS FOR IDENTIFYING A SUBJECT THROUGH DEVICE-FREE AND DEVICE-ORIENTED SENSING TECHNOLOGIES

The systems and method proposed herein aim to identify a mobile device or devices worn by an individual or a subject that has entered an area monitored by a passive motion detection system that uses wireless signals to sense motion in the space. The system will collect as much signals as possible from both the devices worn by the individual and from the system performing the passive (device-free) motion detection for identifying the individual or person of interest. The individual or person of interest may be a user of a product or an intruder.

System and method for presence and pulse detection from wireless signals

Systems and methods for detecting and monitoring human breathing, respiration, and heart rate using statistics about the wireless channel between two or more connected devices. A user is monitored for identifying patterns in the user's behavior that may allow the system to alert a caregiver to deviations in the user behavior that may be indicative of a potential issue, such as depression. A presence may further detected in a sensing area through the detection of spectral components in the breathing frequency range of comprises user includes transforming phase difference between spatial streams and amplitude of the samples representing frequency response of the channel for any frequency value into frequency domain to perform frequency analysis. Statistical analysis may be performed on the frequency space provided by the transformation. Micro motions may also be detected by detecting presence in a sensing area through the detection of spectral components in the micro motion frequency range.

MOBILE ROBOT AND CONTROL METHOD THEREFOR

Disclosed are a mobile robot, a control method therefor, and a terminal. The mobile robot according to the present disclosure comprises: a driving unit for moving a main body; a communication unit for communicating with a plurality of location information transmitters installed within an area and transmitting signals; and a control unit for calculating positioning-related information from at least one of a first signal transmitted between the location information transmitters and a second signal transmitted between the main body and the location information transmitters, detecting an entry of a moving body into the area in response to the amount of a change in the calculated positioning-related information being outside of a reference range, and performing an operation corresponding to the detection.

Vector magnetic tamper detection for sensors

A magnetometer sensor that detects tampering is described. The sensor samples magnetometer data and computes a set of vectors based on the magnetometer data. The sensor detects a tampering of the magnetic sensor based on determining that the set of vectors is outside the reference plane for the magnetometer sensor. The sensor generates a notification to a security system coupled to the magnetometer sensor. The notification indicating the tampering of the magnetometer sensor.

Geolocation based security in intrusion systems

Aspects of the invention are directed towards method and system for providing secure access to a user inside the premises. One or more embodiments of the invention describe receiving a user defined pre-access condition for a predetermined time by an input interface coupled to an intrusion panel. The pre-access condition for a user are authenticated and an authentication result is notified to a cloud server. The authentication is confirmed based on the pre-access condition together with geo-location information of the user within a defined geo-fencing boundary thereby satisfying dual authentication and transmitting the authentication result to the cloud server. A preset emergency notification and location tracking information are triggered on breach of the pre-access condition and/or geo-location information to a predefined user.

SENSOR ASSEMBLY FOR USE IN A SECURITY ALARM SYSTEM AND METHOD OF INSTALLING THE SAME

There is provided a method of installing a magnetic proximity sensor including positioning the magnetic field sensor in a desired location and positioning a magnet in a desired location relative to the magnetic field sensor, with an indicator of the sensor continuing to be turned on during the predetermined period of time when the magnetic field generated by the magnet is sensed by the magnetic field sensor, and being turned off during the predetermined period of time when the magnetic field generated by the magnet is not sensed by the magnetic field sensor. The indicator light thus assists in determining proper relative positioning of the magnet and the magnetic field sensor. If after the predetermined period of time more time is needed to install the magnetic proximity sensor, the method includes initiates another predetermined period of time by removing and replacing a lid of the magnetic proximity sensor.

Controlling Device Participation in Wireless Sensing Systems

In a general aspect, motion is detected using wireless signals. In an example, a method includes receiving, at a wireless communication device, requests for the wireless communication device to transmit wireless signals, the requests initiated by a wireless sensing system. The method further includes transmitting a series of wireless signals from the wireless communication device in response to the requests, and detecting, at the wireless communication device, a trigger event after transmitting the series of wireless signals. The method additionally includes updating, by the wireless communication device, a state of the wireless communication device based on the trigger event, the updated state indicating that the wireless communication device is not enabled to transmit wireless signals in response to the requests from the wireless sensing system. The method also includes communicating, by the wireless communication device, the updated state of the wireless communication device to the wireless sensing system.

Presence detection based on signal data

Techniques for providing status information of a defined location are described. Data indicative of signal strength associated with radio frequency (RF) signals received by one or more devices communicating via a wireless communications protocol is accessed. A baseline signal strength profile based on the data is determined. The data indicative of signal strength associated with RF signals received by the one or more devices is monitored. Based on a comparison of the monitored data to the baseline signal strength profile, a presence of at least one person in a vicinity of the one or more devices is determined. At least one action based on the determined presence is initiated.

SYSTEM AND METHODS FOR SMART INTRUSION DETECTION USING WIRELESS SIGNALS AND ARTIFICIAL INTELLIGENCE
20210312777 · 2021-10-07 ·

An intelligent entrance detection system is provided where, primarily, any authorized or unauthorized entry to an area of a residential (or small industrial) unit covered by a wireless network is automatically detected from active off-the-shelf devices in that area. After the detection, an identification algorithm is employed to verify if this entry is a legal or illegal action. Based on this verification, either the routine smart home system is activated or a hazardous monitoring period begins to further investigate the suspicious event. If the illegal entrance is confirmed during the hazardous monitoring period, the owner of the property is informed through an intruder alarm protocol. In this invention, all of the analytic and processing steps, including entrance detection, owner identification, and device-free authority verification are designed based on monitoring and quantification of changes in surrounding wireless signals originated by human or object movements within the sensing area.