Patent classifications
G08B29/04
COMBINATION NON-PROGRAMMABLE AND PROGRAMMABLE KEY FOR SECURITY DEVICE
A security device for an item of merchandise is provided. The security device includes a non-programmable locking mechanism comprising a mechanical lock and a programmable locking mechanism comprising a monitoring circuit operatively coupled to an alarm. The security device is configured to secure an item of merchandise from theft or removal when the mechanical lock is locked and to be separated from the item of merchandise when the mechanical lock is unlocked. The alarm is configured to provide an alarm signal if the security device is separated from the item of merchandise while the monitoring circuit is armed.
MOTION DETECTOR WITH ACCELEROMETER AND FALSE TAMPERING DETECTION
A system for tamper detection of a motion detector. The system includes an electronic controller configured to receive orientation data from an accelerometer of the motion detector. The electronic controller is also configured to filter the orientation data of the accelerometer of the motion detector. The electronic controller is further configured to determine an orientation of the motion detector using the filtered orientation data. The electronic controller is also configured to identify a tamper condition of the motion detector based on the orientation of the motion detector. The electronic controller is further configured to activate an alarm device of the motion detector based on the tamper condition.
SECURITY ECOSYSTEM
A system, method, and apparatus for implementing workflows across multiple differing systems and devices is provided herein. During operation, a workflow is automatically generated based upon a high probability of overloading resources with a current workflow. In particular, a workstation (or server) detects a high probability that a resource will be overloaded if a particular trigger is implemented. The workstation (or server) then determines an alternate trigger to reduce the chances that a resource will be overloaded. The alternate trigger and action can then be implemented or suggested as a newly-created workflow.
SECURITY ECOSYSTEM
A system, method, and apparatus for implementing workflows across multiple differing systems and devices is provided herein. During operation, a workflow is automatically generated based upon a high probability of overloading resources with a current workflow. In particular, a workstation (or server) detects a high probability that a resource will be overloaded if a particular trigger is implemented. The workstation (or server) then determines an alternate trigger to reduce the chances that a resource will be overloaded. The alternate trigger and action can then be implemented or suggested as a newly-created workflow.
Increasing the suction power in an aspirating smoke detector (ASD) to shorten the transport time from a detected minimum signal level value without the output of an interruption signal
The present disclosure relates to aspirating smoke detectors (ASD). In an ASD, ambient air is aspirated and is fed to a fire detector unit for determining a signal level. For normal operation, the suction power is set to a nominal airflow value and this is increased from a minimum signal level value in order to shorten the transport time of aspirated smoke through the suction pipe to the fire detector unit. In some embodiments, an interruption signal provided for normal operation is output if the airflow exceeds an upper limit value for a minimum period. Independently thereof, the suction power is increased from the minimum signal level value only to the extent that the airflow does not exceed the upper limit value. Or, regardless thereof, the suction power is increased only for a timespan smaller than the minimum period in which the airflow exceeds the upper limit value.
Systems and methods for biometric tamper detection
Various embodiments provide systems and methods for detecting tampering with a monitoring device using biometric data.
WALK TEST FOR FIRE ALARM SYSTEMS USING A MOBILE DEVICE
Methods and systems for performing a walk test for fire alarm systems using a mobile device are described herein. One fire alarm system, includes a system control panel fixedly positioned within a building for controlling a plurality of fire alarm system devices connected to the panel and positioned within the building, a mobile device wirelessly connected to the control panel, and a fire alarm system control application on the mobile device, wherein the fire alarm control system application gains access to the control panel and, therethrough, the plurality of fire alarm system devices and wherein the fire alarm control system application issues a command to a particular fire alarm system device of the plurality of fire alarm system devices to perform a particular test or maintenance function and the control panel relays the command to the particular fire alarm system device.
Enhanced location tracking using ultra-wideband
Disclosed herein are systems and methods related to a wireless tracking system: The wireless tracking system having a plurality of beacons, each of the plurality of beacons having at least one antenna and at least one power source. When the at least one antenna is supplied with power via the power source, a local ping is transmitted from the beacon. A wireless tracking device then receives the ping via its own antenna. Once the wireless tracking device has received a locational ping from at least two of the plurality of beacons, it can then calculate a direct connection path between the at least to beacons. Based on this known path, the wireless tracking device can then determine a distance between the wireless tracking device and connection path. Based on the determined distance, the wireless tracking device may then issue a corrective measure.
Enhanced location tracking using ultra-wideband
Disclosed herein are systems and methods related to a wireless tracking system: The wireless tracking system having a plurality of beacons, each of the plurality of beacons having at least one antenna and at least one power source. When the at least one antenna is supplied with power via the power source, a local ping is transmitted from the beacon. A wireless tracking device then receives the ping via its own antenna. Once the wireless tracking device has received a locational ping from at least two of the plurality of beacons, it can then calculate a direct connection path between the at least to beacons. Based on this known path, the wireless tracking device can then determine a distance between the wireless tracking device and connection path. Based on the determined distance, the wireless tracking device may then issue a corrective measure.
SHOCK DETECTION DEVICE, SYSTEM AND METHOD
A shock detector device (110) for premises security is described. The shock detector device (110) comprises a shock detector sensor (112) configured to sense physical motion and to output an electrical signal in response to the physical motion. Processing circuitry (114) is configured to process the electrical signal by: obtaining an indication that a shock event has occurred if a value for at least one parameter of the electrical signal is determined to exceed a threshold value; and processing instructions for adjusting at least one detection parameter of the shock detector device (110) in response to a determination that the shock event is a false alarm event, wherein the adjusting of the at least one detection parameter results in a decrease of a sensitivity of shock detection by the shock detector device (110).