G08B25/002

System for managing personal safety
11580844 · 2023-02-14 · ·

A personal safety management system (100) comprising at least one portable communication device (200) communicatively connected to a wireless communication network (400); and a central computing device (500) communicatively connected to the wireless communication network (400). The at least one portable communication device (200) is configured to enable the activation of an alarm condition by a user (700) and transmitting data on the activation of the alarm condition to the central computing device (500). The central computing device (500) is configured to receive the data on the activation of the alarm condition from the at least one portable communication device (200). Furthermore, the central computing device (500) is configured to activate the alarm condition at the end of a predetermined time delay after the activation of a first operating element (210) on the communication device (200). In one embodiment, the portable communication device comprises a second operating element (220) and is configured to input, from the second operating element (220), extension data indicating the extension of the predetermined delay, and to transmit the extension data to the central computing device (500); and the central computing device (500) is configured to extend the predetermined delay based on the extension data.

DEVICE AND METHOD FOR CONTROLLING DOOR LOCK
20230042025 · 2023-02-09 · ·

A door lock control device comprises: a door lock interface for communicating with a door lock; an imaging device; a controller for processing images to be acquired through the imaging device; and a storage medium. The controller determines each of first and second objects in the images as being either authorized or unauthorized depending on whether each of the first and second objects matches authentication data read from the storage medium, and controls the door lock through a door lock interface by referring to a distance between the first and second objects determined from the images when the first object is determined as being authorized and the second object is determined as being unauthorized.

SYSTEMS AND METHODS FOR MULTI-CRITERIA ALARMING

Systems and methods for using multi-criteria state machines to manage alarming states and pre-alarming states of a hazard detection system are described herein. The multi-criteria state machines can include one or more sensor state machines that can control the alarming states and one or more system state machines that can control the pre-alarming states. Each state machine can transition among any one of its states based on sensor data values, hush events, and transition conditions. The transition conditions can define how a state machine transitions from one state to another. The hazard detection system can use a dual processor arrangement to execute the multi-criteria state machines according to various embodiments. The dual processor arrangement can enable the hazard detection system to manage the alarming and pre-alarming states in a manner that promotes minimal power usage while simultaneously promoting reliability in hazard detection and alarming functionality.

Methods and systems for managing execution of standard operating procedures by an operator to address alarms generated by a facility management system

A computer assisted facility monitoring method provides users with predefined operating procedures that are recommended for addressing one or more alarms acknowledged by the user. The predefined operating procedures are created and stored prior to the occurrence of the alarms. In some examples, after acknowledging an alarm occurrence, the user may be provided with an option for bypassing or disregarding the alarm, as some such acknowledgements may have been for false alarms. In some examples, the predefined operating procedure may specify multiple action steps for addressing an alarm. In such examples, the user can close out or settle an alarm incident even without completing all of the action steps, provided the user enters a valid reason for doing so. In some examples, a user can batch-select a group of alarms, wherein perhaps only some of the acknowledged alarms in the group have corresponding predefined operating procedures.

Integrated security network

A security system architecture and method of operation that combines a local security network with control panel and sensors, a central monitoring station (CMS), and a separate operator computer server that provides a web portal for both the homeowner and CMS, that maintains a persistent connection between the control panel and CMS allowing failsafe dual-path signaling. This dual-path signaling technique is extended to provide an effective “smash and grab alarm”, and various approaches to dual-path signal management are disclosed including handshaking, persistent domain monitoring, relayed Operator 3-to-CMS signaling, etc. Improved processes for remotely accessing video are also disclosed along with an improved process for remote control panel configuration, and control panel interfacing with home automation appliances.

MONITORING DEVICE, MONITORING METHOD, AND RECORDING MEDIUM

An appropriate response to an event is recommended to a monitoring person. An event detection unit (12) detects an event based on video data, and an alert unit (13) issues a first alert when a first event is detected, and issues a second alert that is distinguished from the first alert when a second event relating to the first event is further detected in addition to the first event.

SYSTEMS AND METHODS OF MONITORING ALARMS FROM THIRD PARTY DEVICES
20230035710 · 2023-02-02 ·

A server acts as an event analyzer for a home security or monitoring system. The server receives a signal from a remote third-party server, the signal including data relating to a condition detected by a device at a premises. The server determines whether the remote third-party server corresponds to a preexisting third-party server registration. The server determines whether the device corresponds to a preexisting device registration. When the remote third-party server is determined to correspond to the preexisting third-party server registration and the device is determined to correspond to the preexisting device registration, the server determines whether the condition detected by the device at the premises is an alarm condition. When the condition detected by the device at the premises is determined to be the alarm condition, the server transmits an alarm signal to a central monitoring station.

METHOD AND SYSTEM FOR EMERGENCY RESPONSES BY EVALUATING MEDIA DATA

A method and system for emergency responses can evaluate media data. An appropriate authority device or system can analyze media data such as a picture provided by an eyewitness' device to determine whether emergency relevant objects are visible in the media data and assigns confidence values to them. Furthermore, the location of the objects and the location of the media data can be determined to verify the authenticity of the possible emergency and to respond with the appropriate emergency response.

METHOD AND SYSTEM FOR ASYNCHRONOUS REPORTING OF EMERGENCY INCIDENTS
20230078210 · 2023-03-16 ·

A computer-implemented method and corresponding system that can allow an eyewitness of an emergency incident to instantly report it to the emergency services by sending data such as a photo of the emergency scene, without having to wait for a call-taker or agent to answer a call. This data is processed by an emergency service platform, which automatically dispatches the required resources to the emergency scene, thus managing to significantly reduce the response time of emergency services.

METHODS AND SYSTEMS FOR MANAGING EXECUTION OF STANDARD OPERATING PROCEDURES BY AN OPERATOR TO ADDRESS ALARMS GENERATED BY A FACILITY MANAGEMENT SYSTEM
20230103657 · 2023-04-06 ·

A computer assisted facility monitoring method provides users with predefined operating procedures that are recommended for addressing one or more alarms acknowledged by the user. The predefined operating procedures are created and stored prior to the occurrence of the alarms. In some examples, after acknowledging an alarm occurrence, the user may be provided with an option for bypassing or disregarding the alarm, as some such acknowledgements may have been for false alarms. In some examples, the predefined operating procedure may specify multiple action steps for addressing an alarm. In such examples, the user can close out or settle an alarm incident even without completing all of the action steps, provided the user enters a valid reason for doing so. In some examples, a user can batch-select a group of alarms, wherein perhaps only some of the acknowledged alarms in the group have corresponding predefined operating procedures.