G08B13/19639

Wall-mounted smart switches and outlets for use in building wiring for load control, home automation, and/or security purposes

Electrical switch devices are installed at in-wall electrical boxes of a building. Each device features a switch module with multiple electrically controlled switches for respective connection of multiple load circuits. A control panel with a user interface is mountable over the electrical box and is connected or connectable to the switch module. A communications transceiver of each device is operable to transmit and receive communications to and from each of the other devices. The control panel has a touch-screen display, and is configured to display virtual on-screen switches, including at least one virtual switch whose output is assigned to a respective one of the electrically controlled switches of the other devices. The at least one virtual switch at one device is thereby operable to control at least one load at another of said devices. User selected names are assignable to the switches, and used to label the virtual switches.

IMAGE SURVEILLANCE AND REPORTING TECHNOLOGY

Image surveillance and reporting technology, in which an event that is indicative of potential physical activity within an area corresponding to a location of a camera unit is detected. In response to detection of the event, the camera unit is controlled to capture one or more images of the area corresponding to the location of the camera unit. The one or more images captured by the camera unit are analyzed to determine whether the one or more images include image data that is indicative of relevant physical activity within the area corresponding to the location of the camera unit. The one or more images are handled based on the determination of whether the one or more images include image data that is indicative of relevant physical activity within the area corresponding to the location of the camera unit.

Surveillance camera

A dome type surveillance camera includes a base, a plurality of cameras, a first connecting section, a plurality of second connecting sections, a hemispherical cover fixed to the base, and a circular rail. The first connecting section is connected on the base and connected with one first camera out of the plurality of cameras. The second connecting sections are connected on the base and connected with each of a plurality of second cameras excluding the first camera out of the plurality of cameras. The cover is disposed to cover the first connecting section, the second connecting sections, and the plurality of cameras. The rail is provided on the base and of which a center is immediately below a top of the cover.

DETECTING UNAUTHORIZED VISITORS
20200226353 · 2020-07-16 ·

An unauthorized visitor system collects an image of a person detected in a room of a patient. The system identifies reference points on the person's face, for example, points along the cheeks, jowls, and/or brow. The system may compare the reference points to reference points of images associated with registered visitors. The system then determines, based on the comparison, if the person is a registered visitor. One or more designated recipients may be alerted if the person is not a registered visitor or if the person breaches a patient identification zone established around a particular patient. The system may also register the person in a database of visitors.

Arming security systems based on communications among a network of security systems

Arming security systems based on communications among a network of security systems in accordance with various embodiments of the present disclosure are provided. In one embodiment, a method for a client device associated with a first security system of a security network is provided, the security network including the first security system installed at a first address and a second security system installed at a second address, the client device including a processor, a communication module, and a display, the method comprising: in response to a security event detected by the second security system at the second address, receiving a user alert; in response to receiving the user alert, displaying the user alert; receiving an input including an arming action for the first security system; and in response to receiving the input, transmitting the arming action to the first security system.

METHODS AND SYSTEMS FOR DETECTING STROKE SYSTEMS
20200210679 · 2020-07-02 ·

A stroke detection system analyzes images of a person's face over time to detect asymmetric changes in the position of certain reference points that are consistent with sagging or drooping that may be symptomatic of a stroke or TIA. On detecting possible symptoms of a stroke or TIA, the system may alert caregivers or others, and log the event in a database. Identifying stroke symptoms automatically may enable more rapid intervention, and identifying TIA symptoms may enable diagnostic and preventative care to reduce the risk of a future stroke.

Image surveillance and reporting technology

Image surveillance and reporting technology, in which an event that is indicative of potential physical activity within an area corresponding to a location of a camera unit is detected. In response to detection of the event, the camera unit is controlled to capture one or more images of the area corresponding to the location of the camera unit. The one or more images captured by the camera unit are analyzed to determine whether the one or more images include image data that is indicative of relevant physical activity within the area corresponding to the location of the camera unit. The one or more images are handled based on the determination of whether the one or more images include image data that is indicative of relevant physical activity within the area corresponding to the location of the camera unit.

Monitoring camera system and monitoring method

A first camera sends a first detection notification to a master device when detecting a person in a first imaging area, and starts transmission of a captured video of the first imaging area to the master device by shifting an operation mode from a sleep mode to a standby mode. The master device notifies a camera other than the first camera of a shift instruction to the standby mode in accordance with the first detection notification. The other camera shifts the operation mode from the sleep mode to the standby mode in accordance with the shift instruction to the standby mode, and starts buffering of a captured video of a second imaging area, and when detecting the person in the second imaging area in the standby mode, the other camera sends a second detection notification of the person to the master device, and starts transmission of the captured video of the second imaging area buffered before a first predetermined time period after a point of time at which the person is detected in the second imaging area, to the master device.

Detecting unauthorized visitors
10643061 · 2020-05-05 · ·

An unauthorized visitor system collects an image of a person detected in a room of a patient. The system identifies reference points on the person's face, for example, points along the cheeks, jowls, and/or brow. The system may compare the reference points to reference points of images associated with registered visitors. The system then determines, based on the comparison, if the person is a registered visitor. One or more designated recipients may be alerted if the person is not a registered visitor or if the person breaches a patient identification zone established around a particular patient. The system may also register the person in a database of visitors.

THREE LEVEL DECTECTOR SIGNAL FOR MULTICAMERA VIDEO ALARM SYSTEM FOR REMOTE MONITORING AND METHOD
20200126379 · 2020-04-23 ·

A television based alarm system provides video streams from multiple cameras produced at a first location that is transmitted via a radio transmitter to a secondary location. Detectors such as motion detector signals from a plurality of motion detectors at the first location are utilized to indicate when and which cameras are likely to see an intruder based on when and which detectors are tripped. In the encoder/decoder, the detectors are connected to LEDS and an encoder video camera at said first location for encoding into an encoder video. The encoder video is sent along with a plurality of videos to the second location. The decoder video is decoded at said second location utilizing photo electric cells. The LEDs produce three levels of brightness to indicate (1) not tripped but functioning, 2) tripped, or 3) malfunctioning for any particular motion detector.