G08B13/20

ANOMALY DETECTION BASED ON AIRFLOW ALERTERS

A computer-implemented method for anomaly detection in a data processing system comprising a processor and a memory comprising instructions which are executed by the processor. The method includes receiving a plurality of real-time airflow patterns acquired by a plurality of airflow alerters, wherein each real-time airflow pattern corresponds to a different airflow alerter; comparing each real-time airflow pattern with a predetermined airflow pattern, wherein each real-time airflow pattern corresponds to a different predetermined airflow pattern; when there is any real-time airflow pattern different from the corresponding predetermined airflow pattern, identifying a group of airflow alerters among the plurality of airflow alerters, wherein a real-time airflow pattern of each airflow alerter in the group is different from the corresponding predetermined airflow pattern; and identifying a location of an anomaly based on the group of airflow alerters.

Intrusion movement prediction

According to one embodiment, a method, computer system, and computer program product for intrusion movement prediction is provided. The embodiment may include receiving environmental sensor data corresponding to a monitored space as captured by a plurality of sensors affixed to an airflow component. The embodiment may also include generating a three-dimensional model of the monitored space using the received environmental data. The method may further include, in response to determining a disturbance is present in the three-dimensional model, performing a security action.

Intrusion movement prediction

According to one embodiment, a method, computer system, and computer program product for intrusion movement prediction is provided. The embodiment may include receiving environmental sensor data corresponding to a monitored space as captured by a plurality of sensors affixed to an airflow component. The embodiment may also include generating a three-dimensional model of the monitored space using the received environmental data. The method may further include, in response to determining a disturbance is present in the three-dimensional model, performing a security action.

Indoor intrusion detection

A computer-implemented method, a system, and a computer program product for detecting objects are disclosed. The method can include receiving, by a computer communicatively connected to a plurality of anemometers positioned throughout the space, first sensor data from the plurality of anemometers, creating a baseline profile of airflow in the space based on the first sensor data, and receiving second sensor data from the plurality of anemometers at a different time than the first sensor data. The method can include comparing the second sensor data with the first sensor data to determine first different data, rendering, in response to determining that the second sensor data is different from the first sensor data, a representation of the object using the first different data and first location data related to the first different data, and calculating a vector associated with the object using the first different data and the first location data.

Indoor intrusion detection

A computer-implemented method, a system, and a computer program product for detecting objects are disclosed. The method can include receiving, by a computer communicatively connected to a plurality of anemometers positioned throughout the space, first sensor data from the plurality of anemometers, creating a baseline profile of airflow in the space based on the first sensor data, and receiving second sensor data from the plurality of anemometers at a different time than the first sensor data. The method can include comparing the second sensor data with the first sensor data to determine first different data, rendering, in response to determining that the second sensor data is different from the first sensor data, a representation of the object using the first different data and first location data related to the first different data, and calculating a vector associated with the object using the first different data and the first location data.

INTRUSION MOVEMENT PREDICTION

According to one embodiment, a method, computer system, and computer program product for intrusion movement prediction is provided. The embodiment may include receiving environmental sensor data corresponding to a monitored space as captured by a plurality of sensors affixed to an airflow component. The embodiment may also include generating a three-dimensional model of the monitored space using the received environmental data. The method may further include, in response to determining a disturbance is present in the three-dimensional model, performing a security action.

INTRUSION MOVEMENT PREDICTION

According to one embodiment, a method, computer system, and computer program product for intrusion movement prediction is provided. The embodiment may include receiving environmental sensor data corresponding to a monitored space as captured by a plurality of sensors affixed to an airflow component. The embodiment may also include generating a three-dimensional model of the monitored space using the received environmental data. The method may further include, in response to determining a disturbance is present in the three-dimensional model, performing a security action.

PILF RESISTANT PACKAGING SYSTEM
20210142637 · 2021-05-13 ·

A theft-proof packaging system includes a product package including a compartment configured to encapsulate a product. The compartment is in a non-surrounding environmental state, the non-surrounding environmental state being either pneumatically pressurized above a surrounding environment or pneumatically vacuumized below the surrounding environment. A pressure sensor inside the compartment includes a switch, the switch configured to disconnect and connect a power source to a transmitter, wherein the switch is configured to disconnect the power source from the transmitter in the presence of the non-surrounding environmental state inside the compartment and the switch is configured to connect the power source to the transmitter when the compartment equalizes to the surrounding environment. A receiving unit is disposed remote from the product package and receives the signal from the transmitter and sounds an alarm. A passive RFID tag may be located within the compartment and detected when passing through a walk-through scanner.

PILF RESISTANT PACKAGING SYSTEM
20210142637 · 2021-05-13 ·

A theft-proof packaging system includes a product package including a compartment configured to encapsulate a product. The compartment is in a non-surrounding environmental state, the non-surrounding environmental state being either pneumatically pressurized above a surrounding environment or pneumatically vacuumized below the surrounding environment. A pressure sensor inside the compartment includes a switch, the switch configured to disconnect and connect a power source to a transmitter, wherein the switch is configured to disconnect the power source from the transmitter in the presence of the non-surrounding environmental state inside the compartment and the switch is configured to connect the power source to the transmitter when the compartment equalizes to the surrounding environment. A receiving unit is disposed remote from the product package and receives the signal from the transmitter and sounds an alarm. A passive RFID tag may be located within the compartment and detected when passing through a walk-through scanner.

Assessing the security situation by means of IoT activity sensors
10997834 · 2021-05-04 · ·

A method and/or system for assessing the security situation in a building through an evaluation of sensor values provided by activity sensors situated in the building, in particular, in the accommodation region, an estimate of the number of persons actually present in the building, determining the number of persons to be expected in the building by an evaluation of administrative data (HR, Outlook, events, occupancies, etc.). Based upon a comparison of the number of persons to be expected with the number of actual persons, an indicator is determined for assessing the actual security situation in the building or in the accommodation region.