Patent classifications
G08B13/2494
Systems and methods for activating and deactivating controlled devices in a secured area
Systems and methods for activating and deactivating controlled devices are provided. Such systems and methods can include a microprocessor unit sampling signal data from a smart microwave sensor module to detect a presence of a user within a secured area, using the signal data to track a route of the user within the secured area, and activating or deactivating the controlled devices located within the secured area based on a location of an end of the route. Such systems and methods can include activating the controlled devices when the location of the end of the route is within the secured area and deactivating the controlled devices when the location of the end of the route is not outside of the secured area.
DETECTION DEVICE, DETECTION METHOD, ROBOT, AND PROGRAM
A detection device includes a detection unit configured to detect a moving object by using a ranging sensor able to detect the presence of a moving object movable in the target area, a determination unit configured to determine whether or not the detected moving object is a human being by using a human detection sensor able to detect a human being, and an authentication unit configured to perform authentication of the detected moving object in a case that the detected moving object is determined to be a human being. The authentication unit includes an authentication information request unit configured to request the moving object to transmit authentication information by wireless communication, and an authentication determination unit configured to determine whether or not the moving object has the right of access based on a result of the wireless communication.
METHOD AND DEVICE FOR IDENTIFYING SUSPICIOUS OBJECT MOVEMENTS BASED ON HISTORICAL RECEIVED SIGNAL STRENGTH INDICATION INFORMATION ASSOCIATED WITH INTERNET-OF-THINGS DEVICES
A process of identifying suspicious object movements in an incident location. An electronic computing device obtains incident information identifying a time of occurrence and a location of an incident. The electronic computing device identifies internet-of-things (IoT) devices deployed in the incident location and accesses received signal strength indication (RSSI) information associated with a selected IoT device. The RSSI information includes historical RSSI values that were captured at the IoT device during the time of occurrence of the incident. The electronic computing device generates a suspicious object movement pattern corresponding to the at least one IoT device based on variations within the historical RSSI values that were captured at the at least one IoT device during the first time period. A display or audio output device provides a corresponding visual or audio output indicating the suspicious object movement pattern corresponding to the IoT device.
Method and device for identifying suspicious object movements based on historical received signal strength indication information associated with internet-of-things devices
A process of identifying suspicious object movements in an incident location. An electronic computing device obtains incident information identifying a time of occurrence and a location of an incident. The electronic computing device identifies internet-of-things (IoT) devices deployed in the incident location and accesses received signal strength indication (RSSI) information associated with a selected IoT device. The RSSI information includes historical RSSI values that were captured at the IoT device during the time of occurrence of the incident. The electronic computing device generates a suspicious object movement pattern corresponding to the at least one IoT device based on variations within the historical RSSI values that were captured at the at least one IoT device during the first time period. A display or audio output device provides a corresponding visual or audio output indicating the suspicious object movement pattern corresponding to the IoT device.
Distributed multi-band wireless networking system
Disclosed is a dedicated control channel for a WLAN network. A number of access points are networked together and communicate data necessary to propagate the WLAN over a backhaul channel, however a dedicated radio on each access point is used to communicate control information between the access points. The control information is communicated over a control channel that is different from the client facing channels or bands, and the backhaul channel. In some embodiments, the control channel is sub 1 GHz.
Adjusting backhaul and fronthaul communications in a wireless mesh network
Adjusting backhaul and fronthaul communication links of wireless mesh networks are described. A wireless mesh network has a topology including fronthaul communication links and backhaul communication links. In one aspect, characteristics of network data packets transmitted within a wireless mesh network can be identified. Based on those characteristics, the topology of the wireless mesh network can change.
System and method for presence detection in an environment to be monitored
A method for presence detection in an environment to be monitored, includes generating an electric charge signal in a condition of absence of presence in the environment to be monitored. An electric charge signal is generated in an operating condition in which a person may be present in the environment. The two generated signals are processed and the results of the processing are compared. Processing the signals includes representing in a biaxial reference system the value of the charge signal considered and its derivative with respect to time, and identifying a plurality of points in the reference system. By comparing the position of the points acquired during the possible human presence with those of the base shape, a variation indicating the actual human presence may be detected. In this case an alarm signal is generated.
Systems and methods for adjusting a signal broadcast pattern of an intrusion detector
Systems and methods for adjusting a broadcast pattern of an intrusion detector are provided. Such systems and methods can include a microwave sensor of the intrusion detector broadcasting a detection signal into a secured area in the broadcast pattern, a communication module of the intrusion detector wirelessly receiving a signal adjustment command from a remote device, and a processor and executable control software of the intrusion detector parsing the signal adjustment command and instructing a signal adjuster of the intrusion detector to adjust a sensitivity of the microwave sensor or an amplitude of the detection signal to alter the broadcast area of the broadcast pattern based on information contained in the adjustment command.
NANOSATELLITE-BASED PROPERTY MONITORING
Methods, systems, and apparatus for nanosatellite-based property monitoring are disclosed. A method includes receiving satellite data related to conditions of a property monitored by a monitoring system; determining, based on the satellite data, that the property is at risk from a threat; requesting, from a sensor of the monitoring system, sensor data related to the threat; receiving, from the sensor, the sensor data related to the threat; and based on analyzing the sensor data related to the threat, performing one or more monitoring system actions. The threat may include one of a weather hazard, a security hazard, or a property damage hazard. The monitoring system actions can include sending an instruction to adjust a sensor or component of the monitoring system and can include sending, to a user device, a notification that the property is at risk from the threat.
DISTRIBUTED MULTI-BAND WIRELESS NETWORKING SYSTEM
Disclosed is a way to expand the range of Internet of Things devices in a home, office, or structure to the range of a local WiFi network. This is accomplished by generating a network bridge for the devices using machine-to-machine protocols to communicate using the WiFi network backhaul channel. Transmissions in machine-to-machine protocol are tunneled through WiFi communications and extracted by the closest access point. Access points include radios for both WiFi and machine-to-machine protocols.