G08B13/20

INDOOR INTRUSION DETECTION

A computer-implemented method, a system, and a computer program product for detecting objects are disclosed. The method can include receiving, by a computer communicatively connected to a plurality of anemometers positioned throughout the space, first sensor data from the plurality of anemometers, creating a baseline profile of airflow in the space based on the first sensor data, and receiving second sensor data from the plurality of anemometers at a different time than the first sensor data. The method can include comparing the second sensor data with the first sensor data to determine first different data, rendering, in response to determining that the second sensor data is different from the first sensor data, a representation of the object using the first different data and first location data related to the first different data, and calculating a vector associated with the object using the first different data and the first location data.

INDOOR INTRUSION DETECTION

A computer-implemented method, a system, and a computer program product for detecting objects are disclosed. The method can include receiving, by a computer communicatively connected to a plurality of anemometers positioned throughout the space, first sensor data from the plurality of anemometers, creating a baseline profile of airflow in the space based on the first sensor data, and receiving second sensor data from the plurality of anemometers at a different time than the first sensor data. The method can include comparing the second sensor data with the first sensor data to determine first different data, rendering, in response to determining that the second sensor data is different from the first sensor data, a representation of the object using the first different data and first location data related to the first different data, and calculating a vector associated with the object using the first different data and the first location data.

Anomaly detection based on airflow alerters

A computer-implemented method for anomaly detection in a data processing system comprising a processor and a memory comprising instructions which are executed by the processor. The method includes receiving a plurality of real-time airflow patterns acquired by a plurality of airflow alerters, wherein each real-time airflow pattern corresponds to a different airflow alerter; comparing each real-time airflow pattern with a predetermined airflow pattern, wherein each real-time airflow pattern corresponds to a different predetermined airflow pattern; when there is any real-time airflow pattern different from the corresponding predetermined airflow pattern, identifying a group of airflow alerters among the plurality of airflow alerters, wherein a real-time airflow pattern of each airflow alerter in the group is different from the corresponding predetermined airflow pattern; and identifying a location of an anomaly based on the group of airflow alerters.

Anomaly detection based on airflow alerters

A computer-implemented method for anomaly detection in a data processing system comprising a processor and a memory comprising instructions which are executed by the processor. The method includes receiving a plurality of real-time airflow patterns acquired by a plurality of airflow alerters, wherein each real-time airflow pattern corresponds to a different airflow alerter; comparing each real-time airflow pattern with a predetermined airflow pattern, wherein each real-time airflow pattern corresponds to a different predetermined airflow pattern; when there is any real-time airflow pattern different from the corresponding predetermined airflow pattern, identifying a group of airflow alerters among the plurality of airflow alerters, wherein a real-time airflow pattern of each airflow alerter in the group is different from the corresponding predetermined airflow pattern; and identifying a location of an anomaly based on the group of airflow alerters.

Pilf resistant packaging system
11670148 · 2023-06-06 ·

A theft-proof packaging system includes a product package including a compartment configured to encapsulate a product. The compartment is in a non-surrounding environmental state, the non-surrounding environmental state being either pneumatically pressurized above a surrounding environment or pneumatically vacuumized below the surrounding environment. A pressure sensor inside the compartment includes a switch, the switch configured to disconnect and connect a power source to a transmitter, wherein the switch is configured to disconnect the power source from the transmitter in the presence of the non-surrounding environmental state inside the compartment and the switch is configured to connect the power source to the transmitter when the compartment equalizes to the surrounding environment. A receiving unit is disposed remote from the product package and receives the signal from the transmitter and sounds an alarm. A passive RFID tag may be located within the compartment and detected when passing through a walk-through scanner.

Pilf resistant packaging system
11670148 · 2023-06-06 ·

A theft-proof packaging system includes a product package including a compartment configured to encapsulate a product. The compartment is in a non-surrounding environmental state, the non-surrounding environmental state being either pneumatically pressurized above a surrounding environment or pneumatically vacuumized below the surrounding environment. A pressure sensor inside the compartment includes a switch, the switch configured to disconnect and connect a power source to a transmitter, wherein the switch is configured to disconnect the power source from the transmitter in the presence of the non-surrounding environmental state inside the compartment and the switch is configured to connect the power source to the transmitter when the compartment equalizes to the surrounding environment. A receiving unit is disposed remote from the product package and receives the signal from the transmitter and sounds an alarm. A passive RFID tag may be located within the compartment and detected when passing through a walk-through scanner.

A TAMPER DETECTION DEVICE AND A METHOD FOR INSTALLING THE DEVICE
20170323537 · 2017-11-09 · ·

There is provided a tamper detection device comprising a laminate; a contact lead attached to the laminate; and a detection module connected to the contact lead. It is advantageous that the laminate is configured to conform to an application surface, and to move the contact lead. A method of installing the device is also disclosed.

Method and corresponding circuit for detecting an opening or closing event

A method includes collecting, at a building opening, air pressure signals from a pressure sensor and sound signals from a sound sensor. The method also includes sensing pressure peaks occurring in the air pressure signals and sensing sound pulses occurring in the sound signals. A joint occurrence of a pressure peak in the air pressure signals and a sound pulse in the sound signals is indicative of an opening/closing event of the building opening.

Method and corresponding circuit for detecting an opening or closing event

A method includes collecting, at a building opening, air pressure signals from a pressure sensor and sound signals from a sound sensor. The method also includes sensing pressure peaks occurring in the air pressure signals and sensing sound pulses occurring in the sound signals. A joint occurrence of a pressure peak in the air pressure signals and a sound pulse in the sound signals is indicative of an opening/closing event of the building opening.

ANOMALY DETECTION BASED ON AIRFLOW ALERTERS

A computer-implemented method for anomaly detection in a data processing system comprising a processor and a memory comprising instructions which are executed by the processor. The method includes receiving a plurality of real-time airflow patterns acquired by a plurality of airflow alerters, wherein each real-time airflow pattern corresponds to a different airflow alerter; comparing each real-time airflow pattern with a predetermined airflow pattern, wherein each real-time airflow pattern corresponds to a different predetermined airflow pattern; when there is any real-time airflow pattern different from the corresponding predetermined airflow pattern, identifying a group of airflow alerters among the plurality of airflow alerters, wherein a real-time airflow pattern of each airflow alerter in the group is different from the corresponding predetermined airflow pattern; and identifying a location of an anomaly based on the group of airflow alerters.